Sei sulla pagina 1di 28

Ques.

: 1 These are the programs that are deposited on a user's


hard drive when they visit a Web site.
1) Proxies 2) Codes
3) Cache 4) Cookies
5) None of these Ans.) 4
Ques. : 2 It is the term used for a wide range of programs used
to secretly record an individual's activities on the Internet:
1) Cookies 2) Sniffers
3) Trackers 4) Spyware
5) None of these Ans.) 4
Ques. : 3 A program that fills a computer system with
selfreplicating
information thus clogging the system is called a
1) virus 2) worm
3) trojan horse 4) damage
5) None of these Ans.) 2
Ques. : 4 These are computer languages closer to human
languages:
1) Assembly languages 2) Machine level languages
3) Procedural language 4) High level language
5) None of these Ans.) 4
Ques. : 5 The ____ structure involves repeating a sequence
until a certain condition remains true.
1) selection 2) conditional
3) sequence 4) loop
5) None of these Ans.) 4
Ques. : 6 Which of the following is the programming tool that
uses linked symbols to show the sequence of steps needed
to solve a programming problem?
1) Flowchart 2) Scatter diagram
3) Pseudocode 4) Hollogram
5) None of these Ans.) 1
Ques. : 7 Programming is the part of which of the following
phases of the systems life cycle?
1) Systems analysis 2) Systems development
3) Systems maintenance 4) Systems design
5) None of these Ans.) 2
Ques. : 8 Which of the following is the sixth phase of the
systems life cycle?
1) Systems maintenance 2) Systems development
3) Systems design 4) Systems analysis
5) None of these Ans.) 1
Ques. : 9 Having several instances of the same data is termed
as which of the following?
1) Data doubling 2) Data duplication
3) Data repetition 4) Data redundancy
5) None of these Ans.) 4
Ques. : 10 Collectively, a person's name, address, and age
would be termed as a
1) character 2) record
3) field 4) file
5) None of these Ans.) 2
Ques. : 11 How many phases are there in every Software
development life cycle model?
1) Four 2) Five
3) Six 4) Seven
5) Nine Ans.) 3
Ques. : 12 Which of the following is the first phase in the
software development life cycle model?
1) Maintenance 2) Deployment
3) Implementation or coding 4) Requirement gathering and
analysis

5) Design Ans.) 4
Ques. : 13 The container that houses most of the electronic
components that make up a computer system is known as the
1) arithmetic logic unit 2) primary storage unit
3) central processing unit 4) system cabinet
5) None of these Ans.) 4
Ques. : 14 Which of the following are often termed as
notebook computers?
1) Desktop systems 2) Personal Digital Assistants
3) Palm computers 4) Laptop computers
5) None of these Ans.) 4
Ques. : 15 Which of the following is the smallest regarding
physical appearance?
1) Desktop 2) Notebook
3) PDA 4) Tablet
5) None of these Ans.) 3
Ques. : 16 The smallest unit in a digital system is a
1) character 2) byte
3) bit 4) word
5) None of these Ans.) 3
Ques. : 17 The binary system has __________ digits.
1) 6 2) 8
3) 2 4) 4
5) None of these Ans.) 3
Ques. : 18 This coding system is designed to support
international languages like Chinese and Japanese.
1) ASCII 2) ANSI
3) EBCDIC 4) Unicode
5) None of these Ans.) 4
Ques. : 19 The communications medium for the entire
computer system is the
1) secondary processor 2) arithmetic logic unit
3) semiconductor 4) motherboard
5) None of these Ans.) 4
Ques. : 20 Tiny circuitboards
etched onto squares of sandlike material called silicon are
called
1) ports 2) slots
3) bays 4) chips
5) None of these Ans.) 4
Ques. : 21 This unit tells the rest of the computer how to carry
out a programs instructions.
1) Motherboard 2) ALU
3) Contro unit 4) System unit
5) None of these Ans.) 3
Ques. : 22 __________ and logical operations are performed
by the ALU.
1) Alphabetical 2) Arithmetic
3) Advanced 4) Additional
5) None of these Ans.) 2
Ques. : 23 Which of the following is not an arithmetic
operator?
1) + 2) 3)
/ 4) *
5) None of these Ans.) 5
Ques. : 24 This is the number of bits that can be accessed at
one time by the CPU.
1) Bit 2) Byte
3) Character 4) Word
5) None of these Ans.) 4
Ques. : 25 Most personal computers uses a CISC architecture.
Expand the term CISC.

1) Common Instruction Set Computer 2) Coded Instruction


Set Computer
3) Custom Instruction Set Computer 4) Complex Instruction
Set Computer
5) None of these Ans.) 4
Ques. : 26 What is the full form of RISC?
1) Reduced Instruction Set Computer 2) Reverse Instruction
Set Computer
3) Refined Instruction Set Computer 4) Recorded Instruction
Set Computer
5) None of these Ans.) 1
Ques. : 27 This is a type of video adapter that contains its own
processor to boost performance levels and so they
achieve better results than the generalpurpose
CPU used by the computer.
1) Graphics enhancer 2) Graphics equiliser
3) Repeater 4) Graphics accelerator
5) None of these Ans.) 4
Ques. : 28 Which of the following is NOT a wellknown
type of memory chips?
1) RISC 2) RAM
3) ROM 4) CMOS
5) None of these Ans.) 1
Ques. : 29 Which of the following types of memory is
commonly called temporary or volatile storage?
1) Flash memory 2) Virtual memory
3) RAM 4) ROM
5) None of these Ans.) 3
Ques. : 30 It improves processing by acting as a temporary
highspeed
holding area between the memory and the CPU.
1) RAM 2) ROM
3) Flash 4) Cache
5) None of these Ans.) 4
Ques. : 31 Frequentlyaccessed
information is held in
1) hard drive 2) cache memory
3) flash memory 4) read only memory
5) None of these Ans.) 2
Ques. : 32 Which type of memory is nonvolatile and cannot be
changed by the user?
1) SDRAM 2) DDR
3) ROM 4) DRAM
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 4/61
5) None of these Ans.) 3
Ques. : 33 Which of the following is NOT an example of a
microcomputer?
1) Desktop computer 2) Laptop
3) Tablet 4) PDA
5) None of these Ans.) 5
Ques. : 34 In order to represent numbers, letters, and special
characters, bits are combined into groups of ______called
bytes.
1) two 2) four
3) six 4) eight
5) None of these Ans.) 4
Ques. : 35 The central processing unit (CPU) or processor is
contained on a single chip called the

1) microprocessor 2) motherboard
3) BIOS 4) extension board
5) None of these Ans.) 1
Ques. : 36 An easily expandable computer system is said to
have a(n)
1) ultra architecture 2) open architecture
3) locked architecture 4) round architecture
5) None of these Ans.) 2
Ques. : 37 Users can easily expand their computer systems by
inserting optional devices into the slots on the system
board. These devices are known as
1) expansion cards 2) expansion bus
3) smart cards 4) output devices
5) None of these Ans.) 1
Ques. : 38 To communicate with another computer over
telephone lines, you need a
1) NIC 2) PC card
3) video card 4) modem
5) None of these Ans.) 4
Ques. : 39 This type of expansion bus is designed to support
several external devices without using expansion cards or
slots.
1) PCI 2) USB
3) BIOS 4) AGP
5) None of these Ans.) 2
Ques. : 40 What does USB mean in computers?
1) Universal Segrigation Bus 2) Universal Section Bus
3) Universal Serial Bus 4) Universal Scheduling Bus
5) None of these Ans.) 3
Ques. : 41 What is the full form of NIC in computers?
1) Network Interconnection Card 2) Network Interchange
Card
3) Network Identification Card 4) Network Interface Card
5) None of these Ans.) 4
Ques. : 42 What is the full form of AGP in computers?
1) Attached Graphics Port 2) Additional Graphics Port
3) Accelerated Graphics Port 4) Advanced Graphics Port
5) None of these Ans.) 3
Ques. : 43 What is the full form of PCI in computers?
1) Private Component Interconnect 2) Peripheral Connection
Interface
3) Peripheral Compartment Interconnection 4) Peripheral
Component Interconnect
5) None of these Ans.) 4
Ques. : 44 What is the full form of PIN used with smart cards?
1) Personal Identification Number 2) Personal Index Number
3) Provisional Identification Number 4) Permanent
Identification Number
5) None of these Ans.) 1
Ques. : 45 What is the full form of SMPS in computers?
1) Schedule Mode Power Supply 2) Switched Mode Power
Supply
3) Segregated Mode Power Supply 4) Simple Mode Power
Supply
5) None of these Ans.) 2
Ques. : 46 There are ____________ layers in the Open
Systems Interconnection (OSI) Model.
1) four 2) five
3) six 4) seven
5) nine Ans.) 4
Ques. : 47 Internet is also called
1) network of cables 2) network of peripherals

3) network of networks 4) network of intranets


5) None of these Ans.) 3
Ques. : 48 IEEE stands for
1) Institute of Experts and Electronics Engineers 2) Institute of
Electrical and Exchange Engineers
3) Institute of Electrical and Electronics Engineers 4) Institute
of Electrical and Electronics Evolutions
5) None of these Ans.) 3
Ques. : 49 This directory is mandatory for every disk:
1) Base 2) Sub
3) Case 4) Root
5) None of these Ans.) 4
Ques. : 50 What is the full form of CEM as used in the online
world of electronic commerce?
1) Customer Ecommerce
Management 2) Customer Experience Management
3) Customer Experience and Migration 4) Customer
Endeavour Management
5) None of these Ans.) 2
Ques. : 51 A communication processor that connects dissimilar
networks by providing the translation from one set of
protocol to another is
1) Router 2) Gateway
3) Repeater 4) Modem
5) None of these Ans.) 2
Ques. : 52 This is a collection of raw facts:
1) Output 2) Information
3) Data 4) Byte
5) None of these Ans.) 3
Ques. : 53 What does the word FTP stands for?
1) File Transfer Protocol 2) File Translation Protocol
3) File Transit Protocol 4) File Tethering Protocol
5) None of these Ans.) 1
Ques. : 54 This refers to how many instructions per second the
processor can perform:
1) Clock speed 2) Bit speed
3) Character processing 4) Caching
5) None of these Ans.) 1
Ques. : 55 This card connects your monitor to your system
board:
1) Audio card 2) Video card
3) Access card 4) Interface card
5) None of these Ans.) 2
Ques. : 56 This type of peripherals configure themselves
automatically:
1) PlugandPlay
2) Output
3) Input 4) Shared
5) None of these Ans.) 1
Ques. : 57 To connect to a local network, you requires this
card:
1) Smart card 2) Modem
3) Repeater 4) NIC
5) None of these Ans.) 4
Ques. : 58 The speed of microprocessors, called the clock
speed, often is measured in
1) gigahertz 2) kilohertz
3) microhertz 4) milihertz
5) None of these Ans.) 1
Ques. : 59 What does "3.0" denote in the term "3.0 GHz P
IV"?
1) Clock speed 2) Power consumption

3) Microprocessor architecture 4) No. of ports to attach


peripherals
5) None of these Ans.) 1
Ques. : 60 _____________ provides the startup
instructions for the computer when it is powered on.
1) RAM 2) CMOS
3) USB 4) AGP
5) None of these Ans.) 2
Ques. : 61 MICR technology used for clearance of cheques
by banks refers to
1) Magnetic Ink Character Recognition 2) Multiple Ink
Character Recognition
3) Marked Ink Character Recognition 4) Master Ink Character
Recognition
5) None of these Ans.) 1
Ques. : 62 ___________ is the changing of data before or
during entry into the computer system.
1) Data mining 2) Data didling
3) Data spying 4) Data leakage
5) None of these Ans.) 2
Ques. : 63 Which of the following is an example of application
software (also called enduser
programs)?
1) Database program 2) Word processor
3) Web browser 4) Spreadsheet
5) All the above Ans.) 5
Ques. : 64 Compiler is a
1) package 2) process
3) system software 4) peripheral device
5) None of these Ans.) 3
Ques. : 65 One nibble is equal to
1) two bits 2) four bits
3) six bits 4) eight bits
5) None of these Ans.) 2
Ques. : 66 Which among the following is NOT a mobile
computing device?
1) PDA 2) Cellular phone
3) Notebook computer 4) Printer
5) None of these Ans.) 4
Ques. : 67 This is a network based on TCP/IP protocols
belonging to an organization, accessible only by the
organization's members or those with authorization.
1) Extranet 2) Intranet
3) Choke 4) Gate
5) Firewall Ans.) 2
Ques. : 68 Which of the following statements is NOT correct
with respect to a file?
1) A files is stored in RAM. 2) A file provides easy reference
to information.
3) A file is a collection of related piece of
information. 4) A file can be generated from an application.
5) Files should be organised in folders. Ans.) 1
Ques. : 69 Which of the following is the process of starting or
restarting a computer?
1) Start up 2) Booting
3) Setting up 4) Initialising
5) Aligning Ans.) 2
Ques. : 70 Most traffic over the Internet uses
1) Packet switching 2) Telex switching
3) Circuit switching 4) Mobile switching
5) None of these Ans.) 1
Ques. : 71 What is the expanded form of DOS?

