Study Material for IBPS PO & Clerk, RRB, SBI PO & Clerk ~ Computer Awareness

Computer is a scoring subject in IBPS Clerk, PO, in RRB, RBI and also in SBI PO & Clerk. For your better practice and knowledge i have uploaded a pdf for computer awareness for IBPS examination. you can practice some questions here or can download the same in pdf file from the bottom of the page which contains 700 questions for practice.

1. A peer-to-peer LAN is an appropriate network architecture for____
(1) The Internet.
(2) Home network.
(3) Network requiring a server with shared resources.
(4) wide area network
(5) None of these

2. Similar to a hub in an Ethernet network, a ____________ helps relay data between wireless network nodes.
(1) Wireless port
(2) Wireless access point
(3) wireless adapter
(4) wireless transceiver
(5) None of these

3. Cell phones use ____________ to access the Internet.
(1) MMS technology
(2) a notation system
(3) micro browser software
(4) HTML language
(5) None of these

4. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______
(1) Node.
(2) Packet.
(3) Override.
(4) Token.
(5) None of these

5. The uniform resource locator (URL) is case sensitive in the ____.
(1) Protocol
(2) Authority
(3) Directory
(4) Type
(5) None of these

6. ASCII is a(n)________
(1) Numbering system for representing numbers with decimals.
(2) Character representation standard common in older mainframe computers.
(3) Encoding standard used to represent letters and characters.
(4) Symbolic programming language that directly represents machine instructions.
(5) None of these

7. A global network made up of thousands of privately owned computers and networks is called the:
(1) World Wide Web.
(2) Internet.
(3) Specialized search engine.
(4) Internet2.
(5) None of these

8. Which of the following is NOT a basic function of the operating system?
(1) Manage memory
(2) Provide the word processing system
(3) Start the computer
(4) Provide the user interface
(5) None of these


9. Which of the following scrambles a message by applying a secret code?
(1) Encryption
(2) Audits
(3) UPS
(4) Firewalls
(5) None of these

10. The Internet began with the development of
1) USENET
2) ARPANET
3) Ethernet
4) Intranet
5) None of these

11. Website is a collection of ________
1) HTML documents
2) Graphic files
3) Audio and Video files
4) All of the above
5) None of these

12. Who designed the first electronic computer - ENIAC ?
1) Van Neuman
2) Joseph M Jacquard
3) J presper Eckert
4) Both 1 and 2
5) None of these

13. Which of the following is not a network?
1) Local Area Network
2) Wide Area Network
3) Optical Fiber
4) All are networks
5) None of these

14. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these

15. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

16. Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these

129. Perforated paper used as input or output media is known as_____
(1) Paper tape
(2) Magnetic tape
(3) Punched paper tape
(4) Card punch
(5) None of these

130. 30 The first generation computer system used________
(1) Vacuum tubes
(2) Transistors
(3) Registers
(4) Magnetic cores
(5) Silicon chip

131. To access properties of an object, the mouse technique to use is _______
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these

132. The ALU and Control Unit jointly known as_______
(1) RAM
(2) ROM
(3) CPU
(4) PC
(5) none of these

133. Computers process data into information by working exclusively with ______
(1) multimedia
(2) words
(3) characters
(4) numbers
(5) None of these

134. COBOL stands for _______
(1) Common Business Oriented Language
(2) Computer Business Oriented Language
(3) Common Business Operated Language
(4) Common Business Organized Language
(5) None of these

135. What is the other name for programmed chip?
(1) RAM
(2) ROM
(3) LSIC
(4) PROM
(5) None of these

136. ___________ Store data temporarily and pass it on as directed by the control unit.
(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these

137. RAID stands for________
(1) Reproduce Array of Intelligent Disks
(2) Reproduce Array of Inexpensive Disks
(3) Redundant Array of Inexpensive Drives
(4) Redundant Array of Inexpensive Disks

138. Select the smallest memory size:-
(1) Terabyte
(2) Gigabyte
(3) Kilobyte
(4) Megabyte
(5) None of these

139. In most Microsoft programs, what does 'alt+f4' do?
(1) Ends the program
(2) Opens the program
(3) Run the program
(4) Modify the program
(1) none of these

140. A device that is used to transmit data from one location to another is known as ________
(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these

141. Programs developed by an outside supplier and provided to the user in a machine readable form is known
as___________.
(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these

142. Which of the following describe one or more characteristics of a modem computer?
(1) An electronic device
(2) A mechanical device
(3) An electro-mechanical device
(4) All of the above
(5) None of these

143. Octal number system has a base ______.
(1) Two
(2) Four
(3) Eight
(4) Ten
(5) None of these

144. PL 1 (Programming Language One) Is __________.
(1) High level programming language
(2) Low level programming language
(3) Machine language
(4) Assembly language
(5) None of these

