Solved papers for Banking Computers Science IBPS Bank Clerk CWE Main Exam 01-01-2017

done IBPS Bank Clerk CWE Main Exam 01-01-2017 Total Questions - 40

  • question_answer1) The scrambling of code is known as:

    A)
     Encryption       

    B)
     Firewalling

    C)
     Scrambling       

    D)
     Deception

    E)
     Permuting

    View Answer play_arrow
  • question_answer2) What is the full form of VoIP?

    A)
     Voice of Internet Power

    B)
     Voice over Internet Protocol

    C)
     Voice on Internet Protocol

    D)
     Very Optimized Internet Protocol

    E)
     Very Official Internet Protocol

    View Answer play_arrow
  • question_answer3) Why do you log off from your computer when going out from your office?

    A)
     Someone might steal tour files, passwords etc.

    B)
     In order to save electricity.

    C)
     logging off is essential to increase performance.

    D)
     logging off is mandatory you before go out

    E)
     logging off is a good exercise to perform regularly.

    View Answer play_arrow
  • question_answer4) Which of the following is not responsible for the performance of the computer?

    A)
     no. of keys in the keyboard.

    B)
     name of the video/ graphics word.

    C)
     memory in the video/graphics word.

    D)
     the clock speed of the processor.

    E)
     no. of cores available in the processor.

    View Answer play_arrow
  • question_answer5) Which of the following is used to access a file from the computer store?

    A)
     insert   

    B)
     retrieve

    C)
     file                  

    D)
     print

    E)
     find

    View Answer play_arrow
  • question_answer6) Hard drive is used to store

    A)
     volatile data     

    B)
     non-volatile data

    C)
     permanent data

    D)
     temporary data

    E)
     intermediate data

    View Answer play_arrow
  • question_answer7) Which of the following is the combination of numbers, alphabets along with username used to get access to user account?

    A)
     Password

    B)
     user-name

    C)
     Title name       

    D)
     host-id

    E)
     screen name

    View Answer play_arrow
  • question_answer8) Which of the following is the type of software that has self-replicating software that causes damage to files and system?

    A)
     Viruses

    B)
     Trojan horses

    C)
     Bots    

    D)
     Worms  

    E)
     Backdoors

    View Answer play_arrow
  • question_answer9) ______ is used for very large files or where a fast response time is not critical. The files to be transmitted are gathered over a period and then send together as a batch.

    A)
     Batch processing

    B)
     Online processing

    C)
     File processing

    D)
     Data processing

    E)
     Text processing

    View Answer play_arrow
  • question_answer10) Which of the following system is a function of dedicated PCs?

    A)
     meant for a single user

    B)
     meant for the single task

    C)
     deal with single software

    D)
     deal with only editing

    E)
     deal for music purpose

    View Answer play_arrow
  • question_answer11) What can possibly be the drawback of e-mails?

    A)
     requires being physically delivered to the user.

    B)
     emails infects computer.

    C)
     emails are very expensive to transmit.

    D)
     emails are slow to load.

    E)
     people don t check emails regularly.

    View Answer play_arrow
  • question_answer12) Which of the following is a valid email address?

    A)
     

    B)
     

    C)
     

    D)
     

    E)
     

    View Answer play_arrow
  • question_answer13) Which of the following character set supports Japanese and Chinese font?

    A)
     EBCDIC          

    B)
     ASCII

    C)
     BC    

    D)
     ECBI

    E)
     Unicode

    View Answer play_arrow
  • question_answer14) What is the full form of RTF?

    A)
     Richer Text Formatting

    B)
     Rich Text Format

    C)
     Right Text Fishing

    D)
     Right Text Font

    E)
     Rich Text Font

    View Answer play_arrow
  • question_answer15) Which of the following is the text alignment available in word processing software that adjusts the left margin while keeping the right margin in anyway?

    A)
     Justify             

    B)
     Left justify

    C)
     Right justify      

    D)
     Centre   

    E)
     Orientation

    View Answer play_arrow
  • question_answer16) Which of the following is false about the clock of the system?

    A)
     It is the property of the toolbar

    B)
     The system can periodically refresh the time by synchronizing with a time source

    C)
     System time is the current date and time of day.

    D)
     The system keeps time so that your applications have ready access to accurate time.

    E)
     The system bases system time on coordinated universal time (UT.

    View Answer play_arrow
  • question_answer17) Which of the following are properties of USB?

    A)
     Platform independent    

    B)
     Platform dependent

    C)
     Source dependent

    D)
     Software dependent

    E)
     Software independent

    View Answer play_arrow
  • question_answer18) An act of sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information?

    A)
     Phishing           

    B)
     Spam

    C)
     hacking            

    D)
     cracking

    E)
     Malware

    View Answer play_arrow
  • question_answer19) Which of the following is the organized collection of large amount of interrelated data stored In a meaningfully way used for manipulation and updating?