1) Dedicated Operating System 2) Differed Operating System


3) Diskette Operating Solution 4) Disk Operating System
5) None of these Ans.) 4
Ques. : 72 What is the expanded form of LSI?
1) Large System Integration. 2) Latest System Integration
3) Large Scale Interconnection 4) Large Scale Integration
5) None of these Ans.) 4
Ques. : 73 What is the full form of VIRUS?
1) Various Information Resources Under Siege 2) Vital
Information Resources Under Suspicion
3) Vital Information Resources Under Siege 4) Various
Information Resources Under Sabotage
5) None of these Ans.) 3
Ques. : 74 Which of the following is not an OS?
1) DOS 2) Windows
3) Linux 4) Microsoft
5) None of these Ans.) 4
1) Keyboard 2) Mouse
3) Plotter 4) Scanner
5) Joystick Ans.) 3
Ques. : 76 Which of the following is an example of a
hardware?
1) Compiler 2) Browser
3) Plotter 4) Unix
5) None of these Ans.) 3
Ques. : 77 Which of the following is an example of a
software?
1) Scanner 2) Repeater
3) Interpreter 4) Router
5) Modem Ans.) 3
Ques. : 78 What do you understand by .doc .htm etc?
1) These are extensions. 2) These are domain names.
3) These are folder names. 4) These are programming
languages.
5) None of these Ans.) 1
Ques. : 79 Which of the following is a computer programming
language?
1) Chrome 2) Java
3) Solaris 4) Outlook
5) None of these Ans.) 2
Ques. : 80 Which of the following are types of memory?
1) CPU & SMPS 2) RAM & ROM
3) UPS & Monitor 4) USB & Motherboard
5) None of these Ans.) 2
Ques. : 81 What is correcting error in a program is called?
1) Compiling 2) Interpreting
3) Grinding 4) Debugging
5) None of these Ans.) 4
Ques. : 82 The _____________ of a computer system includes
the programs and instructions.
1) hardware 2) software
3) peripheral 4) shared devices
5) None of these Ans.) 2
Ques. : 83 What is the default file extension for all Word
documents?
1) WRD 2) DOC
3) TXT 4) FIL
5) None of these Ans.) 2
Ques. : 84 The reusable optical storage will typically have the
acronym
1) ROM 2) DVD
3) RW 4) CD

5) None of these Ans.) 3


Ques. : 85 File extensions are used in order to
1) identify the file type 2) get a hint of the matter of the file
3) name the file 4) secure the file
5) None of these Ans.) 1
Ques. : 86 The acronym HTML stands for
1) High Transfer Machine Language 2) High Transmission
Machine Language
3) Hyper Text Markup Language 4) Hypermedia Text
Machine Language
5) None of these Ans.) 3
Ques. : 87 Computers connected to a LAN can
1) run faster 2) share information and/or share peripheral
equipment
3) email
4) go online
5) None of these Ans.) 2
Ques. : 88 A ________ typically connects personal computers
within a very limited geographical area, usually within a
single building.
1) LAN 2) BAN
3) TAN 4) NAN
5) None of these Ans.) 1
Ques. : 89 Computers manipulate data in many ways, and this
manipulation is called ________.
1) utilizing 2) batching
3) upgrading 4) processing
5) None of these Ans.) 4
Ques. : 90 An email
address typically consists of a user ID followed by the
________ sign and the name of the email
server that manages the users electronic post office box.
1) @ 2) #
3) & 4) *
5) None of these Ans.) 1
Ques. : 91 Software applies________, also called algorithms,
to process data.
1) arithmetic 2) procedures
3) objects 4) rules
5) None of these Ans.) 2
Ques. : 92 A file extension is separated from the main file
name with a(n) ________, but no spaces.
1) question mark 2) exclamation mark
3) underscore 4) period
5) None of these Ans.) 4
Ques. : 93 An ad hoc query is a
1) preplanned
question 2) prescheduled
question
3) spurofthe
moment
question 4) question that will not return any results
5) None of these Ans.) 3
Ques. : 94 A Web ________ consists of one or more Web
pages located on a Web server.
1) hub 2) site
3) story 4) template
5) None of these Ans.) 2
Ques. : 95 A computer ________ is a set of program
instructions that can attach itself to a file, reproduce itself, and
spread to other files.
1) worm 2) virus

3) trojan horse 4) phishing scam


5) None of these Ans.) 2
Ques. : 96 The desktop contains small graphics called
________.
1) windows 2) logos
3) icons 4) pictures
5) None of these Ans.) 3
Ques. : 97 C, BASIC, COBOL, and Java are examples of
________ languages.
1) lowlevel
2) computer
3) system programming 4) highlevel
5) None of these Ans.) 4
Ques. : 98 A(n) ________ camera is a peripheral device used
to capture still images in a digital format that can be easily
transferred into a computer and manipulated using graphics
software.
1) digital 2) analog
3) classic 4) film
5) None of these Ans.) 1
Ques. : 99 __________ makes it possible for shoppers to make
purchases using their computers.
1) Eworld
2) Ecommerce
3) Espend
4) Ebusiness
5) None of these Ans.) 2
Ques. : 100 The humanreadable
version of a program is called ________.
1) source code 2) program code
3) human code 4) system code
5) None of these Ans.) 1
Ques. : 101 OCR stands for
1) Optical Character Recognition 2) Optical CPU Recognition
3) Optimal Character Rendering 4) Other Character
Restoration
5) None of these Ans.) 1
Ques. : 102 If a new device is attached to a computer, such as
a printer or scanner, its ___________ must be installed
before the device can be used.
1) buffer 2) driver
3) pager 4) server
5) None of these Ans.) 2
Ques. : 103 The software that allows users to surf the Internet
is called a(n)
1) search engine 2) Internet Service Provider (ISP)
3) multimedia application 4) browser
5) None of these Ans.) 4
Ques. : 104 A tuple is a
1) a column of a table 2) twodimensional
table
3) row of a table 4) key of a table
5) None of these Ans.) 3
Ques. : 105 In Excel, _________contains one or more
worksheets.
1) Template 2) Workbook
3) Active Cell 4) Label
5) None of these Ans.) 2
Ques. : 106 If you want to extend the length of the network
without having the signal degrade, you would use a
1) resonance 2) router
3) gateway 4) switch

5) repeater Ans.) 5
Ques. : 107 A repair for a known software bug, usually
available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) rectifier Ans.) 2
Ques. : 108 URL stands for
1) Universal Research List 2) Universal Resource List
3) Uniform Registered Link 4) Unified Resource Locator
5) None of these Ans.) 4
Ques. : 109 When data changes in multiple lists and all lists
are not updated, this causes
1) data redundancy 2) information overload
3) duplicate data 4) data inconsistency
5) None of these Ans.) 4
Ques. : 110 What is a backup?
1) Restoring the information backup 2) An exact copy of a
system's information
3) The ability to get a system up and running in the
event of a system crash or failure 4) All of these
5) None of these Ans.) 4
Ques. : 111 The Internet is
1) a large network of networks 2) an internal communication
system for a
business
3) a communication system for the India govt 4) a
communication system for some states in
India
5) a communication system for some cities of India Ans.) 1
Ques. : 112 Computers that are portable and convenient for
users who travel are known as
1) super computers 2) planners
3) minicomputers 4) file servers
5) laptops Ans.) 5
Ques. : 113 What is the storage area for email
messages called?
1) A folder 2) A mail box
3) A directory 4) The hard disk
5) None of these Ans.) 2
Ques. : 114 One advantage of dialup
Internet access is that
1) it utilises broadband technology 2) it is India
3) it uses a router for security 4) modern speeds are very fast
5) it utilises existing telephone services Ans.) 5
Ques. : 115 What is the process of copying software programs
from secondary storage media to the hard disk called?
1) Configuration 2) Download
3) Storage 4) Upload
5) Istallation Ans.) 5
Ques. : 116 Which process checks to ensure the components of
the computer are operating and connected properly?
1) Booting 2) Processing
3) Saving 4) Editing
5) None of these Ans.) 1
Ques. : 117 A means of capturing an image (drawing or photo)
so that it cab be stored on a computer is
1) Modem 2) Software
3) Scanner 4) Keyboard
5) Mouse Ans.) 3
Ques. : 118 An error in a computer program is called a
1) crash 2) power failure
3) bug 4) virus

5) fatal error Ans.) 3


Ques. : 119 Access control based on a person's fingerprints is
an example of
1) biometric identification 2) characteristic identification
3) characteristic security 4) fingerprint customization
5) logistics Ans.) 1
Ques. : 120 The patterns of printed lines on most products are
called
1) prices 2) striping
3) scanner 4) OCR
5) barcodes Ans.) 5
Ques. : 121 Most mail programs automatically complete the
following two parts in an eamil.
1) From: and body: 2) From: and Date:
3) From: and To: 4) From: and Subject:
5) None of these Ans.) 2
Ques. : 122 The computer's capability of distinguishing
spoken words is called
1) voice analysis 2) speech acknowledgment
3) voice recognition 4) speech interpretation
5) vocalisation Ans.) 3
Ques. : 123 Which of the following is an advantage of
mounting an application on the Web?
1) The possibility of 24hour
access for users 2) Creating a system that can extend globally
3) Standardising the design of the interface 4) All of these
5) None of these Ans.) 4
Ques. : 124 The first page of a Web site is called the
1) Homepage 2) Index
3) Java Script 4) Book mark
5) None of these Ans.) 1
Ques. : 125 ERP is an acronym for
1) Enterprise Retirement Planning 2) Enterprise Relationship
Planning
3) Enterprise Resource Planning 4) Enterprise Retention
Planning
5) None of these Ans.) 3
Ques. : 126 The software that allows users to surf the Internet
is called a(n)
1) search engine 2) Internet Service Provider (ISP)
3) multimedia application 4) browser
5) None of these Ans.) 4
Ques. : 127 The issues that deal with the collection and use of
data about individuals is
1) access 2) publicity
3) accuracy 4) property
5) privacy Ans.) 5
Ques. : 128 A term related to sending data to a satellite is
1) downlink 2) modulate
3) demodulate 4) uplink
5) interrelate
Ans.) 4
Ques. : 129 Hackers
1) all of them have the same motive. 2) are people who
maintain computers
3) may legally break into computers as long as
they do not do any damage 4) are people who are allergic to
computers
5) break into other people's computers Ans.) 5
Ques. : 130 Unauthorised copying of software to be used for
personal gain instead of for personal backups is called
1) program thievery 2) data snatching

3) software piracy 4) program looting


5) None of these Ans.) 3
Ques. : 131 Junk email
is also called
1) spam 2) spoof
3) Cookie crumb 4) sniffer script
5) spill Ans.) 1
Ques. : 132 What is usually used for displaying information at
public places?
1) Monitors 2) Overhead Projections
3) Monitors and Overhead Projections 4) Touch Screen Kiosks
5) Loud Speakers Ans.) 3
Ques. : 133 What is MP3?
1) A mouse 2) A printer
3) A sound format 4) A scanner
5) A mobile phone Ans.) 3
Ques. : 134 What is most popular hardware for multimedia
creations?
1) PCs 2) PDAs
3) Mainframe computers 4) WANs
5) Super Computers Ans.) 1
Ques. : 135 Which of the following is needed for sound
recording?
1) Speaker 2) Microphone
3) Talker 4) Mouse
5) Telephone Ans.) 2
Ques. : 136 What is the life span of a CDROM?
1) One year (approx) 2) Two years (approx)
3) Five years (approx) 4) Twenty five years (approx)
5) None of these Ans.) 4
Ques. : 137 The ___________ settings are automatic and
standard.
1) default 2) CPU
3) peripheral 4) userfriendly
5) None of these Ans.) 1
Ques. : 138 What are the two parts of an email
address?
1) User name and street name 2) Legal name and phone
number
3) User name and domain name 4) Initials and password
5) User name and recipient name Ans.) 3
Ques. : 139 Paricipants can see and hear each other in a/an
1) electronic mail system 2) message system
3) teleconference 4) bulletin board
5) None of these Ans.) 3
Ques. : 140 Magnetic tape is not practical for applications
where data must be quickly recalled because tape is
1) a random access medium 2) expensive
3) a readonly
medium 4) fragile and easily damaged
5) a sequential access medium Ans.) 5
Ques. : 141 A __________is the term used when a search
engine returns a Web page that matches the search criteria.
1) blog 2) hit
3) link 4) view
5) success Ans.) 2
Ques. : 142 The _______ is the term used to describe the
window that is currently being used.
1) Web Window 2) Diplay Area
3) WordPad Window 4) Active Window
5) None of these Ans.) 4

Ques. : 143 A microprocessor is the brain of the computer and


is also called a(n)
1) microchip 2) macrochip
3) macroprocessor 4) calculator
5) software Ans.) 1
Ques. : 144 Storage and memory differ with respect to which
of the following characteristics?
1) Price 2) Reliability
3) Speed 4) All of these
5) None of these Ans.) 4
Ques. : 145 What are the two examples of freeware?
1) Windows OS and Linux 2) Shareware and Microsoft Access
3) Microsoft Word and Google toolbar 4) Google Chrome and
Mozilla Firefox
5) Microsoft Power Point and Microsoft Excel Ans.) 4
Ques. : 146 Which of the following functions is NOT
performed by the servers?
1) Email processing 2) Database sharing
3) Processing websites 4) Storage
5) Word processing Ans.) 5
Ques. : 147 The _________controls a client's computer
resources.
1) application program 2) instruction set
3) operating system 4) server application
5) compiler Ans.) 3
Ques. : 148 To reload a Web page, press the _________button.
1) Back 2) Ctrl
3) Enter 4) Refresh
5) None of these Ans.) 4
Ques. : 149 Which of the following could be digital input
devices for computers?
1) Digital camcoder 2) Microphone
3) Scanner 4) All the above
5) None of these Ans.) 4
Ques. : 150 The _________enables you to simultaneously
keep multiple web pages open in one browser window.
1) popup
helper 2) tab row
3) address bar 4) Esc key
5) None of these Ans.) 2
Ques. : 151 You can use the _____________bar to type a URL
and display a Web page, or type a keyword to display a
list of related Web pages.
1) Menu 2) Title
3) Search 4) Web
5) Address Ans.) 5
Ques. : 152 Storage media such as a CD read and write
information using
1) a laser beam of red light 2) magnetic dots
3) magnetic strips 4) All of these
5) None of these Ans.) 1
Ques. : 153 Vendercreated
program modifications are called
1) patches 2) antiviruses
3) holes 4) fixes
5) overlaps Ans.) 1
Ques. : 154 Cache and main memory will lose their content
when the power is off. They are
1) dynamic 2) static
3) volatile 4) nonvolatile
5) faulty Ans.) 3

