11/26/12 Computer Awareness MCQs for IBPS CWE 2012 - IBPS Exams Portal 1/7 www.ibpsexamsportal.com/2012/01/computer-awareness-mcqs-for-ibps-cwe.html Ads by Google New Computer Web Storage Memory Exam PC Computer 13 November 2012 Video Tutorial: Divisibility & Factor Theory 08 November 2012 Corporation Bank Specialist Officers Result Declared 08 November 2012 Karur Vysya Bank clerk recruitment 2012 through IBPS 31 October 2012 Latest GK MCQs for IBPS Clerk 2012- 13
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
6. How are data organised in a spreadsheet?1) Lines and spaces2) Layers and planes3) Height and width4) Rows and columns5) None of these
7. Which of the following is true?1) Byte is a single digit in a binary number2) Bit represents a grouping of digital numbers3) Eight-digit binary number is called a byte4) Eight-digit binary number is called a bit5) None of these
8. Transformation of input into output is performed by?1) Peripherals2) Memory3) Storage4) The Input-Output unit5) The CPU
9. How many options does a binary choice offer?1) None2) One3) Two4) It depends on the amount of memory in the computer5) It depends on the speed of the computer's processor
10. .....is collection of web pages and ......is the very first page that we see on opening ofa web-site1) Home-page, Web-page2) Web-site, Home-page3) Web-page, Home-page4) Web-page, Web-site5) None of these
11. When the pointer is positioned on a _____ it is shaped like a hand.1) Grammar error2) Hyperlink3) Screen tip4) Spelling error5) Formatting error
12. The _____ of a system includes the programs or instructions.1) Hardware2) Icon3) Information4) Software5) None of these
13. 'www' stands for _____1) World Word Web2) World Wide Web3) World White Web4) World Work Web5) None of these
14. What menu is selected to cut, copy, and paste?1) File2) Tools3) Special4) Edit5) None
15. You can use the tab key to1) Move a cursor across the screen2) Indent a paragraph3) Move the cursor down the screen4) Only (1) and (2)5) None of these
16. The most important or powerful computer in a typical network is _____1) Desktop2) Network client3) Network server4) Network station5) None of these
17. Which of the following is an example of connectivity?1) Internet2) Floppy disk3) Power cord
Video Tutorial: Divisibility & Factor TheoryVideo Tutorial: Divisibility & Factor Theory
Corporation Bank Specialist Officers ResultCorporation Bank Specialist Officers Result
DeclaredDeclared
Karur Vysya Bank clerk recruitment 2012 throughKarur Vysya Bank clerk recruitment 2012 through
IBPSIBPS
Latest GK MCQs for IBPS Clerk 2012-13Latest GK MCQs for IBPS Clerk 2012-13
Federal Bank Clerk & PO Final Results DeclaredFederal Bank Clerk & PO Final Results Declared
Popular PostsPopular Posts
Current Affairs Quiz August 2012Current Affairs Quiz August 2012
Current affairs 2012 for AllCurrent affairs 2012 for All
Competitive exams | Current AffairsCompetitive exams | Current Affairs
18. The ability to find an individual item in a file immediately _____ is used.1) File allocation table2) Directory3) Sequential access4) Direct access5) None of these
19. The primary purpose of software is to turn data into _____1) Web sites2) Information3) Programs4) Objects5) None of these
20. To what temporary area can you store text and other data, and later paste them toanother location?1) The clipboard2) ROM3) CD-ROM4) The hard disk5) None of these
21. Storage that retains its data after the power is tuned off is referred to as 1) volatilestorage2) non-volatile storage3) sequential storage4) direct storage5) None of these
22. _____is the science that attempts to produce machines that display the same type ofintelligence that humans do.1) Nano science2) Nanotechnology3) Simulation4) Artificial intelligence (AI)5) None of these
23. Changing an existing document is called _____ the document.1) Creating2) Editing3) Modifying4) Adjusting5) None of these
24. Computers use the _____ number system to store data and perform calculations.1) Decimal2) Hexadecimal3) Octal4) Binary5) None of these
25. Which of the following is the largest unit of storage?1) GB2) KB3) MB4) TB5) None of these
