Вы находитесь на странице: 1из 6

IBPS Clerk Mains (Computer Awareness-Assignment)

Computer Awareness
IBPS Clerk (Mains) Exam 2017
IBPS Clerk Mains (Computer Awareness-Assignment)

COMPUTER AWARENESS
(1-5).In a code language, the symbol for '0' attribute is unnecessarily duplicated in the
is '#' and for '1' is '$'. Numbers greater than tuples.
one is to be written only by using the two E.None of these
symbols that given abovE. Follow some
instruction that are given below - 7. 255.255.255.0 subnet mask of which
A.0 is written as #, B.1 is written as $, class?
C.2 is written as $#, D.3 is written as $$,so A.Class A B.Class B
on C.Class C D.Class D
1. Which of the following will represent 22? E.Class E
A.##$$# B.$#$$$
C.$#$## D.$#$$# 8. __________________ is a set of
E.None of the above programs, located at a network gateway
server that protects the resources of a
2. Which of the following will represent 53? private network from other networks:
A.#$$$$# B.$#$## A. Root kit B. Firewall
C.$$#$#$ D.$#$$## C. Sandbox D. Password Cracker
E.None of the above E. None of these

3. Which of the following will represent the 9. Which of the following is not an input
value of -( #$$# + $#$$ * #$$ )= ? device?
A.35 B.36 A. OCR
C.37 D.38 B. Optical scanners
E.39 C. Voice recognition device
D. COM (Computer Output to Microfilm)
4. Which of the following will represent the E. None of these
value of- ( #$#$#$ + $$$$#÷ #$$# )= ?
A.28 B.57 10. Who among the following is the odd
C.26 D.55 one______?
E.None of the above? A. Mouse B. Scanner
C. Printer D. Keyboard
5. (3457) 8 = (?) 16 E. None of these
A.725 B.7215
C.72F D.72E 11. Which is not a storage device?
E.None of the above. A. Printer B. CD
C. Hard disk D. Floppy Disk
6. In NormalizationBCNF is needed because: E. DVD
A.BCNF is need when the Data is deleted
tuples may be lost 12. ____ ___technologies is used by banks
B.Otherwise tuples may be duplicated for faster processing of large volumes of
C.Updating is otherwise is difficult cheques.
D.When there is dependent attributes in A. OCR B. OMR
two possible composite keys one of the C. MICR D. Bar code
IBPS Clerk Mains (Computer Awareness-Assignment)

E. None of these C.A. or B.


D. NonE.
13. Who invented Analytical engine? E. None of these
A. Blaise Pascal
B. George Bool 19. Which of the following is a function of
C. Charles Babbage Operating System (OS)?
D. Dr. Herman Hollerith A. Process & Memory Management
E. None of these B. File Management
C. Input/Output Management
14. Memory which forgets everything when D. All of the above
you switch off the power is known as_____. E. None of these
A. Corrupted
B. Volatile 20. Which of the following is an example of
C. Non-Volatile Single User Operating System?
D. Non-Corrupted A. MS-DOS B. Windows 9X
E. None. C.A.&B. D. None
E. None of these
15. Which of the following code used in
present day computing was developed by 21. Which of the following is an example of
IBM Corporation? Multi User Operating System?
A. ASCII A. UNIX
B. Hollerith Code B. LINUX
C.EBCDIC Code C. Windows 2000/2007
D. Baudot Code D.A.&B.&C.
E. None of these E. None of these

16. An image editing software in which we 22. MICR stand for?


can draw and edit images is? A. Magnetic Ink character Register
A. PageMaker B. MS-Paint B. Magnetic Ink Code Reader
C. Coral Draw D. Photo Image C. Magnetic Ink Code Register
E. Front D. Magnetic Ink character Recognition
E. Magnetic Ink cases Reader
17. Physical components that make up your
computer are known as______. 23. Virtual memory is________?
A. Software B. Operating Systems A. Memory on the hard disk that the CPU
C. Hardware D. Web Browsers uses an extended RAM.
E. None of these B. Access the page table
C. CPU generates a physical address
18. What is warm booting? D. Automatic storage allocation
A. When a computer is turned on after it E. None of these.
has been completely shut down.
B. When a computer is restarted by 24. What is the full form of SIM?
pressing the restart button or pressing (ctrl A. Station Identity Module
+ Alt + Del) key. B. System Identity Module
IBPS Clerk Mains (Computer Awareness-Assignment)