Ques. : 155 The collection of links throughout the Internet


creates an interconnected network called the
1) WWW 2) Web
3) World Wide Web 4) All the above
5) None of these Ans.) 4
Ques. : 156 Every device on the Internet has a unique
________ address that identifies it in the same way that a
street
address identifies the location of a house.
1) DH 2) DA
3) IP 4) IA
5) None of these Ans.) 3
Ques. : 157 In a client/server model, a client program
1) asks for information 2) provides information and files
3) serves software files to other computers 4) distributes data
files to other computers
5) None of these Ans.) 1
Ques. : 158 A ________ is a computer connected to two or
more networks.
1) link 2) Modem
3) gateway 4) bridge
5) None of these Ans.) 4
Ques. : 159 Storing same data in many places is called
1) iteration 2) concurrency
3) redundancy 4) enumeration
5) None of these Ans.) 3
Ques. : 160 A _________typically connects personal
computers within a very limited geographical area, usually
within a
single building.
1) LAN 2) BAN
3) TAN 4) NAN
5) None of these Ans.) 1
Ques. : 161 Computers manipulate data in many ways, and
this manipulation is called ________.
1) utilizing 2) batching
3) upgrading 4) processing
5) None of these Ans.) 4
Ques. : 162 Software applies________, also called algorithms,
to process data.
1) arithmetic 2) procedures
3) objects 4) rules
5) None of these Ans.) 2
Ques. : 163 A file extension is separated from the main file
name with a(n) ________, but no spaces.
1) question mark 2) exclamation mark
3) underscore 4) period
5) None of these Ans.) 4
Ques. : 164 An ad hoc query is a
1) preplanned
question 2) prescheduled
question
3) spurofthe
moment
question 4) question that will not return any results
5) None of these Ans.) 3
Ques. : 165 A Web ________ consists of one or more Web
pages located on a Web server.
1) hub 2) site
3) story 4) template
5) None of these Ans.) 2
Ques. : 166 Manin memory workd in conjunction with

1) special function cards 2) RAM


3) CPU 4) Intel
5) All the above Ans.) 3
Ques. : 167 A sales clerk at a checkout counter scanning a tag
on an item rather than keying it into the systems, is using
1) input automation 2) item data automation
3) scanning automation 4) source data automation
5) None of these Ans.) 1
Ques. : 168 A(n) ______ is composed of several computers
connected together to share resources and data.
1) hyperlink 2) network
3) backbone 4) hyperlink
5) protocol Ans.) 2
Ques. : 169 Which of the following is a storage device that
uses rigid, permanently installed magnetic disks to store
data/information?
1) floppy diskette 2) hard disk
3) permanent disk 4) optical disk
5) None of these Ans.) 2
Ques. : 170 Microsoft Office is an example of a
1) closedsource
software 2) opensource
software
3) horizontalmarket
software 4) verticalmarket
software
5) compiler Ans.) 1
Ques. : 171 A popular way to learn about computers without
ever going to a classroom is called
1) ilerning
2) elearning
3) Isolated learning 4) Close learning
5) distance learning Ans.) 2
Ques. : 172 A person who uses his/her expertise to gain access
to other people's computers to get information illegally or
do damage is a
1) spammer 2) hacker
3) instant messanger 4) All of these
5) None of these Ans.) 2
Ques. : 173 Which of the following is an example of a storage
device?
1) Magnetic disk 2) Tapes
3) DVDs 4) All of these
5) None of these Ans.) 4
Ques. : 174 The _______folder retains copies of messages that
you have started but are not yet ready to send.
1) Inbox 2) Outbox
3) Drafts 4) Sent Items
5) Address book Ans.) 3
Ques. : 175 Which of the following is an example of an optical
disk?
1) Digital versatile disks 2) Magnetic disks
3) Memory disks 4) Data bus disks
5) None of these Ans.) 1
Ques. : 176 The main job of a CPU is to
1) carry out program instructions 2) store data/information for
future use
3) process data and information 4) Both 1) and 3)
5) None of these Ans.) 4
Ques. : 177 _______ are attempts by individuals to obtain
confidential information from you by falsifying their identity.
1) Phishing trips 2) Computer viruses

3) Special function cards 4) Scanners


5) Keyboards Ans.) 1
Ques. : 178 An example of a processing device would be
1) a magnetic ink reader 2) a tablet PC
3) a special function card 4) a scanner
5) a keyboard Ans.) 2
Ques. : 179 You can use _________ to paste the copied text in
a document.
1) Ctrl+C 2) Ctrl+S
3) Ctrl+V 4) Ctrl+X
5) None of these Ans.) 3
Ques. : 180 The main memory of a computer can also be
called
1) Primary disk 2) Primary memory
3) Internal storage 4) All the above
5) None of these Ans.) 2
Ques. : 181 Connection or link to other documents or Web
pages that contain related information is called
1) dialup
2) electronic commerce
3) hyperlink 4) ecash
5) domain name Ans.) 3
Ques. : 182 Microsoft's Messanger allows users to
1) bypass a browser to surf the Web 2) create a blog
3) communicate via direct live communication 4) identify and
eliminate spam
5) make graphic presentation Ans.) 3
Ques. : 183 Portable computer, also known as laptop
computer, weighing between 4 and 10 pounds is called
1) generalpurpose
application 2) Internet
3) scanner 4) notebook computer
5) None of these Ans.) 4
Ques. : 184 The main circuitboard
of the system unit is the
1) computer program 2) control unit
3) motherboard 4) RAM
5) None of these Ans.) 3
Ques. : 185 Where are you likely to find an embedded
operating system?
1) On a desktop operating system 2) on a networked PC
3) on a network server 4) on a PDA
5) None of these Ans.) 4
Ques. : 186 Manipulating data to create information is known
as
1) Feedback 2) Programming
3) Processing 4) Analysis
5) None of these Ans.) 3
Ques. : 187 A compiler translates higherlevel
programs into a machine language program, which is called
1) source code 2) object code
3) compiled code 4) beta code
5) None of these Ans.) 1
Ques. : 188 What contains the computer BIOS and maintains
its data with the use of a battery for periods when the
system is powered down?
1) CMOS 2) RAM
3) DRAM 4) CPU
5) None of these Ans.) 1
Ques. : 189 Something which has easilyunderstood
instructions in said to be
1) user friendly 2) information

3) word processing 4) icon


5) None of these Ans.) 1
Ques. : 190 What is output?
1) What the processor takes from the user. 2) What the user
gives to the processor.
3) What the processor rejects. 4) What the processor gives to
the user.
5) None of these Ans.) 4
Ques. : 191 A repair for a known software bug, usually
available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) None of these Ans.) 2
Ques. : 192 Reference to each file on a disk are stored in a
1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) None of these Ans.) 1
Ques. : 193 Only ________program(s) remain(s) active even
though we can open many programs at a time.
1) one 2) two
3) three 4) four
5) None of these Ans.) 1
Ques. : 194 When the margins on both the sides are straight
and equal, then there is ________in the document.
1) full justification 2) full alignment
3) left justification 4) right justification
5) None of these Ans.) 1
Ques. : 195 The primary goal of a computer is to turn data into
1) ideas 2) suggestions
3) information 4) reports
5) None of these Ans.) 3
Ques. : 196 What is the main folder on a storage device
called?
1) Platform 2) Interface
3) Root directory 4) Device driver
5) None of these Ans.) 3
Ques. : 197 If you receive and email
from someone you don't know, what should you do?
1) Forward it to the Police immediately 2) Delete it without
opening it
3) Open it and respond to him/her 4) Reply and seek their
identity
5) None of these Ans.) 2
Ques. : 198 Computer ___________is whatever is typed,
submitted or transmitted to a computer system.
1) input 2) output
3) data 4) circuitry
5) None of these Ans.) 1
Ques. : 199 Special effects used to introduce slides in a
presentation are called
1) effects 2) custom animation
3) transition 4) animation
5) None of these Ans.) 3
Ques. : 200 Computers send and receive data in the form of
________ signals.
1) analog 2) digital
3) modulated 4) demodulated
5) All the above Ans.) 2
Ques. : 201 Most World Wide Web pages contain commands
in the language
1) NIH 2) URL
3) HTML 4) IRC

5) None of these Ans.) 3


Ques. : 202 _________ are graphical objects used to represent
commonly used applications.
1) GUI 2) Drivers
3) Windows 4) Applications
5) Icons Ans.) 5
Ques. : 203 Computers connected to a LAN can
1) run faster 2) go online
3) share information and/or share peripheral
equipment 4) email
5) None of these Ans.) 3
Ques. : 204 Whenever you have to give space between the two
words while typing on a PC we have to press a key
known as
1) Backspace 2) Shift
3) Control 4) Escape
5) Space bar Ans.) 5
Ques. : 205 Secondary storage
1) does not require constant power 2) does not use magnetic
media
3) consists of foour main types of devices 4) does not store
information for later retrieval
5) None of these Ans.) 1
Ques. : 206 The first computers were programmed using
1) assembly language 2) machine language
3) spaghetti code 4) source code
5) None of these Ans.) 2
Ques. : 207 Which of the following functions is NOT
performed by the servers?
1) email
processing 2) Database sharing
3) Processing websites 4) Storage
5) Word processing Ans.) 5
Ques. : 208 The ________ controls a client's computer
resources.
1) application program 2) instruction set
3) operating system 4) server application
5) None of these Ans.) 3
Ques. : 209 The Internet allows you to
1) send email
2) view web pages
3) connect to servers all around the world 4) All the above
5) None of these Ans.) 4
Ques. : 210 What kind of software would you most likely use
to keep track of a billing account?
1) Word processing 2) Electronic publishing
3) Spreadsheet 4) Web authoring
5) None of these Ans.) 3
Ques. : 211 Text and graphics that have been cut or copied are
stored in an area called the
1) Pasterboard 2) Copyboard
3) Clipboard 4) Cuttingboard
5) None of these Ans.) 3
Ques. : 212 Which of the following is an example of a storage
device?
1) Magnetic disk 2) Tapes
3) DVDs 4) All of these
5) None of these Ans.) 4
Ques. : 213 The ________file format is a method to encoding
pictures on a computer.
1) HTML 2) JPEG
3) FTP 4) URL

5) DOC Ans.) 2
Ques. : 214 What is the process of copying software programs
from secondary storage media to the hard disk called?
1) configuration 2) download
3) storage 4) upload
5) istallation Ans.) 5
Ques. : 215 The property that, when classes are arranged in a
hierarchy, each class assumes the attributes and methods
of its ancestores is
1) Inheritance 2) generalisation
3) encapsulation 4) information hiding
5) None of these Ans.) 1
Ques. : 216 The software component of an expert system that
draws conclusions is the ___________.
1) user interface 2) database
3) inference engine 4) I/O controller
5) None of these Ans.) 3
Ques. : 217 The attributes and methods for each object are
stored in
1) an object instance 2) an object connection
3) an assembly structure 4) an object repository
5) None of these Ans.) 4
Ques. : 218 What is backup?
1) Adding more components to your network 2) Protecting
data by copying it from the original
source to a different destination
3) Filtering old data from the new data 4) Accessing data on
tape
5) None of these Ans.) 2
Ques. : 219 Which of the following is true?
1) A byte is a single digit in a binary number. 2) A bit
represents a group of digital numbers.
3) Eightdigit
binary number is called a byte. 4) Eightdigit
binary number is called a bit.
5) None of these Ans.) 3
Ques. : 220 A _______is an organised collection of data about
a single entity.
1) file 2) library
3) database 4) dictionary
5) None of these Ans.) 1
Ques. : 221 Hardware devices that are not part of the main
computer system and are often added later to the system are
1) clip art 2) highlights
3) execute 4) peripherals
5) None of these Ans.) 4
Ques. : 222 All of the following are examples of real security
and privacy risks except
1) hackers 2) spam
3) viruses 4) Identity theft
5) None of these Ans.) 2
Ques. : 223 Moving an icon on the desktop is termed as
1) double clicking 2) highlighting
3) dragging 4) pointing
5) None of these Ans.) 3
Ques. : 224 A MODEM is connected in between a telephone
line and a
1) Computer 2) Printer
3) Speaker 4) Microphone
5) Network Ans.) 1
Ques. : 225 The blinking symbol which indicates the next
1) Delete key 2) Control key

3) Cursor 4) Return key


5) None of these Ans.) 3
Ques. : 226 The display bar that lists all the open folders and
active applications is
1) Menu bar 2) Tool bar
3) Task bar 4) Window list
5) None of these Ans.) 3
Ques. : 227 A large space common in most of the Windows
which is displayed at the background of the Windows main
icon screen, is called
1) Application view 2) Work area
3) Project view 4) Toolbar
5) None of these Ans.) 2
Ques. : 228 A photograph, image or any other visual file which
is displayed at the back ground of the windows main icon
screen, is called
1) Wall Paper 2) Screen Saver
3) Windows Theme 4) Active Desktop
5) None of these Ans.) 1
Ques. : 229 All windows settings are stored in this file
1) Windows.INI 2) Groups.INI
3) Win.INI 4) Tem.INI
5) Command.INI Ans.) 3
Ques. : 230 CPU can directly understand this language
1) C 2) C++
3) Assembly 4) Java
5) None of these Ans.) 3
Ques. : 231 An error is also known as
1) bug 2) debug
3) cursor 4) icon
5) None of these Ans.) 1
Ques. : 232 A keyboard is this kind of device
1) black 2) input
3) output 4) word processing
5) None of these Ans.) 2
Ques. : 233 Which part of the computer helps in storing
information?
1) Disk drive 2) Keyboard
3) Monitor 4) Printer
5) None of these Ans.) 1
Ques. : 234 To drop a column that is used as a foreign key,
first
1) Drop the primary key 2) drop the table
3) drop the foreign key constraint 4) All of these
5) None of these Ans.) 3
Ques. : 235 The name given to a document by user is called
1) filename 2) program
3) data 4) record
5) None of these Ans.) 1
Ques. : 236 _________is a procedure that requires users to
enter an identification code and a matching password.
1) Paging 2) Logging on
3) Timesharing
4) Multitasking
5) None of these Ans.) 2
Ques. : 237 Which device is used as the standard pointing
device in a Graphical User Environment?
1) Keyboard 2) Mouse
3) Joystick 4) Track ball
5) None of these Ans.) 2
Ques. : 238 A CPU contains

