Study Material for IBPS PO & Clerk, RRB, SBI PO & Clerk ~ Computer Awareness
Computer is a scoring subject in IBPS Clerk, PO, in RRB, RBI and also in SBI PO & Clerk. For your better practice and knowledge i have uploaded a book for computer awareness for IBPS examination. you can practice some questions here or can download the same in pdf file from the bottom of the page which contains 700 questions for practice.
1. A peer-to-peer LAN is an appropriate network architecture for____
(1) The Internet.
(2) Home network.
(3) Network requiring a server with shared resources.
(4) wide area network
(5) None of these
2. Similar to a hub in an Ethernet network, a ____________ helps relay data between wireless network nodes.
(1) Wireless port
(2) Wireless access point
(3) wireless adapter
(4) wireless transceiver
(5) None of these
3. Cell phones use ____________ to access the Internet.
(1) MMS technology
(2) a notation system
(3) micro browser software
(4) HTML language
(5) None of these
4. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______
(1) Node.
(2) Packet.
(3) Override.
(4) Token.
(5) None of these
5. The uniform resource locator (URL) is case sensitive in the ____.
(1) Protocol
(2) Authority
(3) Directory
(4) Type
(5) None of these
6. ASCII is a(n)________
(1) Numbering system for representing numbers with decimals.
(2) Character representation standard common in older mainframe computers.
(3) Encoding standard used to represent letters and characters.
(4) Symbolic programming language that directly represents machine instructions.
(5) None of these
7. A global network made up of thousands of privately owned computers and networks is called the:
(1) World Wide Web.
(2) Internet.
(3) Specialized search engine.
(4) Internet2.
(5) None of these
8. Which of the following is NOT a basic function of the operating system?
(1) Manage memory
(2) Provide the word processing system
(3) Start the computer
(4) Provide the user interface
(5) None of these
9. Which of the following scrambles a message by applying a secret code?
(1) Encryption
(2) Audits
(3) UPS
(4) Firewalls
(5) None of these
10. The Internet began with the development of
1) USENET
2) ARPANET
3) Ethernet
4) Intranet
5) None of these
11. Website is a collection of ________
1) HTML documents
2) Graphic files
3) Audio and Video files
4) All of the above
5) None of these
12. Who designed the first electronic computer - ENIAC ?
1) Van Neuman
2) Joseph M Jacquard
3) J presper Eckert
4) Both 1 and 2
5) None of these
13. Which of the following is not a network?
1) Local Area Network
2) Wide Area Network
3) Optical Fiber
4) All are networks
5) None of these
14. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these
15. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these
16. Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these
129. Perforated paper used as input or output media is known as_____
(1) Paper tape
(2) Magnetic tape
(3) Punched paper tape
(4) Card punch
(5) None of these
130. 30 The first generation computer system used________
(1) Vacuum tubes
(2) Transistors
(3) Registers
(4) Magnetic cores
(5) Silicon chip
131. To access properties of an object, the mouse technique to use is _______
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these
132. The ALU and Control Unit jointly known as_______
(1) RAM
(2) ROM
(3) CPU
(4) PC
(5) none of these
133. Computers process data into information by working exclusively with ______
(1) multimedia
(2) words
(3) characters
(4) numbers
(5) None of these
134. COBOL stands for _______
(1) Common Business Oriented Language
(2) Computer Business Oriented Language
(3) Common Business Operated Language
(4) Common Business Organized Language
(5) None of these
135. What is the other name for programmed chip?
(1) RAM
(2) ROM
(3) LSIC
(4) PROM
(5) None of these
136. ___________ Store data temporarily and pass it on as directed by the control unit.
(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these
137. RAID stands for________
(1) Reproduce Array of Intelligent Disks
(2) Reproduce Array of Inexpensive Disks
(3) Redundant Array of Inexpensive Drives
(4) Redundant Array of Inexpensive Disks
138. Select the smallest memory size:-
(1) Terabyte
(2) Gigabyte
(3) Kilobyte
(4) Megabyte
(5) None of these
139. In most Microsoft programs, what does 'alt+f4' do?
(1) Ends the program
(2) Opens the program
(3) Run the program
(4) Modify the program
(1) none of these
140. A device that is used to transmit data from one location to another is known as ________
(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these
141. Programs developed by an outside supplier and provided to the user in a machine readable form is known
as___________.
