IBPS Clerks -15-12-2012


161. key is the example of Toggle key

(1) Alt
(2) Shift
(3) Control
(4) Escape
(5) Caps Lock

Answer
(5) Caps Lock

162. Is a feature for scheduling and multi programming to provide an economical inter­active system of two or more use

(1) Time sharing
(2) Multitasking
(3) Time tracing
(4) Multiprocessing
(5) None of these

Answer
(1) Time sharing

163. ROLLBACK in a database is ………….. statement

(1) TCL
(2) DCL
(3) DML
(4) DDL
(5) SDL

Answer
(1) TCL

164. Video controller
(1) Controls the resolution of images on screen
(2) Controls the signals to be sent and received from processor for display
(3) Handles the entire electronic work behind the formation of images on the screen
(4) Is responsible for allocating pixels for formation of images
(5) Is responsible for the refresh rate of the screen / monitor

Answer
(3) Handles the entire electronic work behind the formation of images on the screen

165. The disks stores information in

(1) Tables
(2) Bows and columns
(3) Blocks
(4) Tracks and sectors
(5) All of these

Answer
(4) Tracks and sectors

166. Which file (s) can be executed without mentioning its extension name

(1) .exe
(2) .bat
(3) .com
(4) .app
(5) All of these

Answer
(5) All of these

167. A programming language having a …………….is slow in execution

(1) Interpreter
(2) Compiler
(3) Assembler
(4) Linker
(5) None of these

Answer
(1) Interpreter

168. The word processor used by DOS to write the programs or instructions

(1) WordStar
(2) Word Pad
(3) Notepad
(4) MS-Word
(5) EDIT

Answer
(5) EDIT

169. …………… provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data

(1) DBMS
(2) Tables
(3) Database
(4) Protection passwords
(5) Centralization of data

Answer
(1) DBMS

170. Codec refers to

(1) Coder – decoder
(2) Co-declaration
(3) Command declaration
(4) Command decoding
(5) None of these

Answer
(1) Coder – decoder

171. Origin of internet can be tracked from

(1) ARPAnet
(2) Radio networks
(3) Satellite networks
(4) Indian army networks
(5) Air Force networks

Answer
(1) ARPAnet

172. To connect networks of similar protocols,……………………..are used

(1) Routers
(2) Bridges
(3) Gateways
(4) Dial-up routers
(5) None of these

Answer
(2) Bridges

173. Decimal equivalent of (1111)2

(1) 11
(2) 10
(3) 1
(4) 10
(5) 13

Answer
(4) 10

174.……………is one reason for problems of data integrity

(1) Data availability constraints
(2) Data Inconsistency
(3) Security constraints
(4) Unauthorized access of data
(5) Data redundancy

Answer
(5) Data redundancy

175. Dr. E.F. Codd represented …………rules that a database must obey if it has to be considered truly relational

(1) 10
(2) 8
(3) 12
(4) 6
(5) 5

Answer
(3) 12

176. “>” symbol in DOS commands is use to

(1) Compare two values
(2) Redirect input
(3) Redirect output
(4) Filler data
(5) none of these

Answer
(3) Redirect output

177. System proposal is prepared in ……………… phase of SDLC

(1) Conception
(2) Initiation
(3) Analysis
(4) Design
(5) construction

Answer
(2) Initiation

178. A data warehouse

(1) Contains numerous naming conventions and formats
(2) Is organized around important subject areas
(3) Contains only current data
(4) Can be updated by end users
(5) Explains some observed event or condition

Answer
(2) Is organized around important subject areas

179. Which of these is considered intelligent CASE tool

(1) Toolkit
(2) Methodology companion
(3) Workbench
(4) Upper CASE
(5) Lower CASE

Answer
(3) Workbench

180. Super computer developed by Indian scientists

(1) Param
(2) Super301
(3) Compaq Presario
(4) Cray YMP
(5) Blue Gene

Answer
(1) Param

181. The errors that can be find out by a compiler are

(1) Logical errors
(2) Internal errors
(3) Semantic errors
(4) Syntax errors
(5) Execution errors

