Tipsedge : We Give Tips for your Daily Preparation Material & Quizzes for General Awareness,Computer,Banking,GS and 12th BPS updates, many more. Tipsedge.com will guide you in learning and development throughout your career.

Computer Questions for IBPS 2015

Computer Questions Which are important.

1) The code for a Web page is written using Hypertext Markup language

2) The first computers were programmed using Machine language

3) A file name is a unique name that you give to a file of information

4) This can be another word for program software

5) Any data or instruction entered into the memory of a computer is considered as storage

6) Which part of the computer displays the work done monitor

7) A series of instructions that tells a computer what to do and how to do it is called a program

8) Hardware is the part of a computer that one can touch and feel .

9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the

correct hardware and software.

10) Supercomputers refers to the fastest, biggest and most expensive computers

11) Executing is the process of carrying out commands

12) The rectangular area of the screen that displays a program, data, and or information is a window

13) The process of a computer receiving information from a server on the internet is known as downloading

14) Disk drive is the part of the computer helps to store information

15) Arithmetic operations include addition, subtraction, multiplication, and division

16) A keyboard is the king of input device

17) An error is known as bug

18) A collection of related information sorted and dealt with as a unit is a file

19) Sending an e-mail is similar to writing a letter

20) IT stands for information technology

21) A menu contains commands that can be selected

22) Plotter, printer, monitor are the group consists of output devices

23) Edit menu is selected to cut, copy and paste

24) The most important or powerful computer in a typical network is network server

25) The primary purpose of software is to turn data into information

26) The ability to find an individual item in a file immediately direct access is used.

27) To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices

28) You can use the tab key to move a cursor across the screen, indent a paragraph.

29) A collection of related files is called record.

30) Storage that retains its data after the power is turned off is referred to as non-volatile storage.

31) Internet is an example of connectivity.

32) Testing is the process of finding errors in software code.

33) A syntax contains specific rules and words that express the logical steps of an algorithm.

34) Changing an existing document is called the editing documentation

35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.

36) Computers use the binary number system to store data and perform calculations.

37) The windows key will launch the start buttons.

38) To move to the beginning of a line of text, press the home key.

39) When sending an e-mail, the subject lines describe the contents of the message.

40) Tables, paragraphs and indexes work with when formatting text in word.

41) TB is the largest unit of storage.

42) The operating system tells the computer how to use its components.

43) When cutting and pasting, the item cut is temporarily stored in clipboard.

44) The blinking symbol on the computer screen is called the cursor.

45) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a

sequential because tape is a sequential access medium.

46) Rows and columns are used to organize data in a spread sheet.

47) When you are working on documentation on PC, the document temporarily stored in flash memory.

48) One megabyte equals approximately 1 million bytes.Computer Awareness Part-II

49) Information travels between components on the motherboard through buses.

50) RAM refers to the memory in your computer.

51) Computer connected to a LAN can share information and or share peripheral equipment

52) Microsoft office is an application suite

53) Utilities can handle most system functions that aren’t handled directly by the operating system

54) If you receive an e-mail from someone you don’t know then you should delete it without opening it

55) A set of instructions telling the computer what to do is called program

56) LAN refers to a small single site network

57) A collection of programs that controls how your computer system runs and processes information is called operating system.

58) Device drivers are small, special-purpose programs

59) Transformation of input into output is performed by the CPU

60) Data going into the computer is called input.

61) Binary choice offer only two options

62) To indent the first paragraph of your report, you should use tab key

63) Fields are distinct item that don’t have much meaning to you in a given context

64) A website address is a unique name that identifies a specific web site on the web

65) Modem is an example of a telecommunications device

66) A set of computer programs used for a certain function such as word processing is the best definition of a software package

67) You can start Microsoft word by using start button

68) A blinking symbol on the screen that shows where the next character will appear is a cursor

69) Highlight and delete is used to remove a paragraph from a report you had written

70) Data and time are available on the desktop at taskbar

71) A directory within a directory is called sub directory

72) Testing is the process of finding errors in software code

73) In Excel, charts are created using chart wizard option

74) Microcomputer hardware consists of three basic categories of physical equipment system unit,

input/output, memory

75) Windows is not a common feature of software applications

76) A tool bar contains buttons and menus that provide quick access to commonly used commands

