0% found this document useful (0 votes)
75 views4 pages

IBPS CWE (PO/MT) Previous Year Exam Paper - 2014 Computer Knowledge

This document contains a 20 question multiple choice exam on computer knowledge topics. The questions cover data hierarchy, web browsers, email spam, processor speed measurement, keyboard shortcuts, e-commerce, website blocking programs, versions of MS Office, HTML, computer chips, definitions of common computer acronyms, user authentication, types of software, PDF definition, firmware, cheque processing techniques, Windows file explorer, GUI definition, software debugging, and DOS definition. The answers to all 20 questions are provided at the end.

Uploaded by

Dwinkle Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views4 pages

IBPS CWE (PO/MT) Previous Year Exam Paper - 2014 Computer Knowledge

This document contains a 20 question multiple choice exam on computer knowledge topics. The questions cover data hierarchy, web browsers, email spam, processor speed measurement, keyboard shortcuts, e-commerce, website blocking programs, versions of MS Office, HTML, computer chips, definitions of common computer acronyms, user authentication, types of software, PDF definition, firmware, cheque processing techniques, Windows file explorer, GUI definition, software debugging, and DOS definition. The answers to all 20 questions are provided at the end.

Uploaded by

Dwinkle Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

IBPS CWE (PO/MT) Previous Year Exam Paper – 2014

Subject: Computer Knowledge

1. Which of the following places the common data elements in order from smallest to
largest?

(1) Bit, byte, character, record, field, file, database


(2) Database, file, record, field, character
(3) Character, record, field, database, file
(4) Character, file, record, field, database
(5) Character, field, record, file, database

2. Specialised programs that assist users in locating information on the web are called

(1) Web browsers


(2) Information engines
(3) Data engines
(4) Search engines
(5) None of these

3. What is the term for unsolicited e-mail?

(1) Flamming
(2) Usenet
(3) Spam
(4) Backbone
(5) News Group

4. Processor speed is measured in

(1) bytes
(2) gigabytes
(3) gigahertz
(4) megabytes
(5) kilobytes

5. Which of the following can be used to select the entire document?

(1) Ctrl + H
(2) Alt + S
(3) Shift + E
(4) Ctrl+A
(5) Ctrl + K

Download From - www.letsstudytogether.co


6. The buying or selling of goods over the internet is termed as

(1) e-selling
(2) e-buying
(3) e-business
(4) e-commerce
(5) e-transaction

7. What are the programs that block access to selected websites known as?

(1) Channels
(2) Filters
(3) Browsers
(4) Telnet
(5) Drivers

8. Which of the following is not a valid version of MS-Office?

(1) Office 2000


(2) Office XP
(3) Office 2003
(4) Office 2007
(5) Office Vista

9. Which of the following is used to write Web pages?

(1) URL
(2) HTML
(3) Telnet
(4) HTTP
(5) FTP

10. A computer chip is also called a

(1) register
(2) switch
(3) server
(4) modem
(5) microprocessor

11. VIRUS stands for __________

(1) Vital Information Region Under Siege


(2) Vital Information Recourse Under System
(3) Vital Information Resource Under Secure

Download From - www.letsstudytogether.co


(4) Vital Information Resource Under Siege
(5) Virus Information Recourse Under Siege

12. Verification of a login name and password is known as

(1) Configuration
(2) Accessibility
(3) Logging in
(4) Authentication
(5) Subscription

13. Microsoft Word is an example of alan

(1) system software


(2) application software
(3) operating system
(4) processing device
(5) input device

14. What does the acronym PDF stand for?

(1) Portable Documentation File


(2) Portable Document Format
(3) Portable Document File
(4) Portable Documenting Format
(5) Portable Documentation Format

15. Which of the following refers to programs stored in ROM?

(1) Hardware
(2) Software
(3) Peripheral
(4) Firmware
(5) Freeware

16. In processing cheques, which of the following PO techniques have Indian banks
traditionally followed?

(1) VRT
(2) OMR
(3) OCR
(4) Barcode
(5) MICR

17. Windows Explorer is the name of

Download From - www.letsstudytogether.co


(1) a drive
(2) a file manager
(3) a web browser
(4) an internet server
(5) a network

18. GUI stands for

(1) Graphical Universal Interference


(2) Graphic Universal Interface
(3) Graphical User Interface
(4) Graphical Unity Interference
(5) Graph Utility Interference

19. ________ is the process of finding errors in software code.

(1) Exchanging
(2) Debugging
(3) Running
(4) Compressing
(5) None of these

20. DOS stands for

(1) Disk Operating Session


(2) Disk Operating System
(3) Digital Operating System
(4) Disk Opening Source
(5) Digital Open System

Answers
1. (5) 2. (4) 3. (3) 4. (3) 5. (4) 6. (4) 7. (2) 8. (5) 9. (2) 10. (5) 11. (4) 12. (4) 13. (2) 14. (2) 15. (4)
16. (5) 17. (2) 18. (3) 19. (2) 20. (2)

Download From - www.letsstudytogether.co

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy