Basic Computer Notes For Student in English

Download as pdf or txt
Download as pdf or txt
You are on page 1of 137

IBPS

COMPUTER CAPSULE
SBI, IBPS, RRB PO & Clerk Mains Exams 2018

Most Expected

500 MCQ

Inventions & Discoveries Networking


Introduction of Computer Important Single Linear
Computer Memory Database Management System

India's trusted Educational Blog

www.ibtindia.com www.makemyexam.in
Important Inventions & Discoveries 1

Generation of Computers 2

Types of Computer 2

Computer Memory 4

Operating System 6

Computer Language 8

Computer Network 8
d Servers 10
d Network Devices 13
d OSI Model 14
d IP Address 15
d Some Important Networking Terminology 15

Number System 19

M.S. Word/Excel Shortcuts 20

Database Management System 20

Single Linear Questions 24

Important Abbreviations 31

Most Important M.S. Ofce 50 MCQ 32

Previous Year 50 MCQ 35

Expected 400 MCQ for Banking and other Exams 38


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

First Modern Computer in the World- ENIAC


Father of Computer– Charles Babbage
Inventor of Punch Cards in Computer – Hollerith
Computer Graphics was developed by – William Fetter
ARPANET was developed by – DARPA
Compiler was developed by – Dr. Grace Murray Hopper
Father of Computer Animations- John Whitney
Keyboard was invented by- Christopher Latham Sholes
Laptop Computer was invented by – Adam Osborne
First GUI Computer Game was invented by- A.S. Douglas
Computer BIOS was invented by – Gary Kildall
Inventors of Computer Chip– Jack Kilby & Robert Noyce
Father of Computer Hard Disk- Reynold Johnson
Inventor of First Data Base – Dr. Edgar Frank Codd
Inventor of Computer Scanner – Ray Kurzweil
Inventor of Computer Speakers- Abinawan Puracchidas
Inventor of MS-DOS Operating Systems- Microsoft
Founder of Apple Computers – Steve Jobs
Founder of Artificial Intelligence – John McCarthy
Founder of Bluetooth – Ericsson
Father of C Language – Dennis Ritchie
Father of C++ language – Bjarne Stroustrup
Founder of Email – Shiva Ayyadurai
Founder of Google – Larry Page and Sergey Brin
Founder of Internet – Vint Cerf
Father of Java - James Gosling
Founder of Linux – Linus Torvalds
Founder of Microsoft – Bill Gates and Paul Allen
Founder of Mobile Phones – Martin Cooper
Founder of Mouse – Douglas Engelbart
Founder of Php – Rasmus Lerdorf
Founder of USB – Ajay V.Bhatt
Founder of WWW – Tim Berners-Lee
Founder of Yahoo – Jurry Yang and David Filo
First Commercial Computer – UNIVAC
ENIAC and UNIVAC was developed by – John Mauchly and J. Presper Eckert

www.makemyexam.in www.ibtindia.com Page 1


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

1st 2nd 3rd 4th 5th


Period 1940 – 1956 1956 – 1963 1964 – 1971 1972 – 2010 2010-till date

Components Vacuum Tubes Transistor Integrated Microprocessor, Silicon Chips,


Circuits – ICs Large Scale ICs ULSI,AI
Computer EDVAC,ENIAC,EDSAC IBM-1401 IBM-370 PDP 11 NoteBook
UNIVAC UltraBook....

1. PC 2. Minicomputer 3.Microcomputer
4. Mainframe Computer 5.Palmtop 6.Super computer

1. Personal Computer: A Personal Computer can be defined as a small, relatively inexpensive computer designed for an
individual user. Personal Computers are based on the microprocessor technology that enables manufacturers to put an entire
CPU on one chip. Businesses use personal computers for word processing, accounting, desktop publishing, and for running
spreadsheet and database management applications. At home, the most popular use for personal computers is playing games
and surfing the Internet.

2. Mini Computer: Mini Computer is a midsize multi-processing system capable of supporting up to 250 users
simultaneously. These were designed for specific tasks but have now lost popularity due to the advent of PCs. Some of the
Popular Minicomputers are given below:
IBM Midrange computers
Texas Instrument TI-990

3. Mainframes: Mainframe is very large in size and is an expensive computer capable of supporting hundreds or even
thousands of users simultaneously. Mainframe executes many programs concurrently and supports many simultaneous
executions of programs.

A supercomputer is a computer with great speed and memory. This kind of computer can do jobs faster than any other
computer of its generation. They are usually thousands of times faster than ordinary personal computers made at that time.
The first Atlas was officially commissioned on 7 December 1962, nearly three years after the Cray CDC6600
Supercomputer was introduced, as one of the world's first supercomputers. Seymour Cray is called as father of super
computer.

www.makemyexam.in www.ibtindia.com Page 2


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Top 5 Super Computer in the world in year-2018

Rank Name Site


IBM Power System AC922, IBM POWER9 22C 3.07GHz, NVIDIA Volta
1 Summit GV100, Dual-rail Mellanox EDR Infiniband , IBM DOE/SC/Oak Ridge National
Laboratory, United States
Sunway MPP, Sunway SW26010 260C 1.45GHz, Sunway , NRCPC, National
2 Sunway TaihuLight
Supercomputing Center in Wuxi, China
IBM Power System S922LC, IBM POWER9 22C 3.1GHz, NVIDIA Volta
3 Sierra GV100, Dual-rail Mellanox EDR Infiniband , IBM DOE/NNSA/LLNL,United
States
TH-IVB-FEP Cluster, Intel Xeon E5-2692v2 12C 2.2GHz, TH Express-2,
4 Tianhe-2A
Matrix-2000 , NUDT, National Super Computer Center in Guangzhou,China
PRIMERGY CX2550 M4, Xeon Gold 6148 20C 2.4GHz, NVIDIA Tesla V100
AI Bridging Cloud
5 SXM2, Infiniband EDR , Fujitsu National Institute of Advanced Industrial
Infrastructure (ABCI)
Science and Technology (AIST),Japan

As of June 2018, India has 5 systems on the TOP500 list ranking


Rank Name
39 Pratyush (Cray XC40)
66 Mihir (Cray XC40)
206 InC1 - Lenovo C1040
327 SERC - Cray XC40
496 iDataPlex DX360M4

SOME Fact about Super computer-:


1. Start from -: December 1962
2. Company -:CDC,UK
3. Father of Super Computer-:Seymour Cray
4. First Super Computer-:CDC-6600

In India-:
1. Start from -:December 1990
2. Company -C-DAC,Pune
3. First Super Computer-PARAM-8000

www.makemyexam.in www.ibtindia.com Page 3


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Computer memory is the storage space in computer where data is to be processed and instructions required for processing are
stored.
Primary Memory (Main Memory)-Primary memory holds only those data and instructions on which computer is currently
working. It has limited capacity and data is lost when power is switched off. It is generally made up of semiconductor device.
These memories are not as fast as registers. The data and instruction required to be processed reside in main memory. It is
divided into two subcategories RAM and ROM.
Secondary Memory(Auxiliary Memory)- This type of memory is also known as external memory or non-volatile. It is
slower than main memory. These are used for storing data/Information permanently. CPU directly does not access these
memories instead they are accessed via input-output routines. Contents of secondary memories are first transferred to main
memory, and then CPU can access it. For example: disk, CD-ROM, DVD etc.
Characteristics of Main Memory Characteristic of Secondary Memory
These are semiconductor memories. It is also These are magnetic and optical memories It is known as backup
known as main memory. memory.
Usually volatile memory. It is non-volatile memory.
Data is lost in case power is switched off. Data is permanently stored even if power is switched off.
It is working memory of the computer. It is used for storage of data in a computer.
Faster than secondary memories. Computer may run without secondary memory. Slower than
primary memories.

www.makemyexam.in www.ibtindia.com Page 4


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

RAM (Random Access Memory) is the internal memory of the CPU for storing
data, program, and program result. It is a read/write memory which stores data
until the machine is working. As soon as the machine is switched off, data is
erased. RAM is volatile, i.e. data stored in it is lost when we switch off the
computer or if there is a power failure. Hence, a backup Uninterruptible Power
System (UPS) is often used with computers.
RAM is of two types-:
1. Static RAM (SRAM) 2. Dynamic RAM
(DRAM)
Static RAM (SRAM) : The word static indicates that the memory retains its contents as long as power is being supplied.
However, data is lost when the power gets down due to volatile nature. SRAM chips use a matrix of 6-transistors and no
capacitors. Transistors do not require power to prevent leakage, so SRAM need not be refreshed on a regular basis. There is
extra space in the matrix, hence SRAM uses more chips than DRAM for the same amount of storage space, making the
manufacturing costs higher. SRAM is thus used as cache memory and has very fast access.
Dynamic RAM (DRAM) : DRAM, unlike SRAM, must be continually refreshed in order to maintain the data. This is done
by placing the memory on a refresh circuit that rewrites the data several hundred times per second. DRAM is used for most
system memory as it is cheap and small. All DRAMs are made up of memory cells, which are composed of one capacitor and
one transistor.
Cache Memory : Cache memory is a very high speed semiconductor memory which can speed up the CPU. It acts as a
buffer between the CPU and the main memory. It is used to hold those parts of data and program which are most frequently
used by the CPU. The parts of data and programs are transferred from the disk to cache memory by the operating system,
from where the CPU can access them.
ROM (Read Only Memory): ROM stands for Read Only Memory. The memory from which we can only read but cannot
write on it. This type of memory is non-volatile. The information is stored permanently in such memories during
manufacture. A ROM stores such instructions that are required to start a computer. This operation is referred to as bootstrap.
ROM chips are not only used in the computer but also in other electronic items like washing machine and microwave oven.
MROM (Masked ROM): The very first ROMs were hard-wired devices that contained a pre-programmed set of data or
instructions. These kind of ROMs are known as masked ROMs, which are inexpensive.
PROM (Programmable Read Only Memory) : PROM is read-only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM program. Inside the PROM chip, there are small fuses
which are burnt open during programming. It can be programmed only once and is not erasable.
EPROM (Erasable and Programmable Read Only Memory) : EPROM can be erased by exposing it to ultra-violet light for a
duration of up to 40 minutes. Usually, an EPROM eraser achieves this function. During programming, an electrical charge
is trapped in an insulated gate region. The charge is retained for more than 10 years because the charge has no leakage path.
For erasing this charge, ultra-violet light is passed through a quartz crystal window (lid). This exposure to ultra-violet light
dissipates the charge. During normal use, the quartz lid is sealed with a sticker.
EEPROM (Electrically Erasable and Programmable Read Only Memory) : EEPROM is programmed and erased electrically. It can
be erased and reprogrammed about ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond).

www.makemyexam.in www.ibtindia.com Page 5


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

In EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased one byte at a time, rather
than erasing the entire chip. Hence, the process of reprogramming is flexible but slow.

Bit ( Binary Digit) 0,1


1 Nibble 4 Bits
1 Byte or Character 8 Bits
1 KB (Kilo Byte) 1024 Bytes
1 MB (Mega Byte) 1024 KB
1 GB (Giga Byte) 1024 MB
1 TB (Tera Byte) 1024 GB
1 PB (Peta Byte) 1024 TB
1EB (Exa Byte) 1024 PB
1ZB (Zetta Byte) 1024 EB
1YB (Yotta Byte) 1024 ZB

Virtual memory- : Virtual memory is a memory management technique for letting processes execute outside of memory.
This is very useful especially is an executing program cannot fit in the physical memory.

Online Live Class COMPUTER MEMORY (PRIMARY MEMORY) PART- 1


https://www.youtube.com/watch?v=ahrD7xei7Ag&index=14&list=PLUBOuzNf9-fpFWVbIAD8IRikYBOHJGE6M

Online Live Class COMPUTER MEMORY (Secondary memory) PART-2


https://www.youtube.com/watch?v=M2FDms-U3b4&list=PLUBOuzNf9-fpFWVbIAD8IRikYBOHJGE6M&index=13

An Operating System, or OS, is a software program that enables the computer hardware to communicate and operate with
the computer software. Without a computer Operating System, a computer would be useless.

www.makemyexam.in www.ibtindia.com Page 6


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Basic functions of an operating system-


 Operating system controls and coordinates the use of the hardware among the various applications programs for
various uses.
 Operating system acts as resource allocator and manager. Since there are many possibly conflicting requests for
resources the operating system must decide which requests are allocated resources to operating the computer system
efficiently and fairly?
 Operating system is control program which controls the user programs to prevent errors and improper use of the
computer. It is especially concerned with the operation and control of I/O devices.
 Multiprogramming – In multiprogramming more than one program reside in the main memory. When one job is
unable to execute because of I/O operation to complete, it switches to other program and allow that program to run
the main motive of multiprogramming is to utilize the CPU efficiently.
 Multitasking-In multitasking operating system more than one program is assigned to the CPU or switches between
the programs occurs so fast that it seems like more than one program is running. The main motive of multitasking is
to utilize the CPU efficiently and reduce the response time.
 Multiprocessing-In multiprocessing operating system a task is divided between more than one processor (CPU) so
that parallelism can be achieved.
 Multithreading -Sometime a program need to do multiple task at the same time. It is an extension of
multiprogramming. In multithreading the program is divided into multiple task.

Throughput, Turnaround time, waiting time and Response time -:


 Throughput – number of processes that complete their execution per time unit.
 Turnaround time – amount of time to execute a particular process.
 Waiting time – amount of time a process has been waiting in the
ready queue.
 Response time – amount of time it takes from when a request was
submitted until the first response is produced, not output (for time-
sharing environment).
Hard and Soft real-time systems-:
 A hard real time system guarantees that critical tasks complete on
time. This goal requires that all delays in the system be bounded
from the retrieval of the stored data to the time that it takes the
operating system to finish any request made of it.
 A soft real time system where a critical real-time task gets priority
over other tasks and retains that priority until it completes. As in
hard real time systems kernel delays need to be bounded

www.makemyexam.in www.ibtindia.com Page 7


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 In 1983 Bill Gates announces Microsoft Window November 10, 1983,


 Microsoft Windows 1.01 is introduced in November 20,1985 and initially sold for $100.00
 Microsoft Windows 1.03 is introduced in August 1986.
 Microsoft Windows NT( New Technology) is introduced in 27 July 1993.
 Microsoft Windows ME( Millennium ) is introduced in 2000.
 Microsoft Windows XP (eXPerience ) is introduced in 25 October 2001.

COMPUTER LANGUAGES: A language is the main medium of communicating between the Computer systems and the
most common are the programming languages. As we know a Computer only understands binary numbers that is 0 and 1 to
perform various operations but the languages are developed for different types of work on a Computer. A language consists
of all the instructions to make a request to the system for processing a task.
Low Level Language:
Low level languages are the machine codes in which the instructions are given in machine language in the form of 0 and 1 to
a Computer system. It is mainly designed to operate and handle all the hardware and instructions set architecture of a
Computer. Low level language is also divided into two parts are Machine language and Assembly language.
High Level Language:
The high level languages are the most used and also more considered programming languages that helps a programmer to
read, write and maintain. It is also the third generation language that is used and also running till now by many programmers.
They are less independent to a particular type of Computer and also require a translator that can convert the high level
language to machine language. The translator may be an interpreter and Compiler that helps to convert into binary code for a
Computer to understand.

GENERATION LANGUAGES:
1st - Machine and Assembly language
2nd - Assembly language and high level languages (FORTRAN , COBOL)
3rd - High level languages (FORTRAN II - IV , COBOL , PASCAL , BASIC, ALGOL68)
4th - High level languages(FORTAN 77 , PASCAL , COBOL)
5th - High level languages(C , C++ ,JAVA , .NET)

LANGUAGE TRANSLATOR:
Compiler : It's a computer program(s) that transforms source code written in a programming language
into machine language that is the target language which usually has a binary form known as object code.
Interpreter : It translates high level instructions into an intermediate form, it translates the code into the intermediate form
line by line an caries out specific actions.

Assembler : It is a program that takes basic computer instruction(s) and converts then into a pattern of bits that the
computer's processor can use to perform it's basic operations. The language used to program the assembler is called assembly
language.

A computer network is a system in which multiple computers are connected to each other to share information and
resources.

www.makemyexam.in www.ibtindia.com Page 8


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Characteristics of a Network:
A network is a group of systems that are connected to allow sharing of resources—such as files or printers—or sharing of
services-such as an Internet connection .There are two aspects of setting up a network: the hardware used to connect the
systems together and the software installed on the computers to allow them to communicate.

Basic Communication Model :


Communication model is used to exchange data between two parties. For example communication between a computer,
server and telephone (through modem).

 Source- Data to be transmitted is generated by this device, example: telephones, personal computers etc.
 Transmitter- The data generated by the source system are not directly transmitted in the form they are generated.
The transmitter transforms and encodes the information in such a form to produce electromagnetic waves or signals.
 Transmission System- A transmission system can be a single transmission line or a complex network connecting
source and destination.
 Receiver- Receiver accepts the signal from the transmission system and converts it to a form which is easily
managed by the destination device.
 Destination-Destination receives the incoming data from the receiver.

Network Topology:
Topology is the geometric arrangement of a computer system. Each computer system in a topology is known as a node.
Network topology is determined only by the configuration of connections between nodes.

 Bus Topology: A bus topology is such that there is a single line to which all nodes are connected and the nodes
connect only to this bus.

 Mesh Topology: This type of network topology contains at least


two nodes with two or more paths between them.

 Ring Topology: In this network topology, every node has exactly


two branches connected to it. The ring is broken and cannot work
if one of the nodes on the ring fails.

 Star Topology: In this network topology, the peripheral nodes


are connected to a central node, which rebroadcasts all
transmissions received from any peripheral node to all peripheral
nodes on the network, including the originating node.

 Tree Topology: This is a network topology in which nodes' are


arranged as a tree. The function of the central node in this
topology may be distributed.

www.makemyexam.in www.ibtindia.com Page 9


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

The server is a special computer that contains more disk space and memory than are found on client workstations. The server
has special software installed that allows it to function as a server. This special software can provide file and print services (to
allow sharing of files and printers), provide web pages to clients, or provide e-mail functionality to the company.

Workstations -The workstation also is known as a client, which is just a basic computer running a client operating system
such as Windows XP or Linux. These users typically store their files on a central server so that they can share the files with
other users on the network.

Hosts-The term host refers to any computer or device that is connected to a network and sends or receives information on
that network. A host can be a server, a workstation, a printer with its own network card, or a device such as a router. We can
summarize by saying that any system or device that is connected to the network is known as a host.
Types of Networks-Organizations of different sizes, structures, and budgets need different types of networks. Networks can
be divided into one of two categories: peer-to-peer or server-based networks.
1. Peer-to-Peer Network
2. Server-Based Networks

Peer-to-Peer Network

www.makemyexam.in www.ibtindia.com Page 10


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

A peer-to-peer network has no dedicated servers instead; a number of workstations are connected together for the purpose of
sharing information or devices. When there is no dedicated server, all workstations are considered equal; any one of them can
participate as the client or the server. Peer-to-peer networks are designed to satisfy the networking needs of home networks or
of small companies that do not want to spend a lot of money on a dedicated server but still want to have the Capability to
share information or devices. For example, A small peer-to-peer network will allow these three computers to share the printer
and the customer information with one another .The extra cost of a server was not incurred because the existing client
systems were networked together to create the peer-to-peer network. A big disadvantage of peer-to-peer networking is that
you can‘t do your day-today administration in a single place.

Server-Based Networks
Usually after four or five systems have been networked, the need for a dedicated server to store all of the user accounts and
data files becomes apparent—this is a server-based network. The advantage of a server-based network is that the data files
that will be used by all of the users are stored on the one server. This will help you by giving you a central point to set up
permissions on the data files, and it will give you a central point from which to back up all of the data in case data loss should
occur. With a server-based network, the network server stores a list of users who may use network resources and usually
holds the resources as well. The server in a server-based network may provide a number of different services. The services it
will offer to the network usually are decided by the server‘s role. There are a number of different roles that a server could
play on a network:
1. File and print Servers 2.Application servers 3.Web servers 4.Directory servers
1. File and print servers-
File and print servers control and share printers and files among clients on the network. File and print servers were the
original reason to have a network; a large number of users needed access to the same files, so the files were placed on a
server, and all clients were connected to the server when they needed to work with the files.

2. Application servers-
Application servers are servers that run some form of special program on the server. A good example of an application server
is a server that runs the company‘s e-mail server. The e-mail server software is special software that can be run on a server
operating system. Another example of software that would run on an application server is a database server product such as
Microsoft SQL Server. A database server is a server that holds the company‘s core business data and typically gives this data
to custom applications that run on the workstations. These are some applications that you might find on an application server:
1. Microsoft SQL Server 2.Oracle 3.Microsoft Exchange Server 4.IBM Lotus Domino

3. Web servers-
Web servers are servers that run the Hypertext Transfer Protocol (HTTP) and are
designed to publish information on the Internet or the corporate intranet. Web
servers are popular in today‘s businesses because they host web applications (web
sites) for the organization. These web applications could be designed for internal
use, or they could be used to publish information to the rest of the world on the
Internet. Examples of web server software are Microsoft‘s Internet Information
Services that runs on Windows or Apache web server software that runs on
UNIX/Linux, Novell NetWare, and Windows.

www.makemyexam.in www.ibtindia.com Page 11


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

4. Directory servers-
Directory servers hold a list of the user accounts that are allowed to log on to the network. This list of user accounts is stored
in a database (known as the directory database) and can store information about these user accounts such as address, city,
phone number, and fax number. A directory service is designed to be a central database that can be used to store everything
about such objects as users and printers.
Network Media and Connectors-:
Cabling is the medium for the transmission of data between hosts on the LANs. LANs can be connected together using a
variety of cable types, such as unshielded twisted-pair, coax, or fiber. Each cable type has its own advantages and
disadvantages, which you will examine in this section. There are three primary types of cable media that can be used to
connect systems to a network—coaxial cable, twisted-pair cable, and fiber-optic cable. Transmission rates that can be
supported on each of these physical media are measured in millions of bits per second, or megabits per second (Mbps).

Coaxial Cable-:
Coaxial, or coax, cable looks like the
cable used to bring the cable TV signal
to your television. One strand (a solid-
core copper wire) runs down the middle
of the cable. There are two types of coax
cabling: thinnet and thicknet. The two
differ in thickness and maximum cable
distance that the signal can travel.

Twisted-Pair Cable-:
Coaxial cable is not as popular today as
it was a few years ago; today the
popularity contest has been dominated
by twisted-pair cabling. Twisted-pair
cabling gets its name by having four pairs of wires that are twisted to help reduce crosstalk or interference from outside
electrical devices. (Crosstalk is interference from adjacent wires.) there are two forms of twisted-pair cabling—unshielded
twisted-pair (UTP) and shielded twisted-pair (STP).

Fiber-Optic Cable-:
The third type of cabling that we want to discuss is fiber-optic cabling. Fiber-optic cabling is unlike coax and twisted-pair,
because both of those types have a copper wire that carries the electrical signal. Fiber-optic cables use optical fibers that carry
digital data signals in the form of modulated pulses of light. An optical fiber consists of an extremely thin cylinder of glass,
called the core, surrounded by a concentric layer of glass, known as the cladding. There are two fibers per cable-one to
transmit and one to receive. The core also can be an optical-quality clear plastic, and the cladding can be made up of gel that
reflects signals back into the fiber to reduce signal loss. There are two types of fiber-optic cables: single-mode fiber (SMF)
and multimode fiber (MMF).
1. Single-mode fiber Uses a single ray of light, known as a mode, to carry the transmission over long distances.
2. Multimode fiber Uses multiple rays of light (modes) simultaneously, with each ray of light running at a different
reflection angle to carry the transmission over short distances

www.makemyexam.in www.ibtindia.com Page 12


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Cable Max Distance Transfer Rate Connector Used


Thinnet 185 m 10 Mbps BNC
Thicknet 500 m 10 Mbps AUI
CAT 3 (UTP) 100 m 10 Mbps RJ-45
CAT 5 (UTP) 100 m 100 Mbps RJ-45
CAT 5e 100 m 1 Gbps RJ-45
CAT 6 100 m 10 Gbps RJ-45
Fiber 2 km 1+ Gbps SC, ST

Network devices are components used to connect computers or other electronic devices together so that they can share files
or resources like printers or fax machines. Devices used to setup a Local Area Network (LAN) are the most common types of
network devices used by the public. A LAN requires a hub, router, cabling or radio technology, network cards, and if
online access is desired, a high-speed modem. This is much less complicated than it might sound to someone new to
networking.
 Hub- Broadcasts data from one port to all other ports in the network.
 Repeater- Regenerates the input data which is subjected to attenuation.
 Switch- Intelligent device which sends data to particular port.
 Bridge-Same function as switch but much more primitive and has lesser
ports.
 Router-Connects all computers from a LAN to internet using same IP.
 IEEE 802.11- Wi-Fi standard- 802.11 b has speed of 11 Mbps, 802.11 g
has a speed of 54 Mbps and 802.11 N uses multiple wireless signals and
antennas and has speeds of over 100Mbps.
 Gateway-Needed when 2 different network technologies are being used.
Acts as translator.
 Connecting Cables- RJ-11(Telephone Cable), RJ 45 (LAN Cable),
Twisted pair cables (used in connecting 2 computers), Null Modem Cable (RS232) , Optical Fiber Cable(Gigabit
Ethernet).

ARPANET- Advanced Research Projects Agency Network, ARPANET or Arpanet began development in 1966 by the
United States ARPA. ARPANET was a Wide Area Network linking many Universities and research centers, was first to use
packet switching, and was the beginning of what we consider the Internet today. Some of the reasons for creating ARPANET
include making it easier for people to access computers, to improve computer equipment, and to have a more effective
communication method for the military.

OSI (Open Systems Interconnection) is reference model for how messages should be transmitted between any two points in a
telecommunication network. A reference model is a framework for understanding relationships. The purpose of the OSI

www.makemyexam.in www.ibtindia.com Page 13


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

reference model is to guide vendors and developers so that the digital communication products and software programs they
create will interoperate. The OSI reference model defines seven layers of functions that take place at each end of a
communication.

Layers of OSI -

Layer 7: The application layer - This is the layer at which communication partners are identified, quality of service (QoS) is
identified, user authentication and privacy are considered, and any constraints on data syntax are identified. (This layer is not
the application itself, although some applications may perform application layer functions.)
Layer 6: The presentation layer - This is a layer, usually part of an operating system (OS), that converts incoming and
outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly-
arrived text).
Layer 5: The session layer - This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between
the applications at each end. It deals with session and connection coordination.
Layer 4: The transport layer - This layer manages the end-to-end control (for example, determining whether all packets have
arrived) and error-checking. It ensures complete data transfer.
Layer 3: The network layer - This layer handles the routing of the data (sending it in the right direction to the right
destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does
routing and forwarding.
Layer 2: The data-link layer - This layer provides synchronization for the physical level and does bit-stuffing for strings of
1's in excess of 5. It furnishes transmission protocol knowledge and management. This layer has two sub layers, the Logical
Link Control Layer and the Media Access Control Layer.
Layer 1: The physical layer - This layer conveys the bit stream through the network at the electrical and mechanical level. It
provides the hardware means of sending and receiving data on a carrier network.

www.makemyexam.in www.ibtindia.com Page 14


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Every machine on a network has a unique identifier. Most networks today, including all computers on the Internet, use the
TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a
computer is called its IP address.
There are two standards for IP addresses:-
1) IP Version 4 (IPv4) 2) IP Version 6 (IPv6).
All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address system as well.
Here's what these two address types mean:-
IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address is expressed by four numbers
separated by dots. Each number is the decimal (base-10) representation for an eight-digit binary (base-2) number, also called
an octet. For example: 216.27.61.137.
Class A - 0.0.0.0 - 127.255.255.255 Class B - 128.0.0.0 - 191.255.255.255
Class C - 192.0.0.0 - 223.255.255.255 Class D - 224.0.0.0 - 239.255.255.255
Class E - 240.0.0.0 - 247.255.255.255
IPv6 uses 128 binary bits to create a single unique address on the network. An IPv6 address is expressed by eight groups of
hexadecimal (base-16) numbers separated by colons, as in 2001:cdba:0000:0000:0000:0000:3257:9652 Groups of numbers
that contain all zeros are often omitted to save space, leaving a colon separator to mark the gap (as in 2001:cdba::3257:9652).

Differences between IPv4 and IPv6:

IPv4 IPv6
No. of bits on IP Address 32 128
Format decimal hexadecimal
Capable of Addresses 4.3 billion infinite number

Advantages of IPv6 over IPv4:

 IPv6 simplified the router‘s task compared to IPv4.


 IPv6 is more compatible to mobile networks than IPv4.
 IPv6 allows for bigger payloads than what is allowed in IPv4.
 IPv6 is used by less than 1% of the networks, while IPv4 is still in use by the remaining 99%.

 MAC address -: The address for a device as it is identified at the Media Access Control (MAC) layer in the network
architecture. MAC address is usually stored in ROM on the network adapter card and is unique.
 Bandwidth -: Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range
is called the bandwidth.
 Bookmark - When referring to the Internet or a browser, a bookmark or electronic bookmark is a method of saving a
web page's address. For example, with most browsers pressing Ctrl + D will bookmark the page you are viewing.

www.makemyexam.in www.ibtindia.com Page 15


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 Bounce -A description of what occurs when an e-mail message returns back to the sender as undeliverablE. Some e-mail
programs also have a bounce or bounce back feature built into them, which allows the user to bounce messages back to
the sender causing the e-mail address to appear invalid.
 Buffer-When referring to memory, a buffer is a temporary storage in memory that stores information while processing
other information.
 Cloud computing -A term used to describe services over a network by a collection of servers. These computers or cloud
of computers enable the users visiting to have access to much faster computers or servers, be able to access programs and
services from anywhere with Internet access often without having to install other software, and get access to the services
from any device capable of reaching the network or Internet
 Cyber Law- Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their
respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics including freedom of
expression, access to and usage of the Internet, and online privacy. Generically, cyber law has been referred to as the
Law of the Internet.
 DNS-: Domain Name System or Domain Name Service, a DNS is an Internet or other network server that helps to
point domain names or the hostname to their associated IP address that was introduced by Paul Mockapetris and Jon
Postel in1984. If a domain name is not found within the local database, the server may query other domain servers to
obtain the address of a domain name. For example, when a user is accessing the Computer Hope domain a user would
enter the easy to remember domain: computerhopE.com. When entered that domain name is looked up on a Domain
Name System to translate that name into an IP address that can be better understood by computer, E.g. 69.72.169.241.
Using that IP address the computers can then find the computer containing the Computer Hope web page and forward
that information to your computer.
 E-learning- : E-learning Stands for electronic learning, E-learning (or eLearning) is a term used to describe the
process of acquiring knowledge via the use of a computer and the Internet, intranet, or extranet, using various types of
media. The multimedia may include streaming video, audio recordings, videoconferencing using a webcam, and even
virtual worlds, such as Second Life. It is commonly self-paced but can be led by an instructor as well.
 Phishing-: Pronounced like fishing, phishing is a term used to describe a malicious individual or group of individuals
scamming users by sending e-mails or creating web pages that are designed to collect an individual's online bank,
credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust
them and enter their personal information.

 Pop-up-: Term used to describe a Window that appears on top of all other Windows. This term became a well-known
term with the advent of intrusive and non-intrusive Internet pop-up ads. These ads became increasingly annoying as
this form of advertising started to become more popular with many web pages.
 Search engine-: A search engine is a software program or script available through the Internet that searches
documents and files for keywords and returns the results of any files containing those keywords. Today, there are
thousands of different search engines available on the Internet, each with their own abilities and features. The first

www.makemyexam.in www.ibtindia.com Page 16


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

search engine ever developed is considered Archie, which was used to search for FTP files and the first text-based
search engine is considered Veronica. Today, the most popular and well known search engine is Google.

 Server side scripting-: Server-side scripting is a method of designing Websites so that the process or user request is
run on the originating server. These scripts provide an interface to the user and are used to limit access to proprietary
data. These scripts also work with reusability and allow the webmaster to control access to the source code of the
script to limit any attempts at reverse engineering; additionally some of the coding used in these scripts may even be
valuable or proprietary.
 ASP- : Active Server Pages, an ASP page is a dynamically created web page that commonly ends with a .ASP
extension that utilizes ActiveX scripting, usually VBScript or JScript code. The .aspx extension is used for Web pages
that use Microsoft's ASP.NET. These pages are called "Web Forms", and can contain (X)HTML code as well as
ASP.NET code.
 Web page-: A web page or webpage is a document commonly written in Hyper Text Markup Language (HTML) that
is accessible through the Internet or other network using a browser. A web page is accessed by entering a URL
addresses and may contain text, graphics, and hyperlinks to other web pages and files.
 WWW-: Short for World Wide Web, WWW sometimes also abbreviated as W3 or Web is a graphical interface for
the Internet that was first introduced to the public on August 6, 1991 by Tim Berners-Lee. The World Wide Web
consists of billions of pages linked to each other that contain text, graphics, multimedia files, and other interactive
software. Unlike other services available through the Internet, the World Wide Web provides a rich medium and helps
brings all people together. The first web site was built at CERN by Tim Berners-Lee and put online August 6, 1991.
 Firewall-: A firewall is a software utility or hardware device that limits outside network access to a computer or local
network by blocking or restricting network ports. Firewalls are a great step for helping prevent un-authorized access to
a company or home network. The picture is an example of a hardware firewall, the ZyXEL ZyWALL a Unified
Security Gateway with a Firewall and other security features. In addition to hardware firewalls like that shown above,
basic hardware firewalls are also commonly
found in most network routers and can be
configured and setup through the router setup.
Software firewalls are designed to protect the
computer they are installed onto by blocking
any unrestricted programs from sending and
receiving information from the network or
Internet. A good example of a software
Firewall is the Windows Firewall that is

www.makemyexam.in www.ibtindia.com Page 17


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

included with Microsoft Windows.


