Deprecated: Optional parameter $field declared before required parameter $post is implicitly treated as a required parameter in /home4/keralaon/public_html/wp-content/plugins/pc-google-analytics/includes/lib/class-pc-google-analytics-admin-api.php on line 281

Warning: Cannot modify header information - headers already sent by (output started at /home4/keralaon/public_html/wp-content/plugins/pc-google-analytics/includes/lib/class-pc-google-analytics-admin-api.php:281) in /home4/keralaon/public_html/wp-content/plugins/bluehost-wordpress-plugin/vendor/newfold-labs/wp-module-ecommerce/includes/ECommerce.php on line 197
IBPS Clerk exam previous year computer knowledge question paper

IBPS Clerk exam previous year computer knowledge question paper

0

Deprecated: Creation of dynamic property InsertPostAds::$settings is deprecated in /home4/keralaon/public_html/wp-content/plugins/insert-post-ads/insert-post-ads.php on line 427

IBPS Clerk exam previous year computer knowledge question paper

IBPS Clerk exam previous year computer knowledge question paper:  IBPS Clerk previous year computer knowledge question paper is given below.

Computer Knowledge

1. …… refers to the unauthorized copying and distribution of software.

(1) Hacking
(2) Software piracy
(3) Software literacy
(4) Cracking
(5) Copyright

2. Which of the following is an operating system?

(1) Umlx
(2) Debugger
(3) Mozilla
(4) Google Chrome
(5) Intel 8085

3. A collection of programs that controls how your computer system runs and processes information is called

(1) operating system
(2) computer
(3) office
(4) compiler
(5) interpreter

4. Which of the following statements is a false conceiving file names?

(1) Every file in the same folder must have a unique name
(2) The file name comes before the dot (.)
(3) File extension is another name for the type
(4) The file extension comes before the dot (.) followed by the file name
(5) Files may share the same name or the same extension, but not both at the same time

5. Which is not a storage device?

(1) Printer
(2) CD
(3) Hard Disk
(4) Floppy Disk
(5) DVD

6. …….. tags, placed on animal’s body can be used to record and track in a database all of the animal’s movements.

(1) pas
(2) RFID
(3) PPS
(4) GPS
(5) Other than those given as options

7. Which of the following cables can transmit data at high speeds?

(1) Flat cables
(2) Coaxial cable
(3) Optic fibre cable
(4) Twisted pair cable
(5) UTP cable

8. The hardware device or software program that sends messages between networks is known as a

(1) bridge
(2) backbone
(3) router
(4) gateway
(5) Other than those given as options

9. If you are performing Windows 98 operating system to Windows XP you are performing a(n)

(1) push up
(2) China
(3) patch
(4) pull down
(5) update

10. . . . . . . . . . technology enables you to carry a powerful’ navigational aid in websites.

(1) Convergence
(2) Locator
(3) Sampling rate
(4) Synchronization
(5) Global Positioning System

11. Which of the following is not true about RAM?

(1) RAM is the same as hard disk storage
(2) RAM is a temporary storage area
(3) RAM is volatile
(4) RAM stands for Random Access Memory
(5) Information stored in RAM is gone when you, turn the computer off

12. All of the following are examples of real security and privacy risks EXCEPT

(1) spyware
(2) spam
(3) hackers
(4) identity theft
(5) viruses

13. Which of the following commands in Office 2007, can be used to go to the first cell in the current row?

(1) Tab
(2) Shift + Tab
(3) Esc + Home
(4) Shift + Home
(5) Home

14. Software such as Viruses, Worms and Trojan Horses that has a malicious content, is known as

(1) malicious software (malware)
(2) adware
(3) shareware
(4) spyware
(5) firewall

15. Chip is a common nickname for a(n)

(1) transistor
(2) resistor
(3) integrated circuit
(4) semi-conductor
(5) Other than those given as options

16. What is extension of Microsoft Word document?

(1) doc
(2) ppt
(3) dcc
(4) bd
(5) hml

17. Which of the following enables to determine how often a user visited a website?

(1) Hackers
(2) Spammers
(3) Phish
(4) Identity thefts
(5) Cookies

18. To move to the bottom of a document while working on MS Word, which command is used?

(1) Home key
(2) End key
(3) Ctrl + Page Down
(4) Insert key
(5) Ctrl key + End key

19. What is a person called who uses a computer to cause harm to people or destroy critical systems?

(1) Cyber Terrorist
(2) Black-hat Hacker
(3) Cyber Cracker
(4) Hacktivist
(5) Other than those given as options

20. . . . . . . . .. can interpret voice data into words that can be understood by the computer.