1) a card reader and a printing device 2) an analytical engine


and a control unit
3) a control unit and an arithmetic logic unit 4) an arithmetic
logic unit and a card reader
5) None of these Ans.) 3
Ques. : 239 The ability of an OS to run more than one
application at a time is called
1) multitasking 2) objectoriented
programming
3) multiuser
computing 4) timesharing
5) None of these Ans.) 1
Ques. : 240 Permanent instructions that the computer uses
when it is turned on and that cannot be changed by other
instructions are contained in
1) ROM 2) RAM
3) ALU 4) REM
5) None of these Ans.) 1
Ques. : 241 What are .bas, .doc and .htm examples of?
1) Databases 2) Extensions
3) Domains 4) Protocols
5) None of these Ans.) 2
Ques. : 242 The portion of the CPU that coordinates the
activities of all the other computer components is the
1) motherboard 2) coordination board
3) control unit 4) arithmetic and logical unit
5) None of these Ans.) 3
Ques. : 243 Something which has easilyunderstood
instructions in said to be
1) user friendly 2) information
3) word processing 4) icon
5) None of these Ans.) 1
Ques. : 244 The primary device that a computer uses to store
information is
1) TV 2) storehouse
3) desk 4) hard drive
5) None of these Ans.) 4
Ques. : 245 A program that works like a calculator for keeping
track of money and making budgets
1) calculator 2) spreadsheet
3) budgeter 4) financier
5) None of these Ans.) 2
Ques. : 246 What menu is selected to print?
1) File 2) Tools
3) Social 4) Edit
5) None of these Ans.) 1
Ques. : 247 Programs or a set of electronic instructions that
tell a computer what to do
1) Menu 2) Monitor
3) Hardware 4) Software
5) None of these Ans.) 4
Ques. : 248 _________are symbols that represent any
character or combination of characters.
1) Playing cards 2) Wildcards
3) Private keys 4) Public keys
5) None of these Ans.) 2
Ques. : 249 A word in a web page that, when clicked, opens
another document.
1) anchor 2) hyperlink
3) reference 4) URL
5) None of these Ans.) 2

Ques. : 250 Windos 95, Windows 98 and Windows NT are


known as
1) processors 2) domain names
3) modems 4) operating systems
5) None of these Ans.) 4
Ques. : 251 To find and load a file that has been saved
1) select the Close command 2) select the New command
3) select the Save command 4) select the Open command
5) None of these Ans.) 4
Ques. : 252 Which of the following storage media provides
sequential access only?
1) Floppy disk 2) Magnetic disk
3) Magnetic tape 4) Optical disk
5) None of these Ans.) 3
Ques. : 253 In a spreadsheet, a ____________ is a number you
will use in a calculation.
1) label 2) cell
3) field 4) value
5) None of these Ans.) 4
Ques. : 254 All of the following are included in removable
media except
1) CDROMs
2) Diskette
3) DVDs 4) Hare disk drive
5) None of these Ans.) 4
Ques. : 255 _________cells involves creating a single cell by
combining two or more selected cells.
1) Formatting 2) Merging
3) Embedding 4) Splitting
5) None of these Ans.) 2
Ques. : 256 The primary output device for computers is a
1) Video monitor 2) Printer
3) Keyboard 4) Mouse
5) None of these Ans.) 1
Ques. : 257 A directory within a directory is called a
________.
1) Mini Directory 2) Junior Directory
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 25/61
3) Part Directory 4) Sub Directory
5) None of these Ans.) 4
Ques. : 258 When you save in the following, the data would
remain intact even after turning off computer?
1) RAM 2) Motherboard
3) Secondary storage device 4) Primary storage device
5) None of these Ans.) 3
Ques. : 259 SMPT, FTP and DNS are applications of the
________ layer.
1) Data link 2) Network
3) Transport 4) Application
5) None of these Ans.) 4
Ques. : 260 Which of the following is NOT a common feature
of software application?
1) Menus 2) Windows
3) Help 4) Search
5) None of these Ans.) 2
Ques. : 261 In MICR, C stands for
1) Code 2) Colour
3) Computer 4) Character

5) None of these Ans.) 4


Ques. : 262 A __________ computer is a large and expensive
computer capable of simultaneously processing data for
hundreds or thousands of users.
1) server 2) mainframe
3) desktop 4) tablet
5) None of these Ans.) 2
Ques. : 263 The ______ folder retains compies of messages
that you have started but are not yet ready to send.
1) Inbox 2) Outbox
3) Drafts 4) Sent Items
5) None of these Ans.) 3
Ques. : 264 The ability of an OS to run more than one
application at a time is called
1) multitasking 2) objectoriented
programming
3) multiuser
computing 4) timesharing
5) None of these Ans.) 1
Ques. : 265 Example of nonnumeric
data is
1) Employee address 2) Examination score
3) Bank balance 4) All the above
5) None of these Ans.) 5
Ques. : 266 Coded entries which are used to gain access to a
computer system are called
1) entry code 2) password
3) security commands 4) codewords
5) None of these Ans.) 2
Ques. : 267 To move to the bottom of a document, press
1) Insert key 2) Home key
3) Ctrl key+End key 4) End key
5) None of these Ans.) 3
Ques. : 268 A device that is connected to the motherboard is
called a(n)
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 26/61
1) external device 2) adjunct device
3) peripheral device 4) input device
5) None of these Ans.) 3
Ques. : 269 Storage and memory differ with respect to which
of the following characteristics?
1) Price 2) Reliability
3) Speed 4) All the above
5) None of these Ans.) 4
Ques. : 270 The ______ tells the computer how to use its
components.
1) utility 2) network
3) operating system 4) application software
5) None of these Ans.) 3
Ques. : 271 Screen that comes on when you turn on your
computer that shows all the icons is
1) desktop 2) face to face
3) viewer 4) view space
5) None of these Ans.) 1
Ques. : 272 A file that contains definitions of the paragraph
and character styles for your document and all things you
customised like toolbars and menus is called a
1) guide 2) pattern

3) base document 4) template


5) None of these Ans.) 4
Ques. : 273 A _______contains buttons and menus that
provide quick access to commonly used commands.
1) toolbar 2) status bar
3) window 4) find
5) None of these Ans.) 1
Ques. : 274 The blinking point which shows your position in
the text is called
1) blinker 2) cursor
3) causer 4) pointer
5) None of these Ans.) 2
Ques. : 275 What is the name of the process that is used to
convert a series of instructions, or program, written in a
highlevel
language into instructions (or a program) that can be run on a
computer?
1) Assembling 2) Compiling
3) Translating 4) Uploading
5) None of these Ans.) 2
Ques. : 276 A processor that collects the transmissions from
several communications media and sends them over a
single line that operates at a higher capacity is called
1) multiplexor 2) bridge
3) Hub 4) router
5) None of these Ans.) 1
Ques. : 277 Main memory works in conjunction with
1) special function cards 2) RAM
3) CPU 4) Intel
5) All the above Ans.) 3
Ques. : 278 When you make graph and picture in document,
then your computer holds the data in
1) resotore file 2) backup file
3) clipboard 4) memory
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 27/61
5) None of these Ans.) 4
Ques. : 279 The way the words appear on the page is called
1) text formatting 2) character formatting
3) point size 4) type face
5) None of these Ans.) 1
Ques. : 280 Which key is used in combination with another
key to perform a specific task?
1) Esc 2) Control
3) Arrow 4) Space bar
5) None of these Ans.) 2
Ques. : 281 In the binary language each letter of the alphabet,
each number and each special character is made up of a
unique combination of
1) eight bytes 2) eight kilobytes
3) eight characters 4) eight bits
5) None of these Ans.) 4
Ques. : 282 Word processing, spreadsheet and photoediting
are examples of
1) application software 2) system software
3) operating system software 4) platform software
5) None of these Ans.) 1
Ques. : 283 Which function calculates the largest value in a set
of numbers?

1) Average 2) Count
3) Minimum 4) Maximum
5) None of these Ans.) 4
Ques. : 284 The humanreadable
version of a program is called ________.
1) source code 2) program code
3) human code 4) system code
5) None of these Ans.) 1
Ques. : 285 The number of pixels displayed on a screen is
known as screen
1) resolution 2) colour depth
3) refresh rate 4) viewing size
5) None of these Ans.) 1
Ques. : 286 What is the name of the protocol used to eliminate
loops?
1) ISL 2) Switching
3) Frame tagging 4) Spanning Tree Protocol
5) Scanning Ans.) 4
Ques. : 287 Digital photos and scanned images are typically
stored as __________graphics with extensions such as
bmp, png, jpg, tif and gif.
1) vector 2) bitmap
3) either vector or bitmap 4) neither vector nor bitmap
5) None of these Ans.) 2
Ques. : 288 Select the odd man out.
1) Interpreter 2) Operating system
3) Compiler 4) Assembler
5) None of these Ans.) 2
Ques. : 289 A ______ is a design tool that graphically shows
the logic in a solution algorithm.
1) flowchart 2) hierarchy chart
3) structure chart 4) context diagram
5) None of these Ans.) 1
Ques. : 290 A multipurpose
window which opens nearly for everything is
1) Main desktop 2) Explorer Window
3) Browser Window 4) Error Window
5) None of these Ans.) 2
Ques. : 291 Active Desktop was a feature of
1) Mozilla Firefox 2) Chrome
3) Microsoft Internet Explorer 4.0 4) Safari
5) None of these Ans.) 3
Ques. : 292 Computer Virus is a
1) hardware 2) Windows tool
3) computer program 4) Both 2) and 3)
5) None of these Ans.) 3
Ques. : 293 'Write!' is a`
1) Text editor 2) Word processor
3) Line editor 4) All the above
5) None of these Ans.) 1
Ques. : 294 What is an operating system?
1) It is an interface between user and the
computer. 2) It manages all resources.
3) It does all process management tasks. 4) All the above
5) None of these Ans.) 4
Ques. : 295 The Factor which makes Windows popular is its
1) multitasking
capacity 2) desktop features
3) user freiendly GUI features 4) being inexpensive
5) None of these Ans.) 3
Ques. : 296 A series of tobeviewed

specially designed documents, which are all linked on


Internet, is called:
1) World Wide Web 2) Web Server
3) Search Engine 4) Both 2) and 3)
5) None of these Ans.) 1
Ques. : 297 Minimising a window means
1) close the window 2) make it an ikon and store on task bar
3) close windows after saving its contents 4) shut down the
computer
5) None of these Ans.) 2
Ques. : 298 Software designed for a specific purpose is called
1) General Program 2) Specific Program
3) Application Software 4) System Software
5) None of these Ans.) 3
Ques. : 299 A unit for measuring data trasmission speed is
called
1) cache 2) broadbank channel
3) byte 4) baud
5) None of these Ans.) 4
Ques. : 300 A storage device used to compensate for the
differences in rates of flow of data form one device to another
is
1) buffer 2) channel
3) call 4) chip
5) None of these Ans.) 1
Ques. : 301 A device that generates the periodic signals used
to control the timing of all CPU operations is
1) COM 2) Collate
3) Chip 4) Clock
5) None of these Ans.) 4
Ques. : 302 A comprehensive software system that builds,
maintains and provides access to a database
1) CPU 2) DASD
3) CAI 4) DBMS
5) None of these Ans.) 4
Ques. : 303 The components that process data are located in
the
1) imput devices 2) output devices
3) system unit 4) storage component
5) None of these Ans.) 3
Ques. : 304 Processing involves
1) inputting data into a computer system 2) transforming input
into output
3) displaying output in a useful manner 4) providing relevant
answers
5) None of these Ans.) 2
Ques. : 305 The OSI model is divided into how many
processes called layers
1) Five 2) Six
3) Seven 4) Eight
5) Nine Ans.) 3
Ques. : 306 _________ are specially designed computer chips
that reside inside other devices, such as your car or your
electronic thermostat.
1) Servers 2) Embedded computers
3) Robotic computers 4) Mainframes
5) None of these Ans.) 2
Ques. : 307 The following are all mobile computing devices,
except
1) notebook computers 2) Cellular phone
3) digital scanners 4) Personal Digital Assistant
5) None of these Ans.) 3

Ques. : 308 How many different documents can you have


open at any one time?
1) Not more than three 2) Only one
3) As many as your computer memory will hold 4) No more
than your task bar can display
5) None of these Ans.) 3
Ques. : 309 What do you press to enter the current date in a
cell?
1) Ctrl+ (semi colon) 2) Ctrl+Shift+: (colon)
3) Ctrl+F10 4) Ctrl+F11
5) None of these Ans.) 1
Ques. : 310 Compatibility in regard to computers refers to
1) The software doing the right job 2) It being versatile
enough to handle the job
3) the software being able to run on the computer 4) software
running with the previously installed
software
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 30/61
5) None of these Ans.) 4
Ques. : 311 A CPU contains
1) a card reader and a printing device 2) an analytical engine
and a control unit
3) a control unit and an arithmetic logic unit 4) an arithmetic
logic unit and a card reader
5) None of these Ans.) 3
Ques. : 312 Permanent instructions that the computer uses
when it is turned on and that cannot be changed by other
instructions are contained in
1) ROM 2) RAM
3) ALU 4) REM
5) None of these Ans.) 1
Ques. : 313 Windos 95, Windows 98 and Windows NT are
known as
1) processors 2) domain names
3) modems 4) operating systems
5) None of these Ans.) 4
Ques. : 314 To find and load a file that has been saved
1) select the Close command 2) select the New command
3) select the Save command 4) select the Open command
5) None of these Ans.) 4
Ques. : 315 =SUM (B1:B8) is an example of a
1) function 2) formula
3) cell address 4) value
5) None of these Ans.) 2
Ques. : 316 Which of the following storage media provides
sequential access only?
1) Floppy disk 2) Magnetic disk
3) Magnetic tape 4) Optical disk
5) None of these Ans.) 3
Ques. : 317 In a spreadsheet, a ____________ is a number you
will use in a calculation.
1) label 2) cell
3) field 4) value
5) None of these Ans.) 4
Ques. : 318 All the following are included in removable media
except
1) CDROMs
2) Diskette

