#1
| |||
| |||
paper of ibps clerk |
#3
| |||
| |||
Re: paper of ibps clerk
Feel free I will provide you Computer Knowledge exam paper of IBPS Clerk Post, so that it would be easy for you to prepare hard for the exam. Here is the exam paper ...... refers to the unauthorized copying and distribution of software. (1) Hacking (2) Software piracy (3) Software literacy (4) Cracking (5) Copyright Which of the following is an operating system? (1) Umlx (2) Debugger (3) Mozilla (4) Google Chrome (5) Intel 8085 A collection of programs that controls how your computer system runs and processes information is called (1) operating system (2) computer (3) office (4) compiler (5) interpreter Which of the following statements is a false conceiving file names? (1) Every file in the same folder must have a unique name (2) The file name comes before the dot (.) (3) File extension is another name for the type (4) The file extension comes before the dot (.) followed by the file name (5) Files may share the same name or the same extension, but not both at the same time Which is not a storage device? (1) Printer (2) CD (3) Hard Disk (4) Floppy Disk (5) DVD ........ tags, placed on animal’s body can be used to record and track in a database all of the animal’s movements. (1) pas (2) RFID (3) PPS (4) GPS (5) Other than those given as options Which of the following cables can transmit data at high speeds? (1) Flat cables (2) Coaxial cable (3) Optic fibre cable (4) Twisted pair cable (5) UTP cable The hardware device or software program that sends messages between networks is known as a (1) bridge (2) backbone (3) router (4) gateway (5) Other than those given as options If you are performing Windows 98 operating system to Windows XP you are performing a(n) (1) push up (2) China (3) patch (4) pull down (5) update . . . . . . . . . technology enables you to carry a powerful’ navigational aid in websites. (1) Convergence (2) Locator (3) Sampling rate (4) Synchronization (5) Global Positioning System Which of the following is not true about RAM? (1) RAM is the same as hard disk storage (2) RAM is a temporary storage area (3) RAM is volatile (4) RAM stands for Random Access Memory (5) Information stored in RAM is gone when you, turn the computer off All of the following are examples of real security and privacy risks EXCEPT (1) spyware (2) spam (3) hackers (4) identity theft (5) viruses Which of the following commands in Office 2007, can be used to go to the first cell in the current row? (1) Tab (2) Shift + Tab (3) Esc + Home (4) Shift + Home (5) Home Software such as Viruses, Worms and Trojan Horses that has a malicious content, is known as (1) malicious software (malware) (2) adware (3) shareware (4) spyware (5) firewall Chip is a common nickname for a(n) (1) transistor (2) resistor (3) integrated circuit (4) semi-conductor (5) Other than those given as options What is extension of Microsoft Word document? (1) doc (2) ppt (3) dcc (4) bd (5) hml Which of the following enables to determine how often a user visited a website? (1) Hackers (2) Spammers (3) Phish (4) Identity thefts (5) Cookies To move to the bottom of a document while working on MS Word, which command is used? (1) Home key (2) End key (3) Ctrl + Page Down (4) Insert key (5) Ctrl key + End key What is a person called who uses a computer to cause harm to people or destroy critical systems? (1) Cyber Terrorist (2) Black-hat Hacker (3) Cyber Cracker (4) Hacktivist (5) Other than those given as options . . . . . . . .. can interpret voice data into words that can be understood by the computer. (1) Speech input hardware (2) Speech recognition software (3) Word recognition software (4) Talking software (5) Other than those given as options Oracle is a(n) (1) hardware (2) high level language (3) operating system (4) system software (5) RDBMS |
|