This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, September 7, 2015

Important Questions For IBPS CLERK mains

Important Questions For IBPS CLERK               BY – SOLANKI SIR

1.       ANSI –  American National Standards  Institude.
2.       ASCII -  American standard code for information interchange.
3.       A Byte consist of eight bits.
4.       (55)8 in binary will be 101101.
5.       (1010110)2  =  (    )10
6.       The  box that contains central electronic components of the computer is the Motherboard.
7.       Devices such as monitor, printer, keyboard, mouse are called Peripheral devices .
8.       Which one of following is the opposite of keyboard --   printer.
9.       Impact printers have tinny hummer-like keys  that strike the paper through an inked ribbon.
10.    A printer speed measured in DPI .
11.    LASER printer in example of Non impact printer.
12.   Restarted the computer when it is alrealy power on is Warm booting.
13.   When the computer saves an image on desktop and power down is called Hibernate.
14.   Modem is devices used to transmit data over telephone lines .
15.    Ram is primary storage .
16.   Ram speed measured in Nano second.
17.   Virtual memory is – the use of space on hard disk to simulate addition main mermoy.
18.   Linux is OPEN source operating system.
19.   Unix is MULTIUSER operating system.
20.   Compiler read the entire program at one time.
21.   INTERPRETER translate program line by line.
22.   ASSEMBLER  translate  assembly language in to machine language.
23.   Which one the following keyboard output devices. PRINTER
24.   During the booting process the BIOS looks the system files
25.   ………. Is the ability of an operating system to control the activities of multiple program at the same time.  MULTITASKING.
26.   A SPOOLER is a program that coordinates the print jobs is completed.
27.   Virtual memory is typically locate on HARD DISK.
28.   THRASHING  means swapping data between virtual mermory and RAM too frequently.
29.   Verification the username and password is know as authentications.
30.   The combination of the operating system and the processor is referred to as the computer,s. PLATFORM
31.   ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM. BIOS
32.   Using Windows Explorer, a plus (+) sign in front of a folder indicates:   the folder contains subfolders
33.    The ____________ collects scattered pieces of files on the hard disk and rearranges them sequentially on the hard drive. Disk defragmenter
34.    To restore your Windows XP computer to the state it was in on a previous date, you can use the ____________ utility. System restore.
35.   ____________ is a file system, supported by Windows XP, that supports larger hard drives and larger file sizes that the FAT. NTFS
36.   The concentric circles on hard disks are called  TRACK.
37.   The devices whose drivers are included in Windows are called Plug and Play (PnP).
38.   Match the following operating systems with their characteristic features:
39.               I.    Lynx                      A. open source
           II.   Palm OS                 B. used in personal digital assistants
            III. Mac OS                  C. network operating system
            IV. Linux                     D. primarily for Apple computers
            V.  Novell Netware      E. real-time operating system
Answer: E, B, D, A, C   
40.    Match the following file extensions with their application types:
            I.    .xls                         A. Access database
            II.   .doc                       B. compressed file
            III. .htm                       C. Word document
            IV. .zip                        D. Excel file
            V.  .mdb                      E. Web page
Answer: D, C, E, B, A  
41.    Match the following acronyms with their descriptions:
            I.    NTFS                     A. command-driven PC operating system
            II.   API                        B. user interface involving windows and icons
            III. DOS                       C. system for managing and organizing files on disk
            IV. GIF                        D. file format for representing graphical information
            V.  GUI                       E. blocks of program code for performing common functions
 C, E, A, D, B  
42.    Match the following terms with their definitions:
     I.    tracks                     A. another term meaning to “open” a file
            II.   sectors                   B. smallest segment within a sector
            III. cluster                    C. pie-shaped wedges on a hard drive
            IV. write                      D. another term meaning to “save” a file
            V.  read                       E. concentric circles on a hard drive
 E, C, B, D, A 
43.    Match the following utility programs with their functions:
         I.    File compression                A. removes redundancies in a file to reduce the size
            II.   Task Manager                    B. removes unnecessary files from the hard drive
            III. System Restore                  C. enables users to check on a program or exit a nonresponding program
            IV. Error-checking                   D. allows users to restore system settings back to a specific date
            V.  Disk Cleanup                     E. once known as ScanDisk, it checks for lost files and fragments
Answer: A, C, D, E, B     
44.   Website is a collection of web pages.
45.   Web browser is software that is used to access the webpage.
46.   First page of website is called home page.
47.   Search engine is program that used to search the document specified keyword.
48.   ____ is the process of finding errors in software code? TESTING.
