Solved papers for Banking Computers IBPS Bank Clerk Online CWE-IV Exam Held on 14-12-2014

done IBPS Bank Clerk Online CWE-IV Exam Held on 14-12-2014

  • question_answer1) ______ refers to the unauthorized copying and distribution of software.

    A) Hacking

    B) Software Piracy

    C) Software literacy

    D) Cracking

    E) Copyright

    View Answer play_arrow
  • question_answer2) Which of the following is an operating system?

    A) Linux

    B) Debugger

    C) Mozilla

    D) Google Chrome

    E) Intel 8085

    View Answer play_arrow
  • question_answer3) A collection of programs that controls how your computer system runs and processes in-formation is called

    A) Operating System

    B) Computer

    C) Office

    D) Compiler

    E) Interpreter

    View Answer play_arrow
  • question_answer4) Which of the following statements is a false conceiving file names?

    A) Every file in the same folder must have a unique name

    B) The file name comes before the dot

    C) File extension is another name for the type

    D) The file extension comes before the dot (.) followed by the file name

    E) Files may share the same name or the same extension but not both at the same time.

    View Answer play_arrow
  • question_answer5) Which is not a storage device?

    A) Printer

    B) CD

    C) Hard Disk

    D) Floppy Disk

    E) DVD

    View Answer play_arrow
  • question_answer6) _____tags, placed on animal's body can be used to record and track in a database all of the animal's movements.

    A) POS

    B) RFID

    C) PPS

    D) GPS

    E) None of these

    View Answer play_arrow
  • question_answer7) Which of the following cables can transmit data at high speeds?

    A) Flat cables

    B) Coaxial cable

    C) Optic fibre cable

    D) Twisted pair cable

    E) UTP cable

    View Answer play_arrow
  • question_answer8) The hardware device or software program that sends messages between networks is known as a

    A) Bridge

    B) Backbone

    C) Router

    D) Gateway

    E) None of these

    View Answer play_arrow
  • question_answer9) If you are performing Windows 98 operating system to Windows XP you are performing a(n)

    A) Push up

    B) China

    C) Patch

    D) Update

    E) None of these

    View Answer play_arrow
  • question_answer10) ________technology enables you to carry a powerful navigational aid in websites.

    A) Convergence

    B) Locator

    C) Sampling Rate

    D) Synchronization

    E) Global Positioning System (GPS)

    View Answer play_arrow
  • question_answer11) Which of the following is not true about RAM?

    A) RAM is the same as ha disk storage

    B) RAM is a temporary storage area

    C) RAM is volatile

    D) RAM stands for Random Access Memory

    E) Information stored in RAM gone when you turn the computer off.

    View Answer play_arrow
  • question_answer12) All of the following are examples of real security and privacy risks EXCEPT

    A) Spyware

    B) Spam

    C) Hackers

    D) Identity Theft

    E) Viruses

    View Answer play_arrow
  • question_answer13) Which of the following commands in Office 2007. Can used to go to the first cell in the current row?

    A) TAB

    B) SHIFT + TAB

    C) ESC + HOME


    E) HOME

    View Answer play_arrow
  • question_answer14) Software such as virus worms and Trojan horses has a malicious content known as

    A) Malicious Software

    B) adware

    C) scare ware

    D) Spyware

    E) fire wall

    View Answer play_arrow
  • question_answer15) Chip is a common nickname for a(n)

    A) Transistor

    B) Resistor

    C) Integrated Circuit

    D) Semiconductor

    E) None of these

    View Answer play_arrow
  • question_answer16) What is extension of Microsoft Word document?

    A) Doc

    B) ppt

    C) dec

    D) bd

    E) hml

    View Answer play_arrow
  • question_answer17) Which of the following enables to determine how often a user visited a website?

    A) Hackers

    B) Spammers

    C) Phish

    D) identity thefts

    E) Cookies

    View Answer play_arrow
  • question_answer18) To move to the bottom of a document while working on MS word. Which command is used?

    A) Home Key

    B) End Key

    C) Ctrl + Page Down

    D) Insert Key

    E) Ctrl Key + End Key

    View Answer play_arrow
  • question_answer19) What is a person called who uses a computer to cause harm to people or destroy critical systems?

    A) Cyber terrorist

    B) Black-hat hacker

    C) Cyber Cracker

    D) Hacktivist

    E) None of these

    View Answer play_arrow
  • question_answer20) ______can interpret voice data into words that can be understood by the computer.

