2023 2024 EduVark > Education Discussion > General Discussion


  #1  
June 21st, 2014, 11:20 AM
Super Moderator
 
Join Date: Mar 2012
Bank of Baroda question papers of past years of clerk exam in PDF format

Can you please give me the Bank of Baroda question papers of past years of clerk exam in PDF format as it is very urgent for me?

As you want to get the Bank of Baroda question papers of past years of clerk exam in PDF format so here is the information of the same for you:

Bank of Baroda question papers of past years of clerk exam in PDF format

Masters of Computer Application –(MCA) Entrance 2012
Computer Knowledge Paper I
1. All of the following are examples of real security and privacy risks
EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B
2. A process known as ____________ is used by large retailers to study
trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A
3. ____________terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B
4. A(n) ____________ system is a small, wireless handheld computer that
scans an item’s tag and pulls up the current price (and any special
offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A
5. The ability to recover and read deleted or damaged files from a
criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C
6. Which of the following is NOT one of the four major data processing
functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C
7. ____________ tags, when placed on an animal, can be used to record and
track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B
8. Surgeons can perform delicate operations by manipulating devices
through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A
9. Technology no longer protected by copyright, available to everyone, is
considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A
10. ____________ is the study of molecules and structures whose size
ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A
11. ____________ is the science that attempts to produce machines that
display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D
12. ____________ is data that has been organized or presented in a
meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information
is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B

14. Computers gather data, which means that they allow users to
____________ data.
A. present
B. input
C. output
D. store
Ans : B
15. After a picture has been taken with a digital camera and processed
appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D
18. In the binary language each letter of the alphabet, each number and
each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B
21. A ____________ is approximately one billion bytes.
A. kilobyte

B. bit
C. gigabyte
D. megabyte
Ans : C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C
23. ____________ is any part of the computer that you can physically
touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Ans : A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B
28. The ____________, also called the “brains” of the computer, is
responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)

Ans : D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A
31. ____________ is a set of computer programs used on a computer to help
perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B
32. System software is the set of programs that enables your computer’s
hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Ans : D
33. The PC (personal computer) and the Apple Macintosh are examples of
two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A
34. Apple Macintoshes (Macs) and PCs use different ____________ to
process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C
35. Servers are computers that provide resources to other computers
connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.

Ans : A
36. Smaller and less expensive PC-based servers are replacing
____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D
37. ____________ are specially designed computers that perform complex
calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D
39. The difference between people with access to computers and the
Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A
40. ____________ is the science revolving around the use of
nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Ans : A
41. Which of the following is the correct order of the four major
functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Ans : D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million

Ans : A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C
45. ____________ controls the way in which the computer system functions
and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B
46. The operating system is the most common type of ____________
software.
A. communication
B. application
C. system
D. word-processing software
Ans : C
47. ____________ are specially designed computer chips that reside inside
other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B
48. The steps and tasks needed to process data, such as responses to
questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Ans : D

50. The metal or plastic case that holds all the physical parts of the
computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Ans : A

Masters of Computer Application –(MCA) Entrance 2012
Computer Knowledge Paper II
1. Programs from the same developer , sold bundled together , that
provide better integration and share common features , toolbars and menus
are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks
Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's
hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other
devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)
9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
Ans : (C)
10. in a ring topology , the the computer in possession of the ______ can
trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)
11. This part of operating system manages the essential peripherals, such
as the keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the
floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)

13. ________ controls the way in which the computer system functions and
provides a meAns : by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers
connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
Ans : (A)
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
Ans : (C)
17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled
access to a database
(B) hardware system used to create, maintain, and provide uncontrolled
access to a database.
(C) software system used to create, maintain, and provide uncontrolled
access to a database.
(D) software system used to create, maintain, and provide controlled
access to a database.
(E) None of these
Ans : (D)
18. Which of the following is NOT a goal of transaction processing system
?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these

Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated,
this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)
21. _____________ are words that a programming language has set aside for
its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
Ans : (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's
computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have
the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a
serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
Ans : ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share
a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these

Ans : (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
Ans : (D)
26. Granting an outside organization access to internet web pages is
often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
Ans : (A)
27. Which term identifies a specific computer on the web and the main
page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)
28. The code that relational database management systems use to perform
their database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
Ans : (C)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
Ans : (B)

31. A _________ contains specific rules and words that express the
logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)
33. The most frequently used instructions of a computer program are
likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)
34. The ____________ contains data descriptions and defines the name,
data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the
screen to send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)
37. The _____ manual tells you how to use a software program.
(A) documentation

(B) programming
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet
connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
Ans : (C)
39. Software, such as viruses, worms and Trojan horses, that has a
malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
40. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of time or
on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)
43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac

(E) None of these
Ans : (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system
crash or failure
(D) All of these
(E) None of these
Ans : (D)
45. Which of the following places the common data elements in order from
smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)
46. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
Ans : (C)
48. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
Ans : (C)
50. Which of the following would most likely NOT be a symptom of a virus?

(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
Ans : (B)

Contact Details:
Bank of Baroda
291/14/G/1, Ground Floor,
Bhaskar Empire, Opposite Jayabheri Silicon Towers,
Hitech City Rd,
Madhapur,
Hyderabad,
Andhra Pradesh 500084 ‎
India

Map Location:

Last edited by Neelurk; April 4th, 2020 at 09:02 AM.
Similar Threads
Thread
State Bank of India clerk exam past year question papers in PDF format
Bank clerk modal question papers of past years
Past year question papers of Bank of Baroda Probationary Officers post in PDF format
University of Delhi LLM entrance exam question papers of past years in PDF format
Bank of Baroda question papers of clerical cadre of previous years in PDF format
State Bank of India clerk question papers of past years free download
National Thermal Power Corporation ET question papers of past years in PDF format
Industrial Development Bank of India question papers of past years in PDF format free
Postal Assistant question papers of past years in PDF format
State Bank of India clerk exam question papers of past years in PDF format
GATE Civil Engineering question papers of past years in PDF format
Jest question papers of past years in PDF format free download
Union Bank of India clerk cadre question papers of previous years in PDF format
Management Aptitude Test question papers of past years in PDF format
Manipal University PMT question papers of past years in PDF format



Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 10:56 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8