49.   A connection from one HTML document to another html documents is called HYPERLINK.
50.   All of the following are ways to communicate on the Internet EXCEPT: HYPERLINK.
51.   One of the more recent e-mail scams, which lures Internet users into revealing personal information, is referred to as: phishing.
52.   Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as    Malware .
53.   Which of the following is NOT a type of broadband BLOG Internet connection? .. Dail up connection.
54.   ____________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls. VOIP.
55.    Personal logs or journal entries posted on the Web are known as:.
56.   All of the following are search engines EXCEPT  Verisign  .
57.   Which of the following is more likely to be a popular choice for an Internet connection in a rural area?  SATE LLITE
58.   Although it is the least costly method of connecting to the Internet, ____________ is no longer the most common means of Internet connection in the United States. Dial up connection.
59.   Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called: Plug ins .
60.   One way to mark a site so that you can return to it later is to:  use Favorites or Bookmarks.
61.   URL stands for: Uniform Resource Locator.
62.   In the URL http://www.prenhall.com, the portion labeled http is the:  protocol
63.   What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser? HTTP
64.     ____________ are small text files that some Web sites automatically store on your computer’s hard drive when you visit the site.  COOKIES.
65.   The adware programs that are more intrusive and transmit information about you without your knowledge are considered:   Spyware.
66.   The most common browser in use today is:  Internet Explorer.
67.    A list of Web pages within a Web site you have visited that usually appears at the top of a page is called the: Breadcrumb list.
68.   Which of the following statements is TRUE concerning DSL - For DSL service to work correctly, you must be within approximately three miles of a Central Office.
69.   DSL service, in which the maximum download speed is higher than the maximum upload speed, is known as:  ADSL
70.      ____________ is an example of a security company that certifies that a company’s online transactions are secure.   VeriSign
71.   Webcasts use ____________ media technology to facilitate the viewing and downloading process of large audio and video files.  Streaming .
72.    The specially coded text that enables a user to jump from one location to another within a Web site or to another Website altogether is know as a(n) ____________ Hyperlink
73.     ____________ are national, regional, or local companies that connect individuals, groups, and companies to the Internet. ISP.
74.   Most e-mail providers provide protection from ____________, or junk e-mail. SPAM.
75.     A Web site address is also referred to as a(n) ____________. URL
76.   eBay is an e-commerce example  (consumer-to-consumer C2C).
77.   The “father” of the Internet  -- Vinton Cerf and Robert Kahn) 
78.   An indication that a Web site is secure is the appearance, on some Web browsers, of a small icon of a closed padlock on the status bar at the bottom of the screen.
79.       Match the following terms to their meanings:
            I.    WWW                    A. a large network of networks
            II.   Browser                 B. a tool used to locate information on the Web
            III. E-mail                    C. the means we use to access information over the Internet
            IV. Internet                  D. an application program used to view the Web
            V.  Search engine        E. electronic communication
Answer: C, D, E, A, B  
80.   Match the following terms to their meanings:
            I.    Cookies                             A. software with a malicious intent
            II.   E-commerce                      B. prevents annoying windows from opening
            III. Malware                             C. text files saved on your computer when you visit certain sites
            IV. Closed padlock icon          D. conducting business online
            V.  Pop-Up Stopper                 E. indicates a secure site
Answer: C, D, A, E, B     
81.    Match the following terms to their characteristics:
        I.    Dial-up                  A. connects with coaxial cable
            II.   ADSL                    B. maximum speed of 56 Kbps
            III. SDSL                     C. often available in rural areas when other options are not
            IV. Cable                     D. uploads and downloads data at the same speed
            V.  Satellite                  E. downloads data from the Internet faster than it can upload data
Answer: B, E, D, A, C    
82.    Match the following top-level domains to the categories of organizations they refer to:
            I.    .edu                       A. nonprofit organizations
            II.   .gov                       B. degree granting institutions
            III. .pro                        C. credentialed professionals
            IV. .mil                        D. United States military
            V.  .org                        E. United States government
83.   The network navigation device known as a “smart hub” that transmits a signal only to the node to which it should be sent is a(n): Swtich
84.     If a home network is connected to the Internet a ____________ is required to send data between the two networks.  Router.
