Labels

Tuesday 18 December 2012

DOWNLOAD COMPUTER KNOWLEDGE SOLVED PAPERS I IBPS COMPUTER AWARENESS SOLVED PAPERS I BANK PO COMPUTER AWARENESS MODEL PAPERS I BANL CLERK COMPUTER AWARENESS MODEL PAPERS I BANK PO COMPUTER AWARENESS SOLVED PAPERS I BANK PO COMPUTER AWARENESS SAMPLE PAPERS I BANK CLERK COMPUTER AWARENESS QUESTION PAPERS I BANK CLERK COMPUTER AWARENESS PREVIOUS YEAR PAPERS I COMPUTER AWARENEASS OLD EXAM PAPERS I BANK PO COMPUTER AWARENESS EXAM PAPERS I COMPUTER AWARENESS LAST 5 YEAR SOLVED PAPERS I BANK PO COMPUTER AWARENESS MODEL PAPERS I COMPUTER AWARENESS PRACTICE PAPERS I BANKING EXAM COMPUTER AWARENESS SAMPLE PAPERS I COMPUTER AWARENESS TEST PAPERS I COMPUTER AWARENESS OLD EXAM PAPERS I

INDIAN OVERSEAS BANK PROBATIONARY OFFICER’S  
Computer Knowledge
(Held on May 2011)
Q.1.If you wish to extend the length of the network without having the signal degrade, you would use a ………………
  • resonance
  • router
  • gateway
  • switch
  • repeater
Q.2.A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
  • version
  • patch
  • tutorial
  • FAQ
  • rectifier
Q.3.URL stands for ………………
  • Universal Research List
  • Universal Resource List
  • Uniform Research List
  • Uniform Research Locator
  • Uniform Resource Locator
Q.4.When data changes in multiple lists and all lists are not updated, this causes ………………
  • data redundancy
  • information overload
  • duplicate data
  • data inconsistency
  • data repetition
Q.5.What is a backup ?
  • Restoring the information backup
  • An exact copy of a system's information
  • The ability to get a system up and running in the event of a system crash or failure
  • All of these
  • None of these
Q.6.The Internet is ………………
  • a large network of networks
  • an internal communication system for a business
  • a communication system for the Indian government
  • a communication system for some states of India
  • a communication system for some cities of India
Q.7.What is the storage area for e-mail messages called ?
  • A folder
  • A mailbox
  • A directory
  • The hard disk
  • None of these
Q.8.Computers that are portable and convenient for users who travel are known as..................
  • supercomputers
  • planners
  • minicomputers
  • file servers
  • laptops
Q.9.What is the process of copying software programs from secondary storage media to the hard disk called ?
  • configuration
  • download
  • storage
  • upload
  • installation
Q.10.One advantage of dial-up Internet access is
  • it utilises broadband technology
  • it is Indian
  • it uses a router for security
  • modem speeds are very fast
  • it utilises existing telephone service
Q.11.Which process checks to ensure that the components of the computer are operating and connected properly ?
  • Booting
  • Processing
  • Saving
  • Editing
  • Starting
Q.12.An error in a computer program………………
  • Crash
  • Power Failure
  • Bug
  • Virus
  • Fatal error
Q.13.A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
  • Modem
  • Software
  • Scanner
  • Keyboard
  • Mouse
Q.14.Access-control based on a person's fingerprints is .an example of………………
  • biometric identification
  • characteristic identification
  • characteristic security
  • fingerprint security
  • logistics
Q.15.Most mail programs automatically complete the following two parts in an e-mail..........
  • From: and Body :
  • From: and Date :
  • From: and To :
  • From: and Subject :
  • None of these
Q.16.The patterns of printed lines on most products are called………………
  • prices
  • striping
  • scanners
  • OCR
  • barcodes
Q.17.Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
  • data
  • cyber
  • Internet
  • metaphysical
  • publicity
Q.18.The computer's capability of distinguishing spoken words is called ………………
  • voice analysis
  • speech acknowledgement
  • voice recognition
  • speech interpretation
  • vocalisation
Q.19.The software that allows users to surf the Internet is called a/an ………………
  • Search Engine
  • Internet Service Provider (ISP)
  • Multimedia Application
  • Browser
  • Internet Surfing Provider
Q.20.The first page of a Website is called the ………………
  • Homepage
  • Index
  • Java Script
  • Bookmark
  • Intro Page
Q.21.Which of the following is an advantage of mounting an application on the Web ?
  • The possibility of 24-houraccess for users
  • Creating a system that can extend globally
  • Standardising the design of the interface
  • All of these
  • None of these
Q.22.ERP is an acronym for ………………
  • Enterprise Retirement Planning
  • Enterprise Relationship Planning
  • Enterprise Resource' Planning
  • Enterprise Reorder Planning
  • Enterprise Retention Planning
Q.23.What is usually used for displaying information at public places ?
  • Monitors
  • Overhead Projections
  • Monitors and Overhead Projections
  • Touch Screen Kiosks
  • Loud Speakers
Q.24.Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
  • program thievery
  • data snatching
  • software piracy
  • program looting
  • data looting
Q.23.The issues that deal with the collection and use of data about individuals is ………………
  • access
  • publicity
  • accuracy
  • property
  • privacy
Q.24.Hackers ………………
  • all have the same motive