 NIC-: Short for Network Interface Card, a NIC is also commonly referred
to as an Ethernet card and network adapter and is an expansion card that
enables a computer to connect to a network such as a home network or the
Internet using an Ethernet cable with a RJ-45 connector. The picture is an
example of a SMC EZ Card 10/100 PCI network card, a network card
commonly found in most desktop computers today that do not already
have an onboard network on their motherboard.
 Packet switching-: A method of distributing data over a network first developed by Leonard leinrock between 1959
and 1962 and first widely used on ARPANET. In packet switching, information is broken into small segments of data
known as packets and then reassembled when received at the destination. This helps prevent any small information
sent after larger information from having to wait until the larger information has been sent. When information is
broken into packets, the information size and speed of the line is what determines how fast it takes to send information
over a network and not the order in which it was sent.
 Proxy server-: A proxy is a computer server or software program that is part of the gateway server or another
computer that separates a local network from outside networks. A proxy server will cache all pages accessed through
the network allowing users who may want to visit that same page to load it faster and reduce the networks bandwidth.
When a page is accessed that is not in the proxy server's cache, the proxy server will access the page using its own IP
address, cache the page, and forward it to the user accessing that page.
 Spam-: spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define
spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends
you a message, this could hardly be called spam, even though it is
unsolicited. Real spam is generally email advertising for some product
sent to a mailing list or newsgroup. In addition to wasting people's time
with unwanted e-mail, spam also eats up a lot of network bandwidth.
Consequently, there are many organizations, as well as individuals, who
have taken it upon themselves to fight spam with a variety of
techniques. But because the Internet is public, there is really little that
can be done to prevent spam, just as it is impossible to prevent junk
mail. However, some online services have instituted policies to prevent
spammers from spamming their subscribers.
 Client-server architecture- : Technology that separates computers and application software into two categories
clients, and servers to better employ available computing resources and share data processing loads. A client computer
provides the user interaction-facility (interface) and some or all application
processing, while the a server computer might provide high-volume storage
capacity, heavy data crunching, and/or high resolution graphics. Typically,
several client computers are connected through a network (or networks) to a
server which could be a large PC, minicomputer, or a mainframe computer.
Every computer connected to a website acts as a client while the website's
computer acts as a server. Also called client-server environment.

www.makemyexam.in www.ibtindia.com Page 18


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

Number systems are the technique to represent numbers in the computer system architecture, every value that you are saving
or getting into/from computer memory has a defined number system. Computer architecture supports following number
systems.
 Binary number system
 Octal number system
 Decimal number system
 Hexadecimal (hex) number system

1) Binary Number System-:


A Binary number system has only two digits that are 0 and 1. Every number represents with 0 and 1 in this number system.
The base of binary number system is 2, because it has only two digits.
2) Octal number system-:
Octal number system has only eight (8) digits from 0 to 7. Every number represents with 0,1,2,3,4,5,6 and 7 in this number
system. The base of octal number system is 8, because it has only 8 digits.
3) Decimal number system-
Decimal number system has only ten (10) digits from 0 to 9. Every number represents with 0,1,2,3,4,5,6, 7,8 and 9 in this
number system. The base of decimal number system is 10, because it has only 10 digits.
4) Hexadecimal number system-:
A Hexadecimal number system has sixteen (16) alphanumeric values from 0 to 9 and A to F. Every number represents with
0,1,2,3,4,5,6, 7,8,9,A,B,C,D,E and F in this number system. The base of hexadecimal number system is 16, because it has 16
alphanumeric values. Here A is 10, B is 11, C is 12, D is 13, E is 14 and F is 15.

Number system Base Used digits Example

Binary 2 0,1 (11110000)2

Octal 8 0,1,2,3,4,5,6,7 (257)8

Decimal 10 0,1,2,3,4,5,6,7,8,9 (230)10

Hexadecimal 16 0,1,2,3,4,5,6,7,8,9, (F9)16


A,B,C,D,E,F

For Conversion of number system and binary coding – Watch my video in Makmyexam Youtube channel, Computer Times
Playlist-: Link is given below- :
Number System-:
https://www.youtube.com/watch?v=JIADayNDMt8&list=PLUBOuzNf9-
fpFWVbIAD8IRikYBOHJGE6M&index=17&t=2336s
Binary Coding- :
https://www.youtube.com/watch?v=4-Gcj1bty2E

www.makemyexam.in www.ibtindia.com Page 19


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

M.S. Word/ Excel Shortcuts with CTRL from A-Z Alphabetically-:


CTRL + A = Select text CTRL + B= Bold text
CTRL + C = Copy text CTRL + D = Open font formatting window
CTRL + E = Centre text CTRL + F = Find a phrase
CTRL + G = Go To a specific page or bookmark CTRL + H = Replace text with another text
CTRL + I = Italic text CTRL + J = Justify text
CTRL + K = Open Insert Hyperlink window CTRL + L = Left align text
CTRL + M = Indent a paragraph from the left CTRL + N = Open new Word document
CTRL + O = Open an existing Word document CTRL + P = Print Word document
CTRL + Q = Remove paragraph formatting CTRL + R = Right align text
CTRL + S = Save Word document CTRL + T = Create a hanging indent
CTRL + U = Underline text CTRL + V = Paste text
CTRL + W = Close Word document CTRL + X = Cut text
CTRL + Y = Redo an action previously undone CTRL + Z = Undo a previous action

M.S Excel shortcut keys-:


F2 = edit the selected cell F5= Go to the specific cell
F7 = spell check of the selected text F11= Create the chart
CTRL+SHIFT+ ;= enter the current time CTRL+; = Enter the current date
ALT+SHIFT+F1= insert the new worksheet SHIFT + F3= Open the formula window
SHIFT + F5= open the search box CTRL+D= Fill the cell
CTRL+G= Open the go to option CTRL+O = Open option
CTRL+P= Open the print dialogue box CTRL+F9= Minimize the current window
CTRL+F10= Maximize the current selected window CTRL+F6= Switch between the open worksheets
SHIFT+SPACE= Select entire row CTRL + SPACE= Select entire column
CTRL+W= Close the window CTRL+TAB= Move b/w two or more open excel file

Data Base Management System-:


Database-:
A database is a logically coherent collection of data with some inherent meaning, representing some aspect
of real world and which is designed, built and populated with data for a specific purpose.
DBMS-:
It is a collection of programs that enables user to create and maintain a database. In other words it is general-
purpose software that provides the users with the processes of defining, constructing and manipulating the database for
various Applications.
Advantages of DBMS-:

www.makemyexam.in www.ibtindia.com Page 20


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

1. Redundancy is controlled. 2. Unauthorized access is restricted.


3. Providing multiple user interfaces. 4. Enforcing integrity constraints.
5. Providing backup and recovery.

III-tier Architecture -:
Three levels of data abstraction (III-tier Architecture)-:
They are three levels of abstraction are given below,
1. Physical level: The lowest level of abstraction
describes how data are stored. (How to store the
data?)
2. Logical level: The next higher level of abstraction,
describes what data are stored in database and what
relationship among those data. (What type of data to
be stored?)
3. View level: The highest level of abstraction describes
only part of entire database. (How to show the data?)

The people who use the database can be categorized -

a) Database users b) Database administrator (DBA)

Database users are of 4 different types that are given below:

1) Naive users: These are the unsophisticated users who interact with the system by invoking one of the application
programs that have been written previously. E.g. consider a user who checks for account balance information over the
World Wide Web. Such a user access a form, enters the account number and password etc. And the application
program on the internet then retrieves the account balance using given account information which is passed to the user.

2) Application programmers-: These are computer professionals who write application programs, used to develop
user interfaces. The application programmer uses Rapid Application Development (RAD) toolkit or special type of
programming languages which include special features to facilitate generation of forms and display of date on screen.

3) Sophisticated users: These users interact with the database using database query language. They submit their query
to the query processor. Then Data Manipulation Language (DML) functions are performed on the database to retrieve
the data. Tools used by these users are OLAP (Online Analytical Processing) and data mining tools.

4) Specialized users-: These users write specialized database applications to retrieve data. These applications can be
used to retrieve data with complex data types e.g. graphics data and audio data.

b) Database Administrator (DBA): A person having who has central control over data and programs that access the
data is called DBA. DBA functions are given below:

1. Schema definition: DBA creates database schema by executing Data


Definition Language (DDL) statements.
2. Storage structure and access method definition
3. Schema and physical organization modification: If any changes are to
be made in the original schema, to fit the need of your organization,
then these changes are carried out by the DBA.
4. Granting of authorization for data access: DBA can decide which parts
of data can be accessed by which users. Before any user access the
data, DBMS checks which rights are granted to the user by the DBA.

www.makemyexam.in www.ibtindia.com Page 21


Current Affair से संवधं िि हमारी बेबसाइट पर हमेशा Update रहिे वािी
महत्वपूर्ण Post –

 Latest Current Affairs PDF All Month in Hindi and English


 Latest Yearly and Half Yearly Most Important Current
Affairs PDF in Hindi and English
 Latest Current Affairs PDF in Hindi By Nitin Gupta
 Latest Mahendra Current Affairs PDF Magazine ( MICA )
 Latest करेंट अफेयसण : कौि, क्या, कहााँ ?
 Latest Sports Current Affairs
 Latest करेंट अफेयसण : पुरस्कार / सम्माि / पदक
 Current Affairs 2019 - 20 : महत्वपूर्ण सम्मेिि / समारोह
 बषण 2019 – 20 में चचाण में रहे महत्वपूर्ण शब्दों की Full Form
 बषण 2019 – 20 में चचाण में रही िवीििम पुस्िके एवं उिके िेखक
 वषण 2019 – 2020 में होिे वािी प्रमुख राष्ट्रीय व अंिराणष्ट्रीय नियुनियां
 Most Important Government Schemes 2014 to 2019
 प्रमुख योजिा / अधभयाि व संस्थाओं के ब्ांर् एंबस
े र्र की सूची 2019
 संयक्
ु ि सैन्य अभ्यास
 प्रमुख योजिा / अधभयाि व संस्थाओं के ब्ांर् एंबस
े र्र की सूची
 नवधभन्ि ररपोटण / सूचकांक 2019 – 2020

Join Our Telegram Channel For Free PDF

ऐसी ही PDF के लिये Google पर Search करें – “Nitin Gupta PDF”


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

5. Routine maintenance: DBA has to take periodic backups of the database, ensure that enough disk space is available
to store new data, ensure that performance of DBMS ix not degraded by any operation carried out by the users.

SQL-:
SQL stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI
(American National Standards Institute), it is the standard language for relational database management systems. SQL
statements are used to perform tasks such as update data on a database, or retrieve data from a database. Some common
relational database management systems that use SQL are: Oracle, Sybase, Microsoft SQL Server, Access, Ingres, etc.
Although most database systems use SQL, most of them also have their own additional proprietary extensions that are
usually only used on their system. However, the standard SQL commands such as "Select", "Insert", "Update", "Delete",
"Create", and "Drop" can be used to accomplish almost everything that one needs to do with a database. This tutorial will
provide you with the instruction on the basics of each of these commands as well as allow you to put them to practice using
the SQL Interpreter.

Relational Model-:
The most popular data model in DBMS
is the Relational Model. It is more scientific a model than
others. This model is based on first-order predicate logic
and defines a table as an n-array relation.
The main highlights of this model are −
1. Data is stored in tables called relations.
2. Relations can be normalized.
3. In normalized relations, values saved are atomic
values.
4. Each row in a relation contains a unique value.
5. Each column in a relation contains values from a
same domain.
Key-:
A key is an attribute (also known as column or field)
or a combination of attribute that is used to identify
records. Sometimes we might have to retrieve data from
more than one table, in those cases we require to join
tables with the help of keys. The purpose of the key is to
bind data together across tables without repeating all of the
data in every table. Such an attribute is called a key attribute, and its values can be used to identify each entity uniquely. For
example, the Name attribute is a key of the COMPANY entity type because no two companies are allowed to have the same
name. For the PERSON entity type, a typical key attribute is SocialSecurityNumber. Sometimes, several attributes together
form a key, meaning that the combination of the attribute values must be distinct for each entity. If a set of attributes
possesses this property, we can define a composite attribute that becomes a key attribute of the entity type. The various types
of key with e.g. in SQL are mentioned below, (For examples let suppose we have an Employee Table with attributes ‗ID‘ ,
‗Name‘ ,‘Address‘ , ‗Department_ID‘ ,‘Salary‘)
(I) Super Key –:
An attribute or a combination of attribute that is used to identify the records uniquely is known as Super
Key. A table can have many Super Keys.
E.g. of Super Key
1 ID 2 ID, Name
3 ID, Address 4 ID, Department_ID
5 ID, Salary 6 Names, Address

www.makemyexam.in www.ibtindia.com Page 22


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

7 Names, Address, Department_ID ………… So on as any combination which can identify the records uniquely will be a
Super Key.
(II) Candidate Key –:
It can be defined as minimal Super
Key or irreducible Super Key. In other words an attribute or
a combination of attribute that identifies the record uniquely
but none of its proper subsets can identify the records
uniquely.
E.g. of Candidate Key
1 Code 2 Names, Address
For above table we have only two Candidate Keys (i.e.
Irreducible Super Key) used to identify the records from the
table uniquely. Code Key can identify the record uniquely
and similarly combination of Name and Address can
identify the record uniquely, but neither Name nor Address
can be used to identify the records uniquely as it might be
possible that we have two employees with similar name or
two employees from the same house.
(III) Primary Key-:
A Candidate Key that is used by the
database designer for unique identification of each row in a
table is known as Primary Key. A Primary Key can consist
of one or more attributes of a table. E.g. of Primary Key -
Database designer can use one of the Candidate Key as a
Primary Key. In this case we have ―Code‖ and ―Name,
Address‖ as Candidate Key, we will consider ―Code‖ Key
as a Primary Key as the other key is the combination of
more than one attribute.
(IV) Foreign Key –:
A foreign key is an attribute or
combination of attribute in one base table that points to the
candidate key (generally it is the primary key) of another
table. The purpose of the foreign key is to ensure referential
integrity of the data i.e. only values that are supposed to
appear in the database are permitted.
E.g. of Foreign Key – Let consider we have another table
i.e. Department Table with Attributes ―Department_ID‖,
―Department_Name‖, ―Manager_ID‖, ‖Location_ID‖ with
Department_ID as an Primary Key. Now the
Department_ID attribute of Employee Table (dependent or
child table) can be defined as the Foreign Key as it can
reference to the Department_ID attribute of the
Departments table (the referenced or parent table), a
Foreign Key value must match an existing value in the
parent table or be NULL.

(V) Composite Key–:


If we use multiple attributes to
create a Primary Key then that Primary Key is called
Composite Key (also called a Compound Key or
Concatenated Key). E.g. of Composite Key, if we have used
―Name, Address‖ as a Primary Key then it will be our
Composite Key.

www.makemyexam.in www.ibtindia.com Page 23


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

(VI) Alternate Key–:


Alternate Key can be any of the Candidate Keys except for the Primary Key. E.g. of Alternate Key is
―Name, Address‖ as it is the only other Candidate Key which is not a Primary Key.
(VII) Secondary Key–:
The attributes that are not even the Super Key but can be still used for identification of records (not
unique) are known as Secondary Key. E.g. of Secondary Key can be Name, Address, Salary, Department_ID etc. as they can
identify the records but they might not be unique.
SQL Commands- :
SQL have the different type of commands that are given below -
1. DDL (Data Definition Language)-: A data base schema is specifies by a set of definitions expressed by a special
language called DDL. Example of DDL commands are given below-:
 CREATE - to create objects in the database.
 ALTER - alters the structure of the database.
 DROP - delete objects from the database.
 TRUNCATE - remove all records from a table, including all spaces allocated for the records are removed.
 COMMENT - add comments to the data dictionary.
 RENAME - rename an object.
2. DML (Data Manipulation Language)-: This language that enable user to access or manipulate data as organized
by appropriate data model. Procedural DML or Low level: DML requires a user to specify what data are needed and
how to get those data. Non-Procedural DML or High level: DML requires a user to specify what data are needed
without specifying how to get those data.
 SELECT - retrieve data from the a database
 INSERT - insert data into a table
 UPDATE - updates existing data within a table
 DELETE - deletes all records from a table, the space for the records remain
 MERGE - UPSERT operation (insert or update)
 CALL - call a PL/SQL or Java subprogram
 EXPLAIN PLAN - explain access path to data
 LOCK TABLE - control concurrency
3. DCL-: Data Control Language (DCL) statements. Some examples:
 GRANT - gives user's access privileges to database
 REVOKE - withdraw access privileges given with the GRANT command
4. TCL-: Transaction Control (TCL) statements are used to manage the changes made by DML statements. It allows
statements to be grouped together into logical transactions.
 COMMIT - save work done
 SAVEPOINT - identify a point in a transaction to which you can later roll back
 ROLLBACK - restore database to original since the last COMMIT
 SET TRANSACTION - Change transaction options like isolation level and what rollback segment to use
5. VDL (View Definition Language) -: It specifies user views and their mappings to the conceptual schema.
6. SDL (Storage Definition Language)-: This language is to specify the internal schema. This language may specify
the mapping between two schemas.

 The most common method of entering text and numerical data into a computer system is through the use of a
keyboard.
 Unsolicited commercial email is commonly known as Spam.
 Which device is used for dividing a network into segments- Switch
 Executing is the process of carrying out commands.
 Editing a document consists of reading through the document you‘ve created, then- Correcting your errors.
 Most mail programs automatically complete the following two parts in an e-mail- From and To.

www.makemyexam.in www.ibtindia.com Page 24


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 Different applications and documents of windows desktop are represented by Icon.


 Which area in an Excel window allows entering values and formulas- Formula Bar?
 Fax machines and imaging systems are examples of- Scanning devices.
 The particular field of a record that uniquely identifies each record is called the key field.
 In order to tell Excel that we are entering a formula in a cell, we must begin the entry with an operator-=(Equal)
 Booting is the process when the computer is turned on and the operating system is loading.
 Numbers in table columns are usually- Right Alignment.
 Character in table columns are usually- Left Alignment.
 To combine two or more cells into a single cell is called – Merging
 In a relational database, this is a data structure that organizes the information about a single topic into rows (Tuple)
and columns (Attributes) - Table
 The first computers were programmed using- : Machine language.
 A series of instructions that tells a computer what to do and how to do it is called a- Instruction
 You can use the Address bar to type a URL and display a web page, or type a keyword to display a list of related
web pages.
 When communication in both directions and both the devices can simultaneously transmit the data known as-: Full
duplex
 Collaborative software: Groupware, such as Lotus Notes or Microsoft Exchange
 Certification: Skills and knowledge assessment process.
 Computer Crime: The act of stealing, cheating or otherwise defrauding an organization with the use of a
Computer.
 Cryptography: Method used to protect privacy and security on the internet
 DBMS: An acronym for the database management system. A program that maintains and controls the access to
collection of related information in electronic files.
 Data: Facts coded and structured for subsequent processing, generally using a computer system.
 Digital signature: Encrypted signature used for providing security for the messages/data transferred through the
internet.
 Digital computer: A device that manipulates discrete data and performs arithmetic and logic operations on these
data.
 Data transmission: The movement of data from one location of storage to another. If the locations are
geographically far away, generally done via satellites.
 Disk Mirroring: The data is written on two or more hard disks simultaneously over the same channel
 Disk Duple Xing: The data is written on two or more hard disks simultaneously over the different channel
 Dumb Terminals: Hardware configuration consisting of a keyboard and monitor that is capable of sending and
receiving information but has no memory or processing capabilities.
 Download: Process of transferring a file system from one system to another
 E-commerce: Business transactions conducted over extranets or the internet
 Enterprise, resource planning: An integrated system of operation application combining logistics, production,
contract and order management, sales forecasting and financial and HR management
 Data processing: It is a method concerning with the systematic recording, arranging, filing, processing and
dissemination of facts of business

www.makemyexam.in www.ibtindia.com Page 25


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 The Undo button on the quick access Toolbar allows you to cancel your recent commands or actions.
 A gigabyte represents approximately one billion memory locations.
 Merging cells involves creating a single cell by combining two or more selected cells.
 The horizontal and vertical lines on a worksheet are called— gridlines
 To delete an incorrect character in a document delete key to erase to the right of the insertion point.
 During the boot process, the BIOS looks for the system files.
 Multitasking is the ability of an operating system to control the activities of multiple programs at the same timE.
 The unique signal, generated by a device, that tells the operating system that it is in need of immediate
attention is called an- Interrupt.
 The blocks of code, included in the operating system, that software applications interact with are known
as: Application programming interfaces (APIs).
 MS-DOS is a command-driven operating system.
 SRAM retains data as long as power is provided to the memory chip and need not be refreshed periodically. SRAM
stands for Static Random Access Memory.
 The data on DRAM continues to move in and out of the memory as long as power is available and must be
continually refreshed to maintain the data. DRAM stands for Dynamic Random Access Memory.
 Impact printers create an image by using some mechanism to physically press an inked ribbon against the page,
causing the ink to be deposited on the page in the shape desired.Examples of Impact Printers are Character
Printers and Dot Matrix Printers.
 Non – Impact Printers do not touch the paper when creating an image.Examples of Non - Impact Printers are
Inkjet printers, Laser printers, Solid ink printers, Dye- sublimation, Thermal wax printers, Thermal auto chrome
printers.
 An Integrated Software is a single application that combines major features of several types of application.
 A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or that is
followed automatically
 The Uniform Resource Locator, abbreviated as URL is a specific character string that constitutes a reference to a
resource. In most web browsers, the URL of a web page is displayed on top inside an address bar. An example of a
typical URL would be" http://www.makemyexam.in".
 An interrupt handler is a special numeric code that indicates the priority of a request.
 A spooler is a program that coordinates the print jobs that are waiting to print.
 Virtual memory is typically located on the hard drive.
 The purpose of a swap (or page) file is to hold a program‘s data or instructions in virtual memory when it can‘t fit
in RAM.
 The definition of thrashing is swapping data between virtual memory and RAM too frequently.
 Verification of a login name and password is known as authentication.
 The correct sequence of actions that takes place during the boot-up process?
 Activate BIOS -> Perform POST -> Load operating system -> Check configuration settings
 The BIOS stored on a ROM chip, is responsible for loading the operating system from its permanent location on the
hard drive into RAM.
 The memory resident portion of the operating system is called the— kernel.

www.makemyexam.in www.ibtindia.com Page 26


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 The World Wide Web (abbreviated as WWW or W3,


commonly known as the Web) is a system of
interlinked hypertext documents that are accessed via
the Internet.
 CC (Carbon Copy) in e – mail indicates those who
are to receive a copy of a message addressed primarily
to another. The list of CC recipients is visible to all
other recipients of the message.
 An additional BCC (blind carbon copy) field is
available for hidden notification; recipients listed in
the BCC field receive a copy of the message, but are
not shown on any other recipient's copy (including
other BCC recipients) power-on self-test (POST)
 Using Windows Explorer, a plus (+) sign in front of a
folder indicates— the folder contains subfolders.
 In Windows XP, if you want to see the file size and
modified dates of all files in a folder, the best viewing
option is the Details view.
 The primary purpose of software is to turn data into
Information.
 A directory within a directory is called-Sub
Directory.
 A compiler translates a program written in a high-level language into Machine language.
 A programming language contains specific rules and words that express the logical steps of an algorithm.
 The simultaneous processing of two or more programs by multiple processors is Multiprocessing.
 The secret code that restricts entry to some programs-Password
 Computers use the binary number system to store data and perform calculations.
 Executing is the process of carrying out commands.
 Softcopy is the intangible output, so then what is hardcopy - The printed output
 An error in a computer program is called as- Bug
 Backup is - Protecting data by copying it from the original source to a different destination.
 In page preview mode-You can see all pages of your document
 A collection of interrelated records is called – Database
 To move to the beginning of a line of text, press the Home key.
 The term ‗user interface’ refers to—What the user sees on the screen and how they can interact with it.
 Reusable optical storage will typically have the acronym-RW
 Text in a column is generally aligned – Left
 In Excel, Charts are created using which option -Chart Wizard
 The Mouse pointer becomes different shapes depending on the task you are performing.
 ‗MICR‘ technology used for clearance of cheques by banks refers to—Magnetic Ink Character Recognition
 Modern Computers represent characters and numbers internally using one of the following number systems- Binary
 Smallest storage unit of a computer is-Bit
 A MODEM is connected in between a telephone line and a—Computer

www.makemyexam.in www.ibtindia.com Page 27


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 E-governance-Delivery of public services through internet


 ‘Buy Now–Pay Now’ is commonly used for -Visa Cards
 Correcting errors in a program is referred to as- debugging
 An assembler is used to translate a program written in- Assembly language
 The capability of the operating system to enable two or more than two programs to execute simultaneously in a
single computer system by using a single processor is-Multitasking
 Which keys can be used together with other keys for special tasks - Ctrl, Shift
 Which is the part of a computer that one can touch and feel-Hardware
 A device that reads the information contained on a disk and transfers it to the computer‘s memory- disk drive
 The different styles of lettering in a word processing program-font
 Any letter, number, or symbol found on the keyboard that you can type into the computer- character
 A program which helps create written documents and lets you go back and make corrections as necessary- word
processor
 A place that a user can create to store files- folder
 Start or restart the computer-boot
 A blinking indicator that shows you where your next action will happen-cursor
 Commands at the top of a screen such as: FILE-EDIT-FONT-TOOLS to operate and change things within
programs- menu bar
 The command used to remove text or graphics from a document. The information is then stored on a clipboard so
you can paste it- cut
 A removable magnetic disc that holds information-hard drive
 A command to get a file you worked on from the memory where it was stored-open
 To move down a page in a document-scroll
 A program that works like a calculator for keeping track of money and making budgets-spreadsheet
 All of the following are examples of real security and privacy risks EXCEPT- spam.
 A process known as data mining is used by large retailers to study trends.
 Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex inventory and
sales computer systems.
 The ability to recover and read deleted or damaged files from a criminal computer is an example of a law
enforcement specialty called- computer forensics.
 Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as- robotics.
 Technology no longer protected by copyright, available to everyone, is considered to be-proprietary.
 Nano science is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
 Artificial intelligence (AI) is the science that attempts to produce machines that display the same type of
intelligence that humans do.
 The name for the way that computers manipulate data into information is called:-processing.
 In the binary language each letter of the alphabet, each number and each special character is made up of a unique
combination of-eight bits.
 The term bit is short for- binary digit.
 The components that process data are located in the- system unit
 The CPU and memory are located on the- motherboard.
 Word processing, spreadsheet, and photo-editing are examples of-application software.

www.makemyexam.in www.ibtindia.com Page 28


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 Software is a set of computer programs used on a computer to help perform tasks.


 The PC (personal computer) and the Apple Macintosh are examples of two different-platforms.
 Servers are computers that provide resources to other computers connected to a-network.
 Supercomputers are specially designed computers that perform complex calculations extremely rapidly.
 DSL is an example of a broadband connection.
 The difference between people with access to computers and the Internet and those without this access is known as
the-digital divide.
 A byte can hold one character of data.
 The operating system controls the way in which the computer system functions and provides a means by which
users can interact with the computer.
 Embedded computers are specially designed computer chips that reside inside other devices, such as your car or
your electronic thermostat.
 The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A.
instructions-the operating system.
 The metal or plastic case that holds all the physical parts of the computer is the-system unit. Input devices are used
to provide the steps and tasks the computer needs to process data, and these steps and tasks are called instructions.
 When you connect to the Internet your computer is communicating with a server at your Internet service provider
(ISP)
 The earlier computers, which were massive in size, were based on vacuum tubes.
 Early computing machines, like the ENIAC, were actually meant to assist the armed forces.
 An improvement on the ENIAC, which pioneered 'stored program', was made possible with the help of the
mathematician John von Neumann.
 The B-programming language was developed by Ken Thompson.
 Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.
 The 1st commercially produced and sold computer (1951) was UNIVAC.
 IBM was provided software for PCs by Microsoft.
 The transformation from heavy computers to PCs was made possible using microprocessors.
 The first microprocessor was developed in 1971 by Intel.
 The term 'micro' (extremely small) denotes 10-6m.
 The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.
 A Pentium 4 (P-4) employs roughly 40 million transistors.
 A program used to browse the web is called Web browser.
 An error in software designing which can even cause a computer to crash is called bug.
 The device which sends computer data using a phone line is called MODEM.
 The first home computer (1977), which was sold in millions of units was Apple II.
 'PARAM-8000' is a First supercomputer in India.
 A website containing periodic posts is called blog.
 The unwanted or non-requested emails are called "spam".
 A computer framed to give various network services is called server.
 The first computers were programmed using Machine language.
 A filename is a unique name that you give to a file of information.
 A series of instructions that tells a computer what to do and how to do it is called a program.
 Super computers refers to the fastest, biggest and most expensive computers

www.makemyexam.in www.ibtindia.com Page 29


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 The rectangular area of the screen that displays a program, data, and or information is a window
 The process of a computer receiving information from a server on the internet is known as downloading
 You can use the tab key to move a cursor across the screen, indent a paragraph.
 A collection of related files is called record.
 Storage that retains its data after the power is turned off is referred to as non-volatile storage.
 Testing is the process of finding errors in software code.
 Syntax contains specific rules and words that express the logical steps of an algorithm.
 Changing an existing document is called the editing documentation
 The windows key will launch the start buttons.
 To move to the beginning of a line of text, press the home key.
 Information travels between components on the motherboard through buses.
 A tool bar contains buttons and menus that provide quick access to commonly used commands
 One advantage of dial-up internet access is it utilizes existing telephone security
 Protecting data by copying it from the original source is backup
 In a relational database, table is a data structure that organizes the information about a single topic into rows and
columns.
 When the pointer is positioned on a hyperlink it is shaped like a hand .
 A compiler translates higher level programs into a machine language program, which is called object code
 The ability to find an individual item in a file immediately Direct access .
 Each box in a spread sheet is called a cell.
 Network components are connected to the same cable in the bus topology.
 Scanner will translate images of text, drawings and photos into digital form.
 MS-DOS is a single user operating system
 Ethernet is used for high speed telecommunications
 FORTRAN is a scientific computer language
 Connections to the internet using a phone line and a modem are called dial-up connections
 Restarting a computer that is already on is referred to as warm booting
 A cluster represents a group of sectors
 Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
 A goal of normalization is to minimize the number of redundancy
 A proxy server is used to process client request for web pages
 When data changes in multiple list and list are not updated, this causes data inconsistency
 Granting an outside organization access to internet web pages is often implemented using a extranet
 The code that relational database management systems use to perform their database task is refer to as SQL
 Data integrity means that the data contained in the database is accurate and reliable
 The IBM made the first electronic computer in 1953
 Control panel is used for increasing and decreasing the speed of the cursor of mouse
 The .mpeg is the format of a movie file
 The memory address sent from the CPU to the main memory over a set of wires is called address bus
 The enhanced keyboard contains 101 keys
 Cache memory is a part of main memory
 The central host computer or file server in a star network maintains control with its connecting devices through
polling
 The integration of all kinds of media such as audio, video, voice, graphics and text into one coherent presentation
combined is called multimedia

www.makemyexam.in www.ibtindia.com Page 30


Computer Capsule– SBI,IBPS PO,RRB,CLRK Mains Exam

 A technique for searching special databases, called data warehouses, looking for related information and patterns is
called data mining
 Batch processing is a technique in which a number of similar items or transactions are processed in groups or
batches during a machine run
 Browser is a link between the computer and the internet. It‘s actually a program that provides a way to look in the
hand interact with all information on the internet. A browser is a client program that uses the Hypertext Transfer
Protocol (http)
 Computer Crime: The act of stealing, cheating or otherwise defrauding an organization with the use of a computer
 Cryptography: Method used to protect privacy and security on the internet
 Digital signature: Encrypted signature used for providing security for the messages/data transferred through the
internet.
 E-commerce: Business transactions conducted over extranets or the internet
 Electronic data interchange (EDI) : Electronic transmission or documents through point to point connections
using a set of standard forms, message and data elements, this can be via leased lines private networks or the internet

