Tuesday, May 28, 2013

Computer awareness Questions for IBPS PO/CLERK CWE III SET:-02

1. A _____ describes a category of information in a table of database:- Field
2. A goal of data mining includes: - To analyze data for expected relationships
3. The correct hierarchical order (smallest to largest) for the database terms is :- Field<Record<File<Database
4. In window XP which shortcut is used to cycle through opened items in taskbar:- Alt+Esc
5. A digital computer computes the value of the expression 2 * 5 – 2 > 2 inside:- CPU chip
6. Software providers who develop many productivity tools may also provides stripped-down versions that
combine the simpler features of these tools bundled together in to: - an integrated software application
7. to produce a high quality graphics Hard copy in colour we would want to use a :- Plotter
8. The extension of Batch file is: - .bat
9. The file that is executed at the time of Booting is: - Autoexec.bat
10. Bit refers to a: - Binary digits ( 0 or 1 value)
11. In computer language each letter number and an array of special characters consists of :- 8 bits
12. A small biomedical device available in the market that can be implanted underneath the skin for
identification purposes is called: - verichip
13. Microprocessor was introduced in which generation of computer: - 4th Generations
14. The time taken by the CPU to retrieve and interpret the instruction to be executed is called as: - instruction
cycle
15. Internal memory in a CPU is nothing but: - A set of registers
16. Information retrieval is faster from: - Hard disk
17. OS (operating system) is: - a collection of software routines
18. If you wish to extend the length of the network without having the signal degrade you would use a: -
Repeater
19. A repair for a known software bug usually available at no charge on the internet is called: - Patch
20. When data changes in multiple lists and all lists are not updated this causes :- data inconsistency
21. One advantage of dial up Internet access is that :- it utilizes existing telephone service
22. What is the process of coping software programs from secondary storage media to the hard disk caked :-
Installation
23. Which process checks to ensure the components of the computer are operating and connected properly :-
booting
24. Most mail programs automatically complete the ______ two parts of an e-mail:- from and Date
25. The computer’s capability of distinguishing spoken words is called: - Voice recognition
26. ERP stands for: - enterprise resource planning
27. The issues that deal with the collection and use of data about individuals is: - Privacy
28. a term related to sending data to a satellite is :- uplink
29. Online Doc. Containing underlined phrases or icons that a user can click I order to move immediately to
related parts of the current Doc. Or to other Doc. With relative information are called: - hypertext
30. Physical security is concerned with protecting computer hardware form human tampering and natural
disasters and _____ security is concerned with protecting software from unauthorized tampering or damage :-Cyber
31. Collecting personal information and effectively posing an another individual is known as :- Spoofing
32. What is usually used for displaying information at public places: - Monitors and overhead projections
33. What is the most popular hardware for multimedia creation: - PCs
34. The life span of a CD-ROM is: - approx. 5 year
35. Magnetic tape is not practical for applications where data must be quickly recalled because tape is: - a
sequential access medium
36. How is it possible that both programs and data can be stored in the same floppy disk: - Programs and data
are both software and both cab be stored in any memory device
37. What is embedded system: - A computer and software system that controls a machine or application
38. The signal which shows that a computed is waiting for a command from user is: - interrupt
39. which software allows the user to move from page to page on the web by clicking on or selecting a hyperlink
or by typing in the address of the destination page :- Web Browser
40. Which controls the manner of interaction between the user and the OS: - user interface
41. A _____ is a computer over internets which read IP address on a packet and relay it towards its
destination:- Router
42. A floppy can be write protected by: - Positioning the slider away from the hole
43. Rotational delay time is also known as Latency
44. The average drives have an access time of: - 9-14ms
45. Father of “C” programming language was: - Dennis Ritchie
46. How is power supplied to a low power USB device: - through a USB cable
47. The _____ data mining technique derives rules from real world case examples: - Neural nets
48. ______ is used to identify a user who returns to a website: - cookies
49. Which objects is passed to a java Bean when one of its properties is set via a JSP action:- Servlet Response
50. Microwave transmission is used in environments where installing physical transmission media is :- Easy or
promising and where line of sight transmission is available

No comments:

Post a Comment