3) DVDs 4) Hard Disk Drive


5) None of these Ans.) 4
Ques. : 319 ________ of cells involves creating a single cell
by combining tow or more selected cells.
1) Formatting 2) Merging
3) Embedding 4) Splitting
5) None of these Ans.) 2
Ques. : 320 The operating system is the most common type of
1) communication software 2) application software
3) systems software 4) wordprocessing
5) None of these Ans.) 3
Ques. : 321 The term bit is short form of
1) megabyte 2) binary language
3) binary digit 4) binary number
5) None of these Ans.) 3
Ques. : 322 All the following terms are associated with
spreadsheet software except
1) worksheet 2) cell
3) formula 4) virus detection
5) None of these Ans.) 4
Ques. : 323 ________are devices used to transmit data over
telecommunication lines.
1) Drives 2) Drive bays
3) Modems 4) Platforms
5) None of these Ans.) 3
Ques. : 324 A _______ is approximately one billion bytes.
1) kilobytes 2) bit
3) gigabyte 4) megabyte
5) None of these Ans.) 3
Ques. : 325 The first step in the transaction processing cycle is
________.
1) database operations 2) audit
3) data entry 4) user inquiry
5) None of these Ans.) 3
Ques. : 326 Where is the disk put to enable computer to read
it?
1) In the hard drive 2) In the disk drive
3) Into the CPU 4) In the modern
5) None of these Ans.) 2
Ques. : 327 The most common method of entering text and
numerical data into a computer system is through the use of a
1) plotter 2) scanner
3) printer 4) keyboard
5) None of these Ans.) 4
Ques. : 328 Which keys enable the input of numbers quickly?
1) Function keys 2) The numeric keypad
3) Ctrl, shift and alt 4) Arror keys
5) None of these Ans.) 2
Ques. : 329 Information that comes from an external source
and is fed into computer software is called
1) input 2) output
3) throughput 4) reports
5) None of these Ans.) 1
Ques. : 330 A computer's hard disk is
1) an arithmetic and logical unit 2) computer software
3) operating system 4) computer hardware
5) None of these Ans.) 4
Ques. : 331 Which process checks to ensure the components
of the computer are operating and connected properly?
1) Booting 2) Processing
3) Saving 4) Editing
5) None of these Ans.) 1

Ques. : 332 Unsolicited commercial email is commonly


known as
1) spam 2) junk
3) hoaxes 4) hypertext
5) None of these Ans.) 1
Ques. : 333 A Website address is a unique name that identifies
a specific ______ on the Web.
1) Web browser 2) Website
3) PDA 4) Hyperling
5) None of these Ans.) 2
Ques. : 334 A device that connects to a network without the
use of cables is said to be
1) distributed 2) centralised
3) open source 4) wireless
5) None of these Ans.) 4
Ques. : 335 A menu contains a list of
1) commands 2) data
3) objects 4) reports
5) None of these Ans.) 1
Ques. : 336 Each _________ on a menu performs a specific
action.
1) client 2) server
3) node 4) command
5) None of these Ans.) 4
Ques. : 337 To make a notebook act as a desktop model, the
notebook can be connected to a __________ which is
connected to a monitor and other devices.
1) bay 2) docking station
3) port 4) network
5) None of these Ans.) 2
Ques. : 338 The command used to print a file
1) Shift+P 2) Ctrl+P
3) Alt+P 4) Esc+P
5) None of these Ans.) 2
Ques. : 339 The first page of a Web site is called
1) Home page 2) Index
3) Java Script 4) Bookmark
5) None of these Ans.) 1
Ques. : 340 A telephone number, a birth date, and a customer
name are all examples of
1) a record 2) a query
3) a file 4) a database
5) None of these Ans.) 1
Ques. : 341 Which of the following is not true abou RAM?
1) It is a temporary area. 2) It is the same as hard disk storage.
3) It is volatile. 4) Information stored in RAM is gone when
you
turn the computer off.
5) None of these Ans.) 2
Ques. : 342 The _________ performs smple mathematics for
the CPU.
1) ALU 2) DIMM
3) BUS 4) Register
5) None of these Ans.) 1
Ques. : 343 A prescribed set of welldefined
instructions for solving mathematical problems is called
1) a compiler 2) a code
3) a description 4) an algorithm
5) None of these Ans.) 4
Ques. : 344 The part of the computer that coordinates all its
functions is called its
1) ROM program 2) system board

3) Arithmetic Logic Unit 4) Control Unit


5) None of these Ans.) 4
Ques. : 345 The most common input devices are the ________
and ___________.
1) microphone, printer 2) scanner, board
3) digital camera, speakers 4) keyboard, mouse
5) None of these Ans.) 4
Ques. : 346 To save an existing file with a new name or a new
location, you should use _________command.
1) Save 2) Save As
3) Save and replace 4) New File
5) None of these Ans.) 2
Ques. : 347 Which of the following is a common extension
used in the file name for application programs?
1) EXE 2) DIR
3) TXT 4) DOC
5) None of these Ans.) 1
Ques. : 348 When your computer stops working suddenly, it is
referred to as a
1) crash 2) die
3) death 4) penalty
5) None of these Ans.) 1
Ques. : 349 A program that converts a highlevel
language source file into a machinelanguage
file is called a
1) translator 2) assembler
3) compiler 4) linker
5) None of these Ans.) 3
Ques. : 350 Which keys can be used together with other keys
for special tasks?
1) Insert, Delete 2) Ctrl, Shift
3) Left Arrow, Right arrow 4) Page Up, Page Down
5) None of these Ans.) 2
Ques. : 351 The _________ command on the Quick Access
Toolbar allows you to cancel your recent commands or
actions.
1) Search 2) Cut
3) Document 4) Undo
5) None of these Ans.) 4
Ques. : 352 In MS Access, a table can have ___________
primary key(s).
1) One 2) Two
3) Three 4) Four
5) None of these Ans.) 1
Ques. : 353 __________ software allows users to perform
calculations on rows and columns of data.
1) World Processing 2) Presentation
3) Graphics designing 4) Electronic spreadsheet
5) None of these Ans.) 4
Ques. : 354 A hard copy of a document is
1) stored in the hard disk 2) stored on a floppy disk
3) stored on a CD 4) printed on the printer
5) None of these Ans.) 4
Ques. : 355 What is the storage area for email
messages called?
1) Storage folder 2) Dictionary
3) Mailbox 4) Hard Disk
5) None of these Ans.) 3
Ques. : 356 The altering of data so that it is not usable unless
the changes are undone is called
1) biometrics 2) compression
3) encryption 4) ergonomics

5) None of these Ans.) 3


Ques. : 357 A DVDRAM
is similar to a ____________ except it has storage capacities
up to 5.2 GB,
1) CDR
2) Floppy disk
3) CDRW
4) Harddisk
5) None of these Ans.) 3
Ques. : 358 A proxy server is used for which of the following?
1) To provide security against unauthorised users 2) To
process client requests for web pages.
3) To process client requests for database access 4) To provide
TCP/IP
5) None of these Ans.) 1
Ques. : 359 A file extension is separated from the main file
name with a(n) ________, but no spaces.
1) question mark 2) exclamation mark
3) underscore 4) period
5) None of these Ans.) 4
Ques. : 360 What is an email attachment?
1) A receipt sent by the recpient. 2) A seperate document from
another program
sent along with an email messagel
3) A malicious parasite that feeds off your
messages and destroys the contents. 4) A list of CC or BCC
recipients.
5) None of these Ans.) 2
Ques. : 361 SMTP, FTP and DNS are applications of the
_________ layer.
1) data link 2) network
3) transport 4) application
5) None of these Ans.) 4
Ques. : 362 Which of the following is NOT a JSP implicit
object?
1) Out 2) In
3) Response 4) Page
5) None of these Ans.) 2
Ques. : 363 Computers connected to a LAN can
1) run faster 2) share information and/or share peripheral
equipment
3) email
4) go online
5) None of these Ans.) 2
Ques. : 364 For selecting and highlighting, which of the
following is generally used?
1) Icon 2) Mouse
3) Plotter 4) Floppy disk
5) None of these Ans.) 2
Ques. : 365 Which device is used to access your computer by
other computer or for talk over phone?
1) RAM 2) CD ROM Drive
3) Modem 4) Hard Drive
5) None of these Ans.) 3
Ques. : 366 Which type of memory is closely related to
processor?
1) Main Memory 2) SecondaryMemory
3) Disk Memory 4) Tape Memory
5) None of these Ans.) 1
Ques. : 367 ________ is the primay key of one file which also
appears in another file.
1) Physical key 2) Primary key

3) Foreign key 4) Logical key


5) None of these Ans.) 3
Ques. : 368 The technique that extends storage capacities of
main memory beyond the actual size of the main memory is
called
1) multitasking 2) virtual memory
3) multiprocessing 4) multiprogramming
5) None of these Ans.) 2
Ques. : 369 The blinking symbol on the computer screen is
called
1) mouse 2) hand
3) cursor 4) icon
5) None of these Ans.) 3
Ques. : 370 A world processor would most likely be used to do
which of the following?
1) keep an account of money spent 2) maintain an inventory
3) type a biography 4) do a computer search in the media
centre
5) None of these Ans.) 3
Ques. : 371 Which of the following commands is used to
select the whole document?
1) Ctrl+A 2) Alt+F5
3) Shift+S 4) Can't be done
5) None of these Ans.) 1
Ques. : 372 Where are programs and data kept while the
processor is using them?
1) Main memory 2) Secondary memory
3) Disk memory 4) Program memory
5) None of these Ans.) 1
Ques. : 373 What does the term GUI stand for?
1) Graphical User Interface 2) Graphical Uninstall/Install
3) General Utility Interface 4) Graphical Universal Interface
5) None of these Ans.) 1
Ques. : 374 While sending an email,
_____________ hints about the matter of the mail.
1) subject 2) to
3) contents 4) cc
5) None of these Ans.) 1
Ques. : 375 Microsoft Windows 7 is an example of
1) utility software 2) network solution
3) application program 4) Operating system
5) None of these Ans.) 4
Ques. : 376 What is output?
1) What the processor takes from the user. 2) What the user
gives to the processor.
3) What the processor gets from the user. 4) What the
processor gives to the user.
5) None of these Ans.) 4
Ques. : 377 Copyrighted software that can be used for free is
1) shareware 2) freeware
3) groupware 4) email
5) None of these Ans.) 2
Ques. : 378 A blinking symbol on the screen that shows where
the next character will appear is a/an
1) delete key 2) arrow key
3) cursor 4) return key
5) None of these Ans.) 3
Ques. : 379 Sending an email is similar to
1) picturing an event 2) narrating a story
3) writing a letter 4) creating a drawing
5) None of these Ans.) 3
Ques. : 380 The abbreviation ISP usually means

1) International Spy Project 2) Indian Social Planning


3) Initial Service Provider 4) Internet Service Provider
5) None of these Ans.) 4
Ques. : 381 Network conponents are connected to the same
cable in the ___________ topology.
1) star 2) ring
3) bus 4) mesh
5) None of these Ans.) 3
Ques. : 382 A symbol on the screen that represents a disk,
document or program that you can select
1) keys 2) caps
3) icon 4) monitor
5) None of these Ans.) 3
Ques. : 383 This component is required to process data into
information and consists of integrated circuits.
1) Hard disk 2) RAM
3) CPU 4) ROM
5) None of these Ans.) 3
Ques. : 384 Data that is copied from an application is stored in
the
1) driver 2) clipboard
3) terminal 4) prompt
5) None of these Ans.) 2
Ques. : 385 Every component of your computer is either
1) software or CPU/RAM 2) input devices or output devices
3) application software or system software 4) hardware or
software
5) None of these Ans.) 4
Ques. : 386 A collection of interrelated files in a computer is a
________.
1) management information system 2) spreadsheet
3) database 4) text file
5) None of these Ans.) 3
Ques. : 387 The ________ , also called the Web, contains
billions of documents.
1) Web portal 2) HTTP
3) World Wide Web 4) Domain
5) None of these Ans.) 3
Ques. : 388 Choose the webbrowser
among the following.
1) MSN messanger 2) Yahoo messenger
3) Rediffimail 4) Mozilla Firefox
5) None of these Ans.) 4
Ques. : 389 One advantage of dialup
Internet access is that
1) it utilises wireless broadband technology 2) it utilizes
existing telephone service`
3) it uses a router for security 4) modem speeds are very fast
5) None of these Ans.) 2
Ques. : 390 The code for a Web page is written using
1) Fifth Generation Language 2) WinZip
3) HTML 4) Perl
5) URL Ans.) 3
Ques. : 391 The storage that retains its data after the power is
turned off is referred to as
1) volatile storage 2) nonvolatile
storage
3) sequential storage 4) direct storage
5) None of these Ans.) 2
Ques. : 392 You can use the tab key to
1) move a cursor across the screen 2) indent a paragraph
3) move the cursor down the screen 4) Only 1) and 2)

5) None of these Ans.) 4


Ques. : 393 _________ is approximately one thousand bytes.
1) 1 MB 2) 1 GB
3) 1 KB 4) 1 TB
5) None of these Ans.) 3
Ques. : 394 What is the term used for unsolicited email?
1) newsgroup 2) usenet
3) backbone 4) flaming
5) spam Ans.) 5
Ques. : 395 A ________ contains specific rules and words that
express the logical steps of an algorithm.
1) syntax 2) Programming structure
3) Programming language 4) logic chart
5) None of these Ans.) 3
Ques. : 396 An example of a telecommunication device is a
1) keyword 2) mouse
3) printer 4) modem
5) None of these Ans.) 4
Ques. : 397 Virtual memory is
1) memory on the hard disk that the CPU uses as
extended RAM 2) in RAM
3) only necessary if you do not have any RAM in
your computer 4) a backup device for floppy disks
5) None of these Ans.) 1
Ques. : 398 A proxy server is used for which of the following?
1) To provide security against unauthorised users 2) To
process client requests for web pages.
3) To process client requests for database access 4) To provide
TCP/IP
5) None of these Ans.) 1
Ques. : 399 A(n) _________ is composed of several
computers connected together to share resources and data.
1) backup 2) network
3) backbone 4) hyperlink
5) None of these Ans.) 2
Ques. : 400 Which of the following is NOT an example of an
operating system?
1) MS DOS 2) Windows 98
3) Windows 2000 4) Windows 3.1
5) None of these Ans.) 5
Ques. : 401 The process of writing computer instructions in a
programming language is known as
1) processing 2) coding
3) testing 4) filing
5) None of these Ans.) 2
Ques. : 402 What is a portion of memory that serves as a
temporary repository for data as it waits for a given action?
1) BIOS 2) Cache
3) Motherboard 4) USB
5) None of these Ans.) 2
Ques. : 403 Which of the following is correct about Java?
1) It is a lowlevel
language. 2) It is a highlevel
language.
3) It is a compiler. 4) It is a hardware device driver.
5) None of these Ans.) 2
Ques. : 404 These are specialised programs that assist users in
locating information on the Web.
1) Search Engine 2) Resource Locator
3) Information Management System 4) DBMS
5) None of these Ans.) 1