ANSI—American National Standards Institute EEPROM—Electronically Erasable Programmable


ARPANET—Advanced Research Projects Agency Read-Only Memory
Network EPROM—Erasable Programmable Read-Only Memory
ASCII—American Standard Code for Information FDD—Floppy Disk Drive
Interchange GUI—Graphical User Interface
ISCII— Indian Standard Code for Information HDD—Hard Disk Drive
Interchange HTML—Hypertext Markup Language
ASP—Active Server Pages HTTP—Hypertext Transfer Protocol
BASIC—Beginner's All-Purpose Symbolic Instruction HTTPs—Secure Hypertext Transport Protocol
Code ISO—International Organization for Standardization
CDMA—Code Division Multiple Access ISP—Internet Service Provider
CD-R—CD-Recordable Kb—Kilobit
CD-RW—CD-Rewritable KB—Kilobyte
COBOL—Common Business-Oriented Language LCD—Liquid Crystal Display
DBMS—Database Management System LIFO—Last In First Out
DVD—Digital Versatile Disc or Digital Video Disc MAC—Media Access Control
ENIAC—Electronic Numerical Integrator and Computer MAPI—Messaging Application Programming Interface
EDSAC—Electronic Delay Storage Automatic Calculator MTA—Mail Transfer Agent
EDVAC—Electronic Discrete Variable Automatic OSS—Open-Source Software
Computer PAN—Personal Area Network
PERL—Practical Extraction and Reporting Language
USB—Universal Serial Bus XML–Extensible Markup Language
VLAN—Virtual Local Area ASP–Active Server Pages
RDBMS–Relational Database Management System API–Application Programming Interfaces

www.makemyexam.in www.ibtindia.com Page 31


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

CSS–Cascading Style Sheets MIDI – Musical Instrument Digital Interface


ASCII–American Standard Code For Information MPEG – Motion Picture Experts Group
Interchange PDF – Portable Document Format
XSL- Extensible Style Sheet Language SQL—Structured Query Language
AVI – Audio Video Interleaved SRAM—Static Random Access Memory
CDA – Compact Disk Audio TTL—Transistor-Transistor Logic
DLL – Dynamik Link Library UML—Unified Modeling Language
JPEG – Joint Photographic Expert Group RAID—Redundant Array of Independent Disks
VHF – Very High Frequency. RDBMS—Relational Database Management System
UHF – Ultra High Frequency. RISC—Reduced Instruction Set Computer
ALU- Arithmetic Logic Unit GIF – Graphics Interchange Format
URL – Uniform Resource Locator.
AMD – Advance Micro Device
ASPI – Advacne Scsi Programming Interface
ASIC – Application Specific Integrated Circuit
USB – Universal Serial Bus.
VIRUS – Vital Information Resource Under Seized.
MIME–Multipurpose Internet Mail Extensions
JAD – Java Application Development

IMPORTATNT M.S.OFFICE MCQ


.1. Which of the following is word processing software? Q.4 To move the text to the right side of the page you
a) Microsoft Word would use....
b) Microsoft Excel a) Align left b) Align over one space
c) Microsoft Internet Explorer c) Align right d) Align top
d) Microsoft Windows Explorer
Q.5 To save a file under a different name you should
use....
Q. 2 By Default, How many worksheets available in a
a) Save as b) Save
single Workbook?
a) 3 b) 8 c) Save all d) Save new
Q.6 You would use the indent option when....
c) 255 d) None of above
a) You are in the middle of a document
Q.3 When entering in a lot of text in capitals you should b) You are at the end of the document
use the- c) You are starting a new paragraph
a) Enter key b) Big letter key d) None of the above
c) Num Lock key c) Caps lock key
Q.7 To send the same document addressed to 10 different
people you should use-

www.makemyexam.in www.ibtindia.com Page 32


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

a) Multiple merge b) Mail merge a) End b) Home


c) Merge d) None of the above c) Backspace d) Delete
Q.8 To ensure that you do not lose all of your files you
should always make a Q.17 Which enables you to move directly to specific
a) Back up copy b) Back down location in a document?
c) Back over d) Back under a) Cross-references b) Outlines
b) Subdocuments d) Bookmarks
Q.9 Landscape mode is when the paper is-
a) Taller than it is wider Q.18 How do you add a clip-art picture into your slide in
b) Wider than it is taller. ms pawer-2007?
c) Smaller than normal a) File, insert, picture b) Insert, Picture
d) Bigger than normal b) Insert, Clipart d)Insert, Picture, Clipart

Q.10 The ____ is an area in the top margin of each page Q.19 How do you add animation/ effects to your
in a document where you can insert text or graphics. presentation?
a) Head note b) Top margin a) File, Slide, Animation
c) Footer d) Header b) File, Animation
c) Slideshow, Animation
Q.11 To move a block of text you would use... d) Sideshow, custom animation.
a) Cut and copy e) View, Animation
b) Copy and paste
c) Cut and paste Q.20 Which option can be used to set custom timings for
d) Move block slides in a presentation?
a) Slider Timings b) Slider Timer
Q.12 To see how a spreadsheet will print out, you should c) Slide Show Setup d) Rehearsal.
use-
a) Page overview b) Page preview Q.21 Which key on the keyboard can be used to view
c) Page break d) Look at the page Slide show?
a) F1 b) F2
Q.13 What are the steps to changing the tab color in a c) F5 d) F10
spreadsheet?
a) Right click on the sheet, select the color and Q.22 You can print-
click ok a) An entire workbook
b) Right click on the menu bar, select the color and b) A range of cells by range name
click yes c) A single worksheet
c) Right click on the sheet tab, select tab color, d) All of the above
select the color, click ok
d) Right click and select the color. Q.23 What is the function of the autofit ?
a) Automatically change the width of a column to
Q.14 To keep table headings visible you can use- fit the longest entry or change the height of a row
a) Hold panes b) Line panes to fit the font
c) Freeze panes d) Spreadsheet panes b) A way of arranging data in a particular order
c) A symbol that represents a specific action
Q.15 The values in cells A1 to A5 are all 10. If we used d) None of the above.
the Auto SUM function, what is the value of
=SUM(A1:A5)? Q.24 When creating an Excel formula, what does the cell
a) 5 b) 50 reference with dollar signs like $A$1 do?
c) 500 d) 100 a) Changes the cell format to currency with a dollar
sign as the default
Q.16 Which key deletes the character to the right of the
b) Allows only numbers to be input into the cell
cursor?

www.makemyexam.in www.ibtindia.com Page 33


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

c) Generates an error a) =AVERAGE(B3:B6).


d) Creates an absolute reference. b) =AVE(B3+B4+B5+B6)/4
c) =AVERAGE(B3+B4+B5+B6)/4
Q.25 What does the LEN() function do? d) =AVE(B3:B6)
a) All of the choices
b) Splits the Cell contents Q.34 Which function does not exist in Excel's function
c) Counts the number of characters in a cell library?
d) Deletes Trailing spaces a) Lower b) Proper
c) Upper d)Uppercase.
Q.26 What is the keyboard shortcut for creating a chart
from the selected cells? Q.35 What is the keyboard shortcut for Edit a Cell in MS
A. F11 B. F7 Excel ?
C. F9 D. F3 a) F2 b)F7
c) F3 d)F9
Q.27 The view that puts a blue line around each page that
would be printed is the _____. Q.36 Which of the following formulas would find the sum
a) Print Preview b) Normal of the cells in column J between rows 1 and 8 in an Excel
c) Page Break Preview. d) Split View spreadsheet?
a) =SUM J:1-8
Q.28 The cell reference for a range of cells that starts in b) =J:1+J:8
cell B1 and goes over to column G and down to row 10 is c) =ADD(J1-J8)
_____. d) =SUM(J1:J8)
a) B1-G10 b) B1.G10
c) B1;G10 d) B1:G10 Q.37 What is the short key to enter the current date in a
cell?
Q.29 If you have data that runs across five columns, from a) CTRL+ ; (semicolon.)
column A to column E, one way to centre a title across
b) CTRL+SHIFT+: (colon)
the top of the data would be to:
a) Type the data in A1 and Merge cells A1:A5 c) CTRL+F10
b) Type the data in A1 and Merge cells A1:E1. d) None of these
c) Type the data in C1
Q.38 What is the short key create a new line within a cell?
d) Choose Centre from the Format menu
a) CTRL+ Enter b) Alt + Enter
c) CTRL+F10 d)None of these
Q.30 Which function converts miles to kilometers,
kilograms to pounds, and so on?
Q.39 To format a cell like an already formatted one you
a) Product b) Change
can use --------- .
c) Convert. d)All of above. a) The Fill down command
b) The Format Painter command.
Q.31 You can select the current Row by pressing-
a) Alt spacebar c) The Autosum command
b) Shift + spacebar. d) None of the above.
c) Control + spacebar
Q.40 Which is the part of the Excel screen where you can
d) Shift + Tab
find all the commands or buttons, depending on the tab
you selected before?
Q.32. A function inside another function is called a ____ a) Tab b)Formula Bar
function.
b) Ribbon d)None of the above
a) Complex b)Nested
c) Round d)None of the above
Q.41 You can use an operator to concatenate (join) text
from two cells into one cell. Which operator is that?
Q.33 What is the correct forumla to calculate an average
a) + (Plus) b) $ (Dollar)
between cells B3 and B6?
c) Alt spacebar d) & (ampersand).

www.makemyexam.in www.ibtindia.com Page 34


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

Q.42 To open the Format Cells dialog box, press-


a) Alt + 1 b) Ctrl + 1
c) Ctrl + Shift + 1 d)F1
1a 2a 3d 4c 5a
Q.43 What would be the effect of the formula shown 6c 7b 8a 9b 10d
below in an Excel spreadsheet assuming cells A1 & A2
11.c 12.b 13.c 14.c 15.c
contain numbers?
16.d 17.d 18.c 19.d 20.d
=A1^A2 ( A1=5 and A2=2 )
21.c 22.d 23.a 24.d 25.c
a) Multiply the value in A1 by the value in A2
26.a 27.c 28.d 29.b 30.c
b) A2 is the power of A1
31.b 32.b 33.a 34.d 35.a
c) Change cell values in A1 and A2 to text 36.d 37.a 38.a 39.b 40.c
d) Compare the values in A1 and A2 and display 41.d 42.b 43.b 44.b 45.c
the larger one 46.c 47.c 48.c 49.b 50.c

Q.44. Most database systems make it very easy to create a Q.1. The basic architecture of computer was developed by
database via ? a) John Von Neumann
a) A visual interface b) Charles Babbage
b) A user interface c) Blaise Pascal
c) Tabs d) Garden Moore
d) Speech recognition e) None of these

Q.45 The column that contains the unique identifier is Q. 2 Which of the following is the name of the part of a
referred to as the? computer that one can touch and feel?
a) Secondary key b) Product Key a) Program b)Software
b) Primary Key d) Delete Key c) Hardware d)Output
e) None of these
Q.46 Which tab on the ribbon shows what fonts are
available for use? Q.3 Computers use the __________ number system to
a) View b) Page Layout store data and perform calculations.
c) Home d) Gate a) Decimal b)hexadecimal
c) binary d)octal
Q.47 Using the ribbon, where would you go to activate
the Ruler on your document? Q.4 Which keys can be used together with other keys for
a) View> Toolbars b)File> Open special, tasks?
c) View> Ruler. d)Insert>Reference a) Insert, Delete
b) Ctrl, Shift
Q.48 On what tab can you find the "columns" feature for
your text? c) Left Arrow, Right Arrow
a) Home b) Insert d) Page up, Page Down
c) Page Layout. d) View e) None of these
Q.49 In order to select a single word in Word, how many
times must you click it? Q.5 The capability of the operating system to enable two
a) 1 b) 2 or more than two programs to execute simultaneously in a
c) 3 d) 4 single computer system by using a single processor is
called -
Q.50 Which bar is usually located below that Title Bar a) Multiprocessing
that provides categorized options? b) Multiprogramming
a) Status Bar b) Scroll bar c) Multitasking
c) Menu bar. d) Tool bar d) Multiexecution
e) None of these

www.makemyexam.in www.ibtindia.com Page 35


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

Q.6 The device that allow you to put information into the Q.15 What is the shortcut key you can press to create a
computer are called – copyright symbol?
a) input devices b)output devices a) Alt+Ctrl+C b)Alt + C
c) type devices d)print devices c) Ctrl + C d)Ctrl + Shift + C
e) None of these e) None of these

Q.7 Which application is not typically included in an MS Q.16 What is the process of copying software programs
Office suite? from secondary storage media to the hard disk called ?
(a) configuration b)download
a) word processor b)spreadsheet d) Storage c)upload
c) antivirus d)presentations e) installation
e) None of these
Q.17 The translator program used in assembly language is
Q.8 Portrait and Landscape are called
a) Page Orientation b)Paper Size (a) Compiler b)Interpreter
c) Page Layout d)All of above c) Assembler d)Translator
e) None of these e) None of these

Q.9 Which of the following is not a type of page margin? Q.18 Junk e-mail is also called :
a) Left b)Right (a) spam b) spoof
c) Center d)Top c) sniffer script d) spool
e) None of these e) None of these

Q.10 What is the smallest and largest font size available Q.19 Sending an E-mail is similar to :
in Font Size tool on formatting toolbar? (a) writing a letter
A) 8 and 72 B) 8 and 64 (b) drawing a picture
C) 12 and 72 D) None of above (c) talking on the phone
(d) sending a package
Q.11 IPv6 works on ________bit.
a) 32 b) 64 (e) None of these
b) 16 d) 128
Q.20 When the pointer is positioned on a ................, It is
c) 256
shaped like a hand.
(a) grammar error b)hyperlink
Q.12 Which of the following function key activates the
c) screen tip d)spelling error
speller?
e) formatting error
a) F5 b) F7
Q.21 If you type a word that is not in Word‘s dictionary, a
c) F9 d) Shift + F7 wavy .............. underline appears below the word.
(a) red b)Green
Q.13 Why Drop Caps are used in document?
c) Blue d)Black
a) To drop all the capital letters
e) None of these
b) To automatically begin each paragraph with Q.22 Word processing, spreadsheet and photo-editing are
capital letter examples of ................... .?
c) To begin a paragraph with a large dropped initial (a) application software
capital letter (b) system software
d) None of above (c) operating system software
(d) platform software
Q.14 ................cells involves creating a single cell by (e) None of these
combining two or more selected cells.
(a) Formatting b)merging Q.23 To save an existing file with a new name or to a new
c) Embedding d)Splitting location, you should use the .............. command.
e) None of these (a) Save b)Save and replace

www.makemyexam.in www.ibtindia.com Page 36


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

c) save as d)new file Q.33 Which of the following methods can not be used to
e) None of these edit the contents of a cell?
a) Press the Alt key
Q.24 The copy command saves to : b) Clicking the formula bar
(a) the desktop b)clipboard c) Pressing the F2 key
c) Microsoft Word d)Paste d) Double clicking the cell
e) None of these
e) None of the above
Q.25 By default, Excel positions text in a cell
..................? Q.34 URL stands for –
(a) left – aligned b)right – aligned a) unique Representation Location
c) centered d)justified b) Uniform Resource Locator
e) None of these c) Uniform Resource Location
d) Unique Resource Locator
Q.26 In HTTPs protocol S stands for e) Universal Resource Location
a) Source b)Secure
c) Set d)Simple Q.35 Founder of Artificial Intelligence
e) None of these a) John McCarthy
b) Tim Berners-Lee
Q.27 In order to tell Excel that we are entering a formula c) Douglas Engelbart
in cell, we must begin with an operator such as-
d) Sergey Brin
a) $ b)@
e) Ajay V.Bhatt
c) + d)=
e) #
Q.36 Stack is the _______structure.
Q.28 Who invented the CDC-6600 computer? a) Last in first out (LIFO)
a) Seymour Cray b) First in First out (FIFO)
b) JH Van Tassell c) First in Last out (FILO)
c) Charles Ginsberg d) First come First served (FCFS)
d) Charles Babbage e) None of these
e) None of these
Q.37 Layer one of the OSI model is:
Q.29 The size of commonly used floppy disk is- a) Physical layer b)Link layer
a) 4.5― b)3.5" c) Transport layer d)Network layer
c) 3.25― d)5.5" e) None of these
e) None of these
Q.38 POST stands for_________.
Q.30 Which network protocol is used to send e-mail? a) Power On Selfie Test
a) FTP b)SSH b) Power One Self-Test
c) POP3 d)SMTP c) Power On Self-Test
e) None of these d) Power on Self-Testing
e) Powering On Self-Test
Q.31 How do you display current date only in MS Excel?
a) date () b)Today () Q.39 ____________ is data that has been organized or
c) now () d)time () presented in a meaningful way.
A. A process B. Information
Q.32. Excel displays the current cell address in the ........ C. Software D. Storage
a) Formula bar b)Status Bar
c) Name Box d)Title Bar Q.40 In Excel, Chart are created using which option?
a) Chart Wizard b)Pivot Table
c) Pie Chart d)Bar Chart
e) None of these

www.makemyexam.in www.ibtindia.com Page 37


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

a) .mili b) .mil
Q.41 In Excel on an excel sheet the active cell is indicated c) .edu d).military
by. e) .biz
a) A dark wide border
b) A dotted border Q.50 Which among the following is the Extension of MS
c) A blinking border Access?
d) All of the above a) .txt b) .xls
e) None of these c) .doc d).accdb and .mdb
e) None of these
Q.42 Which of the following is the appropriate format of
URL of email?
a) www_mail.com
b) WWWmail@com
c) www@mailcom
1a 2c 3c 4b 5b
d) www.mail.com
6a 7c 8a 9c 10a
e) None of these
11d 12b 13c 14b 15a
Q.43 A device operating at the physical layer called a 16c 17c 18a 19a 20b
(a) Bridge (b) Router 21a 22a 23c 24b 25a
(c) Repeater (d) All of the above 26b 27d 28a 29b 30d
(e) None of these 31b 32c 33a 34b 35a
36a 37a 38b 39b 40a
Q.44 What shows the contents of active cell. 41a 42c 43c 44d 45d
(a) Name box (b) Row heading 46a 47b 48a 49b 50d
(c) Formula bar (d) Task pan
(e) None of these Q1. Windows Explorer is a _______________?
A. Drive B. Browser
Q.45 Which of the following is not a toggle key
(a) Num lock key (b) Caps lock key C Network D. Data Base
(c) Both (A) & (B) (d) Ctrl key E. File Manager
(e) None of these
2. Which of the following users tunnelling protocols to
Q.46 MS-Excel offers ______ different chart types
(a) 11 (b) 15 securely send private network data over the network?
(c) 20 (d) 25 A. VPN B. WAN
(e) None of these
C. LAN D. GPS
Q.47 Which gate is known as Universal gate? E. MAN
a) AND gate b) NAND gate
c) NOT gate d) XOR gate 3.What is Redhat?
e) None of these
A. Firmware B. Malware
Q.48 _______ is the combination of a scanner and special C. antivirus D. An application software
software which converts the printed or handwritten data to E. Open Source Operating System
ASC II.
a) OCR
b) MICR 4.Usually installation files have the extension
c) OMR ___________?
d) Kimball tag reader A. .jpeg B.gif
e) Other than the given options C. .doc D. .exe
E. .png
Q.49 Which domain name does belong to Military or
Defence organization?

www.makemyexam.in www.ibtindia.com Page 38


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

5. The individual dots that from the image on a monitor D.GB>MB>KB>TB>YB


are called_________________.
A. Bits B. Bytes 13. How many bits in MAC address?
C. Pixels D. Pintes A. 48 bits B. 64 bits
E. None of the above C.128bits D.16bits
E. 32bits.
6. ___________ refers to the unauthorized copying and
distribution of software? 14. Which one is called as modifier key?
A. Software Piracy B. Plagiarism A. Caps Lock key B. Num Lock key
C. Hacking D. Software Literacy C. CTRL key D. Esc key
E. None of these
15. In OSI Model Router used in which layer?
7.EDVAC computer belongs to which Generation? A.Application Layer B.Session layer
A. 1st Gen B. 2nd Gen C.Network layer D. Data link layer
C. 3rd Gen D. 4th Gen E.Physical layer
E. 5th Gen
16. Magnetic disk is coated by?
8. POP stands for____________________ A.Silicon B.Iron oxide
A. Peer to peer Protocols B. Peer to Post Protocol C.Aluminum D.Glass
C. Peer Office Protocols D. Post office Protocols E.None of the above
E. None of these
17. In HTTPs protocol S stands for
9.Which of the following is used for cable network ? A.Source B. Secure
A. VPN B. WAN C.Set D.Simple
C. LAN D. GPS E.None of these
E. MAN
18. If you see #### in a cell the meaning is that –
10. Information travels between components on the A.Row width is low
motherboard through__________? B.Column width is low
A. CMOS B. Buses C.Both row and column width is low
C..Peripherals D. Flash Memory D.Column and row width is high
E.None of the above E. None of these

11.Internet Explorer is a ________________? 19.A computer provides database services to other


A. Drive B. Browser computers,then it will be called as ?
C. Network D. Data Base A. Application server B. Database server
E. File Manager C. File server D.Web server
E. Proxy server
12. Which one is the correct order of memory units-? 20. GUI stands for -
A.TB>MB>YB>GB>KB A.Graphical user Instrument
B.MB>YB>GB>TB>KB B.Graphical unified Interface
C.YB>TB>GB>MB>KB C.Graphical unified Instrument

www.makemyexam.in www.ibtindia.com Page 39


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

D.Graphical user Interface A.0 is written as #, B.1 is written as $,


E.Graphically user Instrument C.2 is written as $#, D.3 is written as $$,so on
21. 1 KB=? Bits-
A.8193 B.8916 28. Which of the following will represent 22?
C.8192 D.1024 A.##$$# B.$#$$$
E.4024 C.$#$## D.$#$$#
22. The copy command saves to: E.None of the above
A. the desktop B. the clipboard
C. Microsoft Word D. Paste 29. Which of the following will represent 53?
E. None of these A.#$$$$# B.$#$##
C.$$#$#$ D.$#$$##
23. Vacuum Tube is the invention ……generation. E.None of the above
A. 1st generation B. 2nd gen
C. 4th gen D. 5th gen 30. Which of the following will represent the value of -(
E. None of these #$$# + $#$$ * #$$ )= ?
A.35 B.36
24. The computer size was very large in ____ C.37 D.38
A. First Generation B.Second Generation E.39
C. Third Generation D. Fourth Generation
E. None of these 31. Which of the following will represent the value of- (
#$#$#$ + $$$$#÷ #$$# )= ?
25. ____ is responsible for overall control and co- A.28 B.57
ordination of instruction execution. C.26 D.55
A. CPU B. ALU E.None of the above?
C. RAM D. Control Unit
E. None of these 32. (3457)8= (?)16
A.725 B.7215
26. Which of the following is the fastest type of C.72F D.72E
computer? E.None of the above.
A. Minicomputer B. Mainframe computer
C. Supercomputer D. Digital computer 33. In NormalizationBCNF is needed because:
E. None of these A.BCNF is need when the Data is deleted tuples may be
lost
27. Find out the technology of third generation? B.Otherwise tuples may be duplicated
Avecuume tube B.trangister C.Updating is otherwise is difficult
C.I.C‘s D.Microprocessor D.When there is dependent attributes in two possible
E.None of the above composite keys one of the attribute is unnecessarily
duplicated in the tuples.
(28-32).In a code language, the symbol for '0' is '#' and for E.None of these
'1' is '$'. Numbers greater than one is to be written only by
using the two symbols that given abovE. Follow some 34. In OSI model Data link layer is dived into -
instruction that are given below - A.MAC and Session layer

www.makemyexam.in www.ibtindia.com Page 40


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

B.MAC and LLC layer C. MICR D. Bar code


C.MAC and Physical layer E. None of these
D.LLC and Transport layer
E. None of the these 41. Who invented Analytical engine?
A. Blaise Pascal B. George Bool
35. 255.255.255.0 subnet mask of which class? C. Charles Babbage D. Dr. Herman Hollerith
A.Class A B.Class B E. None of these
C.Class C D.Class D
E.Class E 42. Memory which forgets everything when you switch
36. __________________ is a set of programs, located at off the power is known as_____.
a network gateway server that protects the resources of a A. Corrupted B. Volatile
private network from other networks: C. Non-Volatile D. Non-Corrupted
A. Root kit B. Firewall E. NonE.
C. Sandbox D. Password Cracker
E. None of these 43. Which of the following code used in present day
computing was developed by IBM Corporation?
37.Which of the following is not an input device? A. ASCII B. Hollerith Code
A. OCR B. Optical scanners C.EBCDIC Code D. Baudot Code
C. Voice recognition device E. None of these
D. COM (Computer Output to Microfilm)
E. None of these 44. An image editing software in which we can draw and
edit images is?
38. Who among the following is the odd one______? A. PageMaker B. MS-Paint
A. Mouse B. Scanner C. Coral Draw D. Photo Image E. Front
C. Printer D. Keyboard
E. None of these 45. Physical components that make up your computer are
known as______.
39. Which is not a storage device? A. Software B. Operating Systems
A. Printer B. CD C. Hardware D. Web Browsers
C. Hard disk D. Floppy Disk E. None of these
E. DVD
46. What is warm booting?
40. ____ ___technologies is used by banks for faster A. When a computer is turned on after it has been
processing of large volumes of cheques. completely shut down.
A. OCR B. OMR B. When a computer is restarted by pressing the restart

www.makemyexam.in www.ibtindia.com Page 41


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

button or pressing (ctrl + Alt + Del) key. 53. A ______is a software program used to view Web
C.A. or B. pages.
D. NonE. A. Site B. Host
C. Link D. Browser
47. Which of the following is a function of Operating E. None of these
System (OS)?
A. Process & Memory Management 54. Micro-programming introduced by_____?
B. File Management A. John Mauchley B. Maurice Wilkies
C. Input/Output Management C. William Shockley D. Blaise pascal
D. All of the above E. None of these

48. Which of the following is an example of Single User 55. Numbers and formulae entered in a cell are called
Operating System? _____.
A. MS-DOS B. Windows 9X A. Labels B. Numeric entries
C.A.&B. D. None C. Intersection D. Text
E. Fellers
49. Which of the following is an example of Multi User 56.TCP /IP protocol stack is –
Operating System? A.Combination of TCP and IP Protocol
A. UNIX B. LINUX B.A Family of protocol that connect to PCs
C. Windows 2000/2007 D.A.&B.&C. C.Part of internet
D.Both b and c
50.MICR stand for? E.None of these
A. Magnetic Ink character Register
B. Magnetic Ink Code Reader 57. When talking of software budget –
C. Magnetic Ink Code Register A.It includes only direct development cost
D. Magnetic Ink character Recognition B.Productivity loss that occurs during IT Training
E. Magnetic Ink cases Reader C.Indirect cost of budget include training cost
D. both a and c
51. Virtual memory is________? E.None
A. Memory on the hard disk that the CPU uses an
extended RAM. 58. Which of the following makes a network insecure?
B. Access the page table A. Encryption B. NIC (Network interface card)
C. CPU generates a physical address C. Static keys D. Either B or C
D. Automatic storage allocation E. None of thesE. E. None of these

52. What is the full form of SIM? 59. Artificial Intelligence can be used in every sphere of
A. Station Identity Module life because of its
B. System Identity Module A.Ability to work in hazardous places
C. Subscriber Identity Module B. Ability to think like human beings
D. Subscriber Trunk Dialing C. Ability to work in artificial environments
E. None of these D. All of the above
E. None

www.makemyexam.in www.ibtindia.com Page 42


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

60. Software Quality assurance is for E. None of these


A. Error prevention B. Error detection
C. Error correction D. Either a or C. 68. To save an existing file with new name at a new
E. None of these. location we should use_______command.
A. Save B. Save and replace
61. IN OOPS technology hiding the complexity of C. Save as D. New file
characteristics is called as – E. None of these
A. Abstraction B. Inheritance
C. Object D. Polymorphism 69. A red wavy line under a word indicates that the
E. Encapsulation word_______.
A. Is too long for the line of text
62. The IP Address 135.0.10.27 belong to the address B. Is not in the dictionary file and therefore might be spelt
class_______? incorrectly
A. Class A B. Class B C. Is not appropriate for that particular sentence
C. Class C D. Class D D. Is a verb
E. Class E E. None of these.

63. Which of the following is not a binary system? 70. Windows xp, windows 7, windows 10 are known
A. EBCDIC B. ASCII as…………….?
C. HEX D. Both a and b A. Processors B. Domain names
E. None C. Modems D. Operating system
E. None of these.
64. 1 AND 1 will give
A.1 B.0 71. _______ is when the more power-hungry components,
C. Both A and B D. 10 such as the monitor and the hard drive are put in idle.
E. None A. Hibernation B. Power down
C. Standby mode D. shutdown procedure
65. Computer to Computer communication for business E. None of these.
transaction is called as- 72. Which of the following is an operating system?
A. PIN B.EDI. A. Linux B. Debugger
C.AIM D.Both a and c C. Mozilla D. Google chrome
E. None E. Intel 8085

66. Fax machines are used to send documents through a? 73. Which of the following cables can transmit data at
A. Telephone line B. Modems high speeds?
C. Co-axial wire D. All of these A. Flat cables B. Coaxial cable
E. None of these C. Optic fiber cable D. Twisted pair cable
E. UTP cable
67. Date and time are available on the desktop 74. What is the base of hexadecimal number system?
at_________. A. 2 B. 8
A. Keyboard B. Recycle bin C. 16 D. 10
C. My computer D. Task bar E. None of these..

www.makemyexam.in www.ibtindia.com Page 43


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

75. RTGS stand for_____. 82. Which of the following is not an operating system?
A. Real Time Gross Settlement A. DOS B. UNIX
B. Real Time General Settlement C. MAC(OS) D. DBMS
C. Run Time Gross Settlement E. Windows XP
D. Regular Time General Settlement
E. None of these 83. One nibble is equal to how many bits?
A. 4 bits B. 8 bits
76. What is the name given to the temporary storage area C. 12 bits D. 16 bits
that a web browser uses to store pages and graphics that it E. None of these
has recently opened?
A. Niche B.Cookies 84. Verification of a Login name and password is known
C. Cache D. Cellar as________.
E. None of these A. Configuration B. Accessibility
C. Authentication D. Logging in
77. Oracle is an example of ______ application software. E. None of these
A. Database B. Word processing
C. Project management D. Presentation graphics 85. Which of the following can be used to select the entire
E. Desktop document?
A. Ctrl+A B.Alt+F5
78. MySQL is_____? C. Shift+A D.Ctrl+K
A. A hierarchical model B. A RDBMS E.Ctrl+H
C. A relational model D. A Database
E. None of these 86. Which of the following will you require to hear music
on your computer?
79. Primary key is a ______? A. Video Card B.Sound Card
A. Common key B. Unique key C. Mouse D.Joy Stick
C. Input key D. Output key E. None of these
E. None of these 87. Layer which converts data frames into bits and also
convert bits into frames is known as……….
80. Which of the following computer language is a A. Data Link Layer B. Transport Layer
mathematically oriented languages used for scientific C. Session Layer D. None
problems?
A. FORTRAN B. COBOL 88. Layer which deals with router..............
C. LISP D. PROLOG A. Network Layer B. Transport Layer
E. APPLE C. Session Layer D. None

81. Which of the following is NOT a computer 89. Layer which manages MAC address ………
programming language? A. Presentation Layer B. Transport Layer
A. C B. C++ C. Session Layer D.Data Link Layer
C. Java D. COBOL
E. Microsoft

www.makemyexam.in www.ibtindia.com Page 44


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

90. Layer which establishes, maintains & terminates a A. Open Software Interrelation
connection while communicating with other client is B. Open System Interrelation
known as……… C. Open System Interconnection
A. Presentation Layer B. Transport Layer D. Open Software Interconnection
C. Session Layer D. None E. None of these

91. Layer which translates data format & deals with 96. USB in data cables stands for?
compression of data and network security is known A. Unicode smart Bus B. Universal structural Bus
as……… C. Unicode Serial Bus D. Universal serial Bus
A. Presentation Layer E. None of these
B. Application Layer
C. Session Layer 97. You must install a (n) ____________ on a network if
D. None you want to share a broadband Internet connection.
A. router B. modem
92. Layer which is the user interface to access the C. node D. cable
network services such as file transfer/ database access is E. None of these
known as………
A. Presentation Layer 98. To reload a web page, press the _____button.
B. Application Layer A. Redo B. Reload
C. Session Layer C. Restore D. Ctrl
D. None E. Refresh

93. A long message that needs to be transmitted is broken 99. ________ mouse uses laser rays for the movement of
into smaller packets of fixed size for error free curser.
transmission is termed as…….. A. Mechanical mouse B. Optical mouse
A. Data Sequencing C. Magnetic mouse D. Normal mouse
B. Flow Control E. None of these
C. Error control
D. None 100. Disk access times are measured in ______?
94. ICMP stands for____________? A. minute B. Milliseconds
A. Internet Control Message Protocol C. Hours D. seconds
B. Internet Connection Management Protocol E. None of these
C. Internet Control Management Protocol
D. None 101. Blaise Pascal has introduced___________?
95. What is the meaning of OSI, in terms of computers? A. Adding machine B. Abacus

www.makemyexam.in www.ibtindia.com Page 45


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

C. Calculator D. difference engine C. FTP client D. Messenger


E. None of these E. None of these

102. Sending an e-mail is similar to _________. 109. When you purchase a product over a Mobile Phone,
A. Petering an event B. Narrating a store the transaction is called_____.
C. Writing a letter D. Creating a drawing] A. Web commerce B. e- commerce
E. None of these C. m-commerce D. Mobile Purchase
E. None of these.
103. You can use the ______bar to type a URL and
display a webpage or type a keyword to display a list of 110. Named collection of fields which represent a
related webpages. complete unit of information is called______.
A. Menu B. Title A. Field B. Record
C. Search D. Web C. Table D. File
E. Address E. None of these

104. A web ______consists of one or more Web pages 111. A __________ is a grid with labeled columns and
located on a Web server. rows.
A. Hub B. Site A. Dialog box B. Worksheet
C. Story D. Template C. Clipboard D. Toolbar
E. None of these E. None of these.