145. Which of the following is a disadvantage of machine language?
(1) Machine Dependent
(2) Slower Execution
(3) Machine Independent
(4) all of the above
(5) None of these

146. Android Operating system is an example of which kind of Source Model?
(1) Vertical Market Software
(2) Open Source
(3) Horizontal Market Software
(4) Shareware
(5) None of these

147. You can use the tab key to___________.
(1) Move a cursor across the screen
(2) Indent a paragraph
(3) Move the cursor down the screen
(4) Only ((1) and (2)
(5) None of these

148. Which process checks to ensure the components of the computer and operating are connected properly?
(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) None of these

149. What is the correct association between a hardware component and a computer function?
(1) Monitor > input
(2) Mouse > input
(3) CPU > storage
(4) Hard disk > processing
(5) None of these

150. The sharing of a medium and its path by 2 or more devices is called ________.
(1) Modulation
(2) Encoding
(3) Line discipline
(4) Multiplexing
(5) None of these

151. The server on the internet is also known as ___________.
(1) Repeater
(2) Host
(3) Gateway
(4) AND Gate
(5) None of these

152. A database management system (DBMS) is a__________.
(1) Hardware system used to create, maintain and provide controlled access to a data- base
(2) hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) Software system used to create, maintain, and provide uncontrolled access to a database.
(4) Software system used to create, maintain and provide controlled access to a database.
(5) None of these

153. Which of the following is an example of connectivity?
(1) Internet
(2) floppy disk
(3) power card
(4) data
(5) None of these

154. What menu is selected to cut, copy and paste?
(1) File
(2) Tools
(3) Special
(4) Edit
(5) None of these

155. To save a document in different location use ______.
(1) Save
(2) Save as
(3) Save as web page
(4) All of above
(5) None of these

156. Programming language built into user programs such as Word and Excel are known as _______.
(1) 4GLs
(2) Macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these

157. Codes consisting of lines of varying widths or lengths that are computer-readable are known as______.
(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these

158. To reload a Web page, press the __________ button.
(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh

159. Personal computers can be connected together to form a_______.
(1) server
(2) supercomputer
(3) network
(4) enterprise
(5) None of these

160. Which of the following is true?
(1) Byte is a single digit in a binary number
(2) Bit represents a grouping of digital numbers
(3) Eight-digit binary number is called a byte
(4) Eight-digit binary number is called a bit
(5) None of these

161. Which of the following can be used to select the entire document?
(1) CTRL+A
(2) ALT+F5
(3) SHIFT+A
(4) CTRL+K
(5) CTRL+H

162. A concentric circle on a disk is called a________
(1) cylinder
(2) track
(3) head
(4) sector
(5) none of these

163. DSL is an example of a(n) ____________ connection.
(1) network
(2) wireless
(3) slow
(4) broadband
(5) none of these

164. Instructions and data that are processed by the CPU are located in________
(1) CD-ROM
(2) RAM
(3) the hard disk
(4) the motherboard
(5) none of these

165. All of the following are considered to be storage devices EXCEPT_______
(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these

166. The commonly used UNIX commands like date, ls, cat etc. are stored in_________
(1) dev directory
(2) bin directory
(3) tmp directory
(4)unix directory
(5) None of these

167. A circuit with about 100 transistors fabricated on a single chip is called _____
(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these

168. One megabyte equals approximately ___________
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

169. A computer checks the _____ of user names and passwords for a match before granting access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these

170. Computers that are portable and convenient for users who travel are known as _____
(1) Super computers
(2) Lap tops
(3) Mini computers
(4) File servers
(5) None of these

171. What is the term for unsolicited e-mail?
(1) News group
(2) Use net
(3) Backbone
(4) Flaming
(5) Spam

172. The _____ tells the computer how to use its components.
(1) Utility
(2) Network
(3) Operating system
(4) Application program
(5) None of these

173. When sending an e-mail, the _____ line describes the contents of the message.
(1) to
(2) subject
(3) contents
(4) CC
(5) None of these

174. The _____ key will launch the start buttons.
(1) Esc
(2) Shift
(3) Windows
(4) Shortcut
(5) None of these

175. What is the ultimate purpose of Defragmentation?
(1) Make the PC faster
(2) Create More Free Space
(3) Delete temporary files
(4) Reduce Power consumption
(5) none of these

176. Which input device cannot be used to work in MS Office?
(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen


Download more Questions for computer Awareness in pdf-

https://drive.google.com/file/d/0B6_nomlME9hLWE1PM3ZxVUFOVm8/edit?usp=sharing
Deepak Tomar

I'm Deepak Tomar. I have completed my M.Tech in Computer Science and now i am working as a Govt. Employee in UP Police, I Love to help others and making friends, you can connect to me on facebook for any help- I will be happy to help you .

1 comment to ''Computer Awareness pdf/Study Material For IBPS,RRB,RBI,SBI"

ADD COMMENT