77) For creating a document, you use new command at file menu

78) Input device is equipment used to capture information and commands

79) A programming language contains specific rules and words that express the logical steps of an algorithm

80) One advantage of dial-up internet access is it utilizes existing telephone security

81) Protecting data by copying it from the original source is backup

82) Network components are connected to the same cable in the star topology

83) Two or more computers connected to each other for sharing information form a network

84) A compute checks the database of user name and passwords for a match before granting access

85) Computers that are portable and convenient for users who travel are known as laptops

86) Spam is the term for unsolicited e-mail

87) Utility software type of program controls the various computer parts and allows the user to interact with the computer

88) Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels

89) Eight digit binary number is called a byte

90) Office LANs that are spread geographically apart on a large scale can be connected using a corporate WAN

91) Storage is the process of copying software programs from secondary storage media to the hard disk

92) The code for a web page is written using Hyper Text Markup Language

93) Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as flash








91.computer quiz questions For ibps 2015



Ques. : 1 Which is considered a direct entry input device?

1) Optical scanner

2) Mouse

3) Light pen

4) Digitizer

5) All of the above.

Ans.4


Ques. : 2 The daily processing of corrections to customer accounts best exemplifies the processing mode of:

1) Batch processing

2) Real-time processing

3) Interactive processing

4) Multi processing

5) All of the above.




111111111111111111111




Ques. : 3 Which is a unit of measurement used with computer systems?

1) Byte

2) Kilobyte

3) Megabyte

4) Gigabyte

5) All of the above




5555555555555




Ques. : 4 A character is represented in EBCDIC by

1) one bit

2) four bits

3) eight bits

4) sixteen bits

5) None of the above




Ans.) 3




Ques. : 5 Which is a secondary memory device?

1) CPU

2) ALU

3) Floppy disk

4) Mouse

5) None of the above

Ans.) 3




Ques. : 6 Which is the computer memory that does not forget?

1) ROM

2) RAM

3) PROM

4) All of the above

5) None of the above

Ans.) 1




Ques. : 7 The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?

1) American Standard Code for International Interchange

2) American Standard Code for Information Interchange

3) American Standard Code for Intelligence interchange

4) American Scientific Code for Information Interchange

5) None of the above

Ans.) 2




Ques. : 8 A computer derives its basic strength from

1) Speed

2) Accuracy

3) Memory

4) all of the above

5) None of the above




Ans.) 4




Ques. : 9 A collection of eight bits is called

1) Byte

2) Word

3) Record

4) file

5) None of the above




Ans.) 1




Ques. : 10 A BIT represents a

1) Decimal digit

2) Octal digit

3) Binary digit

4) Hexadecimal digit

5) none of these

Ans.) 3

Ques. : 11 Which can read data and convert them to a form that a computer can use?

1) Logic

2) Storage

3) Control

4) Input device

5) Output device

Ans.) 4

Ques. : 12 Software instruction intended to satisfy a user's specific processing needs are called

1) System software

2) A microcomputer

3) Documentation

4) Applications software

5) All of the above

Ans.) 4

Ques. : 13 Which of the following is the most powerful type of computer?

1) Super micro

2) Super conductor

3) Microcomputer

4) Super computer

5) Mega frame

Ans.) 4




Ques. : 14 Which of the following people probably has the least amount of technical knowledge?

1) Programmer

2) User

3) System analyst

4) Computer operator

5) Computer professional

Ans.) 2




Ques. : 15 The Central Processing Unit (CPU) consists of:

1) Input, output and processing

2) Control unit, primary storage & secondary storage

3) Control unit, arithmetic-logic unit, primary

storage

4) Control unit, processing, and primary storage

5) None of the above

Ans.) 3




Ques. : 16 This is the part of the computer system that one can touch

1) hardware

2) data

3) software

4) input

5) None of these

Ans.) 1

Ques. : 17 Reusable optical storage will typically have the acronym ___.

1) CD

2) RW

3) DVD

4) ROM

5) None of these

Ans.) 2




Ques. : 18 The __________ tells the computer how to use its components.

1) utility

2) network

3) operating system

4) application program

5) None of these

Ans.) 3

Ques. : 19 A(n) __________ is a program that makes the computer easier to use.