105. __________are used to identify a user who returns to 112. An example of a telecommunication device is
a Website. a________.
A. Cookies B. Plug-ins A. Keyboard B. Mouse
C. Scripts D. ASPs C. Modem D. Printer
E. None of these E. Scanner

106. The _______specifies the operation to be performed 113. Programs that automatically submit your search
and the operands provide the data on which the operation request to several search engines simultaneously are
is to be performed: called______.
A. source code B. opcode A. Metasearch engines B. Webcrawlers
C. object code D. program code C. Spiders D. Hits
E. None of these E. None of these

107. Which of the following is Open Source Software? 114. What kind of Protocol is used to provide Internet
A. Windows B.Linux access from mobile?
C. IOS D. Adobe Photoshop A. TCP/IP B. ISD
E. None of these. C. WAP D. HTTP
E. None of these
108. What is the name of the software that allows us to
browse through web pages called? 115. What is the slowest transmission medium?
A. Browser B. Mail client A. Twisted pair wire B. Coaxial cable

www.makemyexam.in www.ibtindia.com Page 46


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

C. Fiber optic cable D. All of above 122. Which of the following is a network in which
E. None of these computers are located physically close together, often in
the same building?
116. What is an e-mail attachment? A. LAN B. WAN
A. A receipt sent by the recipient C. RAM D. ROM
B. A separate document from another program sent along E. None of these
with an e-mail message
C. A malicious parasite that feeds off of you messages 123. Programs such as Mozilla Firefox that serve as
and destroys the contents navigable windows into the Web are called__________.
D. A list of CC and BCC recipients A. Internet B. Data card
E. None of these C. Web browsers D. RAM
E. None of these
117. The _________program compresses large files into a
smaller file. 124. Start or restart the computer means ___.
A. WinZip B. WinShrink A. exit B. kick
C. WinStyle D. Microsoft C. boot D. kick-start
E. None of above E. None of these

118. The _________folder retains copies of message that 125. You click at B to make the text ________.
you have started but are not yet ready to send. A. Italics B. Underlined
A. Inbox B. Outbox C. Italics and under lined D. Bold
C. Drafts D. Sent Items E. None of these
E. Address Book
126. Each ______ on a menu performs a specific action.
119. Which is not an internet protocol? A. Client B. Server
A. HTTP B. FTP C. Node D. Command
C. STP D. UDP E. None of these
E. None of these
127. An e-mail address typically consists of a user ID
120. What kind of server converts IP addresses to domain followed by the ____ sign and the name of the e-mail
names? server that manages the user‘s electronic post office box.
A. DNS B. MNS A. @ B. #
C. UTP D. RTP C.& D. *
E. None of these E. None of these

121. POST stands for_______. 128. _______are devices used to transmit data over
A. Power OnSelfie Test telecommunications lines.
B. Power One Self-Test A. Drives B. Drives bays
C. Power On Self-Test C. Modems D.Platform
D. Power On Self-Testing E. None of these
E. None of these
129. What is the file extension of MS-Power point?

www.makemyexam.in www.ibtindia.com Page 47


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

A. .exe B. .xls C.Transmission Channel Protocol


C. .ppt D..pst D.Transmission Cross Protocol
E. None of these E.None of the above

130. The information stored in the catalog is called 137.An email feature, which is used to send a copy of an
________. email to one or many other people at the same time that
A. Meta-data B. Mini-world you are sending it to the main recipient/s is called
C. Record D. All of these A.CC B.BCC
E. None of these C.To B.From
E.None of the above
131.Which type of memory holds only the program and
data that the CPU is presently processing? 138. Which of the following uses the handheld operating
A.CMOS B.ROM system?
C.RAM D.Pen Drive A.Supercomputer B.Personal Computer
E.None of these C.Mainframe D.PDA
E.None of the above
132.Pick the odd one-
A.Mouse B.Touch Screen 139.The software that is used to create text based
C.Keyboard D.Scanner documents are referred to as-
E.Light Pen A.DBMS B.Word processors
C.Spreadsheet D.Presentation software
133.Computer Literacy day is celebrated on ____? E.None of the above
A.1 December B.5 December
C.2 December D.5 September 140.__________is the process to detect and remove the
E.8 October errors in software code.
A.Testing B.Compiling
134.Which of the following can only have Sequential C.Debugging D.Programming
Access? E.None of the above
A.Disk B.CD-ROM
C.Tape D.DVD-ROM 141.Computers that control processes, accept data in a
E.None of these continuous.....
A. data traffic pattern B. data highway
135.A Central Computer that holds collections of data and C. infinite loop D. feedback loop
programs for many PC‘s Workstations, and other
computers is a(n) __________ 142. A language reflects the way people think
A.Super computer B.Mini computer mathematically is.....
C.Laptop D.Server A. cross platform programming
E.Palmtop B. functional
C. event driven programming
136.TCP stands for D. 3GL business programming
A.Transmission Control Protocol
B.Telnet Control Protocol

www.makemyexam.in www.ibtindia.com Page 48


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

143. A mistake in an algorithm that causes incorrect A. USB Wireless Network adapter
results is called A.... B. wireless switch
A. logical error B. syntax error C. wireless hub
C. procedural error D. compiler error D. router

144. A device for changing the connection on a connector 151. The connection between your computer at home and
to a different configuration is.... your local ISP is calleD.....
A. a converter B. a component A. the last mile B. the home stretch
C. an attachment D. an adapter C. the home page D. the vital mile

145. Technique that is used to send more than one call 152 ....are attempts by individuals to obtain confidential
over a single line is information from you by falsifying their identity through
A. Digital transmission B. Infrared transmission e-mails.
C. Streaming D. Multiplexing A. Phishing trips B. Viruses
C. Phishing scams D. Spyware scams
146. Which of the following would you find on LinkedIn?
A. Games B. Connections 153. ERP is an acronym for....
C. Chat D. Applications A.Enterprise Relationship planning
B.Enterprise Resource planning
147. The method of Internet access that requires a phone C.Enterprise Reorder planning
line, but offers faster access speeds than dial-up is D.None.
thE.....Connection
A. Cable access 154. Collecting personal information and effectively
B. Satellite access posing as another individual is known as the crime of ..
C. Fiber optic service A. spooling B. spoofing
D. Digital Subscriber Line (DSL) C. hacking D. identity theft

148. ......is a form of denial of service attack in which a 155. Which ports connect special types of music
hostile client repeatedly sends SYN packets to every port instruments to sound cards?
on the server using fake IP addresses. A. BUS B. CPU
A.Cyber crime B. Memory shaving C. USB D. Musical Instrument
C.Synflooding D. Software Piracy D.Digital Interface (MIDI)
156. Where you are likely to find an embedded operating
149. A program either talk or music that is made available system?
in digital format for automatic download over the internet A. On a desktop operating system
B. On a networked PC
is called A.....
C. On a PDA
A. wiki B. broadcast
D. On a Mainframe.
C.vodcast D. podcast
156. Name of the fist computer in India-
150. A USB communication device that supports data A. Sidharth B. Param 10,000
encryption for secure wireless communication for C. CDC-6600 D. C-DAC
notebook users is called A...

www.makemyexam.in www.ibtindia.com Page 49


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

158. Which of the following places the common data


elements in order from smallest to largest? 166. Different components of the motherboard of a PC
A. Bit, byte, character, record, field, file, database
unit are linked together by sets of parallel electrical
B. Database, file, record, field, character
C. Character, file, record, field, database conducting lines. What are these lines called?
D. Character, field, record, file, database A. Conductors B. Buses
C. Connectors D. Consecutive
159. Which protocol provides e-mail facility among
different hosts?
167. Which is the first automatic electronic digital
A. File Transfer Protocol (FTP)
B. TELNET computer?
C. Simple Mail Transfer Protocol (SMTP) A. ENIAC B. MARK I
D. Simple Network Management Protocol (SNMP) C. Z3
D. ABC (Atanasoff –Berry Computer)
160. Which of the following memory is non-volatile? 168. India‘s first supercomputer is
A. DRAM B. SRAM A. Cyber 205 B.Aaditya
C. ROM D. None of the above C.Anupam D. PARAM 8000

161. What is embedded system?


A. The programme which arrives by being wrapped in 169. The metal disks, which are permanently housed in,
box. sealed and contamination free containers are called?
B. The programme which is the permanent part of the A. Hard disks B. Floppy disk
computer C. Winchester disk D. Flexible disk
C. T1he computer which is the part of a big computer.
D. Some combination of computer hardware and
170. What was the name of the first commercially
software.
available microprocessor chip?
162. Which device connects a LAN to the Internet? sA. Intel 308 B. Intel 33
A. Adapter B. Repeater C. Intel 4004 D. Motorola 639
C. Router D. None of the above

163. Signals can be analog or digital and a computer that


processes the both type of signals is known as?
A. Analog computer B. Digital Computer
C. Hybrid Computer D. Mainframe Computer

164. Human beings are referred to as Homo sapiens,


which device is called Silico Sapiens?
A. Monitor B. Hardware
C. Robot D. Computer

165. EBCDIC can code up to how many different


characters?
A. 256 B. 16
C. 32 D. 64

www.makemyexam.in www.ibtindia.com Page 50


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

171. The first digital computer built with IC chips was 178. Computers can be divided into…..major categories.
known as A. Four ( Micro, Mini, Mainframe, Super)
A. IBM 7090 B. Apple - 1 B. Three C. One
C. IBM System / 360 D. VAX - 10 D. None

172. RATS stands for 179. SAN stands for


A. Regression Analysis Time Series A. Storage Area Network
B. Regression Analysis Time Sharing B. Super Array Network
C. Real Analysis Series C. Shared Area Network
D. All of above D. None

173. The magnetic storage chip used to provide non- 180. NAS stands for
volatile direct access storage of data and that have no A. Network Area Service
moving parts are known as B. Network Attached Storage
A.Magnetic core memory C. Network Attached Service
B.Magnetic tape memory D. None
C.Magnetic disk memory
D.Magnetic bubble memory 181. To produce high quality graphics (hardcopy) in
color, ……… is used
174. A computer program that converts an entire program A. RGB monitor B. Plotter
into machine language is called a/an C. Ink-jet printer D. Laser printer
A. Interpreter B. Simulator
C. Compiler D. Commander 182. The scrambling of code is known as
A. Encryption B. a firewall
175. A language translator that analyses and executes the C. Scrambling D. None
source code in-line-by-line manner without looking at the
entire program is called a/an 183. A type of message that web servers pass to your web
A. Interpreter B. Simulator browser when you visit the website
C. Compiler D. Commander A. Cache B. Spam
C. None D. Cookie
176. Who designed the first electronics computer
(ENIAC)? 184. Software that you can use free of charge for a set
A. Von Neumann perioD. After that you have to buy it to keep working is
B. John Eckert & John Mauchly known as
C. Joseph M Jacquard A. Freeware B. Shareware
D. None of the above C. Software D. None

177. A device driver acts like a……. between the device 185. A type of virus (malicious code) that looks for
& OS security loopholes in a system and uses that to replicate
A. inverter B. converter itself is known as
C. translator D. None A. Worm B. Threat
C. Trojan Horse D. None

www.makemyexam.in www.ibtindia.com Page 51


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

186. RAID stands for________ 192. Integrated Circuits (ICs) are related to which
A. Reproduce Array of Intelligent Disks generation of computers?
B. Reproduce Array of Inexpensive Disks A. First generation B. Second generation
C. Redundant Array of Inexpensive Drives C. Third generation D. None
D. Redundant Array of Inexpensive Disks
193. Which type of computers uses the 8-bit code called
187. Software that monitors your online computer EBCDIC?
activities is known as A. Minicomputers B. Microcomputers
A. Malware B. Spyware C. Mainframe computers D. None
C. Freeware D. None
194. The ALU of a computer responds to the commands
188. Software that is made available at no cost and is coming from
sometimes used to entice a user to purchase the A. Primary memory B. Control section
unbranded version with no advertising. C. External memory D. Cache memory
A. Malware B. Spyware
C. Freeware D. None 195. A physical connection between the microprocessor
memory and other parts of the microcomputer is known
189. Which is used to display one or more web pages as
within another normal web page? A. Path B. Address bus
A. IFRAME B. Hyperlink C. Route D. All of the above
C. Home page D. None
196. A technique used by codes to convert an analog
signal into a digital bit stream is known as
190. storage area used to store data to a compensate for A.Pulse code modulationB.Pulse stretcher
the difference in speed at which the different units can C.Query processing D.Queue management
handle data is 197. The terminal device that functions as a cash register,
A. Memory B. Buffer computer terminal, and OCR reader is the?
C. Accumulator D. None A. Data collection terminal
B. OCR register terminal
191. Computer is free from tiresome and boardroom. We C. Video Display terminal
call it D. POS terminal
A. Accuracy B. Diligence
C. Versatility D. None 198. A set of flip flops integrated together is called ____

www.makemyexam.in www.ibtindia.com Page 52


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

A. Counter B. Adder 206. Hard disk is coated on both sides with


C. Register D. None of the above A. Magnetic metallic oxide
B. Optical metallic oxide
199. A register organized to allow moving left or right C. Carbon layer
operations is called a ____ D. All of the above
A. Counter B. Loader
C. Adder D. Shift register 207. The contents of information are stored in
A. Memory data register
200. How many address lines are needed to address each B. Memory address register
machine location in a 2048 x 4 memory chip? C. Memory arithmetic registers
A. 10 B. 11 D. Memory access register
C. 8 D. 12
208. The programs which are as permanent as hardware
201. Multi user systems provided cost savings for small and stored in ROM is known as
business because they use a single processing unit to link A. Hardware B. Software
several C. Firmware D. ROM ware
A. Personal computers B.Workstations
C. Dumb terminals D. Mainframes 209. Which of the following memories must be refreshed
many times per second?
202. The difference between memory and storage is that A. Static RAM B. Dynamic RAM
memory is ___ and storage is __ C. EPROM D. ROM
A. Temporary, permanent
B. Permanent, temporary 210. In which mode, the communication channel is used
C. Slow, fast in both directions at the same time?
D. All of the above A. Full-duplex B. Simplex
C. Half-duplex D. None of the above
203. Which of the following is the first computer to use 211. Which of the printers used in conjunction with
Stored Program Concept? computers uses dry ink powder?
A. UNIVAC B. ENIAC A.Daisy wheel printer B. Line printer
C. EDSAC D. None of above C. Laser printer D. Thermal printer

204. 1 nibble equals to 212. Daisy wheel printer is a type of


A. 1 bits B. 2 bits A. Matrix printer B. Impact printer
C. 4 bits D. 8 bits C. Laser printer D. Manual printer

205. The most commonly used standard data code to 213. Which of these is considered intelligent CASE tool?
represent alphabetical, numerical and punctuation A. Workbench B. Toolkit
characters used in electronic data processing system is C. Upper CASE D. Lower CASE
called
A. ASCII B. EBCDIC 214. Origin of internet can be tracked from
C. BCD D. All of the above A. Satellite networks B. Radio networks

www.makemyexam.in www.ibtindia.com Page 53


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

C. ARPANET (Advanced Research Projects Agency 222. Browsers can be classified into two types. They are
Network) A. Graphical & Text B. Graphical & Navigational
D. None C. Text & Pictorial D. None

215. System proposal is prepared in ……phase of SDLC. 223. The displayed data over internet can be classified
A. Conception B. Initiation into two types. They are
C. Analysis D. Design A. Static & Dynamic B. Graphical &Text
C. Data & Voice D. None
216. A data warehouse
A. Contains numerous naming conventions and formats 224.Which is an open source development environment to
B. Is organized around important subject areas develop dynamic web pages?
C.Contains only current data A. PHP (Hypertext Preprocessor) B. XML
D.None C. VB Script D. None

217. To connect networks of similar protocols, ……..are 225. A protocol that allows a user to log on to a remote
used computer which is also known as remote login is…..
A. Routers B. Gateways A. FTP B. Telnet
C. Bridges D. None C. HTTP D. None

218.……….. is one reason for problems of data integrity 226. A set of rules that enables a user to log on to another
A. Data availability constraints computer and transfer information between it & his/ her
B. Data inconsistency computer.
C. Data redundancy A. HTTP B. FTP
D. None C. WWW D. None

219. Which of the following is an advantage of mounting 227. PSTN stands for
an application on the web? A. Public Switched Transformation Network
A. the possibility of 24-hour access for users B. Public Switched Telephone Network
B. creating a system that can extend globally C. Public Serviced Telnet Network
C. standardizing the design of the interface D. None
D. All of these

220. Which of the following domains is used for profit


businesses?
A. .com B. .edu
C. .net D. None

221. Which of the following domains is used for non-


profit organizations?
A. .org B. .edu
C. .net D. None

www.makemyexam.in www.ibtindia.com Page 54


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

228. Home Page is also known as A. Open Source B. Public Domain


A. Index Page B. Front Page C. Commercial D. None
C. Back Page D. None
236. A coding language that is compatible with windows
229. GPRS stands for servers which is used for increased functionality on a
A. Global Packet Radio Service website or to work with a database
B. Global Positioning Radio Service A. HTML B. ASP
C. General Packet Radio Service C. XML D. None
D. None
237. A code that represents English characters as numbers
230. GSM stands for and ranging from 0 to 127.
A. Global System for Mobile A. ASCII B. EBCDIC
B. Global Service for Mobile C. BCD D. All of above
C. Global System for Mobile communication
D. None 238. An email feature, which is used to send a copy of an
email to one or many other people at the same time that
231. TCP stands for you are sending it to the main recipient/s is called
A. Transmission Control Protocol A. CC B. BCC
B. Telnet Control Protocol C. To D. None
C. Transmission Channel Protocol
D. None 239. An email feature which is used to send someone a
BCC email, their email address will not show in the "to"
232. Proprietary Software is also called as field
A. Closed Source Software A. CC B. BCC
B. Open Source Software C. CC & BCC D. None
C. Commercial Software
D. None 240. GUI stands for
A. Graphic Uninstall/Install
233. A product that is owned exclusively by a single B. Graphical User Interface
company that can only function properly, if it is used with C. General Utility Interface
other products owned by the same company? D. None
A. Proprietary Software
B. Public Domain Software 241. A….. is a design tool that graphically shows the
C. Commercial Software logic in a solution algorithm.
D. None A. Hierarchy Chart B. Flow Chart
C. Structure Chart D. None
234. Which of the following activity can be termed as
software piracy? 242. Programs designed to perform specific tasks related
A. Soft loading B. Counterfeiting to managing computer resources are called
C. Renting D. All of these A. System Software B. Utility Software
C. Application Software D. None
235. Linux is a type of ……….. Software

www.makemyexam.in www.ibtindia.com Page 55


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

243.A ….. contains buttons & menus that provide quick 250. Which of the following format for storing & backing
access to commonly used commands. up computer data on tape that evolved from Digital Audio
A.menubar B. toolbar Tape (DAT) technology?
C. window D. None A. Data Aggregation B. Digital Data Storage
C. Virtual Tape System D. None
244. What is the split – MAC Architecture?
A. The split-MAC architecture uses MAC addresses to 251. The two basic parts of URLs are
create a forward/filter table and break up collision A. TCP & IP B. the protocol & the domain name
domains. C. TCP & FTP D. None
B. The split-MAC architecture uses MAC addresses to
create a forward/fliter table 252. The storage locations in the internal storage of a
C. Both A.&B. CPU is called
D. None A. reference points B. addresses
C. locations D. None
245. In …..normal form, all non-key fields of data
structure are dependent on the whole key. 253. ATM machines run ……. OS
A. First B. Second A. Open Source B. Closed Source
C. Third D. None C. embedded D. None

246. Which of the following are tasks that may be 254. The fraudulent practice of sending emails purposing
completed when configuring your e-mail client? to be from reputable companies in order to induce
A. Provide the IP address of your ISP‘s mail server individuals to reveal personal information(Credit & Debit
B. Provide the name of your e-mail account card details) is called
C. All of these A. Hot swapping of devices B. Pharming
D. None of these C. Phishing D. None

247. A pixel is a…… 255. NIC stands for


A. picture element or dot on a screen A. Network Internal Card
B. point of ink on a laser printed page B. Network Interconnection Channel
C. point of ink on an ink jet printed page C. Network Interface Card
D. None D. None

248. Expansion cards are inserted into 256. ---- Is the Virus that overwrites the files or a few
A. CPU B. Slots parts being replaced?
C. Peripheral devices D. None A. Virus B. File infectors
249.…….. is a communication technology used by some C. worm D. None
incoming mail servers.
A. TCP B. POP3
C. FTP D. None 257. An Internet service that translates domain names to
the IP addresses is called
A. CMS B. ASP
C. DNS D. None

www.makemyexam.in www.ibtindia.com Page 56


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

258. A hacker installs malicious code on a personal 265. The unauthorized activities of malicious software is
computer or server. This code then redirects clicks you called
make on a Web site to another fraudulent Web site A. Pharming B. Payload
without your consent or knowledgE. It is known as…. C. Phishing D. None
A. Phishing B.Smishing
266. Unauthorized access to restricted systems or
C. Pharming D. None
resources is referred as
A. Pharming B. Penetration
259. The act of using the telephone in an attempt to scam C. Phishing D. None
the user into surrendering private information that will be
used for identity theft. 266. Which Key is used for editing a cell?
A. Pharming B.Smishing A. F2 B. F5
C.Vishing D. None C. F3 D. F4

260. A type of phishing attack where mobile phone users 268. Unauthorized access to information by using a
receive text messages containing a Web site hyperlink is terminal that is already logged on with an authorized ID is
called called
A. Piggybacking B. Penetration
A. Pharming B.Smishing
C. Phishing D. None
C.Vishing D. None
269. Any deliberate damage to operations or equipments
is called
261. The creation of Internet Protocol (IP) packets with a
A. Piggybacking B. Sabotage
forged source IP address, with the purpose of concealing
C. Phishing D. None
the identity of the sender or impersonating another
computing system is called …………..
270. Sending large numbers of unwanted e-mail messages
A. Pharming B. Spoofing
to a single recipient or to a group of such recipients is
C.Vishing D. None
termed as
A.Logic bomb B. Mail bombing
262. A malware program that can be used by a black hat
C. Time bomb D. None
cracker to remotely take control of a system for further
attacks like spam emails or Denial of Service attacks,
271. Malicious modification or destruction of data such as
without a user‘s knowledge is called……
changing information on Web sites is called
A. Zombie B. Spoofing
A. Super zapping B. Vandalism
C.Vishing D. None
C. Spamming D. None

263. Ethical hackers who use their skill to secure the


272. Overwhelming or saturating resources on a target
integrity of computer systems or networks is called
system to cause a reduction of availability to legitimate
A. Black Hat B. White Hat
users is termed as
C. Green Hat D. None
A.DistributedDoS attack
264. Spam over instant messenger is called spim while
spam over Internet telephony is known as B. Denial of Service (DoS) attack
A. Malware B. Spit C. Data Diddling
C. Pharming D. None D. None

www.makemyexam.in www.ibtindia.com Page 57


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

273. Creating a false identity using someone else‘s 279. A method in which multiple communication devices
identifying information Computer Questions Thinking of are connected to one another efficiently is known as……
Gov. Job Think IBT A. Switching B. Redundancy
A.DistributedDoS attack C. Capacity D. None
B. Identity Theft
C. Data Diddling 280. What is considered as the 'backbone' of the World
D. None Wide Web?
A. URL B. HTML
274. A program or batch file that waits for a specific time C. HTTP D.None
before causing damage is……
A.Logic bomb 281. MIME stands for
B. Time bomb A. Multipurpose Internet Mail Extension
C. Mail bombing B. Multicasting Internet Mail Extension
D. None C. Multiple Internet Mail Extension
D. None
275. A method for exploiting a vulnerability to take
control of a system or otherwise compromise it is termed 282. FPI stands for____
as……. A. Figure per inch
A.Logic bomb B. Frames per inch
B. Exploit C. Faults per inch
C. Mail bombing D. None
D. None
283. The process of analyzing large data sets in search of
276. The most widely used type of database management new, previously undiscovered relationships is known as:
system is the A. data mining
A. Flat databasE. B. data marting
B. Network databasE. C. data maintenance
C. Relational database D. data warehousing
D. Hierarchical databasE.
284. Collection of interrelated data and set of program to
277.IBM 370 belongs to which generation? access them is called
A. 1st generation B.2nd generation A. Database
C. 3rd generation D.4th generation B. Database Management System
E.None of the above C. Data Structure
D. data warehousing
278. Which of the following will connect you to the
Internet? 285. A repository of data that is designed to serve a
A.HTTP particular community of knowledge workers is called
B. Internet service provider A.datamart
C. A network connection B. data maintenance
D. None C. data warehousing

www.makemyexam.in www.ibtindia.com Page 58


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

D. None C. Carrier Sense Multiple Access with Collision


Detection
286. Keys that are used in combination with some other D. None
key, they have been programmed to perform certain tasks
is called 293. A……is required at each end to absorb the signal so
A. Function keys B. Alphanumeric keys that it does not reflect back across the bus.
C. Modifier keys( Alt, Ctrl)D. None A. gateway B. terminator
C. bridge D. None
287. Which is used to connect a computer to the cabling
used in LAN? 294. Bus Topologies can be classified into two types. It
A. Network Interface Card includes
B. Router A. Regular Bus B. Local Bus
C. Modem C. Both A.&B. D. None
D. None
295. A list of rules for transferring data over a network is
288. A device that regenerates the signal transmitted on a called?
cable in a network is called A. Protocol B. Program code
A. Repeater B. Router C. Rules D. None
C. Bridge D. None
289. A networking device that is used to receive signals 296. Star topologies are normally implemented using a
from one Computer & transmit them on to other A. Unshielded Twisted Pair cable
computers in a network is called…….. B. Twisted Pair cable
A. Repeater B. Hub C. Fiber Optic Cable
C. Bridge D. None D. None

290. An intelligent Hub that has the ability to determine 297. A set of stations connected serially by cable is
the destination of a packet sent across the network is known as
called……… A. Star topology B. Bus topology
A. Repeater B. Switch C. Ring topology D. None
C. Bridge D. None
298. OSI stands for
291. A most Sophisticated relay device used in a network A. Open Systems Interconnection
that can be used to interconnect systems with different B. Open Source Interconnection
protocols, formatting languages and architecture is C. Open Service Interconnection
called……… D. None
A. Gateway B. Switch
C. Bridge D. None 299. Layer which deals with the transportation of binary
data and defines cable & electrical specifications is
292. CSMA/CD stands for known as……….
A. Carrier Sense Multiple Access with Correction A. Data Link Layer
Detection B. Physical Layer
B. Code Sense Multiple Access with Collision Detection C. Session Layer

www.makemyexam.in www.ibtindia.com Page 59


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

D. None A. Password Attacks


B. IP Spoofing
300. IDRP stands for C. Identity Theft
A. ICMP Repeater- Discovery Protocol D. None
B. ICMP Router- Discovery Protocol
C. IDRP Router- Discovery Protocol 307. What is Real Time Operating System (RTOS)?
D. None A. More than one processes can be executed concurrently.
B. Processing is done with a time constraint
301.RSS Stands for C. A type of OS which do not interact with a computer
A. Rich Site Summary directly.
B. Really Simple Syndication D.An OS which use multiple central processors to serve
C.A. or B. multiple real time applications.
D. None
308. What is Batch Processing Operating System
302. What is the full form of UDP? (RTOS)?
A. Upper Divisional Protocol A. More than one processes can be executed concurrently.
B. User Datagram Protocol B. Processing is done with a time constraint
C. Under Divisional Protocol C. A type of OS which do not interact with a computer
D. None directly.
D.An OS which use multiple central processors to serve
303. An Interface refers to a specification by which multiple real time applications.
programs can communicate with a web server is called
A. Graphical User Interface (GUI) 309. What is Distributed Operating System (RTOS)?
B. Musical Instrument Digital Interface (MIDI) A. More than one processes can be executed concurrently.
C. Common Gateway Interface (CGI) B. Processing is done with a time constraint
D. None C. A type of OS which do not interact with a computer
directly.
304. VoIP stands for D.An OS which uses multiple central processors to serve
A. Video Over Internet Protocol multiple real time applications.
B. Voice Over Internet Protocol
C. Voice On Internet Protocol 310. Core of the OS which supports the process by
D. None dividing a path to peripheral devices?
A. Kernel B. Shell
305. The two application protocols most commonly C. Fork D. None
associated with
A. Network File System (NFS) 311. The program which interprets commands given by
B. Common Internet File System (CIFS) the user?
C. Both A.&B. A. Kernel B. Shell
D. None C. Fork D. None

306. An attacker outside your network pretends to be a 312. A system call of OS which is used to create a new
part of your network or legal terminal is called… process is known as?

www.makemyexam.in www.ibtindia.com Page 60


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

A. Kernel B. Shell 321. What is the default size of the data type in MS
C. Fork D. None Access?
A. 50 B. 60
313. A process which is not executing due to any waiting C. 70 D. None
event is called?
A. Kernel B. Shell 322.……. means that the data contained in a database is
C. Deadlock D. None accurate & reliable
A. Data redundancy B. Data integrity
314. Which provides an interface between process & OS? C. Data consistency D. None
A. Kernel B. System Calls
C. Deadlock D. None 323. The smallest unit of information about a record is
called a……
315. User Interface can be divided into two types. They A. cell B. field
are C. record D. NonE.
A. Graphical User Interface
B. Character User Interface 324. Which combines efficient implementation techniques
C.A.&B. that enable them to be used in extremely large database?
D. None A. Data Mining
B. Data Manipulation
316. which one of the following is an MS-DOS external C. Data reliability
command? D. NonE.
A. COPY B. FORMAT
C. DIR D. None 325. A program that generally has more user-friendly
interface than a DBMS is called a
317. In Windows ME, what does ME stands for? A. back end
A. Micro-Expert B. Millennium-Edition B. front end
C. Multi-Expert D. None C. form
D. NonE.
318.In OSI architecture, the routing algorithm is
performed by 326. A collection of conceptual tools for describing data,
(A) Data Link Layer (B) Network layer relationships, semantics & constraints is referred as….
(C) Physical layer (D) Transport layer A. data model
(E) None of these B. ER model
C. DBMS
319. There are a total of……….actions button in D. NonE.
PowerPoint.
A. 12 B. 15 327..Dr.EFCodd represented……. rules that a database
C. 18 D. None must obey if it has to be considered truly relational.
A. 4 b B. 8
320. Attributes can be defined for C. 12 D. NonE.
A. pages B. entity
C. macro D. None 328.…….. is one reason for problems of data integrity

www.makemyexam.in www.ibtindia.com Page 61


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

A. Data availability constraints B. WAN>MAN>LAN


B. Data redundancy C. LAN>MAN>WAN
C. Data reliability D. MAN<LAN<WAN
D. NonE. E. None

329. ………provides total solutions to reduce data 336. An E-R diagram is a graphic method of presenting
redundancy, inconsistency, dependence & unauthorized A. entity classes & their relationships
access of data. B. primary keys & their relationships
A. Table C. primary keys & their relationships to instances
B. Protection password D. NonE.
C. Data reliability
D. None. 337. An entity set that does not have sufficient attributes
to form a primary key, is a…..
330…….. are distinct items that don‘t have much A. primary entity set
meaning to you in a given answer B. weak entity set
A. Fields B. Data C. simple entity set
C. Queries D. None. D. NonE.