  • are people who maintain computers
  • may legally break into computers as long as they do not do any damage
  • are people who are allergic to computers
  • break into other people's computers
Q.25.A term related to sending data to a satellite is ………………
  • downlink
  • modulate
  • demodulate
  • uplink
  • interrelate
Q.26.Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
  • hypermedia
  • hypertext
  • HTML
  • URL
  • FTP
Q.27.Junk e-mail is also called ………………
  • spam
  • spoof
  • cookie crumbs
  • sniffer script
  • spill
Q.28.What is MP3 ?
  • A Mouse
  • A Printer
  • A Sound Format
  • A Scanner
  • A Mobile Phone
Q.29.Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
  • a random-access medium
  • expensive
  • a read-only medium
  • fragile and easily damaged
  • a sequential-access medium
Q.30.What is the most popular hardware for multimedia creations ?
  • PCs
  • Minicompiiters
  • Mainframe Computers
  • WANs
  • Super Computers
Q.31.For sound recording, what is necessary ?
  • Speaker
  • Microphone
  • Talker
  • Mouse
  • Telephone
Q.32.The life-span of a CD-ROM is………………
  • approximately one year
  • approximately two years
  • approximately five years
  • approximately twenty-five years
  • almost unlimited
Q.33.What are the two parts of an E-mail address ?
  • User name and street address
  • Legal name and phone number
  • User name and domain name
  • Initials and password
  • User name and Recipient name
Q.34.How is it possible that both programs and data can be stored on the same floppy disk ?
  • A floppy disk has two sides, one for data and one for programs
  • A floppy disk has to be formatted for one or for the other
  • Programs & data are both software & both can be stored on any memory device
  • Floppy disks can only store data, not programs
  • Floppy disks are better than CDs
Q.35.The ……………… settings are automatic and standard.
  • default
  • CPU
  • peripheral
  • user frien9ly
  • defaulter
Q.36.What is an embedded system ?
  • A program that comes wrapped in a box
  • A program that is permanently part of a computer
  • A computer that is part of a larger computer
  • A computer and software system that controls a machine or appliance
  • None of these
Q.37.For viewing video CDs, you would use………………
  • CD Player
  • Windows Media Player
  • Windows Video Player
  • Windows Movie Player
  • None of these
Q.38.Participants can see and hear each other in a/an ………………
  • electronic mail system
  • message system
  • tele-conference
  • bulletin board
  • None of these
Q.39.Why should you delete unknown e-mail attachments ?
  • You could go to jail
  • The person could track you down and hurt you
  • It is bad manners
  • It might contain a virus that could hurt your computer
  • None of these
Q.40.Which of the following will you require to hear music on your computer ?
  • Video Card
  • Tape Recorder
  • Mouse
  • Joy Stick
  • Sound Card
Q.41.The signal that a computer is waiting for a command from the user is ………………
  • prompt
  • event
  • time slice
  • interrupt
  • None of these
Q.42.This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
  • Web browser
  • Web search engine
  • Web homepage
  • Web service
  • None of these
  • Ans : (A)
Q.43.Which of the following controls the manner of interaction between the user & the operating system ?
  • language translator
  • platform
  • user interface
  • icon
  • None of these
Q.44.Executing more than one program concurrently by one user on one computer is known as ………………
  • multi-programming
  • multi-processing
  • time-sharing
  • multi-tasking
  • multi-action
Q.45.You can keep your personal flies / folders in ………………
  • My Folder
  • My Documents
  • My Files
  • My Text
  • My Collection
Q.46.All computers must have ………………
  • Word processing software
  • An operating system
  • A printer attached
  • A virus checking program
  • None of these
Q.47.Three types of compact disks include CD-ROM, CD-R, and ………………
  • CD-W
  • CD-RAM
  • CD-DVD
  • CD-RW
  • None of these
Q.48.Collecting personal information and effectively posing as another individual is known as the crime of ………………
  • spooling
  • spoofing
  • hacking
  • identity theft
  • None of these
Q.49.The metal or plastic case that holds all the physical parts of the computer is the:
  • System Unit.
  • CPU.
  • Mainframe.
  • Platform.
Q.50.------------- controls the way in which the computer system functions and provides a means by which users can interact with the computer. 
  • The Platform
  • The Operating System
  • Application Software
  • The Motherboard
META TAGS:-COMPUTER KNOWLEDGE QUESTION PAPERS I COMPUTER AWARENESS SAMPLE PAPERS I DOWNLOAD COMPUTER AWARENESS SAMPLE PAPERS I DOWNLOAD COMPUTER AWARENESS TEST EXAM PAPERS I DOWNLOAD COMPUTER AWARENESS EXAM PAPERS I COMPUTER KNOWLEDGE SOLVED PAPERS I DOWNLOAD COMPUTER AWARNESS TEST PAPERS I DOWNLOAD COMPUTER AWARENESS MODEL PAPERS I DOWNLOAD COMPUTER AWARNESS PRACTICE PAPERS I DOWNLOAD COMPUTER AWARNESS OLD EXAM PAPERS I BANK PO COMPUTER AWARENESS QUESTION PAPERS I BANK CLERK COMPUTER AWARNESS EXAM PAPERS I IBPS COMPUTER KNOWLEDGE SOLVED PAPERS I IBPS PO COMPUTER AWARNESS PRACTICE PAPERS I

0 comments:

Post a Comment