85.   A wireless network uses ____________ as its transmission media. Radio waves.
86.    If you wish to extend the length of the network without having the signal degrade, you would use a: Repeater.
87.    ____________ viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded. Boot  virus.
88.    ____________ viruses are often transmitted by a floppy disk left in the floppy disk drive. Boot virus .
89.     ____________ are viruses that are triggered when certain logical conditions are met. Logic bomb.
90.     ____________viruses attach themselves to documents such as Word and Excel. Macro virus.
91.   Blocking access to logical ports is a common method used by ____________ for maximizing computer security.  Firewall.
92.   A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as: Packet filtering.
93.   When you set up a router for a wireless network, the router uses a default network name known as the:  SSID (service set identifier ) .
94.   Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are examples of:  Security protocol.
95.   A ____________ is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests. Zombie.
96.   The 802.11 wireless standard is also known as Wifi (wireless fidelity).
97.   A(n) ____________ is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background. Trojan horse
98.     ____________ are software programs or hardware devices designed to keep computers safe from hackers. Firewall
99.    128.15.9.21 is an example of a(n) ____________. Ip address.
100.      Public places at which you can wirelessly connect to the Internet are known as “hot spots.
  Match the following computer threats to their meanings:
            I.    logic bomb             A. virus that executes based on specified conditions
            II.   Trojan horse          B. software allowing hackers to take control of a computer
            III. backdoor program C. simultaneous requests from multiple zombie computers
            IV. DDoS                     D. program appearing to do useful work but doing harm in the background
            V.  worm                     E. infectious program that runs independent of host files
Answer: A, D, B, C, E  
101.       Match the following acronyms to their definitions:
             I.    HTTP                     A. protects IP addresses from hackers
            II.   SMTP                     B. a protocol associated with Web pages
            III. HPNA                    C. a protocol used for e-mail
            IV. WAP                      D. an access point on a wireless network
            V.  NAT                      E. a network adapter used on a phoneline network
Answer: B, C, E, D, A  
102.         Match the following terms to their meanings:
                    I.    firmware                      A. a list of commands (mini program) that is executed
            II.   computer virus             B. a program that executes whenever the computer boots up
            III. script                            C. read-only memory (ROM) that has software written to it
            IV. Master Boot Record                                                                                   D. a short series of commands that automates repetitive tasks
            V.  macro                          E. a program that attaches itself to another program and attempts to spread                                              itself to other computers through the exchange of files
Answer: C, E, A, B, D  
103.          Match the following acronyms to their definitions:
                   I.    WPA                      A. unique number assigned to the network adapter by the manufacturer
                          II.   SSID                      B. wireless security protocol
            III. MAC                      C. provides a means of wirelessly connecting to a network
            IV. WAP                      D. default network name used by a router
            V.  WAN                     E. network made up of LANs
Answer: B, D, A, C, E 
104.        Match the following terms to their meanings:
      I.    server                     A. two or more computers connected together via software so they can                                                                            communicate
            II.   client                      B. can be a computer, peripheral, or communication device
            III. network                 C. a network device that retransmits a signal to all nodes attached to it
            IV. node                      D. accomplishes specific tasks and makes requests on the network
      V.  hub                        E. provides information, resources, and central control for functions on a network
105.      Mnemonic a memory trick is used in which of the following language?  Assembly language .
106.      The translator program used in assembly language is called  Assembler.
107.      Which of the following is called low level languages?  Machine and assembly language.
108.      Which of the following is machine independence
109.      program? High level language
110.      Which statement is valid about interpreter?    It translates one instruction at a time
111.      The language that the computer can understand and execute is called machine language .
112.      A computer program that converts an entire program into machine language is called a/an Compiler .
113.      Which of the following is most oriented to scientific programming? Fortran.
114.      A program written in machine language is calle  ........ program Object code.
115.      list of instructions used by a computer is called       Program.
