mahendras

Subscribe Mahendras Youtube Channel | Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge For IBPS-PO/CLERK- Exam : 14.10.2015

Bankers Guru

Computer Knowledge For IBPS-PO/CLERK- Examination

Q-1. The network interface card of LAN is related to following layer of OSI Model-

(1) Transport (2) Network (3) Data Link (4) Physical (5) All of these 

Q-2. Which of the following does not describe a data warehouse?

(1) Subject-oriented (2) Integrated (3) Time-variant (4) Updateable 

(5) None of these 

Q-3. Which of the following is true ?

(1) Logical design is software-dependent 

(2) In a distributed database, database is stored in one physical location 

(3) Conceptual design translates the logical design into internal model 

(4) Logical design is software independent 

(5) None of these 

Q-4. A range check _____

(1) Ensures that only the correct data type is entered into a field 

(2) Verifies that all required data is present 

(3) Determines whether a number is within a specified limit 

(4) Tests if the data in two or more associated fields is logical 

(5) None of these 

Q-5. The total set of interlinked hypertext documents worldwide is--------------

(1) HTTP (2) Browser (3) WWW (4) B2B (5) None of these 

Q-6. An applet __________

(1) Is an interpreted program that runs on the client 

(2) Tracks the number of visitors to a Website 

(3) Is a compiled program that usually runs on the client 

(4) Collects data from visitors to a Website 

(5) None of these 

Q-7. Sometimes called a---------------virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(1) System virus (2) Trojan horse virus (3) File virus (4) Macro virus (5) Boot sector 

Q-8. Which error detection method uses one's complement arithmetic?

(1) Simply parity check 

(2) Checksum 

(3) Two-dimensional parity check  

(4) CRC 

(5) None of these 

Q-9. A result of a computer virus can not lead to ___. 

(1) Disk Crash 
(2) Mother Board Crash 
(3) Corruption of program 

(4) Deletion of files 
(5) None of these 

Q-10. What is Internet 2? 

(1) A new type of cabling system for Wide Area Networks 

(2) A second local area network that can connect with another online LAN to share access 

(3) A new standard for Internet browsers 

(4) An association to develop advanced Internet technology 

(5) None of these 

Q-11. The term, "hypertext", means---------- 

(1) Non-sequential writing 

(2) Hypermedia 

(3) Blinking text 

(4) Text with heavy formatting 

(5) None of these 

Q-12. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information? 

(1) Visit Google's cached page to view the older copy. 

(2) Forget about it, as there is no way to find this information. 

(3) Visit a partner site of the organization to see if it is there 

(4) Use the way back machine 

(5) None of these 

Q-13. Which kind of lock includes a keypad that can be used to control access into areas? 

(1) Cipher (2) Warded (3) Device (4) Tumbler (5) Type lock 

Q-14. Which input device is used to read characters directly from an ordinary piece of paper? 

(1) OMR (2) OCR (3) TSR (4) PCR (5) None 

Answers

Q-1.(4) Q-2.(4) Q-3.(1) Q-4.(3) 

Q-5.(1) Q-6.(3) Q-7.(5) Q-8.(2) Q-9.(2) 

Q-10.(4) Q-11.(2) Q-12.(3) Q-13.(4) Q-14.(2)

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.