Ques. : 405 Which of the following is a storage device that


uses rigid, permanently installed magnetic disks to store
data/information?
1) Floppy diskette 2) Hard disk
3) Permanent disk 4) Optical disk
5) None of these Ans.) 2
Ques. : 406 _________ helps in capturing row data and
entering into computer system.
1) CPU 2) Integrated circuit
3) Input device 4) Motherboard
5) None of these Ans.) 3
Ques. : 407 Which of the following converts all the statements
in a program in a single batch and the resulting collection
of instruction is placed in a new file?
1) compiler 2) interpreter
3) converter 4) instruction
5) None of these Ans.) 1
Ques. : 408 Which of the folloiwng contains information about
a single entity in the database like a person, place, event
or thing?
1) Query 2) Form
3) Record 4) Table
5) None of these Ans.) 3
Ques. : 409 Which of the following is NOT a function of the
control unit?
1) Read instructions 2) Execute instructions
3) Interpret instructions 4) Direct operations
5) None of these Ans.) 4
Ques. : 410 The time it takes a device to locate data and
instructions and make them available to the CPU is known as
1) clock speed 2) a processing cycle
3) CPU speed 4) access time
5) None of these Ans.) 4
Ques. : 411 __________ controls the way in which the
computer system functions and provides a means by which
users
can interact with the computer.
1) The platform 2) The operating system
3) Application software 4) The motherboard
5) None of these Ans.) 2
Ques. : 412 _________ is the process of dividing the disk into
tracks and sectors.
1) Tracking 2) Formatting
3) Crashing 4) Allotting
5) None of these Ans.) 2
Ques. : 413 Which of the followin is the largest unit of
storage?
1) GB 2) KB
3) MB 4) TB
5) None of these Ans.) 4
Ques. : 414 The blinking symbol on the computer screen is
called
1) mouse 2) logo
3) hand 4) cursor
5) None of these Ans.) 4
Ques. : 415 A _______ is a professionally designed empty
document that can be adapted to the user's need.
1) file 2) guide
3) template 4) user guide file
5) None of these Ans.) 3
Ques. : 416 A(n) ________ contains commands that can be
selected.

1) pointer 2) menu
3) icon 4) button
5) None of these Ans.) 2
Ques. : 417 Microcomputer hardware consists of three basic
categories of physical equipment:
1) keyboard, monitor, hard drive 2) system unit, input/output,
memory
3) system unit, input/output, secondary storage 4) system unit,
primary storage, secondary storage
5) None of these Ans.) 2
Ques. : 418 A piece of hardware that is used to enter
information into the computer by usning keys is
1) keyboard 2) monitor
3) hard disk 4) icon
5) None of these Ans.) 1
Ques. : 419 What does WWW mean?
1) World Wide Wizard 2) World Wireless Web
3) World Wide Web 4) Wide Wireless Web
5) None of these Ans.) 3
Ques. : 420 __________ processing is used when a large
mailorder
company accumulates orders and processes them
together in one large set.
1) Batch 2) Online
3) Realtime
4) Group
5) None of these Ans.) 1
Ques. : 421 Which of the following is NOT the major function
of a computer?
1) Processing data into information 2) Storing data or
information
3) Modifying data 4) Analysing data or information
5) None of these Ans.) 4
Ques. : 422 A repair for a known software bug, usually
available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) None of these Ans.) 2
Ques. : 423 Which type of memory holds only the program
and data that the CPU is presently processing?
1) CMOS 2) ROM
3) RAM 4) ASCII
5) None of these Ans.) 3
Ques. : 424 When you cut or copy information it gets place in
the
1) clipart 2) clipboard
3) Internet 4) motherboard
5) None of these Ans.) 2
Ques. : 425 If you want to locate the hardware address of a
local device, which protocol would you use?
1) ARP 2) RARP
3) RAM 4) PING
5) PONG Ans.) 4
Ques. : 426 The name of the location of a particular piece of
data is its
1) address 2) memory name
3) storage site 4) data location
5) None of these Ans.) 1
Ques. : 427 Which of the following operating systems is not
owned and licensed by a company?
1) Unix 2) Linux
3) Windows 2000 4) Mac

5) Windows Ans.) 2
Ques. : 428 The MS Excel stores its documents in the form of
files which are called
1) worksheets 2) workbooks
3) notebooks 4) excel sheets
5) None of these Ans.) 1
Ques. : 429 ________ view shows how the contents on printed
page will appear with margin, header and footer.
1) Draft 2) Full screen reading
3) Outline 4) Page layout
5) None of these Ans.) 4
Ques. : 430 What menu is selected to cut, copy and paste?
1) File 2) Edit
3) Tools 4) Table
5) None of these Ans.) 1
Ques. : 431 Personal computers are connected to form
1) Super computer 2) Mainframe computers
3) Enterprise 4) Network
5) Server Ans.) 4
Ques. : 432 What does remain in RAM when computer is
turned off?
1) Operating System 2) BICS
3) Software Application 4) Nothing
5) None of these Ans.) 4
Ques. : 433 Information travels between components on the
motherboard through
1) flash memory 2) CMOS
3) bays 4) buses
5) None of these Ans.) 4
Ques. : 434 In a relational database, this is a data structure that
organises the information about a single topic into rows
and columns.
1) block 2) record
3) tuple 4) table
5) None of these Ans.) 4
Ques. : 435 For seeing the output, which of the following is
used?
1) Scanner 2) Keyboard
3) Mouse 4) Monitor
5) None of these Ans.) 4
Ques. : 436 The simultaneous execution of two or more
instructions is called
1) sequential access 2) reduced instruction set computing
3) multiprocessing 4) disk mirroring
5) None of these Ans.) 3
Ques. : 437 Multiprogramming systems
1) are easier to develop than single programming
systems 2) execute each job faster
3) execute more jobs in the same time period 4) use only one
large mainframe computer
5) None of these Ans.) 3
Ques. : 438 Which device can understand the difference
between data and program?
1) Input device 2) Output device
3) Memory 4) Microprocessor
5) None of these Ans.) 4
Ques. : 439 Which of the following devices has a limitation
that we can only read it but cannot erase or modify it?
1) Magnetic tape 2) Hard disk
3) Compact disk 4) Floppy disk
5) None of these Ans.) 3
Ques. : 440 Which of the following is not an output device?

1) Plotter 2) Printer
3) Monitor 4) Joystick
5) None of these Ans.) 4
Ques. : 441 What kind of scheme is the HTTP protocol?
1) get/put 2) store/forward
3) queuing 4) search/return
5) request/response Ans.) 5
Ques. : 442 What type of error does a memory parity error
create?
1) A fatal exception error 2) An NMI error
3) A corrupt Windows operating system file 4) A GPF error
5) A GPA error Ans.) 2
Ques. : 443 Which of the following cannot be used as the
scope when using a JavaBean with JSP?
1) Page 2) Request
3) Session 4) Application
5) Response Ans.) 5
Ques. : 444 Devices that let the computer communicate with
you are _________ devices.
1) input 2) output
3) processing 4) storage
5) None of these Ans.) 2
Ques. : 445 Eight bits of data is called
1) octabit 2) word
3) sentence 4) byte
5) None of these Ans.) 4
Ques. : 446 The secret code that gives you access to some
programs:
1) clue 2) cue
3) password 4) help
5) None of these Ans.) 3
Ques. : 447 The different styles of lettering in a word
processing program.
1) font 2) calligraphy
3) writing 4) manuscript
5) None of these Ans.) 1
Ques. : 448 An example of a processings device would be
1) a magnetic ink reader 2) a tablet PC
3) Special function cards 4) scanners
5) None of these Ans.) 2
Ques. : 449 The main memory of a computer can also be
called
1) Secondary storage 2) Internal storage
3) Random Access Memory 4) All the above
5) None of these Ans.) 3
Ques. : 450 A saved document is referred to as a
1) file 2) word
3) folder 4) project
5) None of these Ans.) 1
Ques. : 451 By default, Excel positions text in a cell
1) leftaligned
2) rightaligned
3) centered 4) justified
5) None of these Ans.) 1
Ques. : 452 Errors in computer programs are referred to as
1) bugs 2) mistakes
3) item overlooked 4) blunders
5) None of these Ans.) 1
Ques. : 453 A compiler is used to translate a program written
in
1) a low level language 2) a highlevel
language

3) assembly language 4) machine language


5) None of these Ans.) 2
Ques. : 454 Computer programs are also known as
1) operating systems 2) documents
3) peripherals 4) applications
5) None of these Ans.) 4
Ques. : 455 The _______ becomes different shaped depending
on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3
Ques. : 456 Multiplexing involves _________ path and
__________ channels.
1) one, multiple 2) one, one
3) multiple, one 4) multiple, multiple
5) None of these Ans.) 1
Ques. : 457 To access the properties of an object, the mouse
technique to use is
1) dragging 2) dropping
3) rightclicking
4) shiftclicking
5) None of these Ans.) 3
Ques. : 458 A(n) __________ is a program that makes the
computer easier to use.
1) operating system 2) application
3) utility 4) network
5) None of these Ans.) 1
Ques. : 459 Connection to the Internet using a phone line and
a modem is called ___________ connection.
1) digital 2) dialup
3) broadband 4) dish
5) None of these Ans.) 2
Ques. : 460 To access a mainframe or supercomputer, users
often use a
1) terminal 2) monitor
3) desktop 4) handheld
5) None of these Ans.) 1
Ques. : 461 Which of the following is a part of the computer
that one can touch and feel?
1) Hardware 2) Software
3) Programs 4) Output
5) None of these Ans.) 1
Ques. : 462 This component is required to process data into
information and consists of integrated circuits.
1) Hard disk 2) RAM
3) CPU 4) ROM
5) None of these Ans.) 3
Ques. : 463 Which part of the computer displays the work
done?
1) RAM 2) Scanner
3) Monitor 4) ROM
5) None of these Ans.) 3
Ques. : 464 The main job of a CPU is to
1) carry out program instructions 2) store data/information for
future use
3) process data inti information 4) Both 1) and 3)
5) None of these Ans.) 4
Ques. : 465 _________ are attempts by individuals to obtain
confidential information from you by falsifying their identity?
1) Phising trips 2) Computer viruses
3) Special function cards 4) Scanners
5) Keyboards Ans.) 1

Ques. : 466 All of the following are examples of real security


and privacy risks except
1) Hackers 2) Spam
3) Viruses 4) Identity theft
5) None of these Ans.) 2
Ques. : 467 A(n) ___________ is a small, wirless handheld
computer that scans items, tags and pulls up the current
price (and any special offer) as you shop.
1) PSS 2) PoS
3) Inventary 4) Data mining
5) None of these Ans.) 1
Ques. : 468 Which of the following is NOT one of the four
major data processing functions of a computer?
1) Gathering data 2) Processing data into information
3) Analysing the data or information 4) Storing the data or
information
5) None of these Ans.) 3
Ques. : 469 Computers uses __________ language to process
data.
1) processing 2) kilobyte
3) binary 4) representational
5) None of these Ans.) 3
Ques. : 470 Computers process data into information working
exclusively with
1) multimedia 2) words
3) characters 4) numbers
5) None of these Ans.) 4
Ques. : 471 The string of eight 0s and 1s is called a
1) megabyte 2) kilobyte
3) byte 4) gigabyte
5) None of these Ans.) 3
Ques. : 472 A _________ is approximately one billion bytes.
1) kilobyte 2) bit
3) gigabyte 4) megabyte
5) None of these Ans.) 3
Ques. : 473 SMTP, FTP and DNS are applications of the
_________ layer.
1) Data link 2) Network
3) Transport 4) Application
5) None of these Ans.) 4
Ques. : 474 A __________ is not a form of biometrics.
1) Fingerprint 2) Password
3) Retina scan 4) Breath scan
5) None of these Ans.) 2
Ques. : 475 Reference to each file on a disk are stored in a
1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) None of these Ans.) 1
Ques. : 476 Buffering in printers is necessary
1) as computers are fast in generating data for
printing then printer can print it.
2) as there is not enough memory provided with
printers.
3) to make printers work for more years. 4) Both 1) and 2)
5) None of these Ans.) 4
Ques. : 477 Airlines resevation system is a typical example of
1) Batch processing 2) Online
processing
3) Real time processing 4) Both 1) and 2)
5) Both 2) and 3) Ans.) 5
Ques. : 478 Which of the following memories is often used in
a typical computer operation?