26. The _____ key will launch the start buttons.1) Esc2) Shift3) Windows4) Shortcut5) None of these
27. _____is the process of finding errors in software code.1) Compiling2) Testing3) Running4) Debugging5) None of these
28. To move to the beginning of a line of text, press the _____ key.1) Home2) A3) Page-up4) Enter5) None of these
29. Virtual memory is_____1) Memory on the hard disk that the CPU uses as an extended RAM2) RAM3) Only necessary if you do not have any RAM in your computer4) A back up device for floppy disks5) None of these
30. A _____ contains specific rules and words that express the logical steps of analgorithm.1) Syntax2) Programming structure3) Programming language4) Logic chart5) None of these
31. When sending an e-mail, the _____ line describes the contents of the message.1) to2) subject3) contents4) CC5) None of these
32. The _____ tells the computer how to use its components.1) Utility2) Network3) Operating system4) Application program5) None of these
33. Which grouping do you work with when formatting text in word?1) Tables, paragraphs and indexes2) Paragraphs, indexes and sections3) Characters, sections and paragraphs4) Indexes, characters and tables5) None of these
34. What is backup?1) Adding more components to your network2) Protecting data by copying it from the original source to a different destination3) Filtering old data from the new data4) Accessing data on tape5) None of these
35. Network components are connected to the same cable in the _____ topology.1) Star2) Ring3) Bus4) Mesh5) Mixed
36. This component is required to process data into information and consists ofintegrated circuits.1) Hard disk2) RAM3) CPU4) ROM5) None of these
37. One advantage of dial-up-internet access is ___1) It utilises broadband technology2) It utilizes existing telephone service3) It uses a router for security4) Modem speeds are very fast5) None of these
38. What is the term for unsolicited e-mail?1) News group2) Use net3) Backbone4) Flaming5) Spam
39. Two or more computers connected to each other of sharing information form a _____1) Network2) Router3) Server4) Tunnel5) Pipeline
40. Computers that are portable and convenient for users who travel are known as_____1) Super computers
2) Lap tops3) Mini computers4) File servers5) None of these
41. A computer checks the _____ of user names and passwords for a match beforegranting access.1) Website2) Network3) Backup file4) Data base5) None of these
42. Office LANs that are spread geographically apart on a large scale can be connectedusing a corporate _____1) CAN2) LAN3) DAN4) WAN5) TAN
43. The code for a Web page is written using _____1) A fifth generation language2) Win Zip3) Peripherals4) Hypertext Markup Language5) URL
44. What is the process of copying software programs from secondary storage media tothe hard disk called?1) Configuration2) Download3) Storage4) Upload5) Installation
45. Small application programs that run on a web page and may ensure a form iscompleted properly or provide animation are known as _____1) Flash2) Spiders3) Cookies4) Applets5) Sparks
46. The first computers were programmed using _____1) Assembly language2) Machine language3) Source code4) Object code5) Spaghetti code
47. Which process checks to ensure the components of the computer and operating areconnected properly?1) Booting2) Processing3) Saving4) Editing5) None of these
48. In a relational database, this is a data structure that organizes the information abouta single topic into rows and columns.1) Block2) Record3) Tuple4) Table5) Command line interface
49. How can the user determine what programs are available on a computer?1) Checking the hard disk properties2) Viewing the installed programs during the booting process3) Checking the operating system for a list of installed programs.4) Checking the existing files saved on the disk5) None of these
50. When we run a program in HTML coding _____ is used as backend and ____ works asfront-end.1) Notepad - Internet-Explorer2) Notepad - Msn-messenger3) MS-Word - Internet Explorer4) Both (1) and (2)5) None of these