    A)
     Database         

    B)
     File

    C)
     Folder  

    D)
     Data-mining

    E)
     Data source

    View Answer play_arrow
  • question_answer20) Which among the following cycle consists of an Input, processing, output and storage as its constituents?

    A)
     Processing        

    B)
     Output

    C)
     Input               

    D)
     Storage

    E)
     Data

    View Answer play_arrow
  • question_answer21) The part of a computer that coordinates all its functions is called its.

    A)
     ROM program

    B)
     System board

    C)
     Arithmetic logic unit

    D)
     Control unit

    E)
     None of these

    View Answer play_arrow
  • question_answer22) Oracle is a :

    A)
     RDBMS

    B)
     Hardware

    C)
     System software

    D)
     High level language

    E)
     None of the above

    View Answer play_arrow
  • question_answer23) Which of the following computer languages is a mathematically oriented language used for scientific problems?

    A)
     FORTRAN       

    B)
     COBOL

    C)
     LISP               

    D)
     PROLOG

    E)
     ANDROID

    View Answer play_arrow
  • question_answer24) Coded entries which are used to gain access to a computer system are called

    A)
     Entry codes      

    B)
     Passwords

    C)
     Security commands

    D)
     Code words

    E)
     None of these

    View Answer play_arrow
  • question_answer25) Communication between a computer and a keyboard involves ____ transmission

    A)
     Automatic        

    B)
     Half-duplex

    C)
     Full-duplex       

    D)
     Simplex

    E)
     none of the above

    View Answer play_arrow
  • question_answer26) In which of the following level of OSI model, data encryption is done?

    A)
     Application layer

    B)
     Session layer

    C)
     Transport layer

    D)
     Network layer

    E)
     None of these

    View Answer play_arrow
  • question_answer27) _____ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

    A)
     The operating system

    B)
     The motherboard

    C)
     The platform

    D)
     Application software

    E)
     Hardware

    View Answer play_arrow
  • question_answer28) Which of the following is not a property of fiber optic cabling?

    A)
     Transmits at faster speeds than copper cabling

    B)
     Easier to capture a signal from than copper cabling

    C)
     Very resistant to interference

    D)
     Carries signals as light waves

    E)
     les attenuation

    View Answer play_arrow
  • question_answer29) DEL command is used to

    A)
     delete files

    B)
     delete directory

    C)
     delete labels

    D)
     delete contents of file

    E)
     None of these

    View Answer play_arrow
  • question_answer30) _____ are software which

    A)
     used to do particular task.

    B)
     Operating system

    C)
     Program

    D)
     Data software Data

    E)
     None of these

    View Answer play_arrow
  • question_answer31) _____ is the process of a viding the disk into tasks      sectors. 

    A)
     Alloting

    B)
     Crashing

    C)
     Formatting

    D)
     Tracking 

    E)
     Decrypting

    View Answer play_arrow
  • question_answer32) What type of software creates a smaller file that is faster to transfer over the internet?

    A)
     Compression    

    B)
            Fragmentation

    C)
     Encapsulation

    D)
            Unzipped

    E)
     Abstraction

    View Answer play_arrow
  • question_answer33) A process known as ____ is used by large retailers to study trends.

    A)
     data mining      

    B)
     data selection

    C)
     POS                

    D)
     data conversion

    E)
     data inversion

    View Answer play_arrow
  • question_answer34) The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty is called ______.

    A)
     robotics           

    B)
     simulation

    C)
     computer forensics

    D)
     animation

    E)
     encapsulation

    View Answer play_arrow
  • question_answer35) _____ is data that has been organised and presented in a meaningful fashion.

    A)
     A process         

    B)
     Software

    C)
     Storage

    D)
     Information

    E)
     Data

    View Answer play_arrow
  • question_answer36) The components that process data are located in which of the following?

    A)
     input devices

    B)
     output devices

    C)
     system unit                  

    D)
     storage component

    E)
     None of these

    View Answer play_arrow
  • question_answer37) The CPU and memory are located in which of the following devices?

    A)
     motherboard    

    B)
     expansion board

    C)
     storage device

    D)
     output device

    E)
     System unit

    View Answer play_arrow
  • question_answer38) ______ is the revolving around the use of nano structures to build devices on an extremely small scale.

    A)
     Nanotechnology

    B)
     Micro-technology

    C)
     Computer forensics

    D)
     Artificial Intelligence

    E)
     Very small scale technology

    View Answer play_arrow
  • question_answer39) The steps and tasks needed to process data, such as responses to questions or clicking an Icon, are called ____.

    A)
     instructions       

    B)
     the orpating system

    C)
     application software

    D)
     the system unit

    E)
     the hardware unit

    View Answer play_arrow
  • question_answer40) Which of the metal or plastic case that holds all the physical parts of the computer?

    A)
     system unit

    B)
     CPU

    C)
     main frame      

    D)
     platform

    E)
     micro processor

    View Answer play_arrow

Study Package

IBPS Bank Clerk CWE Main Exam 01-01-2017
 

   


You need to login to perform this action.
You will be redirected in 3 sec spinner