1) RAM 2) ROM
3) FDD 4) HDD
5) None of these Ans.) 1
Ques. : 479 Which of the following is NOT a logic gate?
1) AND 2) OR
3) NAND 4) NOR
5) None of these Ans.) 5
Ques. : 480 The difference between people with access to
computers and the Internet and those without this access is
known as the
1) digital divide 2) Internet divide
3) Web divide 4) broadband divide
5) None of these Ans.) 1
Ques. : 481 DSL is example of a(n) _____________
connection.
1) network 2) wireless
3) slow 4) broadband
5) None of these Ans.) 4
Ques. : 482 __________ is the study of molecules and
strctures whose size ranges from 1 to 100 Nanometers?
1) Nanoscience 2) Microelectrodes
3) Computer Forensics 4) Artificial intelligence
5) None of these Ans.) 1
Ques. : 483 The name for the way with which computers
manipulate data into information is called
1) programming 2) processing
3) storing 4) organising
5) None of these Ans.) 2
Ques. : 484 After a picture has been taken with a digital
camera and processed appropriately, the actual print of the
picture is considered a(n)
1) data 2) output
3) input 4) process
5) None of these Ans.) 2
Ques. : 485 A command that takes what has been typed into
the computer and can be seen on the screen and sends it to
the printer for output on paper
1) print 2) return
3) jump 4) attention
5) None of these Ans.) 1
Ques. : 486 The key which lets you exit a program when
pushed
1) arrow key 2) spacebar
3) escape key 4) return key
5) None of these Ans.) 3
Ques. : 487 The ability of an OS to run more than one
application at a time is called
1) multitasking 2) objectoriented
programming
3) multiuser
computing 4) timesharing
5) None of these Ans.) 1
Ques. : 488 Which of the following statements best describes
the batch method of input?
1) Data is processed as soon as it is input. 2) Data is input at
the time it is collected.
3) Data is collected in the form of source
documents, placed into groups, and then input to
the computer.
4) Source documents are not used.
5) None of these Ans.) 3
Ques. : 489 The benefit of using computers is that

1) Computers are very fast and can store huge


amounts of data.
2) Computers provide accurate output even when
input is incorrect.
3) Computers are designed to be inflexible. 4) All the above
5) None of these Ans.) 1
Ques. : 490 The function of CPU is
1) to provide external storage of text 2) to communicate with
the operator
3) to read, interpret and process the information
and instruction 4) to provide a hard copy
5) None of these Ans.) 3
Ques. : 491 What characteristics of readonly
memory makes it useful?
1) ROM information can be easily updated 2) Data in ROM is
nonvolatile, that is, it remains
there even without elctronical power.
3) ROM provides very large amounts of
inexpensive data storage.
4) ROM chips are easily swapped between
different brands of computers.
5) None of these Ans.) 2
Ques. : 492 ___________ is the process of carrying out
commands.
1) Fetching 2) Storing
3) Decoding 4) Executing
5) None of these Ans.) 4
Ques. : 493 Which of the following peripheral devices
displays information to a user?
1) Monitor 2) Keyboard
3) Secondary storage device 4) Scanner
5) None of these Ans.) 1
Ques. : 494 The physical components of a computer system is
called
1) software 2) hardware
3) network 4) open source
5) None of these Ans.) 2
Ques. : 495 Which of the following is a graphical
representation of an application?
1) Windows 95 2) Windows Explorer
3) Icon 4) Taskbar
5) None of these Ans.) 3
Ques. : 496 A field is a related group of
1) records 2) files
3) characters 4) cables
5) None of these Ans.) 3
Ques. : 497 To restart the computer ___________ key is used.
1) Del + Ctrl 2) Backspace + Ctrl
3) Ctrl + Alt + Del 4) Reset
5) None of these Ans.) 4
Ques. : 498 The process of putting information in a file on a
magnetic disk, or in a computer's memory, so it cab be used
later
1) store 2) ship
3) shift 4) centre
5) None of these Ans.) 1
Ques. : 499 Saving is the process of
1) compying a document from memory to a storage
medium
2) making changes to a document's existing
content
3) changing the appearance, or overall look, of a

document
4) developing a document by entering text using a
keyboard
5) None of these Ans.) 1
Ques. : 500 Printed information, called _________ exists
physically and is a more permanent form of output than that
presented on a display device.
1) soft copy 2) hard copy
3) carbon copy 4) desk copy
5) None of these Ans.) 2
Ques. : 501 To find a saved document in the computer's
memory and bring it up on the screen to view is called
1) reversing 2) rerunning
3) retrieving 4) returning
5) None of these Ans.) 3
Ques. : 502 The Internet is a system of
1) software bundles 2) Web pages
3) Website 4) Interconnected networks
5) None of these Ans.) 4
Ques. : 503 Code consisting of bars and lines of varying
widths or lengths that is computerreadable
is known as
1) an ASCII code 2) a magnetic tape
3) an OCR scanner 4) a bar code
5) None of these Ans.) 4
Ques. : 504 A ________ is a unique name that you give to a
file of information.
1) device letter 2) folder
3) filename 4) filename extension
5) None of these Ans.) 3
Ques. : 505 What is an email attachment?
1) A receipt sent by the recpient. 2) A separate document from
another program
sent along with an email message.
3) A malicious parasite that feeds off your
messages and destroys the contents. 4) A list of CC or BCC
recipients.
5) None of these Ans.) 2
Ques. : 506 Which of the following are all considered
advantages of email?
1) Convenience, speed of delivery, generality and
reliability 2) Printable, global and expensive
3) Global, convenience and Microsoft owned 4) Slow
delivery, reliable, global and inexpensive
5) None of these Ans.) 1
Ques. : 507 Ecommerce
allows companies to
1) issue important business reports 2) conduct business over
the Internet
3) support decision making processes 4) keep track of
paperbased
transactions
5) None of these Ans.) 2
Ques. : 508 In a client/server model, a client program
1) asks for information 2) provides information and files
3) serves software files to other computers 4) distributes data
files to other computers
5) None of these Ans.) 1
Ques. : 509 Computers manipulate data in many ways, and
this manipulation is called ________.
1) utilizing 2) batching
3) upgrading 4) processing

5) None of these Ans.) 4


Ques. : 510 Which of the following is an example of an optical
disk?
1) Digital versatile disks 2) Magnetic disks
3) Memory disks 4) Data bus disks
5) None of these Ans.) 1
Ques. : 511 Another word for the CPU is
1) microprocessor 2) execute
3) microchip 4) decoder
5) None of these Ans.) 1
Ques. : 512 A menu contains a list of
1) commands 2) data
3) objects 4) reports
5) None of these Ans.) 1
Ques. : 513 A command to get a file you worked on from the
memory where it was stored
1) close 2) delete
3) open 4) get it
5) None of these Ans.) 3
Ques. : 514 A _________ is a collection of data that is stored
electronically as a series of records in a table.
1) spreadsheet 2) presentation
3) database 4) web page
5) None of these Ans.) 3
Ques. : 515 The software tools that enable a user to interact
with a computer for specific purposes are known as
1) hardware 2) networked softwares
3) sharewares 4) applications
5) None of these Ans.) 4
Ques. : 516 What is the shape of a CD?
1) Quadrilateral 2) Rectangular
3) Circular 4) Hexagonal
5) None of these Ans.) 3
Ques. : 517 Which of the following is NOT an output device?
1) Plotter 2) Printer
3) Scanner 4) Monitor
5) None of these Ans.) 3
Ques. : 518 A ________ contains buttons and menus that
provide quick access to commonly used commands.
1) toolbar 2) menu bar
3) window 4) find
5) None of these Ans.) 1
Ques. : 519 The _________ enables you to simultaneously
keep multiple pages open in one browser window.
1) tab box 2) popup
helper
3) tab row 4) address bar
5) Esc key Ans.) 3
Ques. : 520 A __________ is an example of an input device.
1) keyboard 2) printer
3) motheboard 4) CPU
5) None of these Ans.) 1
Ques. : 521 A(n) ________ is the text you want to be printed
at the bottom of the pages.
1) header 2) endnote
3) footnote 4) footer
5) None of these Ans.) 4
Ques. : 522 A(n) ________ is the combination of software and
hardware that facilitates the sharing of information
between computing devices.
1) network 2) peripheral
3) expansion board 4) digital device

5) None of these Ans.) 1


Ques. : 523 The ________ tells the computer how to use its
components.
1) utility 2) network
3) operating system 4) application program
5) None of these Ans.) 3
Ques. : 524 Which of the following functions is NOT
performed by the TCP?
1) Addressing 2) Connection establishment
3) Data transfer 4) Flow control
5) None of these Ans.) 5
Ques. : 525 In addition to keying data directly into a database,
data entry can be done from a(n)
1) input form 2) table
3) field 4) data dictionary
5) None of these Ans.) 1
Ques. : 526 The term ________ designates equipment that
might be added to a computer system to enhance its
functionality.
1) digital device 2) system addon
3) disk pack 4) peripheral device
5) None of these Ans.) 4
Ques. : 527 A CDRW
disk
1) has a faster access than an internal disk 2) is a form of
optical disk, so it can only be written
once
3) holds less data than a floppy disk 4) can be erased and
rewritten
5) None of these Ans.) 4
Ques. : 528 The process of changing a written work already
done is called
1) filing 2) editing
3) cutting 4) closing
5) None of these Ans.) 2
Ques. : 529 To make a notebook act as a desktop model, the
notebook can be connected to a __________ which is
connected to a monitor and other devices.
1) bay 2) docking station
3) port 4) network
5) None of these Ans.) 2
Ques. : 530 What is the name of the process that is used to
convert a series of instructions, or program, written in a
highlevel
language into instructions (or a program) that can be run on a
computer?
1) Assembling 2) Compiling
3) Translating 4) Uploading
5) None of these Ans.) 2
Ques. : 531 What does 'C' represent in the term MICR?
1) Code 2) Column
3) Computer 4) Character
5) None of these Ans.) 4
Ques. : 532 On which button does help menu exist?
1) End 2) Start
3) Turn off 4) Restart
5) None of these Ans.) 2
Ques. : 533 Which of the following is the newest version of
Excel among the following?
1) Excel 2000 2) Excel 2002
3) Excel ME 4) Excel XP
5) None of these Ans.) 4

Ques. : 534 __________ processes the data and is also called


the brain of the computer.
1) Motherboard 2) Memory
3) RAM 4) CPU
5) None of these Ans.) 4
Ques. : 535 Which of the following are objects in an access
database?
1) table, form 2) queries, reports
3) macros, modules 4) All the above
5) None of these Ans.) 4
Ques. : 536 Which area in an Excel window allows entering
values and formulas?
1) Title bar 2) Menu bar
3) Formula bar 4) Standard Tool Bar
5) None of these Ans.) 3
Ques. : 537 Computer software can be defined as
1) the computer and its associated equipment. 2) the
instructions that tell the computer what to do.
3) computer components that act to accomplish a
goal.
4) an interface between the computer and the
network.
5) the interacton between the computer and its
database. Ans.) 2
Ques. : 538 A ________ is a set of rules.
1) resource locator 2) domain
3) hypertext 4) URL
5) protocol Ans.) 5
Ques. : 539 Which of the following is NOT an example of
hardware?
1) Mouse 2) Printer
3) Monitor 4) Excel
5) None of these Ans.) 4
Ques. : 540 Which of the following is part of the system unit?
1) Monitor 2) CPU
3) CDROM
4) Floppy disk
5) None of these Ans.) 2
Ques. : 541 Fax machines and imaging systems are examples
of
1) barcode
readers 2) output devices
3) scanning devices 4) penbased
systems
5) None of these Ans.) 3
Ques. : 542 When writing a document, you can use the
________ feature to find an appropriate word or an alternative
word if you find yourself stuck for the right word.
1) dictionary 2) word finder
3) encyclopedia 4) Wikipedia
5) None of these Ans.) 1
Ques. : 543 Various applications and documents are
represented on the Windows desktop by
1) Symbols 2) Labels
3) Graphs 4) Icons
5) None of these Ans.) 4
Ques. : 544 Which of the following could be digital input
devices for computers?
1) Digital camcoder 2) Microphone
3) Scanner 4) All the above
5) None of these Ans.) 4

Ques. : 545 The box that contains the central electronic


components of the computer is the
1) motherboard 2) system unit
3) peripheral 4) input device
5) None of these Ans.) 2
Ques. : 546 You can use the _____________bar to type a URL
and display a Web page, or type a keyword to display a
list of related Web pages.
1) menu 2) title
3) search 4) web
5) address Ans.) 5
Ques. : 547 A(n) _________ is a private corporate network,
used exclusively by company employees.
1) Internet 2) local area network
3) peertopeer
4) intranet
5) None of these Ans.) 4
Ques. : 548 A saved document is referred to as a
1) file 2) word
3) folder 4) project
5) None of these Ans.) 1
Ques. : 549 Codes consisting of bars and lines of varying
widths or lengths that are computerreadable
are known as
1) a bar code 2) an ASCII code
3) a magnetic tape 4) a light pen
5) None of these Ans.) 1
Ques. : 550 When cutting and pasting, the item cut is
temporarily stored in
1) ROM 2) Hard drive
3) Diskette 4) Dashboard
5) Clipboard Ans.) 5
Ques. : 551 What is backup?
1) Adding more components to your network 2) Protecting
data by copying it from the original
source to a different destination
3) Filtering old data from the new data 4) Accessing data on
tape
5) None of these Ans.) 2
Ques. : 552 ________ are type of inexpensive digital camera
that remains tethered to a computer and are used for
videoconferencing, video chatting, and live Web broadcast.
1) Webcams 2) Webpics
3) Browsercams 4) Browserpics
5) None of these Ans.) 1
Ques. : 553 The acronym HTML stands for
1) High Transfer Machine Language 2) High Transmission
Machine Language
3) Hyper Text Markup Language 4) Hypermedia Text
Machine Language
5) None of these Ans.) 3
Ques. : 554 Reference to each file on a disk are stored in a
1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) None of these Ans.) 1
Ques. : 555 What is correcting error in a program called?
1) Interpretting 2) Translating
3) Debugging 4) Compiling
5) None of these Ans.) 3
Ques. : 556 Sending an email is similar to
1) writing a letter 2) drawing a picture
3) talking on the phone 4) sending a package