116.      TWO OR MORE THAN COMPUTERS CONNECTED TO EACH OTHER FOR SHARING AN INFORMATION FORMS A ………Network .
117.      What is difference between a switch and hub? -- . Switch operate at data link layer while hubs operate at physical layer.
118.      In the OSI model, the ____________ layer handles data encryption and compression Presentation layer.
119.      A (N) ____________ IS A PRIVATE CORPORATE NETWORK, USED EXCLUSIVELY BY COMPANY EMPLOYEES. Intranet.
120.      ROUTER WORKS AT WHICH OF THE FOLLOWING OSI LAYERS?. Network Layer.
121.      HOW MANY LAYERS IN OSI REFERENCE MODEL? Seven Layer.
122.      A(N) ____________ SERVER KEEPS TRACK OF USERS LOGGING ONTO THE NETWORK AND THE SERVICES Authentication.
123.      . SETUP OF RULES ARE CALLED…….. Protocol.
124.      WHICH LAYER IS RESPONSIBLE FOR ROUTING ?  Network layer
125.       REPEATER OPERATE WHICH LAYER OF THE OSI MODEL ? Physical layer.
126.      . A DEVICE THAT CONNECTS TO A NETWORK WITHOUT THE USE OF CABLES IS SAID TO BE……. Wireless network.
127.      In the OSI model, the ____________ layer is responsible for assembling the data packets into frames. Data link Layer.
128.      THE LAYOUT AND Network interface card STRUCTURE OF THE NETWORK IS KNOWN AS THE NETWORK’S:  Topology.
129.      MODEM USED AT WHICH LAYER OF OSI MODEL? Physical Layer.
130.       A ………..is small group of computers and peripherals linked together in a small geographic area. LAN
131.       In ……….topology, network components are connected by only one cable Bus topology.
132.      Internet is a ……………….. WAN.
133.      The communication mode that supports two-way traffic but only one direction at time is …… Half  Duplex.
134.      NIC stand for……...
135.       In star topology …………………network device is used for central mode? Star Topology.
136.       Most common topology is call star topology.
137.       In a ring topology, the computer in possession of the____________can transmit data. Token
138.       The simultaneous transmission of data to a number of stations is known as Broadcast .
139.       UTP and STP are examples of: Twisted pair
140.      The wired medium least susceptible to signal interference is: Fiber optic calble
141.     ……………. Is a collection of data that is organized so that its contents can easily be accessed manages and updated.  Database.
142.     What is tuple ?   ) A row of record in database table
The process of checking the validity of information handling a transaction file is … Validation
143.     Arranging of data in a logical sequence is knows as … Sorting.
144.      A relational database organizes data by logically grouping similar data into ____________, or tables that contain related --- Relations.
145.     The ascending order of a data hierarchy is: -) bit-byte-field-record-file-database.
146.     What is the language used by most of the DBMSs for helping their users to access data? SQL
147.     Large collection of files are called: Database.
148.     Which of the following is the product of data – Information.
149.     When data changes in multiple lists and all lists are not updated, this causes  -- data inconsistency
150.      ____________ means that the data contained in a database is accurate and reliable.  Data integrity,
151.     In a database, a field is a:  category of information
152.     The purpose of the primary key in a database is to:  uniquely identify a record.
153.     The ____________ contains data descriptions and defines the name, data type, and length of each field in the database -- Data dictionary.
