2023 2024 EduVark > Education Discussion > General Discussion


  #1  
June 21st, 2014, 02:54 PM
Super Moderator
 
Join Date: Mar 2013
IBPS Solved Model Question Papers

Can any one here please provide me the solved Computer Knowledge model paper of IBPS exam???

Here is the solved Computer Knowledge model paper of IBPS exam

1. What is the process of copying software programs from secondary storage media to the hard disk called?

(A) Configuration

(B) Download

(C) Storage

(D) Upload

(E) Installation

2. When the pointer is positioned on a _____, it is shaped like a hand.

(A) Grammar error

(B) Formatting error

(C) Screen Tip

(D) Spelling error

(E) Hyperlink

3. Personal computers can be connected together to form a-

(A) server

(B) Supercomputer

(C) Network

(D) Enterprise

(E) None of these

4. A _____ is the term used when a search engine returns a Web page that matches the search criteria.

(A) Blog

(B) Hit

(C) Link

(D) View

(E) Success

5. _____are words that a programming language has set aside for its own use.

(A) Control words

(B) Control structures

(C) Reserved words

(D) Reserved keys

(E) None of these

6. Mobile Commerce is best described as-

(A) The use of Kiosks in marketing

(B) Transporting products

(C) Buying and selling goods/ services through wireless hand-held devices

(D) Using notebook PC’s in marketing

(E) None of the above

7. Which of the following controls the manner of interaction between the user and the operating system?

(A) Language translator

(B) Platform

(C) User interface

(D) Icon

(E) None of these

8. You can keep your personal files/folders in

(A) My Folder

(B) My Documents

(C) My Files

(D) My Text

(E) My Collection

9. Three types of compact disks include CD-ROM, CD-R, and

(A) CD-W

(B) CD-RAM

(C) CD-DVD

(D) CD-RW

(E) None of these

10. All computers must have

(A) A word processing software

(B) An operating system

(C) An attached printer

(D) A virus checking program

(E) None of these

11. Collecting personal information and effectively posing as another individual is known as

(A) Spooling

(B) Spoofing

(C) Hacking

(D) Identity theft

(E) None of these

12. To change selected text to all capital Letters, click the change case buttons, then click

(A) UPPERCASE

(B) UPPER ALL

(C) CAPS LOCK

(D) Lock Upper

(E) Large Size

13. A person who used his or her expertise to gain access to other people’s computers to get information illegally or to do damage is a

(A) Hacker

(B) Analyst

(C) Instant messenger

(D) Programmer

(E) Spammer

14. A device that connects to a network without the use of cables is said to be

(A) Distributed

(B) Free

(C) Centralized

(D) Open Source

(E) None of these

15. Reusable optical storage will usually have the acronym

(A) CD

(B) DVD

(C) ROM

(D) RW

(E) ROS

16. The most common type of storage devices are:

(A) Persistent

(B) Optical

(C) Magnetic

(D) Flash

(E) Steel

17. Codes consisting of lines of varying widths or lengths that are computer-readable are known as

(A) An ASCII code

(B) A magnetic tape

(C) An OCR scanner

(D) A bar code

(E) None of these

18. A Website’s main page is called its

(A) Home Page

(B) Browser Page

(C) Search Page

(D) Bookmark

(E) None of these

19. Part number, part description, and number of parts ordered are examples of

(A) Control

(B) Output

(C) Processing

(D) Feedback

(E) Input

20. To access properties of an object, the mouse technique to use is

(A) Dragging

(B) Dropping

(C) Right-clicking

(D) Shift-clicking

(E) None of these

21. Computers use the number system to store data and perform calculations.

(A) Binary

(B) Octal

(C) Decimal

(D) Hexadecimal

(E) None of these

22. _________are attempts by individuals to obtain confidential information from you by falsifying their identity.

(A) Phishing trips

(B) Computer viruses

(C) Spyware scams

(D) Viruses

(E) Phishing scams

23. Why is it unethical to share copyrighted files with your friends ?

(A) It is not unethical, because it is legal.

(B) It is unethical because the files are being given for free.

(C) Sharing copyrighted files without permission breaks copyright laws.

(D) It is not unethical because the files are being given for free.

(E) It is not unethical – anyone can access a computer.

24. Which of the following can be used to select the entire document ?

(A) CTRL+A

(B) ALT+F5

(C) SHIFT+A

(D) CTRL+K

(E) CTRL+H

25. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to Auto Fit Contents.