5) None of these Ans.) 1


Ques. : 557 To ________a document menas to make changes
to its existing content.
1) format 2) save
3) edit 4) print
5) None of these Ans.) 3
Ques. : 558 Where is the disk put to enable computer to read
it?
1) Disk drive 2) Memory
3) CPU 4) ALU
5) None of these Ans.) 1
Ques. : 559 What menu is selected to cut, copy and paste?
1) File 2) Tools
3) Special 4) Edit
5) None of these Ans.) 1
Ques. : 560 The most important or powerful computer in a
typical network is
1) desktop 2) network client
3) network server 4) network station
5) None of these Ans.) 3
Ques. : 561 To change hardware components into more
powerful or rectified version is called
1) expansion 2) plug and play
3) upgrading 4) upsizing
5) None of these Ans.) 3
Ques. : 562 Which of the following views is present in Power
Point?
1) Document view 2) Slide sorter view
3) Slide changer view 4) Play slide view
5) None of these Ans.) 2
Ques. : 563 In order to move from one worksheet to another in
excel workbook, one should click
1) active cell 2) scroll bar
3) sheet tab 4) tab button
5) None of these Ans.) 3
Ques. : 564 To access properties of an object, the mouse
technique to use is __________.
1) dragging 2) dropping
3) rightclicking
4) shiftclicking
5) None of these Ans.) 3
Ques. : 565 Every device on the Internet has a unique
________ address that identifies it in the same way that a
street
address identifies the location of a house.
1) DH 2) DA
3) IP 4) IA
5) None of these Ans.) 3
Ques. : 566 This type of hardware consists of devices that
translate data into a form the computer can process
1) application 2) input
3) system 4) All the above
5) None of these Ans.) 2
Ques. : 567 Which key is used in combination with another
key to perform a specific task?
1) Function 2) Arrow
3) Space bar 4) Control
5) None of these Ans.) 4
Ques. : 568 A stepbystep
procedure for accomplishing a task is known as a(n)
1) algorithm 2) hardware program
3) software bug 4) firmware program

5) None of these Ans.) 1


Ques. : 569 A group of 8 bits is known as
1) byte 2) kilobyte
3) binary digit 4) megabit
5) None of these Ans.) 1
Ques. : 570 The hardware device commonly referred to as the
'brain' of the computer is the
1) RAM chip 2) data input
3) CPU 4) secondary storage
5) None of these Ans.) 3
Ques. : 571 What is the intersection of a column and a row
called on an Excel worksheet?
1) Column 2) Value
3) Address 4) Cell
5) None of these Ans.) 4
Ques. : 572 The process of a computer of receiving
information from a server on the Internet is called
1) pulling 2) pushing
3) downloading 4) transferring
5) None of these Ans.) 3
Ques. : 573 Which of the following would you do to remove a
paragraph from a report you had written?
1) Delete and edit 2) Highlight and delete
3) Cut and paste 4) Undo typing
5) None of these Ans.) 2
Ques. : 574 All the following media have read and write
capability except
1) flash memory cards 2) CDROMs
3) hard disk drives 4) floppy disks
5) None of these Ans.) 2
Ques. : 575 If a user needs information instantly available to
the CPU, it should be stored
1) on a CD 2) in secondary storage
3) in the CPU 4) on the motherboard
5) None of these Ans.) 2
Ques. : 576 To what temporary area can you store text and
other data, and later paste them to another location?
1) The clipboard 2) ROM
3) CDROM
4) The hard disk
5) None of these Ans.) 1
Ques. : 577 The operating system called UNIX is typically
used for
1) desktop computers 2) laptop computers
3) super computers 4) web servers
5) All the above Ans.) 5
Ques. : 578 Press __________ to move the insertion point to
the address box, or to highlight the URL in the address box.
1) Alt+D 2) Alt+A
3) Shift+Tab 4) Tab+Ctrl
5) None of these Ans.) 1
Ques. : 579 A collection of unprocessed items is
1) information 2) data
3) memory 4) reports
5) None of these Ans.) 2
Ques. : 580 The portion of the CPU that coordinates the
activities of all the other computer components is the
1) motherboard 2) coordination board
3) control unit 4) airthmetic logic unit
5) None of these Ans.) 3
Ques. : 581 A ______ is approximately one billion bytes.
1) kilobyte 2) bit

3) gigabyte 4) megabyte
5) None of these Ans.) 3
Ques. : 582 The _________ directory is mandatory for every
disk.
1) Root 2) Base
3) Sub 4) Case
5) None of these Ans.) 1
Ques. : 583 To prepare a presentation/slide show, which
application is commonly used?
1) Photoshop 2) Power Point
3) Outlook Express 4) Internet Explorer
5) All the above Ans.) 2
Ques. : 584 _________ is the process of carrying out
commands.
1) Fetching 2) Storing
3) Executing 4) Decoding
5) None of these Ans.) 3
Ques. : 585 Which of the following refers to the fastest,
biggest and most expensive computers?
1) Personal Computers 2) Supercomputers
3) Laptops 4) Notebooks
5) None of these Ans.) 2
Ques. : 586 Microsoft is an example of
1) an operating system 2) a processing device
3) application software 4) an input device
5) None of these Ans.) 3
Ques. : 587 ________ is the process of carrying out
commands.
1) Fetching 2) Storing
3) Decoding 4) Executing
5) None of these Ans.) 4
Ques. : 588 If you do not want to select any option after
opening a menu then click menu title again or press key
________ to close the menu.
1) Shift 2) Tab
3) Escape 4) F1
5) None of these Ans.) 3
Ques. : 589 It is easy to change the name of file using
_____________ process.
1) transforming 2) christening
3) renaming 4) retagging
5) None of these Ans.) 3
Ques. : 590 What is the minimum and maximum zoom sizes in
MS Office?
1) 10, 100 2) 20, 250
3) 10, 500 4) 10, 1000
5) None of these Ans.) 3
Ques. : 591 In Excel, _________contains one or more
worksheets.
1) Template 2) Workbook
3) Active cell 4) Label
5) None of these Ans.) 2
Ques. : 592 Which of the following is a popular programming
language for developing multimedia web pages, websites
and webbased
applications?
1) COBOL 2) Java
3) BASIC 4) Assembler
5) None of these Ans.) 2
Ques. : 593 Compiling creates a(n)
1) program specification 2) algorithm
3) executable program 4) subroutine

5) None of these Ans.) 3


Ques. : 594 Computers use the ___________number system to
store data and perform calculations.
1) decimal 2) hexadecimal
3) octal 4) binary
5) None of these Ans.) 1
Ques. : 595 The ______ key will launch the Start button.
1) esc 2) shift
3) Windows 4) Shortcut
5) None of these Ans.) 3
Ques. : 596 A character of information is represented by a(n)
1) byte 2) bit
3) field 4) attribute
5) None of these Ans.) 2
Ques. : 597 A set of instructions telling the computer what to
do is called
1) mentor 2) instructor
3) compiler 4) program
5) None of these Ans.) 4
Ques. : 598 To maximise a window means
1) fill it to capacity 2) expand it to fit the desktop
3) put only like files inside 4) drag it to the recycle bin
5) None of these Ans.) 2
Ques. : 599 The home page of a website is
1) the largest page 2) the last page
3) the first page 4) the most colourful page
5) None of these Ans.) 3
Ques. : 600 Which of the following is not associated with
computers?
1) BIt 2) Binary
3) Pencil 4) Mouse
5) Screen Ans.) 3
Ques. : 601 MICR technology used for clearance of cheques
by banks refers to
1) Magnetic Ink Character Recognition 2) Magnetic
Intelligence Character Recognition
3) Magnetic Information Cable Recognition 4) Magnetic
Insurance Cases Recognition
5) None of these Ans.) 1
Ques. : 602 Modern computers represent characters and
numbers internally using one of the following number
systems:
1) Penta 2) Octal
3) Hexa 4) Septa
5) Binary Ans.) 5
Ques. : 603 A ________ is approximately a million bytes.
1) gigabyte 2) kilobyte
3) megabyte 4) Terabyte
5) None of these Ans.) 3
Ques. : 604 If you want to extend the length of the network
without having the signal degrade, you would use a
1) repeater 2) router
3) gateway 4) switch
5) None of these Ans.) 1
Ques. : 605 To move down a page in a document
1) jump 2) fly
3) wringgle 4) scroll
5) None of these Ans.) 4
Ques. : 606 What type of resource does have greater
probability to become shared resource in a computer network?
1) Printers 2) Speakers
3) Floppy disk drivers 4) Keyboards

5) None of these Ans.) 1


Ques. : 607 Which of the following terms is used to describe
the movement of an item with the help of mouse to a new
position on screen?
1) click 2) double click
3) drag and drop 4) point
5) right click Ans.) 3
Ques. : 608 What does storage unit provide?
1) Place for typing data 2) Storage for information and
instruction
3) Place for printing information 4) All the above
5) None of these Ans.) 2
Ques. : 609 _________ are distinct items that don't have much
meaning to you in a given countext.
1) Fields 2) Data
3) Queries 4) Properties
5) None of these Ans.) 2
Ques. : 610 An example of a telecommunication device is a
1) Keyboard 2) mouse
3) printer 4) modem
5) None of these Ans.) 4
Ques. : 611 Two or more computers connected to each other
for sharing information form a
1) network 2) router
3) server 4) tunnel
5) pipeline Ans.) 1
Ques. : 612 The _____ becomes different shapes depending on
the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3
Ques. : 613 The capability of the operating system to enable
two or more than two instructions to execute simultaneously
in a single computer system by using multiple CPUs is
1) Multitasking 2) Multiprogramming
3) multiprocessing 4) Multiexecution
5) None of these Ans.) 3
Ques. : 614 A collection of related information sorted and
dealt with as a unit is a
1) disk 2) data
3) file 4) floppy
5) None of these Ans.) 3
Ques. : 615 An output device that lets you see what the
computer is doing
1) a disk drive 2) monitorscreen
3) shift key 4) printer
5) None of these Ans.) 2
Ques. : 616 To access a mainframe or supercomputer, users
often use a
1) terminal 2) node
3) desktop 4) handheld
5) None of these Ans.) 1
Ques. : 617 By default, your documents print in
__________mode.
1) landscape 2) portrait
3) page setup 4) print view
5) None of these Ans.) 2
Ques. : 618 Firewalls are used to protect against
1) unauthorised attacks 2) virus attacks
3) data driven attacks 4) fire attacks
5) None of these Ans.) 1
Ques. : 619 The term "hypertext" means

1) Nonsequential
writing 2) Hypermedia
3) Blinking text 4) Text with heavy formatting
5) None of these Ans.) 2
Ques. : 620 We can enter and edit text efficiently using
1) spreadsheet 2) typewriter
3) Word Processing Program 4) Desktop Publishing Program
5) None of these Ans.) 3
Ques. : 621 ________ may be included in other folder while
making heirarchical structure folder.
1) Minifolder 2) Tiered folder
3) Subfolder
4) Object
5) None of these Ans.) 3
Ques. : 622 To access properties of an object, the mouse
technique to use is __________.
1) rightclicking
2) shiftclicking
3) dragging 4) dropping
5) None of these Ans.) 1
Ques. : 623 A ________ shares hardware, software and data
among authorised users.
1) network 2) protocol
3) hypertext 4) transmitter
5) None of these Ans.) 1
Ques. : 624 Computer programs are written in a highlevel
programming language however, the humanreadable
version of a program is called
1) cache 2) instruction set
3) source code 4) world size
5) None of these Ans.) 3
Ques. : 625 In world processing, an efficient way to move the
3rd paragraph to place it after the 5th paragraph is
1) copy and paste 2) copy, cut and paste
3) cut, copy and paste 4) cut and paste
5) None of these Ans.) 4
Ques. : 626 Which of the following is an example of
connectivity?
1) Internet 2) Floppy disk
3) paper disk 4) TV disk
5) None of these Ans.) 1
Ques. : 627 ________ allows you to print.
1) Ribbon 2) Monitor
3) Go now 4) Ctrl+P
5) None of these Ans.) 4
Ques. : 628 Microsoft Office is an example of a
1) closedsource
software 2) opensource
software
3) horizontalmarket
software 4) verticalmarket
software
5) None of these Ans.) 1
Ques. : 629 A popular way to learn about computers without
ever going to a classroom is called
1) ilerning
2) isolated learning
3) elearning
4) close learning
5) None of these Ans.) 3
Ques. : 630 A person who uses his/her expertise to gain access
to other people's computers to get information illegally or

do damage is a
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 60/61
1) spammer 2) hacker
3) instant messanger 4) All of the above
5) None of these Ans.) 2
Ques. : 631 Binary coded decimal (BCD) numbers express
each decimal digit as a
1) bit 2) byte
3) nibble 4) binary digit
5) word Ans.) 3
Ques. : 632 One nibble is equal to
1) 2 bits 2) 4 bits
3) 6 bits 4) 8 bits
5) None of these Ans.) 2
Ques. : 633 What may happen if a worksheet is not protected?
1) It cannot be opened. 2) It cannot be saved.
3) It cannot be edited. 4) It can be edited.
5) All cells get locked Ans.) 4
Ques. : 634 What is a firmware?
1) A program started in RAM. 2) A program started in a file.
3) A program started in boot sector. 4) A program started in
ROM.
5) None of these Ans.) 4
Ques. : 635 'TWAIN' is related to which of the following?
1) Printer 2) Keyboard
3) Mouse 4) Monitor
5) Scanner Ans.) 5
Ques. : 636 The Internet is an example of __________
network.
1) star 2) bus
3) hybrid 4) mesh
5) ring Ans.) 4
Ques. : 637 Blueprints are usually created using
____________software.
1) CGI 2) Paint
3) Draw 4) CAD
5) API Ans.) 4
Ques. : 638 The power of a spreadsheet lies in its
1) cells 2) formulas
3) labels 4) worksheets
5) row and columns Ans.) 2
Ques. : 639 IP address consists of how many bits?
1) 16 bits 2) 8 bits
3) 30 bits 4) 32 bits
5) 36 bits Ans.) 4
Ques. : 640 Which storage decive is mounted on 'reels'?
1) Floppy disk 2) CDROM
3) Magnetic disk 4) Magnetic tape
5) Hard disk Ans.) 4
Ques. : 641 A paint program keeps track of every _________
placed on the screen.
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 61/61
1) Image 2) object
3) pixel 4) color

5) symbol Ans.) 3
Ques. : 642 Rules of a programming language are called
1) procedures 2) calls
3) methods 4) login
5) syntax Ans.) 5
Ques. : 643 A primary key can also be called a
1) super key 2) candidate key
3) alternate key 4) secondary key
5) foreign key Ans.) 2

Ques. : 644 Which shortcut key is used to open a new file in


MS Word?
1) Ctrl+N 2) Ctrl+M
3) Ctrl+Y 4) Ctrl+X
5) Ctrl+Z Ans.) 1
Ques. : 645 Bridge operates in which of the following OSI
layers?
1) Physical 2) Network
3) Data link 4) Both 1) and 3)
5) Session Ans.) 4

Potrebbero piacerti anche