1) application

2) utility

3) network

4) operating system

5) None of these

Ans.) 2




Ques. : 20 The ‘Difference Analyzer’ was created in the early 1920s by __

1) Peter Norton

2) Douglas Knuth

3) Vannevar Bush

4) Alan Kay

5) None of these

Ans.) 3




Ques. : 21 The most important or powerful computer in a typical network.

1) desktop

2) network client

3) network server

4) network station

5) None of these

Ans.) 3




Ques. : 22 To access a mainframe or supercomputer, users often use a ___

1) terminal

2) node

3) desktop

4) handheld

5) None of these

Ans.) 1




Ques. : 23 What data base function allows you to define the data your database is storing?

1) Definition wizard

2) Query Function

3) Design view

4) Data dictionary

5) None of these

Ans.) 4




Ques. : 24 If you wanted to tell the database management system that a specific attribute contained numbers only, what

would you need to set?

1) Data category

2) Data type

3) Data dictionary

4) Data definition

5) None of these

Ans.) 2




Ques. : 25 What key distinctly identifies a record in a database table?

1) Main key

2) Primary key

3) Principal key

4) Major key

5) None of these

Ans.) 2




Ques. : 26 What key links records from one database table to a record or records in another database table?

1) Primary key

2) Principal key

3) Foreign key

4) Link key

5) None of these

Ans.) 3




Ques. : 27 When you link one database table to another database table, what are you creating?

1) Primary link

2) Connectivity

3) Relationships

4) Referential integrity

5) None of these

Ans.) 3




Ques. : 28 What would you need to establish if you wanted to insure that the key in one database table was the same as

a key in another database table?

1) Top-level grouping

2) Connectivity

3) Referential integrity

4) Field properties

5) None of these

Ans.) 3




Ques. : 29 What database tool would you use to find answers to your questions about data stored in your database?

1) Queries

2) Tables

3) Show

4) Q&A

5) None of these

Ans.) 1




Ques. : 30 When we describe, or define, the categories of information we collect in an Excel worksheet, what type of

table are we creating?

1) Categorization

2) Classification

3) Explanation

4) List definition

5) None of these

Ans.) 4




Ques. : 31 If you wished to limit what you would see on an Excel worksheet, what data function would you use?

1) Sort

2) Filter

3) Conditional format

4) Data analysis

5) None of these

Ans.) 2




Ques. : 32 If you wished to highlight, not hide, some information in a worksheet because it met some criteria, what Excel

tool would you use?

1) Table

2) Format

3) Conditional Format

4) Filter

5) None of these

Ans.) 3




Ques. : 33 What Excel tool allows you to create quickly and automatically summary data from a large data set?

1) Conditional formatting

2) Sorting

3) Pivot tables

4) Field lists

5) None of these

Ans.) 3




Ques. : 34 When creating a custom filer in Excel, which of the following would not be considered a Boolean operator?

1) If

2) And

3) Or

4) Not

5) None of these

Ans.) 1




Ques. : 35 Which of the following is a good habit to get into when creating a worksheet?

1) Placing titles for columns in the first row of data

2) Using conditional formatting to spot spelling

errors

3) Inserting comments in each cell to define that

data or type of data

4) Grouping records according to some

classification

5) None of these

Ans.) 1

























Ques. : 36 What term is used to describe a collection of information that you can use to build reports or discover facts

about an environment?

1) Database

2) Web site

3) Wiki

4) Relation

5) None of these

Ans.) 1




Ques. : 37 Microsoft's Access and Corel's Paradox are both examples of which type of software?

1) Network database systems

2) Relational database systems

3) Flat-file database systems

4) Hierarchical database systems

5) None of these

Ans.) 2




Ques. : 38 What type of graphical model is used to define a database?

1) Flowchart

2) E-R diagram

3) Organizational model

4) Programming model

5) None of these

Ans.) 2

Ques. : 39 After you develop a model for your database, you should then _____ it before building it.

1) normalize

2) design

3) plan

4) approve

5) None of these

Ans.) 1




Ques. : 40 Which of the following contains information about the structure of a database?

1) Database management system

2) Data dictionary

3) Data repository

4) Data warehouse

5) None of these

Ans.) 2




Ques. : 41 The rules of a language are called its __________.

1) structure

2) code

3) syntax

4) rigidity

5) None of these

Ans.) 3




Ques. : 42 A language that can be written on one platform and executed on another platform is said to be __________.