(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these
142. Which of the following describe one or more characteristics of a modem computer?
(1) An electronic device
(2) A mechanical device
(3) An electro-mechanical device
(4) All of the above
(5) None of these
143. Octal number system has a base ______.
(1) Two
(2) Four
(3) Eight
(4) Ten
(5) None of these
144. PL 1 (Programming Language One) Is __________.
(1) High level programming language
(2) Low level programming language
(3) Machine language
(4) Assembly language
(5) None of these
145. Which of the following is a disadvantage of machine language?
(1) Machine Dependent
(2) Slower Execution
(3) Machine Independent
(4) all of the above
(5) None of these
146. Android Operating system is an example of which kind of Source Model?
(1) Vertical Market Software
(2) Open Source
(3) Horizontal Market Software
(4) Shareware
(5) None of these
147. You can use the tab key to___________.
(1) Move a cursor across the screen
(2) Indent a paragraph
(3) Move the cursor down the screen
(4) Only ((1) and (2)
(5) None of these
148. Which process checks to ensure the components of the computer and operating are connected properly?
(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) None of these
149. What is the correct association between a hardware component and a computer function?
(1) Monitor > input
(2) Mouse > input
(3) CPU > storage
(4) Hard disk > processing
(5) None of these
150. The sharing of a medium and its path by 2 or more devices is called ________.
(1) Modulation
(2) Encoding
(3) Line discipline
(4) Multiplexing
(5) None of these
151. The server on the internet is also known as ___________.
(1) Repeater
(2) Host
(3) Gateway
(4) AND Gate
(5) None of these
152. A database management system (DBMS) is a__________.
(1) Hardware system used to create, maintain and provide controlled access to a data- base
(2) hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) Software system used to create, maintain, and provide uncontrolled access to a database.
(4) Software system used to create, maintain and provide controlled access to a database.
(5) None of these
153. Which of the following is an example of connectivity?
(1) Internet
(2) floppy disk
(3) power card
(4) data
(5) None of these
154. What menu is selected to cut, copy and paste?
(1) File
(2) Tools
(3) Special
(4) Edit
(5) None of these
155. To save a document in different location use ______.
(1) Save
(2) Save as
(3) Save as web page
(4) All of above
(5) None of these
156. Programming language built into user programs such as Word and Excel are known as _______.
(1) 4GLs
(2) Macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
157. Codes consisting of lines of varying widths or lengths that are computer-readable are known as______.
(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
158. To reload a Web page, press the __________ button.
(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh
159. Personal computers can be connected together to form a_______.
(1) server
(2) supercomputer
(3) network
(4) enterprise
(5) None of these
160. Which of the following is true?
(1) Byte is a single digit in a binary number
(2) Bit represents a grouping of digital numbers
(3) Eight-digit binary number is called a byte
(4) Eight-digit binary number is called a bit
(5) None of these
161. Which of the following can be used to select the entire document?
(1) CTRL+A
(2) ALT+F5
(3) SHIFT+A
(4) CTRL+K
(5) CTRL+H
162. A concentric circle on a disk is called a________
(1) cylinder
(2) track
(3) head
(4) sector
(5) none of these
163. DSL is an example of a(n) ____________ connection.
(1) network
(2) wireless
(3) slow
(4) broadband
(5) none of these
164. Instructions and data that are processed by the CPU are located in________
(1) CD-ROM
(2) RAM
(3) the hard disk
(4) the motherboard
(5) none of these
165. All of the following are considered to be storage devices EXCEPT_______
(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these
166. The commonly used UNIX commands like date, ls, cat etc. are stored in_________
(1) dev directory
(2) bin directory
(3) tmp directory
(4)unix directory
(5) None of these
167. A circuit with about 100 transistors fabricated on a single chip is called _____
(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these
168. One megabyte equals approximately ___________
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
169. A computer checks the _____ of user names and passwords for a match before granting access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these
170. Computers that are portable and convenient for users who travel are known as _____
(1) Super computers
(2) Lap tops
(3) Mini computers
(4) File servers
(5) None of these
171. What is the term for unsolicited e-mail?
(1) News group
(2) Use net
(3) Backbone
(4) Flaming
(5) Spam
172. The _____ tells the computer how to use its components.
(1) Utility
(2) Network
(3) Operating system
(4) Application program
(5) None of these
173. When sending an e-mail, the _____ line describes the contents of the message.
(1) to
(2) subject
(3) contents
(4) CC
(5) None of these
174. The _____ key will launch the start buttons.
(1) Esc
(2) Shift
(3) Windows
(4) Shortcut
(5) None of these
175. What is the ultimate purpose of Defragmentation?
(1) Make the PC faster
(2) Create More Free Space
(3) Delete temporary files
(4) Reduce Power consumption
(5) none of these
176. Which input device cannot be used to work in MS Office?
(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen
Download more Questions for computer Awareness in pdf book-
https://drive.google.com/file/d/0B6_nomlME9hLWE1PM3ZxVUFOVm8/edit?usp=sharing