    A) Speech Input Hardware

    B) Speech Recognition Software

    C) Word Recognition Software

    D) Talking Software

    E) None of these

    View Answer play_arrow
  • question_answer21) Oracle is a

    A) Hardware

    B) High Level Language

    C) Operating System

    D) System Software

    E) RDBMS

    View Answer play_arrow
  • question_answer22) Which of following company developed the microprocessor?

    A) Intel

    B) IBM

    C) Microsoft

    D) Apple

    E) Google

    View Answer play_arrow
  • question_answer23) What does ALU in computing denote?

    A) Application and Logic Unit

    B) Algorithm Logic Unit

    C) Arithmetic Layered Unit

    D) Arithmetic legal Unit

    E) Arithmetic Logic Unit

    View Answer play_arrow
  • question_answer24) Integrated Circuit (1C) chips used in computers are mad with

    A) Copper

    B) Aluminium

    C) Gold

    D) Silicon

    E) Silver

    View Answer play_arrow
  • question_answer25) What does the computer abbreviation MB used for?

    A) Mega Bit

    B) Million Bytes

    C) Mega Bytes

    D) Million Bit

    E) Micro Bytes

    View Answer play_arrow
  • question_answer26) What is the full form of HTTP'

    A) Hyper Text Transfer Pro to col

    B) Hyper Text Transition Protocol

    C) Hyper Text Transfer Program

    D) Hyper Text Transition Program

    E) Hyper Text Trivial Protocol

    View Answer play_arrow
  • question_answer27) Verification of a Login name and Password is known as_______

    A) Configuration

    B) Accessibility

    C) Authentication

    D) logging in

    E) None of these

    View Answer play_arrow
  • question_answer28) Which of the following is software?

    A) Keyboard

    B) Internet Explorer

    C) Scanner

    D) Mouse

    E) Printer

    View Answer play_arrow
  • question_answer29) The term Bit is short for-

    A) Binary Digit

    B) Binary Number

    C) Binary Language

    D) Small digit

    E) One byte

    View Answer play_arrow
  • question_answer30) What does MICR stand for?

    A) Magnetic Ink Character Register

    B) Magnetic Ink Code Reader

    C) Magnetic Ink Code Register

    D) Magnetic Ink Character Recognition

    E) Magnetic Ink Cases Reader

    View Answer play_arrow
  • question_answer31) RTGS stands for-

    A) Real Time Gross Settlement

    B) Real Time General settlement

    C) Run Time Gross Settlement

    D) Regular Time General Settlement

    E) Regular Time Gross Settlement

    View Answer play_arrow
  • question_answer32) A device that converts from decimal to binary number is known as

    A) Instructor

    B) Decoder

    C) AND Gate

    D) Converter

    E) None of these

    View Answer play_arrow
  • question_answer33) What does the acronym ASCI stands for?

    A) American Standard Code for Information Interchanger

    B) American Standard Code for Information Interchange

    C) American Standardized Code for Information Interchange

    D) American Standardization Code for Information Interchange

    E) American Standardization Code for Information Inter Changer

    View Answer play_arrow
  • question_answer34) Which of the following is not a valid formula in Microsoft Excel?

    A) =A2+A1

    B) = A2 + 1

    C) = 1 + A2

    D) = 1A + 2

    E) =A1+A2

    View Answer play_arrow
  • question_answer35) What does the acronym ISP stand for?

    A) Internal Service Provider

    B) International Service Provider

    C) Internet Service Provider

    D) Internet Service Providing

    E) Internet Service Provision

    View Answer play_arrow
  • question_answer36) What is the full form of WWW?

    A) Work Wide Web

    B) World Wide Web

    C) World With Web

    D) World Wide Wet

    E) World Weak Web

    View Answer play_arrow
  • question_answer37) Which of the following is hardware?

    A) Assembler

    B) Server

    C) Compiler

    D) Interpreter

    E) OS

    View Answer play_arrow
  • question_answer38) USB in data cables stands for?

    A) Unicode Smart Bus

    B) Universal Structural Bus

    C) Unicode serial Bus

    D) Universal Smart Bus

    E) Universal Serial Bus

    View Answer play_arrow
  • question_answer39) Which of the following is not a binary number?

    A) 11101

    B) 110

    C) 233

    D) 1001

    E) 100110

    View Answer play_arrow
  • question_answer40) _____ is approximately one billion bytes.

    A) Megabyte

    B) Kilobyte

    C) Terabyte

    D) Gigabyte

    E) Bit

    View Answer play_arrow

Study Package

IBPS Bank Clerk Online CWE-IV Exam Held on 14-12-2014
  30 20


You need to login to perform this action.
You will be redirected in 3 sec spinner