1) portable

2) robust

3) third generation

4) dynamic

5) None of these

Ans.) 1




Ques. : 43 __________ is Microsoft’s latest entry into the programming arena.

1) Java

2) .NET

3) Visual Basic

4) Pascal

5) None of these

Ans.) 2




Ques. : 44 A next-generation Web content development language, __________ typically refers to a suite of technologies

that allow developers to store data in a readable format.

1) HTML

2) XSL

3) XML

4) PHP

5) None of these

Ans.) 3




Ques. : 45 JavaScript was developed by __________ to run inside of web pages.

1) Microsoft

2) Sun

3) Oracle

4) Netscape

5) None of these

Ans.) 4




Ques. : 46 This technology is used to convert XML into HTML.

1) CSS

2) XHTML

3) PHP

4) XSL

5) None of these

Ans.) 4




Ques. : 47 The __________ is a special database that holds information about the computer’s user, installed programs

and hardware devices.

1) dynamic link library

2) initialization file

3) compiled help module

4) Windows Registry

5) None of these

Ans.) 4




Ques. : 48 A(n) __________ converts all the source code into machine code, creating an executable file.

1) linker

2) compiler

3) assembler

4) interpreter

5) None of these

Ans.) 2




Ques. : 49 A series of steps that always results in an answer is the definition of __________.

1) heuristic

2) flowchart

3) algorithm

4) pseudo code

5) None of these

Ans.) 3




Ques. : 50 The color of an object is an example of a(n) __________.

1) attribute

2) detail

3) listing

4) specification

5) None of these

Ans.) 1




Ques. : 51 A(n) __________ file contains information in an indexed and cross-linked format.

1) executable

2) initialization

3) help

4) library

5) None of these

Ans.) 3




Ques. : 52 A(n) __________ encapsulates data and functionality.

1) structured program

2) selection statement

3) object

4) program

5) None of these

Ans.) 2




Ques. : 53 __________ are text files containing OS commands.

1) Initialization files

2) Batch files

3) Executable files

4) Help files

5) None of these

Ans.) 2




Ques. : 54 The __________ prevents unlawful access to voice communications by wire.

1) Electronic Communications Privacy Act

2) Freedom of Information Act

3) USA Patriot Act

4) Privacy Act of 1974

5) None of these

Ans.) 1




Ques. : 55 Which of the following will not protect you from spam?

1) spam blockers

2) e-mail rules

3) popup blocker

4) filters

5) None of these

Ans.) 3




Ques. : 56 A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.

1) popup blocker

2) firewall

3) spyware blocker

4) spam assassin

5) restore file

Ans.) 2




Ques. : 57 To read the system messages and warnings, access the __________ in Windows.

1) system manager

2) control panel

3) event viewer

4) message screen

5) None of these

Ans.) 3




Ques. : 58 To create a copy of files in the event of system failure, you create a __________.

1) restore file

2) backup

3) firewall

4) redundancy

5) None of these

Ans.) 2




Ques. : 59 If configured correctly, the __________ will prevent interaction with your computer after a specified time

period.

1) firewall

2) filter

3) screen saver

4) popup blocker

5) virus

Ans.) 3




Ques. : 60 To recover files from a backup, you perform a __________.

1) restore

2) scan

3) unerase

4) copy

5) None of these

Ans.) 1




Ques. : 61 A __________ is anything that can cause harm.

1) vulnerability

2) phish

3) Threat

4) spoof

5) All of the above

Ans.) 3




Ques. : 62 In the right setting a thief will steal your information by simply watching what you type.

1) snagging

2) spying

3) social engineering

4) shoulder surfing

5) None of these

Ans.) 4




Ques. : 63 ---------- A hacker contacts you my phone or email and attempts to acquire your password

1) spoofing

2) phishing

3) spamming

4) bugging

5) None of these

Ans.) 2




Ques. : 64 This power protection device includes a battery that provides a few minutes of power.

1) surge suppressor

2) line conditioner

3) generator

4) UPS

5) None of these

Ans.) 4




Ques. : 65 A hacker that changes or forges information in an electronic resource, is engaging in __________.

1) denial of service

2) sniffing

3) terrorism

4) data diddling

5) None of these

Ans.) 4




Ques. : 66 The __________ of a threat measures its potential impact on a system

1) vulnerabilities

2) countermeasures

3) degree of harm

4) susceptibility

5) none of these

Ans.) 3




Ques. : 67 Which of the following identifies a specific web page and its computer on the Web?