(A) Fit to Form

(B) Format

(C) Auto size

(D) Contents

(E) Auto Fit

26. The simultaneous processing of two or more programs by multiple processors is

(A) Multiprogramming

(B) Multitasking

(C) Time-sharing

(D) Multiprocessing

(E) None of these

27. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is

(A) Memory-only

(B) Write-only

(C) Once-only

(D) Run-only

(E) Read-only

28. What is the permanent memory built into your computer called ?

(A) RAM

(B) Floppy

(C) CPU

(D) CD-ROM

(E) ROM

29. The default view in Excel is view.

(A) Work

(B) Auto

(C) Normal

(D) Roman

(E) None of these

30. What displays the contents of the active cell in Excel ?

(A) Name box

(B) Row Headings

(C) Formula bar

(D) Task pane

(E) None of these

31. In Word, you can force a page break

(A) By positioning your cursor at the appropriate place and pressing the Fl key

(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter

(C) By using the Insert/Section Break

(D) By changing the font size of your document

(E) None of these

32. Grouping and processing all of a firm’s transactions at one time is called

(A) A database management system

(B) Batch processing

(C) A real-time system

(D) An on-line system

(E) None of these

33. Help Menu is available at which button ?

(A) End

(B) Start

(C) Turnoff

(D) Restart

(E) Reboot

34. You can keep your personal files/ folders in

(A) My Folder

(B) My Documents

(C) My Files

(D) My Text

(E) None of these

35. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)

(A) Supercomputer

(B) Minicomputer

(C) Laptop

(D) Server

(E) None of these

36. When you save to this, your data will remain intact even when the computer is turned off.

(A) RAM

(B) Motherboard

(C) Secondary storage device

(D) Primary storage device

(E) None of these

37. The folder retains copies of messages that you have started but are not yet ready to send.

(A) Drafts

(B) Outbox

(C) Address Book

(D) Sent Items

(E) Inbox

38. You can a search by providing more information the search engine can use to select a smaller, more useful set of results.

(A) Refine

(B) Expand

(C) Load

(D) Query

(E) Slowdown

39. The contents of are lost when the computer turns off.

(A) Storage

(B) Input

(C) Output

(D) Memory

(E) None of these

40. The enables you to simultaneously keep multiple Web pages open in one browser window.

(a) Tab box

(B) Pop-up helper

(C) Tab row

(D) Address bar

(E) Esc key

41. A DVD is an example of a(n)

(A) Hard disk

(B) Optical disc

(C) Output device

(D) Solid-state storage device

(E) None of these

42. What are the two parts of an e-mail address?

(A) User name and street address

(B) Legal name and phone number

(C) User name and domain name

(D) Initials and password

(E) User name and recipient name

43. If you wish to extend the length of the network without having the signal degrade, you would use a

(A) Resonance

(B) Router

(C) Gateway

(D) Switch

(E) Repeater

44. A repair for a known software bug, usually available at no charge on the internet, is called

(A) version

(B) Patch

(C) Tutorial

(D) FAQ

(E) Rectifier

45. URL stands for

(A) Universal Research List

(B) Universal Resource List

(C) Uniform Research List

(D) Uniform Research Locator

(E) Uniform Resource Locator

46. When data changes in multiple lists and all lists are not updated, this causes

(A) Data redundancy

(B) Information overload

(C) Duplicate data

(D) Data inconsistency

(E) Data repetition

47. What is a backup?

(A) Restoring the information backup

(B) An exact copy of a system’s information

(C) The ability to get a system up and running in the event of a system crash or failure

(D) All of these

(E) None of these

48. The Internet is

(A) A large network of networks

(B) An internal communication system for a business

(C) A communication system for the Indian government

(D) A communication system for some states of India

(E) A communication system for some cities of India

49. Computers that are portable and convenient for users who travel are known as

(A) Supercomputers

(B) Planners

(C) Minicomputers

(D) File servers

(E) Laptops

50. What is the storage area for e-mail messages called?

(A) A folder

(B) A mail box

(C) A directory

(D) The hard disk

(E) None of these

Answers

1. E 2. E 3. C 4. E 5. C 6. C 7. C 8. B 9. D 10. B 11. B 12. A 13. A 14. E 15. D 16. C 17. D 18. A 19. E 20. C 21. A 22. A 23. C 24. A 25. A 26. D 27. E 28. E 29. C 30. C 31. B 32. C 33. B 34. B 35. D 36. D 37. A 38. A 39. D 40. C 41. B 42. C 43. E 44. B 45. E 46. D 47. D 48. A 49. E 50. B

Last edited by Neelurk; May 13th, 2020 at 12:40 PM.
Similar Threads
Thread
Group IV Solved Model question papers
Solved Kotak Mahindra Bank Sample Model Question Papers
Solved Question Papers of IBPS Specialist Officer Exam
IBPS Model Question Papers With Answers
Solved Question Papers of IBPS PO Exam
IBPS Exam solved Question Papers
TANCET MBA Exam Solved Model question Papers
VAO Exam Solved Model Question Papers
BSNL TTA Exam Solved Model Question Papers
IBPS Exam Solved Question Papers
GATE ECE Solved Model Question Papers
VAO Solved Model Question Papers
MCA Entrance Solved Model question paper
B.Ed Entrance Exam Solved Model Question Papers
PHD Solved Model Papers in Agriculture



Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 04:46 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8