331. A collection of related files is called……….. 338. A computer checks …….. of username & password
A. field B. record for a match before granting access.
C. database D. None. A. website B. network
C. database D. None.
332. A logical schema
A. is the entire database 339. ….. is a primary key of one file that also appears in
B. is a standard way of organizing information into another file?
accessible part A. Physical key B. Foreign key
C.A.&B. C. Logical key D. None.
D. NonE.
340. Key to represent relationship between tables is called
333. To locate a data item for storage is A. Physical key B. Foreign key
A. field B. fetch C. Logical key D. NonE.
C. feed D. NonE.
341.In a relational database, a data structure that
334..Find out the perfect pair of input devices? organizes the information about a single topic into rows &
A. keyboard, touch screen, mouse columns, is….
B. Mouse, Fax Machine, Light Pen A. block B. record
C. Light Pen, Keyboard, Joysticks. C. tuple D. table
D.Keyboard, Mouse, Digital Camera
C. None of thesE. 342. Hub is associated with…….. network
A. bus B. ring
335.Which one is true according to speed? C. star D. mesh
A. LAN>WAM>MAN

www.makemyexam.in www.ibtindia.com Page 62


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

343.Multiplexing involves…….path and…. channel A.Mesh B. Ring


A. single path & multiple channel C. Bus D. None
B. Single path & single channel
C. multiple path & multiple channel 352. Telnet is………based computer protocol
D. mesh A. sound B. image
C. text D. None
344. P2P is a……application architecture
A. distributed B. client/server 353. through………an administrator or another user can
C. 1-tier D. None access someone else‘s computer remotely.
A. Web server B. Web application
345. In OSI architecture, the routing is performed by C. telnet D. None
A. network layer
B. data link layer 354. How many ways you can save a document?
C. transport layer A. 5 B. 4
D. None C. 3 D. None

346. Which of the following is considered a broad band 355. The maximum zoom % in MS Power Point is…….
communication channel? A. 400 B. 100
A. Coaxial Cable C. 200 D. None
B. Fiber Optics Cable
C. Microwave Circuits 356. In Excel, charts are created using which option?
D. All of these A. Pie Chart B. Chart Wizard
C.Bar Chart D. None
347. How many bits are there in the Ethernet address?
A. 48 bits B. 64 bits 357. In order to include picture data type must be?
C. 16 bits D. None A. OLE B. hyperlink
C.A. or B. D. None
348. Ethernet, token ring and token bus are types of
A. LAN B. WAN 358. A…….. is the term used when a search engine
C. MAN D. None returns a web page that matches search criteria
A. blog B. hit
349. Which of the following items is not used in LANs? C. link D. None
A. Interface card B. cable
C. computer D. Modem 359. Which is required to create an html document?
A. Internet B. text editor
350. which is the name of the network topology in which C. Browser D. None
there are bidirectional links between each possible nodes?
A. Mesh B. Ring 360. Which of the following will be used if a sender of e-
C. Bus D. None mail wants to bold, italics etc, the text message?
A. Rich text B. Rich signature
351. An alternate name for the completely interconnected C. Reach format D. None
network topology is

www.makemyexam.in www.ibtindia.com Page 63


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

361. Which stores information about the user‘s web 368. Which one of the following is a cryptographic
activity? protocol used to secure http concession?
A. Spam B. Cookie A. Transport Layer Security
C. Cache D. None B. Explicit Congestion Notification
C. Resource Reservation Notification (RRN)
362. Each IP packet must contain D. None
A. Source address B. destination address
C.A.&B. D. None 369. Which of the following inputs a computer‘s memory,
but unlike a virus, it does not replicate itself?
363. Vendor-created program modifications are called— A. Trojan Horse B. Logic bomb
—— C. Firewall D. None
A. patches B. antiviruses
C. holes D. None 370. Which one of the following is a key function of
firewall?
364. If your computer rebooting itself then it is likely that A. Monitoring B. deleting
A. It has a virus C. moving D. None
B. It does not have enough memory
C. There has been a power surge 371. The load instruction is mostly used to designate a
D. None transfer from memory to a processor register known as
A. Program counter B. instruction register
365. The …….. of a Threat measures its potential impact C. accumulator D. None
on a System
A. vulnerabilities B. degree of harm 372. The most frequently used instructions of a computer
C. susceptibility D. None program are likely to be fetched from
A. cache B. cookie
366. A digital signature is C. main memory D. None
A. scanned signature
B. encrypting information 373. Arithmetic Logic Unit(ALU) and control sections
C. signature in binary form have special purpose locations called
D. None A. secondary memory B. registers
C. accumulator D. None
367. A firewall operated by
A. the pre-purchase phase 374.Who was the Inventors of Computer Chip (IC)
B. isolating intranet from extranet A.Jack Kilby B.Robert Noyce
C. screening packets to/from the network & provide C.Jack Kilby and Robert Noyce D.John McCarthy
controllable filtering of network traffic. E.Martin Cooper
D. None

www.makemyexam.in www.ibtindia.com Page 64


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

375.Gigabyte represents approximately A.Last in first out (LIFO)


______________memory locations. B.First in First out (FIFO)
A.one billion B.one million C.First in Last out (FILO)
C.one trillion D.two million D.First come First served (FCFS)
E.none of the above E. None of these

376.In a worksheet lines between cells are called 380. Which layer is reasonable for the user interface?
as____________. A.Physical Layer B.Application Layer
C.Data Link Layer D.Network Layer
A.Cross lines B.Gridlines E.Session Layer
C.Parallel lines D.Adjacent
E.None of thesE. 381.A __________ network has a central (hub) computer
that is responsible for managing the network
377.EDVAC stands for_____________. A.star B.ring
A.Electronic Disc Variable Automatic Computer C.Bus D.Mesh
B.Electronic Discrete Variable Automatically Computer
E.None of the above
C.Electronic Discrete Variable AutomaticComputer
D.Electronic Discrete Versatile Automatic Computer
382. IPv6 works on ________bit.
A.32 bit B.64 bit
378. Binary equivalent to 87 is:
C.16 bit D.128 bit
A.1010111
E.256 bit
B.1101111
C.1011111
383..How many maximum columns insert in MS word
D.10111111
table?
A.32 B.61
C.63 D.65
E.67

384. AND gate output with three inputs, A, B, and C, is


HIGH when ________.
A. A = 1, B = 1, C = 0
B. A = 0, B = 0, C = 0
C. A = 1, B = 1, C = 1
D. A = 1, B = 0, C = 1
E. A = 0, B = 1, C = 1

385. Which one of the following image represents a NOR


gate?
E.None of these
A.
379. Stack is the ____________________structure.

www.makemyexam.in www.ibtindia.com Page 65


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

A.AND Gate B.OR Gate


C.NOT Gate D.NOR Gate
E.None of the above
391. Convert (577)8 = (?) 16
B.
A.17F B.16E
C.17E D.15D
E.16F
392. Convert (111111110010)2 = (?)16
C.
A. (EE2)16

B. (FF2)16

C. (2FE)16
D.
D. (FD2)16

E. None of these

386. What will be the one‘s complement of (10101)


A.01010 B.11111 393. Convert (8B3F)16 = (?)2
C.00010 D.11000 A. 35647
E.10100
387. What will be the two‘s complement of (10101) B. 011010
A.01010 B.11111
C. 1011001111100011
C.01011 D.11000
E.10100 D. 1000101100111111
388. Which of the following represent Associative Law?
A.(A.B).C = A.(B.C) E. 1001111110011000
B.(A.B).C = A.C + A.B
C.A.B=B.A
394. Father of 'C' programming language_________.
D.A.(B.C) = A.B + A.C
A. Dennis Ritchie B. Prof Jhon Kemeny
E.None of the above
C. Thomas Kurtz D. Bill Gates
E. None
389. How many Keywords available in ‗C‘ Language?
A.25 B.23
395. Which of the following is not a method of accessing
C.32 D.36
the web?
E.39
A. modem B. ISDN
C. DSL D. CPU
390. Result of this given the image is equal to ------
E. None of these

396. Yahoo (www.yahoo.com) is a _________.


A. Website for Consumers

www.makemyexam.in www.ibtindia.com Page 66


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

B. Portal
C. Organization that allocates web addresses 400. Which memory is used to store the data untill the
D. Super Computer light is on __________?
E. None of these. A. RAM B. ROM
C. PROM D. CACHE
397. Time during which a job is processed by the E. None of these
computer is___.
A. Execution Time B. Delay Time
C. Real Time D. Waiting Time
E. None of these

398. Internet Explorer is a _____.


A. Web Browser
B. Graphing Package
C. News Reader
D. Any person browsing the net
E. None of these

399. 1st microprocessor in the world _______ .


A. 8085 B. 8086
C. I-4004 D. 8286
E. None of these

1 (E) 2 (A) 3E 4 (D) 5 (C) 6 (A) 7 (A) 8 (D) 9 (E) 10 (B)


11 (B) 12 (C) 13 (A) 14 (C) 15 (C) 16 (B) 17 (B) 18 (B) 19 (B) 20 (D)
21 (C) 22 (B) 23 (A) 24 (A) 25 (D) 26 (C) 27 (C) 28 (D) 29 (C) 30 E
31 (C) 32 (C) 33 (D) 34 (B) 35 (C) 36 (B) 37 (D) 38 (C) 39 (A) 40 (C)
41 (C) 42 (B) 43 (A) 44 (C) 45 (C) 46 (B) 47 (D) 48 (A) 49 (D) 50 (D)
51 (A) 52 (C) 53 (D) 54 (B) 55 (B) 56 (D) 57 (D) 58 (C) 59 (D) 60 (C)
61 (A) 62 (B) 63 ( C) 64 (A) 65 (B) 66 (A) 67 (D) 68 (C) 69 (B) 70 (D)
71 (C) 72 (A) 73 (A) 74 (C) 75 (A) 76 (B) 77 (A) 78 (B) 79 (B) 80 (A)
81 (E) 82 (D) 83 (A) 84 (C) 85 (A) 86 (B) 87 (A) 88 (A) 89 (D) 90 (C)
91 (A) 92 (B) 93 (B) 94 (C) 95 ( C) 96 (D) 97 (A) 98 (E) 99 (B) 100 (B)
101 (A) 102 (C) 103 (C) 104 (B) 105 (A) 106 (B) 107 (B) 108 (A) 109 (C) 110 (B)
111(B) 112 (C) 113 (A) 114 (C) 115 (A) 116 (B) 117 (A) 118 (C) 119 (C) 120 (A)
121 (C) 122 (A) 123 (C) 124 (C) 125 (D) 126 (D) 127 (A) 128 (C) 129 (C) 130 (A)
131 (C) 132 (B) 133 (C) 134 (C) 135 (D) 136 (A) 137 (A) 138 (D) 139 (B) 140 (A)

www.makemyexam.in www.ibtindia.com Page 67


Computer Capsule– SBI,IBPS PO,RRB & Clerk Mains Exam

141 (D) 142 (B) 143 (A) 144 (D) 145 (D) 146 (B) 147 (D) 148 (C) 149 (D) 150 (A)
151 (A) 152 (A) 153 (B) 154 (D) 155 (D) 156 (C) 157 (A) 158 (D) 159 (C) 160 (C)
161 (D) 162 (C) 163 (C) 164 (D) 165 (A) 166 (B) 167 (D) 168 (D) 169 (C) 170 (C)
171 (C) 172 (A) 173 (D) 174 (C) 175 (A) 176 (B) 177 (C) 178 (A) 179 (A) 180 (B)
181 (B) 182 (A) 183 (D) 184 (B) 185 (A) 186 (D) 187 (B) 188 (C) 189 (A) 190 (B)
191 (B) 192 (C) 193 (C) 194 (B) 195 (B) 196 (A) 197 (D) 198 (C) 199 (D) 200 (B)
201 (C) 202 (A) 203 (C) 204 (C) 205 (A) 206 (A) 207 (A) 208 (C) 209 (B) 210 (A)
211 (C) 212 (B) 213 (A) 214 (C) 215 (B) 216 (B) 217 (C) 218 (A) 219 (D) 220 (A)
221 (A) 222 (A) 223 (A) 224 (A) 225 (B) 226 (B) 227 (B) 228 (A) 229 (C) 230 (C)
231 (A) 232 (A) 233 (A) 234 (D) 235 (A) 236 (B) 237 (A) 238 (A) 239 (B) 240 (B)
241 (B) 242 (B) 243 (B) 244 (A) 245 (B) 246 (A) 247 (A) 248 (B) 249 (B) 250 (B)
251 (B) 252 (B) 253 (C) 254 (C) 255 (C) 256 (B) 257 (C) 258 (C) 259 (C) 260 (B)
261 (B) 262 (A) 263 (B) 264 (B) 265 (B) 266 (B) 267 ( ) 268 (A) 269 (B) 270 (B)
271 (B) 272 (B) 273 (B) 274 (B) 275 (B) 276 (C) 277 (C) 278 (B) 279 (A) 280 (C)
281 (A) 282 (B) 283 (A) 284 (A) 285 (A) 286 (C) 287 (A) 288 (A) 289 (B) 290 (B)
291 (A) 292 (C) 293 (B) 294 (C) 295 (A) 296 (A) 297 (C) 298 (A) 299 (B) 300 (B)
301 (C) 302 (B) 303 (C) 304 (B) 305 (C) 306 (C) 307 (B) 308 (C) 309 (D) 310 (A)
311 (B) 312 (C) 313 (C) 314 (B) 315 (C) 316 (B) 317 (B) 318 (B) 319 (A) 320 (B)
321 (A) 322 (B) 323 (B) 324 (A) 325 (C) 326 (A) 327 (C) 328 (A) 329 (B) 330 (B)
331 (B) 332 (A) 333 (B) 334 (C) 335 (C) 336 (A) 337 (C) 338 (B) 339 (B) 340 (B)
341 (D) 342 (C) 343 (A) 344 (B) 345 (A) 346 (D) 347 (A) 348 (A) 349 (D) 350 (A)
351 (A) 352 (C) 353 (C) 354 (C) 355 (A) 356 (B) 357 (A) 358 (B) 359 (B) 360 (A)
361 (B) 362 (C) 363 (A) 364 (A) 365 (B) 366 (B) 367 (C) 368 (A) 369 (B) 370 (A)
371 (C) 372 (A) 373 (B) 374 (C) 375 (A) 376 (B) 377 (B) 378 (A) 379 (A) 380 (B)
381 (A) 382 (D) 383 (C) 384 (C) 385 (B) 386 (A) 387 (C) 388 (A) 389 (C) 390 (A)
391 (A) 392 (B) 393 (D) 394 (A) 395 (D) 396 (A) 397 (A) 398 (A) 399 (C) 400 (A)

www.makemyexam.in www.ibtindia.com Page 68


***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

BSC : Question of Day : BSC


Ques. : 1 Connection or link to other documents or Web pages that contain related information is called
1) dial­up 2) electronic commerce
3) hyperlink 4) e­cash
5) domain name Ans.) 3

Ques. : 2 Microsoft's Messanger allows users to


1) bypass a browser to surf the Web 2) create a blog
3) communicate via direct live communication 4) identify and eliminate spam
5) make graphic presentation Ans.) 3

Ques. : 3 Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called
1) general­purpose application 2) Internet
3) scanner 4) notebook computer
5) None of these Ans.) 4

Ques. : 4 The main circuit­board of the system unit is the


1) computer program 2) control unit
3) motherboard 4) RAM
5) None of these Ans.) 3

Ques. : 5 Where are you likely to find an embedded operating system?


1) On a desktop operating system 2) on a networked PC
3) on a network server 4) on a PDA
5) None of these Ans.) 4

Ques. : 6 Manipulating data to create information is known as


1) Feedback 2) Programming
3) Processing 4) Analysis
5) None of these Ans.) 3

Ques. : 7 A compiler translates higher­level programs into a machine language program, which is called
1) source code 2) object code
3) compiled code 4) beta code
5) None of these Ans.) 1

Ques. : 8 What contains the computer BIOS and maintains its data with the use of a battery for periods when the system is
powered down?
1) CMOS 2) RAM
3) DRAM 4) CPU
5) None of these Ans.) 1

Ques. : 9 Something which has easily­understood instructions in said to be


1) user friendly 2) information
3) word processing 4) icon
5) None of these Ans.) 1

Ques. : 10 What is output?


1) What the processor takes from the user. 2) What the user gives to the processor.
3) What the processor rejects. 4) What the processor gives to the user.
5) None of these Ans.) 4
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 1/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 11 A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) None of these Ans.) 2

Ques. : 12 Reference to each file on a disk are stored in a


1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) None of these Ans.) 1

Ques. : 13 Only ________program(s) remain(s) active even though we can open many programs at a time.
1) one 2) two
3) three 4) four
5) None of these Ans.) 1

Ques. : 14 When the margins on both the sides are straight and equal, then there is ________in the document.
1) full justification 2) full alignment
3) left justification 4) right justification
5) None of these Ans.) 1

Ques. : 15 The primary goal of a computer is to turn data into


1) ideas 2) suggestions
3) information 4) reports
5) None of these Ans.) 3

Ques. : 16 What is the main folder on a storage device called?


1) Platform 2) Interface
3) Root directory 4) Device driver
5) None of these Ans.) 3

Ques. : 17 If you receive and e­mail from someone you don't know, what should you do?
1) Forward it to the Police immediately 2) Delete it without opening it
3) Open it and respond to him/her 4) Reply and seek their identity
5) None of these Ans.) 2

Ques. : 18 Computer ___________is whatever is typed, submitted or transmitted to a computer system.


1) input 2) output
3) data 4) circuitry
5) None of these Ans.) 1

Ques. : 19 Special effects used to introduce slides in a presentation are called


1) effects 2) custom animation
3) transition 4) animation
5) None of these Ans.) 3

Ques. : 20 Computers send and receive data in the form of ________ signals.
1) analog 2) digital
3) modulated 4) demodulated
5) All the above Ans.) 2

Ques. : 21 Most World Wide Web pages contain commands in the language
1) NIH 2) URL
3) HTML 4) IRC
5) None of these Ans.) 3
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 2/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 22 _________ are graphical objects used to represent commonly used applications.
1) GUI 2) Drivers
3) Windows 4) Applications
5) Icons Ans.) 5

Ques. : 23 Computers connected to a LAN can


1) run faster 2) go online
3) share information and/or share peripheral
4) e­mail
equipment
5) None of these Ans.) 3

Ques. : 24 Whenever you have to give space between the two words while typing on a PC we have to press a key known
as
1) Backspace 2) Shift
3) Control 4) Escape
5) Space bar Ans.) 5

Ques. : 25 Secondary storage


1) does not require constant power 2) does not use magnetic media
3) consists of foour main types of devices 4) does not store information for later retrieval
5) None of these Ans.) 1

Ques. : 26 The first computers were programmed using


1) assembly language 2) machine language
3) spaghetti code 4) source code
5) None of these Ans.) 2

Ques. : 27 Which of the following functions is NOT performed by the servers?


1) e­mail processing 2) Database sharing
3) Processing websites 4) Storage
5) Word processing Ans.) 5

Ques. : 28 The ________ controls a client's computer resources.


1) application program 2) instruction set
3) operating system 4) server application
5) None of these Ans.) 3

Ques. : 29 The Internet allows you to


1) send e­mail 2) view web pages
3) connect to servers all around the world 4) All the above
5) None of these Ans.) 4

Ques. : 30 What kind of software would you most likely use to keep track of a billing account?
1) Word processing 2) Electronic publishing
3) Spreadsheet 4) Web authoring
5) None of these Ans.) 3

Ques. : 31 Text and graphics that have been cut or copied are stored in an area called the
1) Pasterboard 2) Copyboard
3) Clipboard 4) Cuttingboard
5) None of these Ans.) 3

Ques. : 32 Which of the following is an example of a storage device?


1) Magnetic disk 2) Tapes

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 3/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …
3) DVDs 4) All of these
5) None of these Ans.) 4

Ques. : 33 The ________file format is a method to encoding pictures on a computer.


1) HTML 2) JPEG
3) FTP 4) URL
5) DOC Ans.) 2

Ques. : 34 What is the process of copying software programs from secondary storage media to the hard disk called?
1) configuration 2) download
3) storage 4) upload
5) istallation Ans.) 5

Ques. : 35 The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods
of its ancestores is
1) Inheritance 2) generalisation
3) encapsulation 4) information hiding
5) None of these Ans.) 1

Ques. : 36 The software component of an expert system that draws conclusions is the ___________.
1) user interface 2) database
3) inference engine 4) I/O controller
5) None of these Ans.) 3

Ques. : 37 The attributes and methods for each object are stored in
1) an object instance 2) an object connection
3) an assembly structure 4) an object repository
5) None of these Ans.) 4

Ques. : 38 What is backup?


2) Protecting data by copying it from the original
1) Adding more components to your network
source to a different destination
3) Filtering old data from the new data 4) Accessing data on tape
5) None of these Ans.) 2

Ques. : 39 Which of the following is true?


1) A byte is a single digit in a binary number. 2) A bit represents a group of digital numbers.
3) Eight­digit binary number is called a byte. 4) Eight­digit binary number is called a bit.
5) None of these Ans.) 3

Ques. : 40 A _______is an organised collection of data about a single entity.


1) file 2) library
3) database 4) dictionary
5) None of these Ans.) 1

Ques. : 41 Hardware devices that are not part of the main computer system and are often added later to the system are
1) clip art 2) highlights
3) execute 4) peripherals
5) None of these Ans.) 4

Ques. : 42 All of the following are examples of real security and privacy risks except
1) hackers 2) spam
3) viruses 4) Identity theft
5) None of these Ans.) 2

Ques. : 43 Moving an icon on the desktop is termed as


http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 4/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) double clicking 2) highlighting


3) dragging 4) pointing
5) None of these Ans.) 3

Ques. : 44 A MODEM is connected in between a telephone line and a


1) Computer 2) Printer
3) Speaker 4) Microphone
5) Network Ans.) 1

Ques. : 45 The blinking symbol which indicates the next character will appear at which place, is called
1) Delete key 2) Control key
3) Cursor 4) Return key
5) None of these Ans.) 3

Ques. : 46 The display bar that lists all the open folders and active applications is
1) Menu bar 2) Tool bar
3) Task bar 4) Window list
5) None of these Ans.) 3

Ques. : 47 A large space common in most of the Windows which is displayed at the background of the Windows main
icon screen, is called
1) Application view 2) Work area
3) Project view 4) Toolbar
5) None of these Ans.) 2

Ques. : 48 A photograph, image or any other visual file which is displayed at the back ground of the windows main icon
screen, is called
1) Wall Paper 2) Screen Saver
3) Windows Theme 4) Active Desktop
5) None of these Ans.) 1

Ques. : 49 All windows settings are stored in this file


1) Windows.INI 2) Groups.INI
3) Win.INI 4) Tem.INI
5) Command.INI Ans.) 3

Ques. : 50 CPU can directly understand this language


1) C 2) C++
3) Assembly 4) Java
5) None of these Ans.) 3

Ques. : 51 An error is also known as


1) bug 2) debug
3) cursor 4) icon
5) None of these Ans.) 1

Ques. : 52 A keyboard is this kind of device


1) black 2) input
3) output 4) word processing
5) None of these Ans.) 2

Ques. : 53 Which part of the computer helps in storing information?


1) Disk drive 2) Keyboard
3) Monitor 4) Printer
5) None of these Ans.) 1
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 5/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 54 To drop a column that is used as a foreign key, first


1) Drop the primary key 2) drop the table
3) drop the foreign key constraint 4) All of these
5) None of these Ans.) 3

Ques. : 55 The name given to a document by user is called


1) filename 2) program
3) data 4) record
5) None of these Ans.) 1

Ques. : 56 _________is a procedure that requires users to enter an identification code and a matching password.
1) Paging 2) Logging on
3) Time­sharing 4) Multi­tasking
5) None of these Ans.) 2

Ques. : 57 Which device is used as the standard pointing device in a Graphical User Environment?
1) Keyboard 2) Mouse
3) Joystick 4) Track ball
5) None of these Ans.) 2

Ques. : 58 A CPU contains


1) a card reader and a printing device 2) an analytical engine and a control unit
3) a control unit and an arithmetic logic unit 4) an arithmetic logic unit and a card reader
5) None of these Ans.) 3

Ques. : 59 The ability of an OS to run more than one application at a time is called
1) multitasking 2) object­oriented programming
3) multi­user computing 4) time­sharing
5) None of these Ans.) 1

Ques. : 60 Permanent instructions that the computer uses when it is turned on and that cannot be changed by other
instructions are contained in
1) ROM 2) RAM
3) ALU 4) REM
5) None of these Ans.) 1

Ques. : 61 What are .bas, .doc and .htm examples of?


1) Databases 2) Extensions
3) Domains 4) Protocols
5) None of these Ans.) 2

Ques. : 62 The portion of the CPU that coordinates the activities of all the other computer components is the
1) motherboard 2) coordination board
3) control unit 4) arithmetic and logical unit
5) None of these Ans.) 3

Ques. : 63 Something which has easily­understood instructions in said to be


1) user friendly 2) information
3) word processing 4) icon
5) None of these Ans.) 1

Ques. : 64 The primary device that a computer uses to store information is


1) TV 2) storehouse

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 6/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …
3) desk 4) hard drive
5) None of these Ans.) 4

Ques. : 65 A program that works like a calculator for keeping track of money and making budgets
1) calculator 2) spreadsheet
3) budgeter 4) financier
5) None of these Ans.) 2

Ques. : 66 What menu is selected to print?


1) File 2) Tools
3) Social 4) Edit
5) None of these Ans.) 1

Ques. : 67 Programs or a set of electronic instructions that tell a computer what to do


1) Menu 2) Monitor
3) Hardware 4) Software
5) None of these Ans.) 4

Ques. : 68 _________are symbols that represent any character or combination of characters.


1) Playing cards 2) Wildcards
3) Private keys 4) Public keys
5) None of these Ans.) 2

Ques. : 69 A word in a web page that, when clicked, opens another document.
1) anchor 2) hyperlink
3) reference 4) URL
5) None of these Ans.) 2

Ques. : 70 Windos 95, Windows 98 and Windows NT are known as


1) processors 2) domain names
3) modems 4) operating systems
5) None of these Ans.) 4

Ques. : 71 To find and load a file that has been saved


1) select the Close command 2) select the New command
3) select the Save command 4) select the Open command
5) None of these Ans.) 4

Ques. : 72 Which of the following storage media provides sequential access only?
1) Floppy disk 2) Magnetic disk
3) Magnetic tape 4) Optical disk
5) None of these Ans.) 3

Ques. : 73 In a spreadsheet, a ____________ is a number you will use in a calculation.


1) label 2) cell
3) field 4) value
5) None of these Ans.) 4

Ques. : 74 All of the following are included in removable media except


1) CD­ROMs 2) Diskette
3) DVDs 4) Hare disk drive
5) None of these Ans.) 4

Ques. : 75 _________cells involves creating a single cell by combining two or more selected cells.
1) Formatting 2) Merging

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 7/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Embedding 4) Splitting
5) None of these Ans.) 2

Ques. : 76 The primary output device for computers is a


1) Video monitor 2) Printer
3) Keyboard 4) Mouse
5) None of these Ans.) 1

Ques. : 77 A directory within a directory is called a ________.


1) Mini Directory 2) Junior Directory
3) Part Directory 4) Sub Directory
5) None of these Ans.) 4

Ques. : 78 When you save in the following, the data would remain intact even after turning off computer?
1) RAM 2) Motherboard
3) Secondary storage device 4) Primary storage device
5) None of these Ans.) 3

Ques. : 79 SMPT, FTP and DNS are applications of the ________ layer.
1) Data link 2) Network
3) Transport 4) Application
5) None of these Ans.) 4

Ques. : 80 Which of the following is NOT a common feature of software application?


1) Menus 2) Windows
3) Help 4) Search
5) None of these Ans.) 2

Ques. : 81 In MICR, C stands for


1) Code 2) Colour
3) Computer 4) Character
5) None of these Ans.) 4

Ques. : 82 A __________ computer is a large and expensive computer capable of simultaneously processing data for
hundreds or thousands of users.
1) server 2) mainframe
3) desktop 4) tablet
5) None of these Ans.) 2

Ques. : 83 The ______ folder retains compies of messages that you have started but are not yet ready to send.
1) Inbox 2) Outbox
3) Drafts 4) Sent Items
5) None of these Ans.) 3

Ques. : 84 The ability of an OS to run more than one application at a time is called
1) multitasking 2) object­oriented programming
3) multi­user computing 4) time­sharing
5) None of these Ans.) 1

Ques. : 85 Example of non­numeric data is


1) Employee address 2) Examination score
3) Bank balance 4) All the above
5) None of these Ans.) 5

Ques. : 86 Coded entries which are used to gain access to a computer system are called

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 8/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) entry code 2) password


3) security commands 4) codewords
5) None of these Ans.) 2

Ques. : 87 To move to the bottom of a document, press


1) Insert key 2) Home key
3) Ctrl key+End key 4) End key
5) None of these Ans.) 3

Ques. : 88 A device that is connected to the motherboard is called a(n)


1) external device 2) adjunct device
3) peripheral device 4) input device
5) None of these Ans.) 3

Ques. : 89 Storage and memory differ with respect to which of the following characteristics?
1) Price 2) Reliability
3) Speed 4) All the above
5) None of these Ans.) 4

Ques. : 90 The ______ tells the computer how to use its components.
1) utility 2) network
3) operating system 4) application software
5) None of these Ans.) 3

Ques. : 91 Screen that comes on when you turn on your computer that shows all the icons is
1) desktop 2) face to face
3) viewer 4) view space
5) None of these Ans.) 1

Ques. : 92 A file that contains definitions of the paragraph and character styles for your document and all things you
customised like toolbars and menus is called a
1) guide 2) pattern
3) base document 4) template
5) None of these Ans.) 4

Ques. : 93 A _______contains buttons and menus that provide quick access to commonly used commands.
1) toolbar 2) status bar
3) window 4) find
5) None of these Ans.) 1

Ques. : 94 The blinking point which shows your position in the text is called
1) blinker 2) cursor
3) causer 4) pointer
5) None of these Ans.) 2

Ques. : 95 What is the name of the process that is used to convert a series of instructions, or program, written in a high­
level language into instructions (or a program) that can be run on a computer?
1) Assembling 2) Compiling
3) Translating 4) Uploading
5) None of these Ans.) 2

Ques. : 96 A processor that collects the transmissions from several communications media and sends them over a single
line that operates at a higher capacity is called
1) multiplexor 2) bridge
3) Hub 4) router

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 9/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) None of these Ans.) 1

Ques. : 97 Main memory works in conjunction with


1) special function cards 2) RAM
3) CPU 4) Intel
5) All the above Ans.) 3

Ques. : 98 When you make graph and picture in document, then your computer holds the data in
1) resotore file 2) backup file
3) clipboard 4) memory
5) None of these Ans.) 4

Ques. : 99 The way the words appear on the page is called


1) text formatting 2) character formatting
3) point size 4) type face
5) None of these Ans.) 1

Ques. : 100 Which key is used in combination with another key to perform a specific task?
1) Esc 2) Control
3) Arrow 4) Space bar
5) None of these Ans.) 2

Ques. : 101 In the binary language each letter of the alphabet, each number and each special character is made up of a
unique combination of
1) eight bytes 2) eight kilobytes
3) eight characters 4) eight bits
5) None of these Ans.) 4

Ques. : 102 Word processing, spreadsheet and photo­editing are examples of


1) application software 2) system software
3) operating system software 4) platform software
5) None of these Ans.) 1

Ques. : 103 Which function calculates the largest value in a set of numbers?
1) Average 2) Count
3) Minimum 4) Maximum
5) None of these Ans.) 4

Ques. : 104 The human­readable version of a program is called ________.


1) source code 2) program code
3) human code 4) system code
5) None of these Ans.) 1

Ques. : 105 The number of pixels displayed on a screen is known as screen


1) resolution 2) colour depth
3) refresh rate 4) viewing size
5) None of these Ans.) 1

Ques. : 106 What is the name of the protocol used to eliminate loops?
1) ISL 2) Switching
3) Frame tagging 4) Spanning Tree Protocol
5) Scanning Ans.) 4

Ques. : 107 Digital photos and scanned images are typically stored as __________graphics with extensions such as
bmp, png, jpg, tif and gif.

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 10/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) vector 2) bitmap
3) either vector or bitmap 4) neither vector nor bitmap
5) None of these Ans.) 2

Ques. : 108 Select the odd man out.


1) Interpreter 2) Operating system
3) Compiler 4) Assembler
5) None of these Ans.) 2

Ques. : 109 A ______ is a design tool that graphically shows the logic in a solution algorithm.
1) flowchart 2) hierarchy chart
3) structure chart 4) context diagram
5) None of these Ans.) 1

Ques. : 110 A multi­purpose window which opens nearly for everything is


1) Main desktop 2) Explorer Window
3) Browser Window 4) Error Window
5) None of these Ans.) 2

Ques. : 111 Active Desktop was a feature of


1) Mozilla Firefox 2) Chrome
3) Microsoft Internet Explorer 4.0 4) Safari
5) None of these Ans.) 3

Ques. : 112 Computer Virus is a


1) hardware 2) Windows tool
3) computer program 4) Both 2) and 3)
5) None of these Ans.) 3

Ques. : 113 'Write!' is a`


1) Text editor 2) Word processor
3) Line editor 4) All the above
5) None of these Ans.) 1

Ques. : 114 What is an operating system?


