mahendras

| Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge For IBPS PO/CLERK : 24.03.2016

Bankers Guru

Q.1. When you are selecting a mouse for a particular computer system, what is the most important 
consideration?

(1) The type of drivers that come with the mouse 

(2) The length of the mouse cord

(3) The type of connector the mouse is equipped with 

(4) The number of buttons the mouse has

(5) None of these

Q.2. How is power supplied to a low-power USB device?

(1) Through a power cable 

(2) From an external power supply

(3) Directly from the computers power supply 

(4) Through the USB cable

(5) None of these 

Q.3. A document created in a word processing program or a budget created in a spreadsheet are both examples of documents created in:

(1) Application software (2) System software 

(3) An operating system. (4) A Windows platform 

(5) None of these

Q.4. Which of the following is not a valid memory?

(1) ROM (2) RAM (3) EEPROM (4) NIC (5) None of these

Q.5. What do you need to have for browsing internet?

(1) Internet Account with an ISP (2) Telephone Line

(3) Computer with modem (4) All of the above

(5) None of these

Q.6. If you want to improve the performance of your PC, you need to upgrade the

(1) CPU (2) Monitor (3) Keyboard (4) Printer (5) None of these

Q.7. Which of the following is a function of UPS?

(1) It limits damage caused by fluctuating levels of electricity

(2) It provides battery backup for limited time

(3) It delivers electronic messages via bus

(4) It conducts a power-on self-test or POST

(5) None of these

Q.8. The feature to customize the desktop to display information that can be updated from internet is:

(1) Active desktop (2) Online desktop (3) E-mail

(4) Resource Sharing (5) None of these

Q.9. ...... is a process of sending documents to a storage where they are temporarily stored and remain there until printer prints them.

(1) Printing (2) Queuing (3) Waiting Queue (4) Print Spooling (5) None of these

Q.10. Firewall is used in communication network / system to save:

(1) Unauthorized attack (2) Virus attack (3) Data driven attack

(4) Fire attack (5) None of these

ANSWERS

Q.1.(3) Q.2.(4) Q.3.(1) Q.4.(4) Q.5.(4) Q.6.(1) Q.7.(2) Q.8.(1) Q.9.(4) Q.10.(1) 












Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.