C. Subscriber Identity Module E. None of these


D. Subscriber Trunk Dialing
E. None of these 31. Artificial Intelligence can be used in
every sphere of life because of its
25. A ______is a software program used to A.Ability to work in hazardous places
view Web pages. B. Ability to think like human beings
A. Site B. Host C. Ability to work in artificial environments
C. Link D. Browser D. All of the above
E. None of these E. None

26. Micro-programming introduced 32. Software Quality assurance is for


by_____? A. Error prevention
A. John Mauchley B. Maurice Wilkies B. Error detection
C. William Shockley D. Blaise pascal C. Error correction
E. None of these D. Either a or C.
E. None of these.
27. Numbers and formulae entered in a cell
are called _____. 33. IN OOPS technology hiding the
A. Labels B. Numeric entries complexity of characteristics is called as –
C. Intersection D. Text A. Abstraction
E. Fellers B. Inheritance
C. Object
28.TCP /IP protocol stack is – D. Polymorphism
A. Combination of TCP and IP Protocol E. Encapsulation
B. A Family of protocol that connect to PCs
C. Part of internet 34. The IP Address 135.0.10.27 belong to
D. Both b and c the address class_______?
E. None of these A. Class A B. Class B
C. Class C D. Class D
29. When talking of software budget – E. Class E
A. It includes only direct development cost
B. Productivity loss that occurs during IT 35. Which of the following is not a binary
Training system?
C. Indirect cost of budget include training A. EBCDIC B. ASCII
cost C. HEX D. Both a and b
D. both a and c E. None
E. None
36. 1 AND 1 will give
30. Which of the following makes a network A.1 B.0
insecure? C. Both A and B D. 10
A. Encryption E. None
B. NIC (Network interface card)
C. Static keys
D. Either B or C
IBPS Clerk Mains (Computer Awareness-Assignment)

37. Computer to Computer communication 43. _______ is when the more power-
for business transaction is called as- hungry components, such as the monitor
A. PIN B. EDI. and the hard drive are put in idle.
C. AIM D. Both a and c A. Hibernation
E. None B. Power down
C. Standby mode
38. Fax machines are used to send D. shutdown procedure
documents through a? E. None of these.
A. Telephone line B. Modems
C. Co-axial wire D. All of these 44. Which of the following is an operating
E. None of these system?
A. Linux B. Debugger
39. Date and time are available on the C. Mozilla D. Google chrome
desktop at_________. E. Intel 8085
A. Keyboard B. Recycle bin
C. My computer D. Task bar 45. Which of the following cables can
E. None of these transmit data at high speeds?
A. Flat cables
40. To save an existing file with new name B. Coaxial cable
at a new location we should C. Optic fiber cable
use_______command. D. Twisted pair cable
A. Save E. UTP cable
B. Save and replace
C. Save as 46. What is the base of hexadecimal
D. New file number system?
E. None of these A. 2 B. 8
C. 16 D. 10
41. A red wavy line under a word indicates E. None of these..
that the word_______.
A. Is too long for the line of text 47. RTGS stand for_____.
B. Is not in the dictionary file and therefore A. Real Time Gross Settlement
might be spelt incorrectly B. Real Time General Settlement
C. Is not appropriate for that particular C. Run Time Gross Settlement
sentence D. Regular Time General Settlement
D. Is a verb E. None of these
E. None of these.
48. What is the name given to the
42. Windows xp, windows 7, windows 10 temporary storage area that a web browser
are known as…………….? uses to store pages and graphics that it has
A. Processors B. Domain names recently opened?
C. Modems D. Operating system A. Niche B. Cookies
E. None of these. C. Cache D. Cellar
E. None of these
IBPS Clerk Mains (Computer Awareness-Assignment)

49. Oracle is an example of ______ 50. In OSI model Data link layer is dived into
application software. -
A. Database A.MAC and Session layer
B. Word processing B.MAC and LLC layer
C. Project management C.MAC and Physical layer
D. Presentation graphics D.LLC and Transport layer
E. Desktop E. None of the these

Вам также может понравиться