1) It is an interface between user and the
2) It manages all resources.
computer.
3) It does all process management tasks. 4) All the above
5) None of these Ans.) 4

Ques. : 115 The Factor which makes Windows popular is its


1) multi­tasking capacity 2) desktop features
3) user freiendly GUI features 4) being inexpensive
5) None of these Ans.) 3

Ques. : 116 A series of to­be­viewed specially designed documents, which are all linked on Internet, is called:
1) World Wide Web 2) Web Server
3) Search Engine 4) Both 2) and 3)
5) None of these Ans.) 1

Ques. : 117 Minimising a window means


1) close the window 2) make it an ikon and store on task bar
3) close windows after saving its contents 4) shut down the computer
5) None of these Ans.) 2

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 11/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 118 Software designed for a specific purpose is called


1) General Program 2) Specific Program
3) Application Software 4) System Software
5) None of these Ans.) 3

Ques. : 119 A unit for measuring data trasmission speed is called


1) cache 2) broadbank channel
3) byte 4) baud
5) None of these Ans.) 4

Ques. : 120 A storage device used to compensate for the differences in rates of flow of data form one device to another is
1) buffer 2) channel
3) call 4) chip
5) None of these Ans.) 1

Ques. : 121 A device that generates the periodic signals used to control the timing of all CPU operations is
1) COM 2) Collate
3) Chip 4) Clock
5) None of these Ans.) 4

Ques. : 122 A comprehensive software system that builds, maintains and provides access to a database
1) CPU 2) DASD
3) CAI 4) DBMS
5) None of these Ans.) 4

Ques. : 123 The components that process data are located in the
1) imput devices 2) output devices
3) system unit 4) storage component
5) None of these Ans.) 3

Ques. : 124 Processing involves


1) inputting data into a computer system 2) transforming input into output
3) displaying output in a useful manner 4) providing relevant answers
5) None of these Ans.) 2

Ques. : 125 The OSI model is divided into how many processes called layers
1) Five 2) Six
3) Seven 4) Eight
5) Nine Ans.) 3

Ques. : 126 _________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
1) Servers 2) Embedded computers
3) Robotic computers 4) Mainframes
5) None of these Ans.) 2

Ques. : 127 The following are all mobile computing devices, except
1) notebook computers 2) Cellular phone
3) digital scanners 4) Personal Digital Assistant
5) None of these Ans.) 3

Ques. : 128 How many different documents can you have open at any one time?
1) Not more than three 2) Only one
3) As many as your computer memory will hold 4) No more than your task bar can display
5) None of these Ans.) 3
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 12/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 129 What do you press to enter the current date in a cell?
1) Ctrl+; (semi colon) 2) Ctrl+Shift+: (colon)
3) Ctrl+F10 4) Ctrl+F11
5) None of these Ans.) 1

Ques. : 130 Compatibility in regard to computers refers to


1) The software doing the right job 2) It being versatile enough to handle the job
4) software running with the previously installed
3) the software being able to run on the computer
software
5) None of these Ans.) 4

Ques. : 131 A CPU contains


1) a card reader and a printing device 2) an analytical engine and a control unit
3) a control unit and an arithmetic logic unit 4) an arithmetic logic unit and a card reader
5) None of these Ans.) 3

Ques. : 132 Permanent instructions that the computer uses when it is turned on and that cannot be changed by other
instructions are contained in
1) ROM 2) RAM
3) ALU 4) REM
5) None of these Ans.) 1

Ques. : 133 Windos 95, Windows 98 and Windows NT are known as


1) processors 2) domain names
3) modems 4) operating systems
5) None of these Ans.) 4

Ques. : 134 To find and load a file that has been saved
1) select the Close command 2) select the New command
3) select the Save command 4) select the Open command
5) None of these Ans.) 4

Ques. : 135 =SUM (B1:B8) is an example of a


1) function 2) formula
3) cell address 4) value
5) None of these Ans.) 2

Ques. : 136 Which of the following storage media provides sequential access only?
1) Floppy disk 2) Magnetic disk
3) Magnetic tape 4) Optical disk
5) None of these Ans.) 3

Ques. : 137 In a spreadsheet, a ____________ is a number you will use in a calculation.


1) label 2) cell
3) field 4) value
5) None of these Ans.) 4

Ques. : 138 All the following are included in removable media except
1) CD­ROMs 2) Diskette
3) DVDs 4) Hard Disk Drive
5) None of these Ans.) 4

Ques. : 139 ________ of cells involves creating a single cell by combining tow or more selected cells.
1) Formatting 2) Merging

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 13/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Embedding 4) Splitting
5) None of these Ans.) 2

Ques. : 140 The operating system is the most common type of


1) communication software 2) application software
3) systems software 4) word­processing
5) None of these Ans.) 3

Ques. : 141 The term bit is short form of


1) megabyte 2) binary language
3) binary digit 4) binary number
5) None of these Ans.) 3

Ques. : 142 All the following terms are associated with spreadsheet software except
1) worksheet 2) cell
3) formula 4) virus detection
5) None of these Ans.) 4

Ques. : 143 ________are devices used to transmit data over telecommunication lines.
1) Drives 2) Drive bays
3) Modems 4) Platforms
5) None of these Ans.) 3

Ques. : 144 A _______ is approximately one billion bytes.


1) kilobytes 2) bit
3) gigabyte 4) megabyte
5) None of these Ans.) 3

Ques. : 145 The first step in the transaction processing cycle is ________.
1) database operations 2) audit
3) data entry 4) user inquiry
5) None of these Ans.) 3

Ques. : 146 Where is the disk put to enable computer to read it?
1) In the hard drive 2) In the disk drive
3) Into the CPU 4) In the modern
5) None of these Ans.) 2

Ques. : 147 The most common method of entering text and numerical data into a computer system is through the use of a
1) plotter 2) scanner
3) printer 4) keyboard
5) None of these Ans.) 4

Ques. : 148 Which keys enable the input of numbers quickly?


1) Function keys 2) The numeric keypad
3) Ctrl, shift and alt 4) Arror keys
5) None of these Ans.) 2

Ques. : 149 Information that comes from an external source and is fed into computer software is called
1) input 2) output
3) throughput 4) reports
5) None of these Ans.) 1

Ques. : 150 A computer's hard disk is


1) an arithmetic and logical unit 2) computer software

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 14/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) operating system 4) computer hardware


5) None of these Ans.) 4

Ques. : 151 Which process checks to ensure the components of the computer are operating and connected properly?
1) Booting 2) Processing
3) Saving 4) Editing
5) None of these Ans.) 1

Ques. : 152 Unsolicited commercial email is commonly known as


1) spam 2) junk
3) hoaxes 4) hypertext
5) None of these Ans.) 1

Ques. : 153 A Website address is a unique name that identifies a specific ______ on the Web.
1) Web browser 2) Website
3) PDA 4) Hyperling
5) None of these Ans.) 2

Ques. : 154 A device that connects to a network without the use of cables is said to be
1) distributed 2) centralised
3) open source 4) wireless
5) None of these Ans.) 4

Ques. : 155 A menu contains a list of


1) commands 2) data
3) objects 4) reports
5) None of these Ans.) 1

Ques. : 156 Each _________ on a menu performs a specific action.


1) client 2) server
3) node 4) command
5) None of these Ans.) 4

Ques. : 157 To make a notebook act as a desktop model, the notebook can be connected to a __________ which is
connected to a monitor and other devices.
1) bay 2) docking station
3) port 4) network
5) None of these Ans.) 2

Ques. : 158 The command used to print a file


1) Shift+P 2) Ctrl+P
3) Alt+P 4) Esc+P
5) None of these Ans.) 2

Ques. : 159 The first page of a Web site is called


1) Home page 2) Index
3) Java Script 4) Bookmark
5) None of these Ans.) 1

Ques. : 160 A telephone number, a birth date, and a customer name are all examples of
1) a record 2) a query
3) a file 4) a database
5) None of these Ans.) 1

Ques. : 161 Which of the following is not true abou RAM?


http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 15/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) It is a temporary area. 2) It is the same as hard disk storage.


4) Information stored in RAM is gone when you
3) It is volatile.
turn the computer off.
5) None of these Ans.) 2

Ques. : 162 The _________ performs smple mathematics for the CPU.
1) ALU 2) DIMM
3) BUS 4) Register
5) None of these Ans.) 1

Ques. : 163 A prescribed set of well­defined instructions for solving mathematical problems is called
1) a compiler 2) a code
3) a description 4) an algorithm
5) None of these Ans.) 4

Ques. : 164 The part of the computer that coordinates all its functions is called its
1) ROM program 2) system board
3) Arithmetic Logic Unit 4) Control Unit
5) None of these Ans.) 4

Ques. : 165 The most common input devices are the ________ and ___________.
1) microphone, printer 2) scanner, board
3) digital camera, speakers 4) keyboard, mouse
5) None of these Ans.) 4

Ques. : 166 To save an existing file with a new name or a new location, you should use _________command.
1) Save 2) Save As
3) Save and replace 4) New File
5) None of these Ans.) 2

Ques. : 167 Which of the following is a common extension used in the file name for application programs?
1) EXE 2) DIR
3) TXT 4) DOC
5) None of these Ans.) 1

Ques. : 168 When your computer stops working suddenly, it is referred to as a


1) crash 2) die
3) death 4) penalty
5) None of these Ans.) 1

Ques. : 169 A program that converts a high­level language source file into a machine­language file is called a
1) translator 2) assembler
3) compiler 4) linker
5) None of these Ans.) 3

Ques. : 170 Which keys can be used together with other keys for special tasks?
1) Insert, Delete 2) Ctrl, Shift
3) Left Arrow, Right arrow 4) Page Up, Page Down
5) None of these Ans.) 2

Ques. : 171 The _________ command on the Quick Access Toolbar allows you to cancel your recent commands or
actions.
1) Search 2) Cut
3) Document 4) Undo
5) None of these Ans.) 4

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 16/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 172 In MS Access, a table can have ___________ primary key(s).


1) One 2) Two
3) Three 4) Four
5) None of these Ans.) 1

Ques. : 173 __________ software allows users to perform calculations on rows and columns of data.
1) World Processing 2) Presentation
3) Graphics designing 4) Electronic spreadsheet
5) None of these Ans.) 4

Ques. : 174 A hard copy of a document is


1) stored in the hard disk 2) stored on a floppy disk
3) stored on a CD 4) printed on the printer
5) None of these Ans.) 4

Ques. : 175 What is the storage area for e­mail messages called?
1) Storage folder 2) Dictionary
3) Mailbox 4) Hard Disk
5) None of these Ans.) 3

Ques. : 176 The altering of data so that it is not usable unless the changes are undone is called
1) biometrics 2) compression
3) encryption 4) ergonomics
5) None of these Ans.) 3

Ques. : 177 A DVD­RAM is similar to a ____________ except it has storage capacities up to 5.2 GB,
1) CD­R 2) Floppy disk
3) CD­RW 4) Hard­disk
5) None of these Ans.) 3

Ques. : 178 A proxy server is used for which of the following?


1) To provide security against unauthorised users 2) To process client requests for web pages.
3) To process client requests for database access 4) To provide TCP/IP
5) None of these Ans.) 1

Ques. : 179 A file extension is separated from the main file name with a(n) ________, but no spaces.
1) question mark 2) exclamation mark
3) underscore 4) period
5) None of these Ans.) 4

Ques. : 180 What is an email attachment?


2) A seperate document from another program
1) A receipt sent by the recpient.
sent along with an email messagel
3) A malicious parasite that feeds off your
4) A list of CC or BCC recipients.
messages and destroys the contents.
5) None of these Ans.) 2

Ques. : 181 SMTP, FTP and DNS are applications of the _________ layer.
1) data link 2) network
3) transport 4) application
5) None of these Ans.) 4

Ques. : 182 Which of the following is NOT a JSP implicit object?


1) Out 2) In

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 17/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Response 4) Page
5) None of these Ans.) 2

Ques. : 183 Computers connected to a LAN can


2) share information and/or share peripheral
1) run faster
equipment
3) e­mail 4) go online
5) None of these Ans.) 2

Ques. : 184 For selecting and highlighting, which of the following is generally used?
1) Icon 2) Mouse
3) Plotter 4) Floppy disk
5) None of these Ans.) 2

Ques. : 185 Which device is used to access your computer by other computer or for talk over phone?
1) RAM 2) CD ROM Drive
3) Modem 4) Hard Drive
5) None of these Ans.) 3

Ques. : 186 Which type of memory is closely related to processor?


1) Main Memory 2) SecondaryMemory
3) Disk Memory 4) Tape Memory
5) None of these Ans.) 1

Ques. : 187 ________ is the primay key of one file which also appears in another file.
1) Physical key 2) Primary key
3) Foreign key 4) Logical key
5) None of these Ans.) 3

Ques. : 188 The technique that extends storage capacities of main memory beyond the actual size of the main memory is
called
1) multitasking 2) virtual memory
3) multiprocessing 4) multiprogramming
5) None of these Ans.) 2

Ques. : 189 The blinking symbol on the computer screen is called


1) mouse 2) hand
3) cursor 4) icon
5) None of these Ans.) 3

Ques. : 190 A world processor would most likely be used to do which of the following?
1) keep an account of money spent 2) maintain an inventory
3) type a biography 4) do a computer search in the media centre
5) None of these Ans.) 3

Ques. : 191 Which of the following commands is used to select the whole document?
1) Ctrl+A 2) Alt+F5
3) Shift+S 4) Can't be done
5) None of these Ans.) 1

Ques. : 192 Where are programs and data kept while the processor is using them?
1) Main memory 2) Secondary memory
3) Disk memory 4) Program memory
5) None of these Ans.) 1

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 18/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 193 What does the term GUI stand for?


1) Graphical User Interface 2) Graphical Uninstall/Install
3) General Utility Interface 4) Graphical Universal Interface
5) None of these Ans.) 1

Ques. : 194 While sending an e­mail, _____________ hints about the matter of the mail.
1) subject 2) to
3) contents 4) cc
5) None of these Ans.) 1

Ques. : 195 Microsoft Windows 7 is an example of


1) utility software 2) network solution
3) application program 4) Operating system
5) None of these Ans.) 4

Ques. : 196 What is output?


1) What the processor takes from the user. 2) What the user gives to the processor.
3) What the processor gets from the user. 4) What the processor gives to the user.
5) None of these Ans.) 4

Ques. : 197 Copyrighted software that can be used for free is


1) shareware 2) freeware
3) groupware 4) e­mail
5) None of these Ans.) 2

Ques. : 198 A blinking symbol on the screen that shows where the next character will appear is a/an
1) delete key 2) arrow key
3) cursor 4) return key
5) None of these Ans.) 3

Ques. : 199 Sending an email is similar to


1) picturing an event 2) narrating a story
3) writing a letter 4) creating a drawing
5) None of these Ans.) 3

Ques. : 200 The abbreviation ISP usually means


1) International Spy Project 2) Indian Social Planning
3) Initial Service Provider 4) Internet Service Provider
5) None of these Ans.) 4

Ques. : 201 Network conponents are connected to the same cable in the ___________ topology.
1) star 2) ring
3) bus 4) mesh
5) None of these Ans.) 3

Ques. : 202 A symbol on the screen that represents a disk, document or program that you can select
1) keys 2) caps
3) icon 4) monitor
5) None of these Ans.) 3

Ques. : 203 This component is required to process data into information and consists of integrated circuits.
1) Hard disk 2) RAM
3) CPU 4) ROM
5) None of these Ans.) 3

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 19/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 204 Data that is copied from an application is stored in the


1) driver 2) clipboard
3) terminal 4) prompt
5) None of these Ans.) 2

Ques. : 205 Every component of your computer is either


1) software or CPU/RAM 2) input devices or output devices
3) application software or system software 4) hardware or software
5) None of these Ans.) 4

Ques. : 206 A collection of interrelated files in a computer is a ________.


1) management information system 2) spreadsheet
3) database 4) text file
5) None of these Ans.) 3

Ques. : 207 The ________ , also called the Web, contains billions of documents.
1) Web portal 2) HTTP
3) World Wide Web 4) Domain
5) None of these Ans.) 3

Ques. : 208 Choose the web­browser among the following.


1) MSN messanger 2) Yahoo messenger
3) Rediffimail 4) Mozilla Firefox
5) None of these Ans.) 4

Ques. : 209 One advantage of dial­up Internet access is that


1) it utilises wireless broadband technology 2) it utilizes existing telephone service`
3) it uses a router for security 4) modem speeds are very fast
5) None of these Ans.) 2

Ques. : 210 The code for a Web page is written using


1) Fifth Generation Language 2) WinZip
3) HTML 4) Perl
5) URL Ans.) 3

Ques. : 211 The storage that retains its data after the power is turned off is referred to as
1) volatile storage 2) non­volatile storage
3) sequential storage 4) direct storage
5) None of these Ans.) 2

Ques. : 212 You can use the tab key to


1) move a cursor across the screen 2) indent a paragraph
3) move the cursor down the screen 4) Only 1) and 2)
5) None of these Ans.) 4

Ques. : 213 _________ is approximately one thousand bytes.


1) 1 MB 2) 1 GB
3) 1 KB 4) 1 TB
5) None of these Ans.) 3

Ques. : 214 What is the term used for unsolicited e­mail?


1) newsgroup 2) usenet
3) backbone 4) flaming
5) spam Ans.) 5
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 20/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 215 A ________ contains specific rules and words that express the logical steps of an algorithm.
1) syntax 2) Programming structure
3) Programming language 4) logic chart
5) None of these Ans.) 3

Ques. : 216 An example of a telecommunication device is a


1) keyword 2) mouse
3) printer 4) modem
5) None of these Ans.) 4

Ques. : 217 Virtual memory is


1) memory on the hard disk that the CPU uses as
2) in RAM
extended RAM
3) only necessary if you do not have any RAM in
4) a backup device for floppy disks
your computer
5) None of these Ans.) 1

Ques. : 218 A proxy server is used for which of the following?


1) To provide security against unauthorised users 2) To process client requests for web pages.
3) To process client requests for database access 4) To provide TCP/IP
5) None of these Ans.) 1

Ques. : 219 A(n) _________ is composed of several computers connected together to share resources and data.
1) backup 2) network
3) backbone 4) hyperlink
5) None of these Ans.) 2

Ques. : 220 Which of the following is NOT an example of an operating system?


1) MS DOS 2) Windows 98
3) Windows 2000 4) Windows 3.1
5) None of these Ans.) 5

Ques. : 221 The process of writing computer instructions in a programming language is known as
1) processing 2) coding
3) testing 4) filing
5) None of these Ans.) 2

Ques. : 222 What is a portion of memory that serves as a temporary repository for data as it waits for a given action?
1) BIOS 2) Cache
3) Motherboard 4) USB
5) None of these Ans.) 2

Ques. : 223 Which of the following is correct about Java?


1) It is a low­level language. 2) It is a high­level language.
3) It is a compiler. 4) It is a hardware device driver.
5) None of these Ans.) 2

Ques. : 224 These are specialised programs that assist users in locating information on the Web.
1) Search Engine 2) Resource Locator
3) Information Management System 4) DBMS
5) None of these Ans.) 1

Ques. : 225 Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information?
1) Floppy diskette 2) Hard disk
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 21/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Permanent disk 4) Optical disk


5) None of these Ans.) 2

Ques. : 226 _________ helps in capturing row data and entering into computer system.
1) CPU 2) Integrated circuit
3) Input device 4) Motherboard
5) None of these Ans.) 3

Ques. : 227 Which of the following converts all the statements in a program in a single batch and the resulting collection
of instruction is placed in a new file?
1) compiler 2) interpreter
3) converter 4) instruction
5) None of these Ans.) 1

Ques. : 228 Which of the folloiwng contains information about a single entity in the database like a person, place, event
or thing?
1) Query 2) Form
3) Record 4) Table
5) None of these Ans.) 3

Ques. : 229 Which of the following is NOT a function of the control unit?
1) Read instructions 2) Execute instructions
3) Interpret instructions 4) Direct operations
5) None of these Ans.) 4

Ques. : 230 The time it takes a device to locate data and instructions and make them available to the CPU is known as
1) clock speed 2) a processing cycle
3) CPU speed 4) access time
5) None of these Ans.) 4

Ques. : 231 __________ controls the way in which the computer system functions and provides a means by which users
can interact with the computer.
1) The platform 2) The operating system
3) Application software 4) The motherboard
5) None of these Ans.) 2

Ques. : 232 _________ is the process of dividing the disk into tracks and sectors.
1) Tracking 2) Formatting
3) Crashing 4) Allotting
5) None of these Ans.) 2

Ques. : 233 Which of the followin is the largest unit of storage?


1) GB 2) KB
3) MB 4) TB
5) None of these Ans.) 4

Ques. : 234 The blinking symbol on the computer screen is called


1) mouse 2) logo
3) hand 4) cursor
5) None of these Ans.) 4

Ques. : 235 A _______ is a professionally designed empty document that can be adapted to the user's need.
1) file 2) guide
3) template 4) user guide file
5) None of these Ans.) 3

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 22/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 236 A(n) ________ contains commands that can be selected.


1) pointer 2) menu
3) icon 4) button
5) None of these Ans.) 2

Ques. : 237 Microcomputer hardware consists of three basic categories of physical equipment:
1) keyboard, monitor, hard drive 2) system unit, input/output, memory
3) system unit, input/output, secondary storage 4) system unit, primary storage, secondary storage
5) None of these Ans.) 2

Ques. : 238 A piece of hardware that is used to enter information into the computer by usning keys is
1) keyboard 2) monitor
3) hard disk 4) icon
5) None of these Ans.) 1

Ques. : 239 What does WWW mean?


1) World Wide Wizard 2) World Wireless Web
3) World Wide Web 4) Wide Wireless Web
5) None of these Ans.) 3

Ques. : 240 __________ processing is used when a large mail­order company accumulates orders and processes them
together in one large set.
1) Batch 2) Online
3) Real­time 4) Group
5) None of these Ans.) 1

Ques. : 241 Which of the following is NOT the major function of a computer?
1) Processing data into information 2) Storing data or information
3) Modifying data 4) Analysing data or information
5) None of these Ans.) 4

Ques. : 242 A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) None of these Ans.) 2

Ques. : 243 Which type of memory holds only the program and data that the CPU is presently processing?
1) CMOS 2) ROM
3) RAM 4) ASCII
5) None of these Ans.) 3

Ques. : 244 When you cut or copy information it gets place in the
1) clipart 2) clipboard
3) Internet 4) motherboard
5) None of these Ans.) 2

Ques. : 245 If you want to locate the hardware address of a local device, which protocol would you use?
1) ARP 2) RARP
3) RAM 4) PING
5) PONG Ans.) 4

Ques. : 246 The name of the location of a particular piece of data is its
1) address 2) memory name
3) storage site 4) data location
5) None of these Ans.) 1
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 23/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 247 Which of the following operating systems is not owned and licensed by a company?
1) Unix 2) Linux
3) Windows 2000 4) Mac
5) Windows Ans.) 2

Ques. : 248 The MS Excel stores its documents in the form of files which are called
1) worksheets 2) workbooks
3) notebooks 4) excel sheets
5) None of these Ans.) 1

Ques. : 249 ________ view shows how the contents on printed page will appear with margin, header and footer.
1) Draft 2) Full screen reading
3) Outline 4) Page layout
5) None of these Ans.) 4

Ques. : 250 What menu is selected to cut, copy and paste?


1) File 2) Edit
3) Tools 4) Table
5) None of these Ans.) 1

Ques. : 251 Personal computers are connected to form


1) Super computer 2) Mainframe computers
3) Enterprise 4) Network
5) Server Ans.) 4

Ques. : 252 What does remain in RAM when computer is turned off?
1) Operating System 2) BICS
3) Software Application 4) Nothing
5) None of these Ans.) 4

Ques. : 253 Information travels between components on the motherboard through


1) flash memory 2) CMOS
3) bays 4) buses
5) None of these Ans.) 4

Ques. : 254 In a relational database, this is a data structure that organises the information about a single topic into rows
and columns.
1) block 2) record
3) tuple 4) table
5) None of these Ans.) 4

Ques. : 255 For seeing the output, which of the following is used?
1) Scanner 2) Keyboard
3) Mouse 4) Monitor
5) None of these Ans.) 4

Ques. : 256 The simultaneous execution of two or more instructions is called


1) sequential access 2) reduced instruction set computing
3) multiprocessing 4) disk mirroring
5) None of these Ans.) 3

Ques. : 257 Multiprogramming systems


1) are easier to develop than single programming
2) execute each job faster
systems

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 24/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) execute more jobs in the same time period 4) use only one large mainframe computer
5) None of these Ans.) 3

Ques. : 258 Which device can understand the difference between data and program?
1) Input device 2) Output device
3) Memory 4) Microprocessor
5) None of these Ans.) 4

Ques. : 259 Which of the following devices has a limitation that we can only read it but cannot erase or modify it?
1) Magnetic tape 2) Hard disk
3) Compact disk 4) Floppy disk
5) None of these Ans.) 3

Ques. : 260 Which of the following is not an output device?


1) Plotter 2) Printer
3) Monitor 4) Joystick
5) None of these Ans.) 4

Ques. : 261 What kind of scheme is the HTTP protocol?


1) get/put 2) store/forward
3) queuing 4) search/return
5) request/response Ans.) 5

Ques. : 262 What type of error does a memory parity error create?
1) A fatal exception error 2) An NMI error
3) A corrupt Windows operating system file 4) A GPF error
5) A GPA error Ans.) 2

Ques. : 263 Which of the following cannot be used as the scope when using a JavaBean with JSP?
1) Page 2) Request
3) Session 4) Application
5) Response Ans.) 5

Ques. : 264 Devices that let the computer communicate with you are _________ devices.
1) input 2) output
3) processing 4) storage
5) None of these Ans.) 2

Ques. : 265 Eight bits of data is called


1) octabit 2) word
3) sentence 4) byte
5) None of these Ans.) 4

Ques. : 266 The secret code that gives you access to some programs:
1) clue 2) cue
3) password 4) help
5) None of these Ans.) 3

Ques. : 267 The different styles of lettering in a word processing program.


1) font 2) calligraphy
3) writing 4) manuscript
5) None of these Ans.) 1

Ques. : 268 An example of a processings device would be


1) a magnetic ink reader 2) a tablet PC
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 25/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Special function cards 4) scanners


5) None of these Ans.) 2

Ques. : 269 The main memory of a computer can also be called


1) Secondary storage 2) Internal storage
3) Random Access Memory 4) All the above
5) None of these Ans.) 3

Ques. : 270 A saved document is referred to as a


1) file 2) word
3) folder 4) project
5) None of these Ans.) 1

Ques. : 271 By default, Excel positions text in a cell


1) left­aligned 2) right­aligned
3) centered 4) justified
5) None of these Ans.) 1

Ques. : 272 Errors in computer programs are referred to as


1) bugs 2) mistakes
3) item overlooked 4) blunders
5) None of these Ans.) 1

Ques. : 273 A compiler is used to translate a program written in


1) a low level language 2) a high­level language
3) assembly language 4) machine language
5) None of these Ans.) 2

Ques. : 274 Computer programs are also known as


1) operating systems 2) documents
3) peripherals 4) applications
5) None of these Ans.) 4

Ques. : 275 The _______ becomes different shaped depending on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3

Ques. : 276 Multiplexing involves _________ path and __________ channels.


1) one, multiple 2) one, one
3) multiple, one 4) multiple, multiple
5) None of these Ans.) 1

Ques. : 277 To access the properties of an object, the mouse technique to use is
1) dragging 2) dropping
3) right­clicking 4) shift­clicking
5) None of these Ans.) 3

Ques. : 278 A(n) __________ is a program that makes the computer easier to use.
1) operating system 2) application
3) utility 4) network
5) None of these Ans.) 1

Ques. : 279 Connection to the Internet using a phone line and a modem is called ___________ connection.
1) digital 2) dial­up
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 26/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) broadband 4) dish
5) None of these Ans.) 2

Ques. : 280 To access a mainframe or supercomputer, users often use a


1) terminal 2) monitor
3) desktop 4) handheld
5) None of these Ans.) 1

Ques. : 281 Which of the following is a part of the computer that one can touch and feel?
1) Hardware 2) Software
3) Programs 4) Output
5) None of these Ans.) 1

Ques. : 282 This component is required to process data into information and consists of integrated circuits.
1) Hard disk 2) RAM
3) CPU 4) ROM
5) None of these Ans.) 3

Ques. : 283 Which part of the computer displays the work done?
1) RAM 2) Scanner
3) Monitor 4) ROM
5) None of these Ans.) 3

Ques. : 284 The main job of a CPU is to


1) carry out program instructions 2) store data/information for future use
3) process data inti information 4) Both 1) and 3)
5) None of these Ans.) 4

Ques. : 285 _________ are attempts by individuals to obtain confidential information from you by falsifying their identity?
1) Phising trips 2) Computer viruses
3) Special function cards 4) Scanners
5) Keyboards Ans.) 1

Ques. : 286 All of the following are examples of real security and privacy risks except
1) Hackers 2) Spam
3) Viruses 4) Identity theft
5) None of these Ans.) 2

Ques. : 287 A(n) ___________ is a small, wirless handheld computer that scans items, tags and pulls up the current
price (and any special offer) as you shop.
1) PSS 2) PoS
3) Inventary 4) Data mining
5) None of these Ans.) 1

Ques. : 288 Which of the following is NOT one of the four major data processing functions of a computer?
1) Gathering data 2) Processing data into information
3) Analysing the data or information 4) Storing the data or information
5) None of these Ans.) 3

Ques. : 289 Computers uses __________ language to process data.


1) processing 2) kilobyte
3) binary 4) representational
5) None of these Ans.) 3

Ques. : 290 Computers process data into information working exclusively with

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 27/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) multimedia 2) words
3) characters 4) numbers
5) None of these Ans.) 4

Ques. : 291 The string of eight 0s and 1s is called a


1) megabyte 2) kilobyte
3) byte 4) gigabyte
5) None of these Ans.) 3

Ques. : 292 A _________ is approximately one billion bytes.


1) kilobyte 2) bit
3) gigabyte 4) megabyte
5) None of these Ans.) 3

Ques. : 293 SMTP, FTP and DNS are applications of the _________ layer.
1) Data link 2) Network
3) Transport 4) Application
5) None of these Ans.) 4

Ques. : 294 A __________ is not a form of biometrics.


1) Fingerprint 2) Password
3) Retina scan 4) Breath scan
5) None of these Ans.) 2

Ques. : 295 Reference to each file on a disk are stored in a


1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) None of these Ans.) 1

Ques. : 296 Buffering in printers is necessary


1) as computers are fast in generating data for 2) as there is not enough memory provided with
printing then printer can print it. printers.
3) to make printers work for more years. 4) Both 1) and 2)
5) None of these Ans.) 4

Ques. : 297 Airlines resevation system is a typical example of


1) Batch processing 2) On­line processing
3) Real time processing 4) Both 1) and 2)
5) Both 2) and 3) Ans.) 5

Ques. : 298 Which of the following memories is often used in a typical computer operation?
1) RAM 2) ROM
3) FDD 4) HDD
5) None of these Ans.) 1

Ques. : 299 Which of the following is NOT a logic gate?


1) AND 2) OR
3) NAND 4) NOR
5) None of these Ans.) 5

Ques. : 300 The difference between people with access to computers and the Internet and those without this access is
known as the
1) digital divide 2) Internet divide
3) Web divide 4) broadband divide
5) None of these Ans.) 1

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 28/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 301 DSL is example of a(n) _____________ connection.


1) network 2) wireless
3) slow 4) broadband
5) None of these Ans.) 4

Ques. : 302 __________ is the study of molecules and strctures whose size ranges from 1 to 100 Nanometers?
1) Nanoscience 2) Microelectrodes
3) Computer Forensics 4) Artificial intelligence
5) None of these Ans.) 1

Ques. : 303 The name for the way with which computers manipulate data into information is called
1) programming 2) processing
3) storing 4) organising
5) None of these Ans.) 2

Ques. : 304 After a picture has been taken with a digital camera and processed appropriately, the actual print of the
picture is considered a(n)
1) data 2) output
3) input 4) process
5) None of these Ans.) 2

Ques. : 305 A command that takes what has been typed into the computer and can be seen on the screen and sends it to
the printer for output on paper
1) print 2) return
3) jump 4) attention
5) None of these Ans.) 1

Ques. : 306 The key which lets you exit a program when pushed
1) arrow key 2) spacebar
3) escape key 4) return key
5) None of these Ans.) 3

Ques. : 307 The ability of an OS to run more than one application at a time is called
1) multitasking 2) object­oriented programming
3) multi­user computing 4) time­sharing
5) None of these Ans.) 1

Ques. : 308 Which of the following statements best describes the batch method of input?
1) Data is processed as soon as it is input. 2) Data is input at the time it is collected.
3) Data is collected in the form of source
documents, placed into groups, and then input to 4) Source documents are not used.
the computer.
5) None of these Ans.) 3

Ques. : 309 The benefit of using computers is that


1) Computers are very fast and can store huge 2) Computers provide accurate output even when
amounts of data. input is incorrect.
3) Computers are designed to be inflexible. 4) All the above
5) None of these Ans.) 1

Ques. : 310 The function of CPU is


1) to provide external storage of text 2) to communicate with the operator
3) to read, interpret and process the information
4) to provide a hard copy
and instruction
5) None of these Ans.) 3

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 29/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 311 What characteristics of read­only memory makes it useful?