154.     The process of reducing redundancy in a database is called:  Normalization.
155.     A ____________ is a large-scale electronic repository of data that is time-variant.  ) Data warehouse.             
156.     OLAP --  assists users with analyzing and finding  trends in data warehouses
157.     TPS --  processes everyday business transactions
158.     DSS -   uses databases and models for assisting complex decision processes.
159.     SQL -- consists of commands and syntax for  querying relational databases
160.     The primary key must be a(n) ____________ field.    Unique.
161.     IP address is currently – 4 Bytes.
162.     World Wide Web -- a collection of linked information residing on computers connected by the internet.
163.     A web page is located using a URL (Uniform Resource Locator)
164.     HTML stands for    -- Hyper Text Markup Language
165.      A search engine is a program to search  for information --- . web pages for information using specified search  terms
166.      junk e-mail is also called – SPAM .
167.      A Website’s main page is called its—  Home page.
168.      A web ……… consists of one or more webpage located on a web server  --- Site.
169.      The software that allows users to surf the internet is called a ……. Web browser .
170.       ____________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls.    VOIP.
171.      ….. is the encompassing term that involves the use of electronic platforms - intranets, extranets and the Internet - to conduct a company's business.  -- . E-commerce.
172.      Programs such as Internet Explorer that serve as navigable windows into the Web are called— WEB BROWSER.
173.      All of the following use Web-based e-mail clients, meaning you can access the e-mail account from any computer, EXCEPT: Microsoft outlook.
174.      Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called  --- Plug-ins.
175.      One way to mark a site so that you can return to it later is to:  use Favorites or Bookmarks
176.      ____________ are small text files that some Web sites  automatically store on your computer’s hard drive when you visit the site.  --- Cookies.
177.      Which of the following is more likely to be a popular choice for an Internet connection in a rural area?  ==  Satellite network.
178.       Although it is the least costly method of connecting to the Internet, ____________ is no longer the most common means of Internet connection in the United States.  Dialup Connection.
179.      Each excel file is called a workbook because : ) It can contain many sheets including worksheets and chart sheets
180.      How are data organized in a spreadsheet?  Rows and columns.
181.      Which of the following methods cannot be used to edit the content of cell?  -- Alt keys.
182.      The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is --- ) B1:G10
183.      The PC productivity tool that manipulates data organized in rows and columns is called a – Spreadsheet.
184.      . Forms that are used to organize business data into rows and columns are called – Spreadsheet.
185.      User wishes to remove a spreadsheet from a workbook. Which is the correct sequence of events that will do this? --- Right click on the spreadsheet tab and select DELETE.
186.      When you see a cell with a red triangle in the top right corner, what does this signify? -- There is a comment associated with the cell.
187.      All formula in Excel start with  --- (=).
188.      You can use a function to combine text from two cells into one cell. But you can use an operator to do the same thing. Which operator is that?    & (ampersand)
189.      Two common wildcard characters that Excel recognizes are      * and ?
190.       Which of the following displays the contents of the active cell?    Formula bar
191.      A feature of MS Word that saves the document automatically after certain interval is available on – Save as.
192.      Background color or effects applied on a document is not visible in -- Print Preview
193.      What is the default left margin in Word 2003 document?            1,25.
194.      Which of the following is not valid version of MS Office?  Office Vista.
195.      Which of the following is a transparent graphic or text placed behind text?  Watermark
196.      Which of the following mail merge terms combines a document with a list of names and addresses to produce individualized documents? Mail Merge
197.      Which of the following is the keyboard shortcut to insert an endnote -- Press [Alt]+[Ctrl]+[D].
198.      Which of the following orientations is taller than it is wide?  Portrait
199.      MS Word allows creation of what type of documents by default?   .Doc
200.      Which language does MS-Word use to create Macros?   Visual Basic
201.      The most advanced from of ROM ??  EEPROM
202.      The result of an arithmatic and logical operations are stored in  ACCUMULATOR .
203.      Which company developed MS office 2007 -  MICROSOFT.
204.      You can select  the  current  row  in excel  worksheet by pressing  --- SHIFT+SPACE BAR
205.      Getting the data from different worksheet is called – Referencing
206.      Excel  uses a colon to denote a range of cells.
207.      Ctrl+p command used to print the document.
208.      Ctrl + f2 command used to print preview.
209.      The default window contains numbers of bars in m.s excel.     6 bars
210.      Total worksheet in excel 255 .