(1) Speech input hardware
(2) Speech recognition software
(3) Word recognition software
(4) Talking software
(5) Other than those given as options

21. Oracle is a(n)

(1) hardware
(2) high level language
(3) operating system
(4) system software
(5) RDBMS

22. Which of the following company developed the microprocessor?

(1) Intel
(2) IBM
(3) Microsoft
(4) Apple
(5) Google

23. What does ALU in computing denote?

(1) Application and Logic Unit
(2) Algorithm Logic Unit
(3) Arithmetic Layered Unit
(4) Arithmetic Legal Unit
(5) Arithmetic Logic Unit

24. Integrated Circuit (IC) chips used in computers are made with

(1) copper
(2) aluminium
(3) gold
(4) silicon
(5) silver

25. What does the computer abbreviation ‘MB’ used for?

(1) Mega Bit
(2) Million Bytes
(3) Mega Bytes
(4) Million Bit
(5) Micro Bytes

26. What is the full form of HTTP?

(1) Hyper Text Transfer Protocol
(2) Hyper Text Transition Protocol
(3) Hyper Text Transfer Program
(4) Hyper Text Transition Program
(5) Hyper Text Trivial Protocol

27. Verification of a login name and password is known as

(1) configuration
(2) accessibility
(3) authentication
(4) logging in
(5) Other than those given as options

28. Which of the following is software?

(1) Keyboard
(2) Internet Explorer
(3) Scanner
(4) Mouse
(5) Printer

29. The term ‘bit’ is short for

(1) binary digit
(2) binary number
(3) binary language
(4) small digit
(5) one byte

30. What does MICR stand for?

(1) Magnetic Ink Character Register
(2) Magnetic Ink Code Reader
(3) Magnetic Ink Code Register
(4) Magnetic Ink Character Recognition
(5) Magnetic Ink Cases Reader

31. RTGS stands for

(1) Real Time Gross Settlement
(2) Real Time General Settlement
(3) Run Time Gross Settlement
(4) Regular Time General Settlement
(5) Regular Time Gross Settlement

32. A device that converts from decimal to binary number is known as

(1) instructor
(2) decoder
(3) AND gate
(4) converter
(5) decoder

33. What does the acronym ASCI stands for?

(1) American Standard Code for Information Interchanger
(2) American Standard Code for Information Interchange
(3) American Standardised Code for Information Interchange
(4) American Standardisation Code for Information Interchange
(5) American Standardisation Code for Information Interchanger

34. Which of the following is not a valid formula in Microsoft Excel?

(1) =A2+A1
(2) =A2+1
(3) = 1 + A2
(4) =1A+2
(5) =A1 +A2

35. What does the acronym ISP stand for?

(1) Internal Service Provider
(2) International Service Provider
(3) Internet Service Provider
(4) Internet Service Providing
(5) Internet Service Provision

36. What is the full form of WWW?

(1) Work Wide Web
(2) World Wide Web
(3) World With Web
(4) World Wide Wet
(5) World Weak Web

37. Which of the following is hardware?

(1) Assembler
(2) Server
(3) Compiler
(4) Interpreter
(5) Operating System

38. USB in data cables stands for

(1) Unicode Smart Bus
(2) Universal Structural Bus
(3) Unicode Serial Bus
(4) Universal Smart Bus
(5) Universal Serial Bus

39. Which of the following is not a binary number?

(1) 11101
(2) 110
(3) 233
(4) 1001
(5) 100110

40. A is approximately one billion bytes.

(1) megabyte
(2) kilobyte
(3) terabyte
(4) gigabyte
(5) bit

Share.

About Author

Leave A Reply