2) Data in ROM is nonvolatile, that is, it remains
1) ROM information can be easily updated
there even without elctronical power.
3) ROM provides very large amounts of 4) ROM chips are easily swapped between
inexpensive data storage. different brands of computers.
5) None of these Ans.) 2

Ques. : 312 ___________ is the process of carrying out commands.


1) Fetching 2) Storing
3) Decoding 4) Executing
5) None of these Ans.) 4

Ques. : 313 Which of the following peripheral devices displays information to a user?
1) Monitor 2) Keyboard
3) Secondary storage device 4) Scanner
5) None of these Ans.) 1

Ques. : 314 The physical components of a computer system is called


1) software 2) hardware
3) network 4) open source
5) None of these Ans.) 2

Ques. : 315 Which of the following is a graphical representation of an application?


1) Windows 95 2) Windows Explorer
3) Icon 4) Taskbar
5) None of these Ans.) 3

Ques. : 316 A field is a related group of


1) records 2) files
3) characters 4) cables
5) None of these Ans.) 3

Ques. : 317 To restart the computer ___________ key is used.


1) Del + Ctrl 2) Backspace + Ctrl
3) Ctrl + Alt + Del 4) Reset
5) None of these Ans.) 4

Ques. : 318 The process of putting information in a file on a magnetic disk, or in a computer's memory, so it cab be used
later
1) store 2) ship
3) shift 4) centre
5) None of these Ans.) 1

Ques. : 319 Saving is the process of


1) compying a document from memory to a storage 2) making changes to a document's existing
medium content
3) changing the appearance, or overall look, of a 4) developing a document by entering text using a
document keyboard
5) None of these Ans.) 1

Ques. : 320 Printed information, called _________ exists physically and is a more permanent form of output than that
presented on a display device.
1) soft copy 2) hard copy
3) carbon copy 4) desk copy
5) None of these Ans.) 2
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 30/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 321 To find a saved document in the computer's memory and bring it up on the screen to view is called
1) reversing 2) rerunning
3) retrieving 4) returning
5) None of these Ans.) 3

Ques. : 322 The Internet is a system of


1) software bundles 2) Web pages
3) Website 4) Interconnected networks
5) None of these Ans.) 4

Ques. : 323 Code consisting of bars and lines of varying widths or lengths that is computer­readable is known as
1) an ASCII code 2) a magnetic tape
3) an OCR scanner 4) a bar code
5) None of these Ans.) 4

Ques. : 324 A ________ is a unique name that you give to a file of information.
1) device letter 2) folder
3) filename 4) filename extension
5) None of these Ans.) 3

Ques. : 325 What is an email attachment?


2) A separate document from another program
1) A receipt sent by the recpient.
sent along with an email message.
3) A malicious parasite that feeds off your
4) A list of CC or BCC recipients.
messages and destroys the contents.
5) None of these Ans.) 2

Ques. : 326 Which of the following are all considered advantages of e­mail?
1) Convenience, speed of delivery, generality and
2) Printable, global and expensive
reliability
3) Global, convenience and Microsoft owned 4) Slow delivery, reliable, global and inexpensive
5) None of these Ans.) 1

Ques. : 327 E­commerce allows companies to


1) issue important business reports 2) conduct business over the Internet
3) support decision making processes 4) keep track of paper­based transactions
5) None of these Ans.) 2

Ques. : 328 In a client/server model, a client program


1) asks for information 2) provides information and files
3) serves software files to other computers 4) distributes data files to other computers
5) None of these Ans.) 1

Ques. : 329 Computers manipulate data in many ways, and this manipulation is called ________.
1) utilizing 2) batching
3) upgrading 4) processing
5) None of these Ans.) 4

Ques. : 330 Which of the following is an example of an optical disk?


1) Digital versatile disks 2) Magnetic disks
3) Memory disks 4) Data bus disks
5) None of these Ans.) 1

Ques. : 331 Another word for the CPU is

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 31/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) microprocessor 2) execute
3) microchip 4) decoder
5) None of these Ans.) 1

Ques. : 332 A menu contains a list of


1) commands 2) data
3) objects 4) reports
5) None of these Ans.) 1

Ques. : 333 A command to get a file you worked on from the memory where it was stored
1) close 2) delete
3) open 4) get it
5) None of these Ans.) 3

Ques. : 334 A _________ is a collection of data that is stored electronically as a series of records in a table.
1) spreadsheet 2) presentation
3) database 4) web page
5) None of these Ans.) 3

Ques. : 335 The software tools that enable a user to interact with a computer for specific purposes are known as
1) hardware 2) networked softwares
3) sharewares 4) applications
5) None of these Ans.) 4

Ques. : 336 What is the shape of a CD?


1) Quadrilateral 2) Rectangular
3) Circular 4) Hexagonal
5) None of these Ans.) 3

Ques. : 337 Which of the following is NOT an output device?


1) Plotter 2) Printer
3) Scanner 4) Monitor
5) None of these Ans.) 3

Ques. : 338 A ________ contains buttons and menus that provide quick access to commonly used commands.
1) toolbar 2) menu bar
3) window 4) find
5) None of these Ans.) 1

Ques. : 339 The _________ enables you to simultaneously keep multiple pages open in one browser window.
1) tab box 2) pop­up helper
3) tab row 4) address bar
5) Esc key Ans.) 3

Ques. : 340 A __________ is an example of an input device.


1) keyboard 2) printer
3) motheboard 4) CPU
5) None of these Ans.) 1

Ques. : 341 A(n) ________ is the text you want to be printed at the bottom of the pages.
1) header 2) endnote
3) footnote 4) footer
5) None of these Ans.) 4

Ques. : 342 A(n) ________ is the combination of software and hardware that facilitates the sharing of information

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 32/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

between computing devices.


1) network 2) peripheral
3) expansion board 4) digital device
5) None of these Ans.) 1

Ques. : 343 The ________ tells the computer how to use its components.
1) utility 2) network
3) operating system 4) application program
5) None of these Ans.) 3

Ques. : 344 Which of the following functions is NOT performed by the TCP?
1) Addressing 2) Connection establishment
3) Data transfer 4) Flow control
5) None of these Ans.) 5

Ques. : 345 In addition to keying data directly into a database, data entry can be done from a(n)
1) input form 2) table
3) field 4) data dictionary
5) None of these Ans.) 1

Ques. : 346 The term ________ designates equipment that might be added to a computer system to enhance its
functionality.
1) digital device 2) system add­on
3) disk pack 4) peripheral device
5) None of these Ans.) 4

Ques. : 347 A CD­RW disk


2) is a form of optical disk, so it can only be written
1) has a faster access than an internal disk
once
3) holds less data than a floppy disk 4) can be erased and rewritten
5) None of these Ans.) 4

Ques. : 348 The process of changing a written work already done is called
1) filing 2) editing
3) cutting 4) closing
5) None of these Ans.) 2

Ques. : 349 To make a notebook act as a desktop model, the notebook can be connected to a __________ which is
connected to a monitor and other devices.
1) bay 2) docking station
3) port 4) network
5) None of these Ans.) 2

Ques. : 350 What is the name of the process that is used to convert a series of instructions, or program, written in a high­
level language into instructions (or a program) that can be run on a computer?
1) Assembling 2) Compiling
3) Translating 4) Uploading
5) None of these Ans.) 2

Ques. : 351 What does 'C' represent in the term MICR?


1) Code 2) Column
3) Computer 4) Character
5) None of these Ans.) 4

Ques. : 352 On which button does help menu exist?

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 33/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) End 2) Start
3) Turn off 4) Restart
5) None of these Ans.) 2

Ques. : 353 Which of the following is the newest version of Excel among the following?
1) Excel 2000 2) Excel 2002
3) Excel ME 4) Excel XP
5) None of these Ans.) 4

Ques. : 354 __________ processes the data and is also called the brain of the computer.
1) Motherboard 2) Memory
3) RAM 4) CPU
5) None of these Ans.) 4

Ques. : 355 Which of the following are objects in an access database?


1) table, form 2) queries, reports
3) macros, modules 4) All the above
5) None of these Ans.) 4

Ques. : 356 Which area in an Excel window allows entering values and formulas?
1) Title bar 2) Menu bar
3) Formula bar 4) Standard Tool Bar
5) None of these Ans.) 3

Ques. : 357 Computer software can be defined as


1) the computer and its associated equipment. 2) the instructions that tell the computer what to do.
3) computer components that act to accomplish a 4) an interface between the computer and the
goal. network.
5) the interacton between the computer and its
Ans.) 2
database.

Ques. : 358 A ________ is a set of rules.


1) resource locator 2) domain
3) hypertext 4) URL
5) protocol Ans.) 5

Ques. : 359 Which of the following is NOT an example of hardware?


1) Mouse 2) Printer
3) Monitor 4) Excel
5) None of these Ans.) 4

Ques. : 360 Which of the following is part of the system unit?


1) Monitor 2) CPU
3) CD­ROM 4) Floppy disk
5) None of these Ans.) 2

Ques. : 361 Fax machines and imaging systems are examples of


1) bar­code readers 2) output devices
3) scanning devices 4) pen­based systems
5) None of these Ans.) 3

Ques. : 362 When writing a document, you can use the ________ feature to find an appropriate word or an alternative
word if you find yourself stuck for the right word.
1) dictionary 2) word finder
3) encyclopedia 4) Wikipedia

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 34/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) None of these Ans.) 1

Ques. : 363 Various applications and documents are represented on the Windows desktop by
1) Symbols 2) Labels
3) Graphs 4) Icons
5) None of these Ans.) 4

Ques. : 364 Which of the following could be digital input devices for computers?
1) Digital camcoder 2) Microphone
3) Scanner 4) All the above
5) None of these Ans.) 4

Ques. : 365 The box that contains the central electronic components of the computer is the
1) motherboard 2) system unit
3) peripheral 4) input device
5) None of these Ans.) 2

Ques. : 366 You can use the _____________bar to type a URL and display a Web page, or type a keyword to display a
list of related Web pages.
1) menu 2) title
3) search 4) web
5) address Ans.) 5

Ques. : 367 A(n) _________ is a private corporate network, used exclusively by company employees.
1) Internet 2) local area network
3) peer­to­peer 4) intranet
5) None of these Ans.) 4

Ques. : 368 A saved document is referred to as a


1) file 2) word
3) folder 4) project
5) None of these Ans.) 1

Ques. : 369 Codes consisting of bars and lines of varying widths or lengths that are computer­readable are known as
1) a bar code 2) an ASCII code
3) a magnetic tape 4) a light pen
5) None of these Ans.) 1

Ques. : 370 When cutting and pasting, the item cut is temporarily stored in
1) ROM 2) Hard drive
3) Diskette 4) Dashboard
5) Clipboard Ans.) 5

Ques. : 371 What is backup?


2) Protecting data by copying it from the original
1) Adding more components to your network
source to a different destination
3) Filtering old data from the new data 4) Accessing data on tape
5) None of these Ans.) 2

Ques. : 372 ________ are type of inexpensive digital camera that remains tethered to a computer and are used for
videoconferencing, video chatting, and live Web broadcast.
1) Webcams 2) Webpics
3) Browsercams 4) Browserpics
5) None of these Ans.) 1

Ques. : 373 The acronym HTML stands for


http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 35/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) High Transfer Machine Language 2) High Transmission Machine Language


3) Hyper Text Markup Language 4) Hypermedia Text Machine Language
5) None of these Ans.) 3

Ques. : 374 Reference to each file on a disk are stored in a


1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) None of these Ans.) 1

Ques. : 375 What is correcting error in a program called?


1) Interpretting 2) Translating
3) Debugging 4) Compiling
5) None of these Ans.) 3

Ques. : 376 Sending an email is similar to


1) writing a letter 2) drawing a picture
3) talking on the phone 4) sending a package
5) None of these Ans.) 1

Ques. : 377 To ________a document menas to make changes to its existing content.
1) format 2) save
3) edit 4) print
5) None of these Ans.) 3

Ques. : 378 Where is the disk put to enable computer to read it?
1) Disk drive 2) Memory
3) CPU 4) ALU
5) None of these Ans.) 1

Ques. : 379 What menu is selected to cut, copy and paste?


1) File 2) Tools
3) Special 4) Edit
5) None of these Ans.) 1

Ques. : 380 The most important or powerful computer in a typical network is


1) desktop 2) network client
3) network server 4) network station
5) None of these Ans.) 3

Ques. : 381 To change hardware components into more powerful or rectified version is called
1) expansion 2) plug and play
3) upgrading 4) upsizing
5) None of these Ans.) 3

Ques. : 382 Which of the following views is present in Power Point?


1) Document view 2) Slide sorter view
3) Slide changer view 4) Play slide view
5) None of these Ans.) 2

Ques. : 383 In order to move from one worksheet to another in excel workbook, one should click
1) active cell 2) scroll bar
3) sheet tab 4) tab button
5) None of these Ans.) 3

Ques. : 384 To access properties of an object, the mouse technique to use is __________.

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 36/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) dragging 2) dropping
3) right­clicking 4) shift­clicking
5) None of these Ans.) 3

Ques. : 385 Every device on the Internet has a unique ________ address that identifies it in the same way that a street
address identifies the location of a house.
1) DH 2) DA
3) IP 4) IA
5) None of these Ans.) 3

Ques. : 386 This type of hardware consists of devices that translate data into a form the computer can process
1) application 2) input
3) system 4) All the above
5) None of these Ans.) 2

Ques. : 387 Which key is used in combination with another key to perform a specific task?
1) Function 2) Arrow
3) Space bar 4) Control
5) None of these Ans.) 4

Ques. : 388 A step­by­step procedure for accomplishing a task is known as a(n)


1) algorithm 2) hardware program
3) software bug 4) firmware program
5) None of these Ans.) 1

Ques. : 389 A group of 8 bits is known as


1) byte 2) kilobyte
3) binary digit 4) megabit
5) None of these Ans.) 1

Ques. : 390 The hardware device commonly referred to as the 'brain' of the computer is the
1) RAM chip 2) data input
3) CPU 4) secondary storage
5) None of these Ans.) 3

Ques. : 391 What is the intersection of a column and a row called on an Excel worksheet?
1) Column 2) Value
3) Address 4) Cell
5) None of these Ans.) 4

Ques. : 392 The process of a computer of receiving information from a server on the Internet is called
1) pulling 2) pushing
3) downloading 4) transferring
5) None of these Ans.) 3

Ques. : 393 Which of the following would you do to remove a paragraph from a report you had written?
1) Delete and edit 2) Highlight and delete
3) Cut and paste 4) Undo typing
5) None of these Ans.) 2

Ques. : 394 All the following media have read and write capability except
1) flash memory cards 2) CD­ROMs
3) hard disk drives 4) floppy disks
5) None of these Ans.) 2

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 37/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 395 If a user needs information instantly available to the CPU, it should be stored
1) on a CD 2) in secondary storage
3) in the CPU 4) on the motherboard
5) None of these Ans.) 2

Ques. : 396 To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard 2) ROM
3) CD­ROM 4) The hard disk
5) None of these Ans.) 1

Ques. : 397 The operating system called UNIX is typically used for
1) desktop computers 2) laptop computers
3) super computers 4) web servers
5) All the above Ans.) 5

Ques. : 398 Press __________ to move the insertion point to the address box, or to highlight the URL in the address box.
1) Alt+D 2) Alt+A
3) Shift+Tab 4) Tab+Ctrl
5) None of these Ans.) 1

Ques. : 399 A collection of unprocessed items is


1) information 2) data
3) memory 4) reports
5) None of these Ans.) 2

Ques. : 400 The portion of the CPU that coordinates the activities of all the other computer components is the
1) motherboard 2) coordination board
3) control unit 4) airthmetic logic unit
5) None of these Ans.) 3

Ques. : 401 A ______ is approximately one billion bytes.


1) kilobyte 2) bit
3) gigabyte 4) megabyte
5) None of these Ans.) 3

Ques. : 402 The _________ directory is mandatory for every disk.


1) Root 2) Base
3) Sub 4) Case
5) None of these Ans.) 1

Ques. : 403 To prepare a presentation/slide show, which application is commonly used?


1) Photoshop 2) Power Point
3) Outlook Express 4) Internet Explorer
5) All the above Ans.) 2

Ques. : 404 _________ is the process of carrying out commands.


1) Fetching 2) Storing
3) Executing 4) Decoding
5) None of these Ans.) 3

Ques. : 405 Which of the following refers to the fastest, biggest and most expensive computers?
1) Personal Computers 2) Supercomputers
3) Laptops 4) Notebooks
5) None of these Ans.) 2

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 38/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 406 Microsoft is an example of


1) an operating system 2) a processing device
3) application software 4) an input device
5) None of these Ans.) 3

Ques. : 407 ________ is the process of carrying out commands.


1) Fetching 2) Storing
3) Decoding 4) Executing
5) None of these Ans.) 4

Ques. : 408 If you do not want to select any option after opening a menu then click menu title again or press key
________ to close the menu.
1) Shift 2) Tab
3) Escape 4) F1
5) None of these Ans.) 3

Ques. : 409 It is easy to change the name of file using _____________ process.
1) transforming 2) christening
3) renaming 4) retagging
5) None of these Ans.) 3

Ques. : 410 What is the minimum and maximum zoom sizes in MS Office?
1) 10, 100 2) 20, 250
3) 10, 500 4) 10, 1000
5) None of these Ans.) 3

Ques. : 411 In Excel, _________contains one or more worksheets.


1) Template 2) Workbook
3) Active cell 4) Label
5) None of these Ans.) 2

Ques. : 412 Which of the following is a popular programming language for developing multimedia web pages, websites
and web­based applications?
1) COBOL 2) Java
3) BASIC 4) Assembler
5) None of these Ans.) 2

Ques. : 413 Compiling creates a(n)


1) program specification 2) algorithm
3) executable program 4) subroutine
5) None of these Ans.) 3

Ques. : 414 Computers use the ___________number system to store data and perform calculations.
1) decimal 2) hexadecimal
3) octal 4) binary
5) None of these Ans.) 1

Ques. : 415 The ______ key will launch the Start button.
1) esc 2) shift
3) Windows 4) Shortcut
5) None of these Ans.) 3

Ques. : 416 A character of information is represented by a(n)


1) byte 2) bit

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 39/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) field 4) attribute
5) None of these Ans.) 2

Ques. : 417 A set of instructions telling the computer what to do is called


1) mentor 2) instructor
3) compiler 4) program
5) None of these Ans.) 4

Ques. : 418 To maximise a window means


1) fill it to capacity 2) expand it to fit the desktop
3) put only like files inside 4) drag it to the recycle bin
5) None of these Ans.) 2

Ques. : 419 The home page of a website is


1) the largest page 2) the last page
3) the first page 4) the most colourful page
5) None of these Ans.) 3

Ques. : 420 Which of the following is not associated with computers?


1) BIt 2) Binary
3) Pencil 4) Mouse
5) Screen Ans.) 3

Ques. : 421 MICR technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition 2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition 4) Magnetic Insurance Cases Recognition
5) None of these Ans.) 1

Ques. : 422 Modern computers represent characters and numbers internally using one of the following number systems:
1) Penta 2) Octal
3) Hexa 4) Septa
5) Binary Ans.) 5

Ques. : 423 A ________ is approximately a million bytes.


1) gigabyte 2) kilobyte
3) megabyte 4) Terabyte
5) None of these Ans.) 3

Ques. : 424 If you want to extend the length of the network without having the signal degrade, you would use a
1) repeater 2) router
3) gateway 4) switch
5) None of these Ans.) 1

Ques. : 425 To move down a page in a document


1) jump 2) fly
3) wringgle 4) scroll
5) None of these Ans.) 4

Ques. : 426 What type of resource does have greater probability to become shared resource in a computer network?
1) Printers 2) Speakers
3) Floppy disk drivers 4) Keyboards
5) None of these Ans.) 1

Ques. : 427 Which of the following terms is used to describe the movement of an item with the help of mouse to a new
position on screen?

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 40/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) click 2) double click


3) drag and drop 4) point
5) right click Ans.) 3

Ques. : 428 What does storage unit provide?


1) Place for typing data 2) Storage for information and instruction
3) Place for printing information 4) All the above
5) None of these Ans.) 2

Ques. : 429 _________ are distinct items that don't have much meaning to you in a given countext.
1) Fields 2) Data
3) Queries 4) Properties
5) None of these Ans.) 2

Ques. : 430 An example of a telecommunication device is a


1) Keyboard 2) mouse
3) printer 4) modem
5) None of these Ans.) 4

Ques. : 431 Two or more computers connected to each other for sharing information form a
1) network 2) router
3) server 4) tunnel
5) pipeline Ans.) 1

Ques. : 432 The _____ becomes different shapes depending on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3

Ques. : 433 The capability of the operating system to enable two or more than two instructions to execute simultaneously
in a single computer system by using multiple CPUs is
1) Multitasking 2) Multiprogramming
3) multiprocessing 4) Multiexecution
5) None of these Ans.) 3

Ques. : 434 A collection of related information sorted and dealt with as a unit is a
1) disk 2) data
3) file 4) floppy
5) None of these Ans.) 3

Ques. : 435 An output device that lets you see what the computer is doing
1) a disk drive 2) monitor­screen
3) shift key 4) printer
5) None of these Ans.) 2

Ques. : 436 To access a mainframe or supercomputer, users often use a


1) terminal 2) node
3) desktop 4) handheld
5) None of these Ans.) 1

Ques. : 437 By default, your documents print in __________mode.


1) landscape 2) portrait
3) page setup 4) print view
5) None of these Ans.) 2

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 41/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 438 Firewalls are used to protect against


1) unauthorised attacks 2) virus attacks
3) data driven attacks 4) fire attacks
5) None of these Ans.) 1

Ques. : 439 The term "hypertext" means


1) Non­sequential writing 2) Hypermedia
3) Blinking text 4) Text with heavy formatting
5) None of these Ans.) 2

Ques. : 440 We can enter and edit text efficiently using


1) spreadsheet 2) typewriter
3) Word Processing Program 4) Desktop Publishing Program
5) None of these Ans.) 3

Ques. : 441 ________ may be included in other folder while making heirarchical structure folder.
1) Minifolder 2) Tiered folder
3) Sub­folder 4) Object
5) None of these Ans.) 3

Ques. : 442 To access properties of an object, the mouse technique to use is __________.
1) right­clicking 2) shift­clicking
3) dragging 4) dropping
5) None of these Ans.) 1

Ques. : 443 A ________ shares hardware, software and data among authorised users.
1) network 2) protocol
3) hypertext 4) transmitter
5) None of these Ans.) 1

Ques. : 444 Computer programs are written in a high­level programming language; however, the human­readable
version of a program is called
1) cache 2) instruction set
3) source code 4) world size
5) None of these Ans.) 3

Ques. : 445 In world processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is
1) copy and paste 2) copy, cut and paste
3) cut, copy and paste 4) cut and paste
5) None of these Ans.) 4

Ques. : 446 Which of the following is an example of connectivity?


1) Internet 2) Floppy disk
3) paper disk 4) TV disk
5) None of these Ans.) 1

Ques. : 447 ________ allows you to print.


1) Ribbon 2) Monitor
3) Go now 4) Ctrl+P
5) None of these Ans.) 4

Ques. : 448 Microsoft Office is an example of a


1) closed­source software 2) open­source software
3) horizontal­market software 4) vertical­market software
5) None of these Ans.) 1
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 42/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 449 A popular way to learn about computers without ever going to a classroom is called
1) i­lerning 2) isolated learning
3) e­learning 4) close learning
5) None of these Ans.) 3

Ques. : 450 A person who uses his/her expertise to gain access to other people's computers to get information illegally or
do damage is a
1) spammer 2) hacker
3) instant messanger 4) All of the above
5) None of these Ans.) 2

Ques. : 451 Binary coded decimal (BCD) numbers express each decimal digit as a
1) bit 2) byte
3) nibble 4) binary digit
5) word Ans.) 3

Ques. : 452 One nibble is equal to


1) 2 bits 2) 4 bits
3) 6 bits 4) 8 bits
5) None of these Ans.) 2

Ques. : 453 What may happen if a worksheet is not protected?


1) It cannot be opened. 2) It cannot be saved.
3) It cannot be edited. 4) It can be edited.
5) All cells get locked Ans.) 4

Ques. : 454 What is a firmware?


1) A program started in RAM. 2) A program started in a file.
3) A program started in boot sector. 4) A program started in ROM.
5) None of these Ans.) 4

Ques. : 455 'TWAIN' is related to which of the following?


1) Printer 2) Keyboard
3) Mouse 4) Monitor
5) Scanner Ans.) 5

Ques. : 456 The Internet is an example of __________ network.


1) star 2) bus
3) hybrid 4) mesh
5) ring Ans.) 4

Ques. : 457 Blueprints are usually created using ____________software.


1) CGI 2) Paint
3) Draw 4) CAD
5) API Ans.) 4

Ques. : 458 The power of a spreadsheet lies in its


1) cells 2) formulas
3) labels 4) worksheets
5) row and columns Ans.) 2

Ques. : 459 IP address consists of how many bits?


1) 16 bits 2) 8 bits
3) 30 bits 4) 32 bits

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 43/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) 36 bits Ans.) 4

Ques. : 460 Which storage decive is mounted on 'reels'?


1) Floppy disk 2) CD­ROM
3) Magnetic disk 4) Magnetic tape
5) Hard disk Ans.) 4

Ques. : 461 A paint program keeps track of every _________ placed on the screen.
1) Image 2) object
3) pixel 4) color
5) symbol Ans.) 3

Ques. : 462 Rules of a programming language are called


1) procedures 2) calls
3) methods 4) login
5) syntax Ans.) 5

Ques. : 463 A primary key can also be called a


1) super key 2) candidate key
3) alternate key 4) secondary key
5) foreign key Ans.) 2

Ques. : 464 Which shortcut key is used to open a new file in MS Word?
1) Ctrl+N 2) Ctrl+M
3) Ctrl+Y 4) Ctrl+X
5) Ctrl+Z Ans.) 1

Ques. : 465 Bridge operates in which of the following OSI layers?


1) Physical 2) Network
3) Data link 4) Both 1) and 3)
5) Session Ans.) 4

Ques. : 466 ______ printer is used for fax machines.


1) Line 2) Dot matrix
3) Laser 4) Inkjet
5) Thermal Ans.) 5

Ques. : 467 What does AMD stands for?


1) Advanced Mainframe Devices 2) Advanced Micro Devices
3) Advanced Mini Devices 4) Advanced Monitor Devices
5) Advanced Major Devices Ans.) 2

Ques. : 468 _______ provides electronic data interchange facility.


1) ISDN 2) LAN
3) VAN 4) CAN
5) None of these Ans.) 3

Ques. : 469 An assembly language is a division of


1) Middle level language 2) High level language
3) Low level language 4) Machine language
5) None of these Ans.) 3

Ques. : 470 A language based on graphics for use in education is called


1) PROLOG 2) LOGO

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 44/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) COBOL 4) BASIC
5) PASCAL Ans.) 2

Ques. : 471 Which is the most popular medium for direct access to secondary storage of a computer?
1) Magnetic tape 2) ROM
3) RAM 4) Magnetic disk
5) None of these Ans.) 4

Ques. : 472 Ethernet uses _________ topology.


1) bus 2) ring
3) star 4) tree
5) mesh Ans.) 1

Ques. : 473 Which of the following produces the best­quality graphics reproduction?
1) Laser printer 2) Inkjet printer
3) Plotter 4) Dot matrix printer
5) CAD Ans.) 3

Ques. : 474 A process is an instance of a computer _________ that is being executed.


1) job 2) program
3) task 4) method
5) call Ans.) 2

Ques. : 475 A computer virus is a software program which has the essential ability to
1) repeat data 2) clone itself
3) hide itself 4) reduce itself
5) None of these Ans.) 2

Ques. : 476 Communication between computers is almost always


1) serial 2) parallel
3) serially parallel 4) direct
5) indirect Ans.) 1

Ques. : 477 The interface of data from a CPU to peripheral devices of a computer is achieved through
1) interface 2) commands
3) buffer 4) parts of computer
5) All the above Ans.) 4

Ques. : 478 DOS cannot retrieve any data from a disk if a computer virus corrupts the ________ of the computer.
1) directory area 2) data area
3) BAT files 4) file allocation table
5) root directory area Ans.) 4

Ques. : 479 Salami attack is a type of attack that operates on


1) confidential data 2) company data
3) employee data 4) financial data
5) None of these Ans.) 4

Ques. : 480 Which of the following is NOT a part of the operating system?
1) Supervisor 2) Job­control program
3) I/O control program 4) Performance monitor
5) None of these Ans.) 4

Ques. : 481 Reel­to­reel tape drives are commonly used with


1) mini computers 2) micro computers
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 45/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) mainframe computers 4) laptops


5) personal computers Ans.) 3

Ques. : 482 To select an entire row in the Excelsheet, the shortcut key that is used is
1) ctrl+space 2) ctrl+arrow key
3) shift+arrow key 4) ctrl+tab
5) shift+space Ans.) 5

Ques. : 483 What is the number of maximum columns that can be inserted in a Word (2003) document?
1) 35 2) 42
3) 45 4) 55
5) 52 Ans.) 3

Ques. : 484 ________ are the summarised version of slides that display only titles and main text.
1) Handouts 2) Outlines
3) Speaker notes 4) Slide sorter
5) None of these Ans.) 2

Ques. : 485 In _______, the cells are referred by their fixed position in the worksheet.
1) cell referencing 2) relative referencing
3) absolute referencing 4) mixed referencing
5) fixed referencing Ans.) 3

Ques. : 486 How many types of data can be entered in a worksheet?


1) Three 2) Four
3) Two 4) Five
5) Six Ans.) 1

Ques. : 487 Which type of protocol is used for accessing Internet/web on mobile phones?
1) PPP 2) HTTP
3) FTP 4) WAP
5) SMTP Ans.) 4

Ques. : 488 The device which is used to connect the computer to the network media is called
1) cable 2) hub
3) switch 4) NIC
5) All the above Ans.) 4

Ques. : 489 One KB is equal to _______ bytes.


1) 124 2) 924
3) 1024 4) 1124
5) 1224 Ans.) 3

Ques. : 490 IEEE _______ standard is used for wirless LAN.


1) 802.12 2) 802.13
3) 802.15 4) 802.11
5) 802.10 Ans.) 4

Ques. : 491 To change the selected text to all capital letters, click the change case button, then click
1) Uppercase 2) Upper all
3) Capslock 4) Lock Upper
5) Large Size Ans.) 1

Ques. : 492 A person who uses his/her expertise to gain access to other people's computers to get information illegally or
do damage is a

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 46/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) hacker 2) analyst
3) instant messanger 4) programmer
5) None of these Ans.) 1

Ques. : 493 A device that connects to a network without the use of cables is said to be
1) distributed 2) free
3) centralised 4) open source
5) wireless Ans.) 5

Ques. : 494 Reusable optical storage will typically have the acronym
1) CD 2) DVD
3) ROM 4) RW
5) ROS Ans.) 4

Ques. : 495 A Web site’s main page is called its ________.


1) Homepage 2) Browser page
3) Search page 4) Bookmark
5) None of these Ans.) 1

Ques. : 496 Which of the following was the first widely used OS with graphical interface?
1) OS12 2) MVS
3) Mac OS 4) DOS
5) VMS Ans.) 3

Ques. : 497 Which of the following was the first widely used OS with graphical interface?
1) OS12 2) MVS
3) Mac OS 4) DOS
5) VMS Ans.) 3

Ques. : 498 Lynx is a type of


1) search engine 2) web index
3) meta­search­engine 4) web browser
5) newsgroup Ans.) 4

Ques. : 499 A computer is a box full of electronic


1) chips 2) registers
3) circuits 4) switching devices
5) None of these Ans.) 4

Ques. : 500 Which of the following keyboards is the fastest?