1) Web site

2) Web site address

3) URL

4) Domain Name

5) All of above

Ans.) 4




Ques. : 68 Software, such as Explorer and Firefox, are referred to as _____.

1) Systems software

2) Utility software

3) Browsers

4) Internet tools

5) None of these

Ans.) 3




Ques. : 69 Which following ISP is free?

1) CompuServe

2) AOL

3) NetZero

4) MSN

5) None of these

Ans.) 3




Ques. : 70 When internet data leaves your campus, it normally goes to a(n) ______ before moving toward its destination.

1) Internet backbone

2) Network access point

3) Base station

4) Communication system

5) None of these

Ans.) 2




Ques. : 71 MCI and AT&T are examples of which of the following?

1) Social networks

2) Communications systems

3) Internet service providers

4) Mobisodes

5) None of these

Ans.) 3




Ques. : 72 What type of telecommunications hardware allows you to access the web?

1) Browser

2) Modem

3) FTP protocol

4) IRC

5) All of above

Ans.) 2




Ques. : 73 E-mail addresses separate the user name from the ISP using the __________ symbol

1) &

2) @

3) %

4) *

5) None of these

Ans.) 2




Ques. : 74 The mail server as defined in the text uses the __________ protocol

1) HTTP

2) FTP

3) POP

4) SMTP

5) All of above

Ans.) 3




Ques. : 75 When sending an e-mail, the __________ line describes the contents of the message.

1) to

2) subject

3) contents

4) CC

5) All of above

Ans.) 2




Ques. : 76 Unsolicited commercial email is commonly known as __________.

1) junk

2) hoaxes

3) spam

4) hypertext

5) All of above

Ans.) 3




Ques. : 77 News servers utilize __________ to distribute documents to readers.

1) NNTP

2) NEWS

3) HTTP

4) FTP

5) None of these

Ans.) 1




Ques. : 78 Discussion groups may have a __________ who monitors the postings and enforces the site’s rules.

1) judge

2) sysop

3) narrator

4) censor

5) None of these

Ans.) 2




Ques. : 79 A message with replies on a newsgroup is often called a __________.

1) post

2) list

3) thread

4) comment

5) All of above

Ans.) 3




Ques. : 80 The Internet was originally a project for this government agency.

1) ARPA

2) NSF

3) NSA

4) FCC

5) None of these

Ans.) 1




Ques. : 81 A word in a web page that, when clicked, opens another document.

1) anchor

2) URL

3) Hyperlink

4) reference

5) All of above

Ans.) 3




Ques. : 82 A network’s __________ is the central structure that connects other portions of the network.

1) trunk

2) backbone

3) protocol

4) server

5) None of these

Ans.) 2




Ques. : 83 __________ is the protocol that supports linking from one web page to another page.

1) HTML

2) IP

3) HTTP

4) FTP

5) All of above

Ans.) 3




Ques. : 84 You can organize your bookmarks using __________.

1) structures

2) containers

3) folders

4) menus

5) None of these

Ans.) 3




Ques. : 85 The browser’s __________ keeps a list of web pages you have visited during the current session.

1) history

2) cache

3) favorites

4) trail

5) All of the above

Ans.) 1




Ques. : 86 A __________ organizes the web into categories.

1) search engine

2) encyclopedia

3) archive

4) directory

5) None of these

Ans.) 4




Ques. : 87 To match all of the words in your search, the Boolean __________ operator should be used.

1) and

2) or

3) xor

4) both

5) All of above

Ans.) 1




Ques. : 88 What type of accountants may recommend controls for an organization's computer systems?

1) Environment accountant

2) Internal accountant

3) Government accountant

4) Public accountant

5) All of above

Ans.) 2




Ques. : 89 Which IT area is well-established in Accounting?

1) Multimedia systems

2) Web development

3) Statistical analysis

4) Accounting Information Systems

5) None of these

Ans.) 4




Ques. : 90 How do accountants quickly research new government rules and regulations?

1) With an internal database management systems

2) Through the Web

3) With an external database management systems

4) Through organizational network systems

5) All of above

Ans.) 2




Ques. : 91 Which computer virus records every movement you make on your computer?

1) Malware Android

2) Key logger

3) DoS

4) Trapper

5) None of these

Ans.) 2