Answer
(4) Syntax errors

182. is used to add or put into your document such as a picture or text

(1) TV
(2) Squeeze in
(3) Push in
(4) Insert
(5) None of these

Answer
(2) Squeeze in

183. Office Assistant is

(1) An application that allows you 10 lake notes and save them in file
(2) A button on the standard toolbar that executes the Save command
(3) A collection of Auto correct options In Word
(4) An animated character that offers help and suggestions
(5) None of these

Answer
(4) An animated character that offers help and suggestions

184. Pressing CTRL+9 in Excel

(1) Prints 9
(2) Prints
(3) Prints 9 followed by spaces
(4) Inserts 9 cells at the current location
(5) Hides the current row

Answer
(5) Hides the current row

185. To change the name of an Excel worksheet

(1) Click on the worksheet tab by holing CTRL key and type a new name
(2) Choose Save AS option from file menu
(3) Add a (?) at the end of file name while saving the workbook
(4) Press CTRL+ SHIHT keys and new name
(5) Double click at the worksheet tab and type a new name

Answer
(5) Double click at the worksheet tab and type a new name

186. A computer used at supermarkets, departmental stores and restaurant etc is called……..terminal

(1) P-O-S
(2) Dumb
(3) Intelligent
(4) Smart
(5) Calculating

Answer
(1) P-O-S

187. ………………acts as temporary high speed holding area between the memory and the CPU thereby improving processing capabilities

(1) ROM
(2) RAM
(3) Temporary memory
(4) Cache memory
(5) Flash memory

Answer
(4) Cache memory

188. A document that explains how to use a software program is called …………..manual

(1) User
(2) System
(3) Software
(4) Program
(5) Technical

Answer
(1) User

189. The process that deals with the technical and management issues of software development is

[1] Delivery process
[2] Control process
[3] Software process
[4] Testing process
[5] Monitoring process

Answer
[3] Software process

190. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
(1) ER model
(2) Data base
(3) Data Model
(4) DBMS
(5) None of these

Answer
(3) Data Model

191. You can protect sensitive data from prying eyes using…………….

(1) Encryption
(2) Passwords
(3) File locks
(4) File permissions
(5) none of these

Answer
(4) File permissions

192. Android is………….

(1) Operating system
(2) Application
(3) Interface
(4) Software
(5) A collection of all these

Answer
(5) A collection of all these

193. ………………..search engine sends request for information to several search engines simultaneously and compiles the results
(1) Meta
(2) Individual
(3) Directory
(4) Subject directory
(5) none of these

Answer
(1) Meta

194. ………………………search method is conducted for a specific title, domain, URL,, or host

(1) Keyword
(2) Field
(3) Boolean
(4) Miscellaneous
(5) Logical

Answer
(1) Meta

195. To access a website or web con – tent from a web server, the client sends a(n)…………..

(1) Information
(2) Message
(3) Request
(4) Response
(5) Interrupt

Answer
(3) Request

196. An http request contains ……………parts

(1) 2
(2) 5
(3) 3
(4) 4
(5) 1

Answer
(3) Request

197. Through an administrator or another user can access someone else’s computer remotely

(1) Administrator
(2) Web server
(3) Web application
(4) HTTP
(5) Telnet

Answer
(5) Telnet

198. Telnet is a …………….based computer protocol

(1) Sound
(2) Text
(3) Image
(4) Animation
(5) Digits

Answer
(2) Text

199. To allow someone else schedule your meetings and appointments………….. feature of Outlook is used

(1) Monthly calendar
(2) Event manager
(3) Appointments
(4) Delegate Access
(5) None of these

Answer
(4) Delegate Access

200. P2P is a ………………………………application architecture

(1) Client/ server
(2) Distributed
(3) Centralized
(4) 1-tier
(5) None of these

Answer
(2) Distributed