1) QWERTY 2) Dvorak
3) Alphanumeric 4) Numeric
5) None of these Ans.) 2

Ques. : 501 Which hole is used to mark the location of the first sector in a soft­sectored disk?
1) Address 2) Location
3) Label 4) Primary
5) Index Ans.) 5

Ques. : 502 The process of a computer receiving information from a server on the Internet is known as
1) pulling 2) downloading
3) pushing 4) uploading
5) transferring Ans.) 2

Ques. : 503 The part of the CPU which coordinates the activities of all other components of the computer is called
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 47/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) motherboard 2) coordination board


3) Arithmetic Logic Unit 4) control unit
5) None of these Ans.) 1

Ques. : 504 Repair which is usually available on Internet without any charge, for a known software bug is called
1) patch 2) version
3) help 4) FAQ
5) tutorial Ans.) 1

Ques. : 505 Which of the following was the first computer to use transisters instead of vacuum tubes?
1) Intel­650 2) Burroughs E­101
3) Datametric­1000 4) IBM 1401
5) ENIAC Ans.) 4

Ques. : 506 The two basic types of record access methods are _________ and _________.
1) sequential, random 2) direct, immediate
3) sequential, indexed 4) on­line, realtime
5) None of these Ans.) 1

Ques. : 507 To save an existing file with a new name or a new location, you should use _________command.
1) save 2) save and replace
3) new file 4) save as
5) All the above Ans.) 4

Ques. : 508 The primary job of an operating system is to manage


1) commands 2) users
3) programmes 4) resources
5) process Ans.) 4

Ques. : 509 _______ fields store the numbers used for calculation in database.
1) Next 2) Key
3) Numeric 4) Alphanumeric
5) Varchar Ans.) 3

Ques. : 510 When sending an email, ________line describes the content of the message.
1) to 2) CC
3) Contents 4) BCC
5) Subject Ans.) 5

Ques. : 511 What is backup?


2) Protecting data by copying it from the original
1) Adding more components to your network
source to a different destination
3) Filtering old data from the new data 4) Accessing data on tape
5) None of these Ans.) 2

Ques. : 512 ________ are type of inexpensive digital camera that remains tethered to a computer and are used for
videoconferencing, video chatting, and live Web broadcast.
1) Webcams 2) Webpics
3) Browsercams 4) Browserpics
5) None of these Ans.) 1

Ques. : 513 The acronym HTML stands for


1) High Transfer Machine Language 2) High Transmission Machine Language
3) Hyper Text Markup Language 4) Hypermedia Text Machine Language
5) None of these Ans.) 3
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 48/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 514 Reference to each file on a disk are stored in a


1) file allocation table 2) root allocation table
3) linking directory 4) root directory
5) directory allocation table Ans.) 1

Ques. : 515 What is correcting error in a program is called?


1) Interpreting 2) Translating
3) Debugging 4) Compiling
5) None of these Ans.) 3

Ques. : 516 Sending an email is similar to


1) writing a letter 2) drawing a picture
3) talking on the phone 4) sending a package
5) None of these Ans.) 1

Ques. : 517 To _________ a document means to make changes to its existing content.
1) format 2) save
3) edit 4) print
5) None of these Ans.) 3

Ques. : 518 Where is the disk put to enable computer to read it?
1) Disk drive 2) Memory
3) CPU 4) ALU
5) None of these Ans.) 1

Ques. : 519 What menu is selected to cut, copy and paste?


1) File 2) Tools
3) Special 4) Edit
5) None of these Ans.) 4

Ques. : 520 The most important or powerful computer in a typical network is


1) desktop 2) network client
3) network server 4) network station
5) None of these Ans.) 3

Ques. : 521 To change hardware components into more powerful or rectified version is called
1) expansion 2) plug and play
3) upgrading 4) upsizing
5) None of these Ans.) 3

Ques. : 522 Which of the following views is present in Power Point?


1) Document view 2) Slide sorter view
3) Slide changer view 4) Play slide view
5) None of these Ans.) 2

Ques. : 523 In order to move from one worksheet to another in excel workbook, one should click
1) active cell 2) scroll bar
3) sheet tab 4) tab button
5) None of these Ans.) 3

Ques. : 524 Every device on the Internet has a unique ________ address that identifies it in the same way that a street
address identifies the location of a house.
1) DH 2) DA
3) IP 4) IA

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 49/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) None of these Ans.) 3

Ques. : 525 This type of hardware consists of devices that translate data into a form the computer can process
1) application 2) input
3) system 4) All of these
5) None of these Ans.) 2

Ques. : 526 Which key is used in combination with another key to perform a specific task?
1) Home 2) Arrow
3) Space bar 4) Ctrl
5) None of these Ans.) 4

Ques. : 527 A set of step­by­step procedures for accomplishing a task is known as a(n)
1) algorithm 2) hardware program
3) software bug 4) firmware program
5) None of these Ans.) 1

Ques. : 528 A group of 8 bits is known as


1) byte 2) kilobyte
3) binary digit 4) megabit
5) nibble Ans.) 1

Ques. : 529 The hardware device commonly referred to as the 'brain' of the computer is the
1) RAM chip 2) data input
3) CPU 4) secondary storage
5) None of these Ans.) 3

Ques. : 530 What is the intersection of a column and a row called on an Excel worksheet?
1) Column 2) Value
3) Address 4) Cell
5) None of these Ans.) 4

Ques. : 531 The process of a computer of receiving information from a server on the Internet is called
1) pulling 2) pushing
3) downloading 4) transferring
5) None of these Ans.) 3

Ques. : 532 You can start Microsoft Word by using __________ button.
1) New 2) Program
3) Control Panel 4) My Computer
5) None of these Ans.) 2

Ques. : 533 Any data or instructions sent to the computer is termed as


1) storage 2) output
3) input 4) information
5) None of these Ans.) 3

Ques. : 534 Which of the following could you do to remove a paragraph from a report you had written?
1) Delete and edit 2) Highlight and delete
3) Cut and paste 4) Undo typing
5) None of these Ans.) 2

Ques. : 535 All of the following storage media have Read and Write capabilities except
1) flash memory cards 2) CD­ROMs

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 50/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) hard disk drives 4) floppy disks


5) None of these Ans.) 2

Ques. : 536 To what temporary area can you store text and other data, and later paste them to another location?
1) Clipboard 2) ROM
3) CD­ROM 4) Hard disk
5) None of these Ans.) 1

Ques. : 537 If a user needs information instantly available to the CPU, it should be stored
1) on a CD 2) in secondary storage
3) in the CPU 4) in BIOS
5) None of these Ans.) 2

Ques. : 538 The operating system called UNIX is typically used for
1) desktop computers 2) laptop computers
3) super computers 4) web servers
5) All the above Ans.) 5

Ques. : 539 Press __________ to move the insertion point to the address box, or to highlight the URL in the address box.
1) Alt+D 2) Alt+A
3) Shift+Tab 4) Tab+Ctrl
5) Ctrl+S Ans.) 1

Ques. : 540 A collection of unprocessed items is


1) Information 2) data
3) memory 4) reports
5) None of these Ans.) 2

Ques. : 541 To prepare a presentation/slide show, which application is commonly used?


1) Photoshop 2) Power Point
3) Outlook Express 4) Internet Explorer
5) All the above Ans.) 2

Ques. : 542 ________ is the process of carrying out commands.


1) Fetching 2) Storing
3) Executing 4) Decoding
5) None of these Ans.) 3

Ques. : 543 Which of the following refers to the fastest, biggest and most expensive computers?
1) Personal Computers 2) Supercomputers
3) Laptops 4) Notebooks
5) None of these Ans.) 2

Ques. : 544 Microsoft Word is an example of


1) an operating system 2) a processing device
3) application software 4) an input device
5) None of these Ans.) 3

Ques. : 545 If you do not want to select any option after opening a menu then click menu title again or press key
________ to close the menu.
1) Shift 2) Tab
3) Escape 4) F1
5) None of these Ans.) 3

Ques. : 546 It is easier to change the name of file using ________ process.

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 51/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) transforming 2) christening
3) renaming 4) retagging
5) None of these Ans.) 3

Ques. : 547 A series 100 POST error code indicates a problem with the
1) hard drive 2) RAM or ROM
3) system board 4) video adapter
5) None of these Ans.) 3

Ques. : 548 Which of the following are valid Min. and Max. zoom sizes in MS Office?
1) 10, 100 2) 20, 250
3) 10, 500 4) 10, 1000
5) None of these Ans.) 3

Ques. : 549 In MS Excel, _______ contains one or more worksheets.


1) template 2) workbook
3) active cell 4) label
5) None of these Ans.) 2

Ques. : 550 Compiling creates a(n)


1) program specification 2) algorithm
3) executable program 4) subroutine
5) None of these Ans.) 3

Ques. : 551 Computers use the ___________ number system to store data and perform calculations.
1) decimal 2) hexadecimal
3) octal 4) binary
5) None of these Ans.) 4

Ques. : 552 The ______ key will launch the Start button.
1) Esc 2) Shift
3) Windows 4) Tab
5) None of these Ans.) 3

Ques. : 553 A character of information is represented by a(n)


1) byte 2) bit
3) field 4) attribute
5) None of these Ans.) 2

Ques. : 554 A set of instructions telling the computer what to do is called


1) mentor 2) instructor
3) compiler 4) program
5) None of these Ans.) 4

Ques. : 555 To maximise a window means


1) fill it to capacity 2) expand it to fit the desktop
3) put only like files inside 4) drag it to the recycle bin
5) None of these Ans.) 2

Ques. : 556 The "home page" of a website is


1) the largest page 2) the last page
3) the first page 4) the most colourful page
5) None of these Ans.) 3

Ques. : 557 Which of the following is not associated with computers?


http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 52/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) Bit 2) Binary
3) Pencil 4) Mouse
5) Screen Ans.) 3

Ques. : 558 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition 2) Magnetic Ink Character Reading
3) Magnetic Information Cable Recognition 4) Magnetic Insurance Cases Recognition
5) None of these Ans.) 1

Ques. : 559 Modern computers represents characters and numbers internally using one of the following number
systems?
1) Penta 2) Octal
3) Hexa 4) Septa
5) Binary Ans.) 5

Ques. : 560 A ________ is approximately a million bytes.


1) gigabyte 2) kilobyte
3) megabyte 4) terabyte
5) None of these Ans.) 3

Ques. : 561 If you wish to extend the length of the network without having the signal degrade, you would use a
1) repeater 2) router
3) gateway 4) switch
5) None of these Ans.) 1

Ques. : 562 To move down a page in a document


1) jump 2) fly
3) wriggle 4) scroll
5) None of these Ans.) 4

Ques. : 563 Date and time are available on the desktop at


1) Taskbar 2) My Computer
3) Recycle Bin 4) Only 2) and 3)
5) None of these Ans.) 1

Ques. : 564 Which type of resource does have greater probability to become shared resource in a computer network?
1) Printers 2) Speakers
3) Floppy disk drivers 4) Keyboards
5) None of these Ans.) 1

Ques. : 565 Which of the following terms is used to describe the movement of an item with the help of mouse to a new
position on screen?
1) Click 2) Double click
3) Drag and drop 4) Point
5) Right click Ans.) 3

Ques. : 566 What does storage unit provide?


1) Place for typing data 2) Storage for information and instruction
3) Place for printing information 4) All the above
5) None of these Ans.) 2

Ques. : 567 ________ are dintinct items that don't have much meaning to you in a given context.
1) Fields 2) Data
3) Queries 4) Properties

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 53/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) None of these Ans.) 2

Ques. : 568 An example of a telecommunication device is a


1) Keyboard 2) mouse
3) printer 4) modem
5) None of these Ans.) 4

Ques. : 569 Two or more computers connected to each other for sharing information form a
1) network 2) router
3) server 4) tunnel
5) pipeline Ans.) 1

Ques. : 570 The benefit of using computers is that


1) Computers are very fast and can store huge 2) Computers provide accurate output even when
amounts of data. input is incorrect.
3) Computers are designed to be inflexible. 4) All the above
5) None of these Ans.) 1

Ques. : 571 The ________ becomes different shapes depending on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3

Ques. : 572 A collection of related information sorted and dealt with as a unit is a
1) disk 2) data
3) file 4) floppy
5) None of these Ans.) 3

Ques. : 573 An output device that lets you see what the computer is doing
1) a disk drive 2) monitor­screen
3) shift key 4) printer
5) None of these Ans.) 2

Ques. : 574 Bit is short for


1) binary system 2) digital byte
3) binary digit 4) binary unit
5) None of these Ans.) 3

Ques. : 575 To access a mainframe or supercomputer, users often use a


1) terminal 2) node
3) desktop 4) handheld
5) None of these Ans.) 1

Ques. : 576 By default, your documents print in __________mode.


1) landscape 2) portrait
3) page setup 4) print view
5) None of these Ans.) 2

Ques. : 577 Firewalls are used to protect against


1) unauthorised attacks 2) virus attacks
3) data driven attacks 4) fire attacks
5) None of these Ans.) 1

Ques. : 578 The term "hypertext" means


1) Non­sequential writing 2) Hypermedia
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 54/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Blinking text 4) Text with heavy formatting


5) None of these Ans.) 2

Ques. : 579 You can enter and edit the text efficiently using
1) spreadsheet 2) typewriter
3) Word Processing Program 4) Desktop Publishing Program
5) None of these Ans.) 3

Ques. : 580 ______ may be included in other folder while making heirarchical structure folder.
1) Minifolder 2) Tiered folder
3) Sub­folder 4) Object
5) None of these Ans.) 3

Ques. : 581 A _____ shares hardware, software and data among authorised users.
1) network 2) protocol
3) hyperlink 4) transmitter
5) None of these Ans.) 1

Ques. : 582 Computer programs are written in a high­level programming language; however, the human­readable
version of a program is called
1) cache 2) instruction set
3) source code 4) word size
5) None of these Ans.) 3

Ques. : 583 In world processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is
1) copy and paste 2) copy, cut and paste
3) cut, copy and paste 4) cut and paste
5) None of these Ans.) 4

Ques. : 584 Which of the following is an example of connectivity?


1) Internet 2) floppy disk
3) power cord 4) data
5) None of these Ans.) 1

Ques. : 585 A disk on which you store information is called


1) plate 2) data disk
3) paper disk 4) TV disk
5) None of these Ans.) 2

Ques. : 586 _______ allows you to print.


1) Ribbon 2) Monitor
3) Go now 4) Ctrl+P
5) None of these Ans.) 4

Ques. : 587 Microsoft Office is an example of a


1) closed­source software 2) open­source software
3) horizontal­market software 4) vertical­market software
5) None of these Ans.) 1

Ques. : 588 A popular way to learn about computers without ever going to a classroom is called
1) c­learning 2) isolated learning
3) e­learning 4) close learning
5) distance learning Ans.) 3

Ques. : 589 A person who uses his/her expertise to gain access to other people's ciomputers to get information illegally
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 55/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

or do damage is a
1) spammer 2) hacker
3) instant messanger 4) All of the above
5) None of these Ans.) 2

Ques. : 590 Binary coded decimal (BCD) numbers express each decimal digit as a
1) bit 2) byte
3) nibble 4) binary digits
5) word Ans.) 3

Ques. : 591 What happens when a worksheet is not protected?


1) It cannot be opened. 2) It cannot be saved.
3) It cannot be edited. 4) It can be edited.
5) All cells get locked. Ans.) 4

Ques. : 592 What is a firmware?


1) A program started in RAM. 2) A program started in a file.
3) A program started in boot sector. 4) A program started in ROM.
5) None of these Ans.) 4

Ques. : 593 'TWAIN' is related to which of the following?


1) Printer 2) Keyboard
3) Mouse 4) Monitor
5) Scanner Ans.) 5

Ques. : 594 The Internet is an example of __________ network.


1) star 2) bus
3) hybrid 4) mesh
5) ring Ans.) 4

Ques. : 595 Blueprints are usually created using ____________software.


1) CGI 2) Paint
3) Draw 4) CAD
5) API Ans.) 4

Ques. : 596 The power of a spreadsheet lies in its


1) cells 2) formulas
3) labels 4) worksheets
5) rows and columns Ans.) 2

Ques. : 597 IP address consists of how many bits?


1) 16 bits 2) 8 bits
3) 30 bits 4) 36 bits
5) 32 bits Ans.) 5

Ques. : 598 Which storage decive is mounted on 'reels'?


1) Floppy disk 2) CD­ROM
3) Magnetic disk 4) Magnetic tape
5) Hard disk Ans.) 4

Ques. : 599 A paint program keeps track of every _________ placed on the screen.
1) image 2) object
3) pixel 4) colour
5) symbol Ans.) 3

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 56/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 600 Rules of a programming language are called


1) procedures 2) calls
3) methods 4) login
5) syntax Ans.) 5

Ques. : 601 A primary key can also be called a


1) super key 2) candidate key
3) alternate key 4) secondary key
5) foreign key Ans.) 2

Ques. : 602 Which of the following is used to open a new file in MS Word?
1) Ctrl + X 2) Ctrl + Y
3) Ctrl + Z 4) Ctrl + F
5) Ctrl+N Ans.) 5

Ques. : 603 Bridge operates in which of the following OSI layers?


1) Physical 2) Network
3) Data Link 4) Both 1) and 3)
5) Session Ans.) 4

Ques. : 604 _______ printer is used for fax machines.


1) Line 2) Dot matrix
3) Laser 4) Inkjet
5) Thermal Ans.) 5

Ques. : 605 What does AMD stands for?


1) Advanced Mainframe Devices 2) Advanced Micro Devices
3) Advanced Mini Devices 4) Advanced Monitor Devices
5) Advanced Major Devices Ans.) 2

Ques. : 606 To open format cells dialogue box in MS Excel, we press


1) Ctrl + 1 2) Shift+1
3) Alt+1 4) Ctrl+Shift+1
5) F1 Ans.) 1

Ques. : 607 _______ provides electronic data interchange facility.


1) ISDN 2) LAN
3) VAN 4) CAN
5) None of these Ans.) 3

Ques. : 608 An assembly language is a division of


1) Middle level language 2) High level language
3) Low level language 4) Machine language
5) None of these Ans.) 3

Ques. : 609 A language based on graphics for use in education is called


1) PROLOG 2) LOGO
3) COBOL 4) BASIC
5) PASCAL Ans.) 2

Ques. : 610 Which is the most popular medium for direct access to secondary storage of a computer?
1) Magnetic tape 2) ROM
3) RAM 4) Magnetic disk
5) PROM Ans.) 4
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 57/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 611 Ethernet uses _________ topology.


1) bus 2) ring
3) star 4) tree
5) mesh Ans.) 1

Ques. : 612 Which of the following produces the best quality graphics reproduction?
1) Laser printer 2) Inkjet printer
3) Plotter 4) Dot matrix printer
5) CAD Ans.) 3

Ques. : 613 A process is another name for


1) job 2) program
3) task 4) method
5) call Ans.) 2

Ques. : 614 A computer virus is a software program which has the essential ability to
1) damage data 2) clone itself
3) hide itself 4) damage program
5) None of these Ans.) 2

Ques. : 615 The interface of data from a CPU to peripheral devices of a computer is achieved through
1) interface 2) commands
3) buffer 4) parts of computer
5) All the above Ans.) 4

Ques. : 616 DOS cannot retrieve any data from a disk if a computer virus corrupts the ________ of the computer.
1) directory area 2) data area
3) BAT files 4) file allocation table
5) root directory area Ans.) 4

Ques. : 617 Salami attack is a type of attack that operates on


1) ocnfidential data 2) company data
3) employee data 4) financial data
5) None of these Ans.) 4

Ques. : 618 Which of the following is NOT a part of the operating system?
1) Supervisor 2) Jon­control program
3) I/O control program 4) Performance monitor
5) None of these Ans.) 4

Ques. : 619 Reel­to­reel tape drives are commonly used with


1) mini computers 2) micro computers
3) mainframe computers 4) laptops
5) personal computers Ans.) 3

Ques. : 620 To select an entire row in the Excelsheet, the shortcut key that is used is
1) Ctrl+Space 2) Ctrl+Arrow
3) Shift+Arrow 4) Ctrl+Tab
5) Shift+Space Ans.) 5

Ques. : 621 What is the number of maximum columns that can be inserted in a Word (2003) document?
1) 35 2) 42
3) 45 4) 55
5) 52 Ans.) 3
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 58/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 622 _________ are the summarised version of slides that display only titles.
1) Handouts 2) Outlines
3) Speaker notes 4) Slide sorter
5) None of these Ans.) 2

Ques. : 623 In _____, the cell are referred by their fixed position in the worksheet.
1) cell referencing 2) relative referencing
3) absolute referencing 4) mixed referencing
5) fixed referencing Ans.) 3

Ques. : 624 How many types of data can be entered in a worksheet?


1) Three 2) Four
3) Two 4) Five
5) Six Ans.) 1

Ques. : 625 Which type of protocol is used for accessing Internet/web on mobile phones?
1) PPP 2) HTTP
3) FTP 4) WAP
5) SMTP Ans.) 4

Ques. : 626 The device which is used to connect the computer to the network media is called
1) cable 2) hub
3) switch 4) NIC
5) All the above Ans.) 4

Ques. : 627 IEEE _______ standard is used for wirless LAN.


1) 802.12 2) 802.13
3) 802.15 4) 802.11
5) 802.10 Ans.) 4

Ques. : 628 DNS is extremely important for the correct functioning of the Internet as it
2) maps symbolic names for machines onto their
1) encrypts data
IP address
3) translates message into machine language 4) All the above
5) None of these Ans.) 2

Ques. : 629 Which of the following was the first widely used OS with graphical interface?
1) OS12 2) MVS
3) Mac OS 4) DOS
5) VMS Ans.) 3

Ques. : 630 Lynx is a type of


1) search engine 2) web index
3) meta­search­engine 4) web browser
5) newsgroup Ans.) 4

Ques. : 631 A computer is a box full of electronic


1) chips 2) registers
3) circuits 4) switching devices
5) None of these Ans.) 4

Ques. : 632 Which hole is used to mark the location of the first sector in a soft­sectored disk?
1) Address 2) Location
3) Label 4) Primary
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 59/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) Index Ans.) 5

Ques. : 633 The process of a computer receiving information from a server on the Internet is known as
1) pulling 2) downloading
3) pushing 4) uploading
5) transferring Ans.) 2

Ques. : 634 The part of CPU which coordinated the activities of all other components of the computer is
1) motherboard 2) coordination board
3) Arithmetic Logic Unit 4) Control Unit
5) None of these Ans.) 1

Ques. : 635 Repair which is usually available on Internet without any charge, for a known software bug is called
1) patch 2) version
3) help 4) FAQ
5) tutorial Ans.) 1

Ques. : 636 Which was the first computer to use transisters instead of vacuum tubes?
1) Intel­650 2) Burroughs E­101
3) Datametric­1000 4) IBM 1401
5) ENIAC Ans.) 4

Ques. : 637 The two basic types of record access methods are _________ and _________.
1) sequential, random 2) direct, immediate
3) sequential, indexed 4) on­line, realtime
5) None of these Ans.) 1

Ques. : 638 To save an existing file with a new name or a new location, you should use _________command.
1) save 2) save and replace
3) new file 4) save as
5) All the above Ans.) 4

Ques. : 639 The primany job of an operating system is to manage


1) commands 2) users
3) programs 4) resources
5) process Ans.) 4

Ques. : 640 ________ fields store the numbers used for calculation in database.
1) Next 2) Key
3) Numeric 4) Alphanumeric
5) Valchar Ans.) 3

Ques. : 641 When sending an email, ________line describes the content of the message.
1) to 2) CC
3) contents 4) BCC
5) Subject Ans.) 5

Ques. : 642 What is the keyboard shortcut for creating chart from the selected cell range?
1) F2 2) F4
3) F8 4) F10
5) F11 Ans.) 5

Ques. : 643 Which of the following methods will not enter data into a cell?
1) Pressing an errow key 2) Pressing the Esc key
3) Pressing the tab key 4) Clicking the enter button to the formula bar
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 60/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

5) None of these Ans.) 2

Ques. : 644 Anti­virus is a ________ software.


1) system 2) utility
3) application 4) operating system
5) None of these Ans.) 2

Ques. : 645 A _____ contains commands that can be selected.


1) pointer 2) menu
3) icon 4) button
5) table Ans.) 2

Ques. : 646 The stock pointer in 8085 microprocessor is a


1) 16­bit accumulator 2) memory location in the stock
4) 16­bit register that points to stock memory
3) flag register used for the stock
location
5) None of these Ans.) 4

Ques. : 647 ________ is used in academic testing.


1) MICR 2) POS
3) OCR 4) OMR
5) Bar code reader Ans.) 4

Ques. : 648 _________ is called as a supervisor of computer activities.


1) Memory 2) OS
3) I/O devices 4) CU
5) ALU Ans.) 4

Ques. : 649 Repeater works in _________ layer of the OSI model.


1) application 2) transport
3) physical 4) data link
5) network Ans.) 3

Ques. : 650 RAS stands for


1) Random Access Security 2) Random Access Service
3) Remote Access Security 4) Remote Access Service
5) Remote Access Standard Ans.) 4

Ques. : 651 Band, the unit for measuring data transmission speed, is equal to
1) one bit per second 2) one byte per second
3) two bytes per second 4) two bits per second
5) None of these Ans.) 1

Ques. : 652 What type of computer can support hundreds of people at any time?
1) Desktop 2) Laptop
3) Microcomputer 4) Minicomputer
5) Mainframe Computer Ans.) 5

Ques. : 653 ________ uses viruses to destroy computer hardware and software.
1) Spoofing 2) Tunneling
3) Sabotage 4) Phishing
5) Flooding Ans.) 3

Ques. : 654 Which of the following is NOT a Microsoft Internet tool technology?
1) Dream Weaver 2) Internet Explorer
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 61/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

3) Outlook Express 4) Silverlight


5) Expression web Ans.) 1

Ques. : 655 What are concentric circles on floppy disks known as


1) Tracks 2) Cylinders
3) Segments 4) Holes
5) Sectors Ans.) 1

Ques. : 656 The cell reference for cell range G3 to M13 is


1) G3,M13 2) G3­M13
3) G3;M13 4) G3:M13
5) G3+M13 Ans.) 4

Ques. : 657 _______ memory has the shortest access time.


1) Cache 2) Virual
3) Secondary 4) Primary
5) Read only Ans.) 1

Ques. : 658 Unix operating system is a


1) multiuser OS 2) time­sharing OS
3) multi­tasking OS 4) All the above
5) None of these Ans.) 4

Ques. : 659 Which access method is used to access cassette tapes?


1) Direct 2) Sequential
3) Indirect 4) Parallel
5) Both 1) and 2) Ans.) 2

Ques. : 660 How many layers are there in the TCP/IP model?
1) four 2) five
3) six 4) seven
5) three Ans.) 2

Ques. : 661 A walky­talky set is an example of ________ system.


1) simplex 2) half duplex
3) full deplex 4) double duplex
5) None of these Ans.) 2

Ques. : 662 EBCDIC can code how many different characters?


1) 8 2) 16
3) 32 4) 64
5) 256 Ans.) 5

Ques. : 663 _______ provides a connection­oriented reliable service for sending message.
1) IP 2) TCP
3) UDP 4) HTTP
5) None of these Ans.) 2

Ques. : 664 In mark sensing, data is read


1) optically 2) electrically
3) magnetically 4) mechanically
5) None of these Ans.) 2

Ques. : 665 _______ layer of the OSI model is also called an end­to­layer.

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 62/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

1) Presentation 2) Network
3) Session 4) Transport
5) Application Ans.) 4

Ques. : 666 A Winchester disk is a


1) disk stack 2) removal disk
3) flexible disk 4) All the above
5) None of these Ans.) 1

Ques. : 667 IEEE _______ is the standard for token bus.


1) 802.3 2) 802.4
3) 802.5 4) 802.2
5) 802.6 Ans.) 2

Ques. : 668 Plotter accuracy is measured in terms of repeatability and


1) buffer size 2) resolution
3) vertical dimension 4) intelligence
5) None of these Ans.) 2

Ques. : 669 How many types of storage loops exst in magnetic bubble memory?
1) 8 2) 4
3) 16 4) 2
5) 32 Ans.) 4

Ques. : 670 Which of the following IP address classes is multicast?


1) Class A 2) Class B
3) Class C 4) Class D
5) Class E Ans.) 4

Ques. : 671 The blinking symbol on the computer screen is called


1) mouse 2) logo
3) hand 4) palm
5) cursor Ans.) 5

Ques. : 672 In second generation computers, speed was measured in


1) nanoseconds 2) milliseconds
3) microseconds 4) picoseconds
5) None of these Ans.) 3

Ques. : 673 _______ is NOT an Intenet connection.


1) Broadband 2) WWAN
3) DSL 4) WLAN
5) Dial­up Ans.) 2

Ques. : 674 The output quality of a printer is measured by


1) dots per sq inch 2) dots per inch
3) Dots printed per unit 4) dots printed per line
5) Both 1) and 2) Ans.) 1

Ques. : 675 How many values can be represented by a single byte?


1) 4 2) 16
3) 64 4) 256
5) 512 Ans.) 4

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 63/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 676 _______ is the process of finding errors in software code.


1) Compiling 2) Testing
3) Running 4) Debugging
5) None of these Ans.) 1

Ques. : 677 Which piece of hardware protects the resource of a private network from other networks?
1) Cache server 2) Proxy server
3) Firewall 4) Router
5) Bridge Ans.) 3

Ques. : 678 What is the shortcut key for 'Find and Replace' dialogue box?
1) Ctrl+A 2) Ctrl+R
3) Ctrl+H 4) Ctrl+M
5) Ctrl+N Ans.) 3

Ques. : 679 _______ are used to identify a user who returns to a website.
1) Cookies 2) Plug­in
3) Scripts 4) ASPS
5) Browser Ans.) 1

Ques. : 680 All the information collected during database development is stored in a
1) repository 2) dataware house
3) RAD 4) CASE
5) None of these Ans.) 2

Ques. : 681 COBOL is used in ____________applications.


1) commercial 2) scientific
3) space 4) mathematical
5) None of these Ans.) 1

Ques. : 682 The altering of data so that it is not usable unless the changes are undone is called
1) Biometrics 2) Compression
3) Encryption 4) Ergonomics
5) None of these Ans.) 3

Ques. : 683 The formulas in Excel start with


1) % 2) =
3) + 4) ­
5) ; Ans.) 2

Ques. : 684 The ______ key will launch the Start button.
1) Esc 2) Shift
3) Windows 4) Ctrl
5) Tab Ans.) 3

Ques. : 685 Search menu is available at which of the following buttons?


1) End 2) Start
3) Turn off 4) Restart
5) Reboot Ans.) 2

Ques. : 686 Which of the following displays the address and name of the selected cell?
1) Name box 2) Row heading
3) Formula bar 4) Task pane
5) None of these Ans.) 1

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 64/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 687 The process of transferring files from your computer to a computer on the Internet is called
1) downloading 2) uploading
3) FTP 4) JPEG
5) downsizing Ans.) 2

Ques. : 688 In how many ways can we save a document?


1) four 2) two
3) five 4) one
5) can't save a document Ans.) 2

Ques. : 689 Which of the following can be used to select the entire column in a worksheet?
1) shift+space 2) ctrl+space
3) alt+space 4) ctrl+space+1
5) shift+space+1 Ans.) 2

Ques. : 690 Machine code is a


1) high­level language 2) software language
3) low­level language 4) middle­level language
5) compiler Ans.) 3

Ques. : 691 Objects on the slide that hold text are called
1) object holders 2) text holders
3) auto layout 4) place holders
5) data holders Ans.) 4

Ques. : 692 The speedometer of a car represents


1) digital computer 2) hybrid computer
3) analog computer 4) micro computer
5) mini computer Ans.) 3

Ques. : 693 C++ is


1) a procedure­oriented language 2) a problem­oriented language
3) an object­oriented language 4) a program­oriented language
5) None of these Ans.) 3

Ques. : 694 What is the number of bit pattern provided by a 7­bit code?
1) 256 2) 128
3) 64 4) 512
5) 32 Ans.) 2

Ques. : 695 Process is


1) a program in high­level language kep on hard
2) contents of main memory
disk
3) a program in execution 4) a job in secondary memory
5) None of these Ans.) 3

Ques. : 696 By default, the left margin in the Word document is


1) 1 inch 2) 2 inches
3) 1.25 inches 4) 1.35 inches
5) 1.75 inches Ans.) 3

Ques. : 697 The parity bit is added for


1) loading 2) indexing
3) updating 4) error detection
5) hashing Ans.) 4
http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 65/66
***PDF BAZAAR***
17/10/2015 IBPS PO Coaching | IBPS PO/Clerk coaching | Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi | SSC coaching in Delhi | IBPS online Test | …

Ques. : 698 Flash memory is the type of


1) ROM 2) PROM
3) EPROM 4) EEPROM
5) RAM Ans.) 4

Ques. : 699 MS Excel contains _________rows.,


1) 65,500 2) 65,534
3) 65,535 4) 65,536
5) 65,533 Ans.) 4

Ques. : 700 The topology with highest reliability is


1) bus 2) star
3) ring 4) mesh
5) tree Ans.) 4

Ques. : 701 The term gigabyte refers to


1) 1024 bytes 2) 1204 kbytes
3) 1024 megabytes 4) 1024 terabytes
5) None of these Ans.) 3

http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx 66/66

You might also like