IBPS Clerks -15-12-2012


161. key is the example of Toggle key

(1) Alt
(2) Shift
(3) Control
(4) Escape
(5) Caps Lock

Answer

162. Is a feature for scheduling and multi programming to provide an economical inter­active system of two or more use

(1) Time sharing
(2) Multitasking
(3) Time tracing
(4) Multiprocessing
(5) None of these

Answer

163. ROLLBACK in a database is ………….. statement

(1) TCL
(2) DCL
(3) DML
(4) DDL
(5) SDL

Answer

164. Video controller
(1) Controls the resolution of images on screen
(2) Controls the signals to be sent and received from processor for display
(3) Handles the entire electronic work behind the formation of images on the screen
(4) Is responsible for allocating pixels for formation of images
(5) Is responsible for the refresh rate of the screen / monitor

Answer

165. The disks stores information in

(1) Tables
(2) Bows and columns
(3) Blocks
(4) Tracks and sectors
(5) All of these

Answer

166. Which file (s) can be executed without mentioning its extension name

(1) .exe
(2) .bat
(3) .com
(4) .app
(5) All of these

Answer

167. A programming language having a …………….is slow in execution

(1) Interpreter
(2) Compiler
(3) Assembler
(4) Linker
(5) None of these

Answer

168. The word processor used by DOS to write the programs or instructions

(1) WordStar
(2) Word Pad
(3) Notepad
(4) MS-Word
(5) EDIT

Answer

169. …………… provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data

(1) DBMS
(2) Tables
(3) Database
(4) Protection passwords
(5) Centralization of data

Answer

170. Codec refers to

(1) Coder – decoder
(2) Co-declaration
(3) Command declaration
(4) Command decoding
(5) None of these

Answer

171. Origin of internet can be tracked from

(1) ARPAnet
(2) Radio networks
(3) Satellite networks
(4) Indian army networks
(5) Air Force networks

Answer

172. To connect networks of similar protocols,……………………..are used

(1) Routers
(2) Bridges
(3) Gateways
(4) Dial-up routers
(5) None of these

Answer

173. Decimal equivalent of (1111)2

(1) 11
(2) 10
(3) 1
(4) 10
(5) 13

Answer

174.……………is one reason for problems of data integrity

(1) Data availability constraints
(2) Data Inconsistency
(3) Security constraints
(4) Unauthorized access of data
(5) Data redundancy

Answer

175. Dr. E.F. Codd represented …………rules that a database must obey if it has to be considered truly relational

(1) 10
(2) 8
(3) 12
(4) 6
(5) 5

Answer

176. “>” symbol in DOS commands is use to

(1) Compare two values
(2) Redirect input
(3) Redirect output
(4) Filler data
(5) none of these

Answer

177. System proposal is prepared in ……………… phase of SDLC

(1) Conception
(2) Initiation
(3) Analysis
(4) Design
(5) construction

Answer

178. A data warehouse

(1) Contains numerous naming conventions and formats
(2) Is organized around important subject areas
(3) Contains only current data
(4) Can be updated by end users
(5) Explains some observed event or condition

Answer

179. Which of these is considered intelligent CASE tool

(1) Toolkit
(2) Methodology companion
(3) Workbench
(4) Upper CASE
(5) Lower CASE

Answer

180. Super computer developed by Indian scientists

(1) Param
(2) Super301
(3) Compaq Presario
(4) Cray YMP
(5) Blue Gene

Answer

181. The errors that can be find out by a compiler are

(1) Logical errors
(2) Internal errors
(3) Semantic errors
(4) Syntax errors
(5) Execution errors

Answer

182. is used to add or put into your document such as a picture or text

(1) TV
(2) Squeeze in
(3) Push in
(4) Insert
(5) None of these

Answer

183. Office Assistant is

(1) An application that allows you 10 lake notes and save them in file
(2) A button on the standard toolbar that executes the Save command
(3) A collection of Auto correct options In Word
(4) An animated character that offers help and suggestions
(5) None of these

Answer

184. Pressing CTRL+9 in Excel

(1) Prints 9
(2) Prints
(3) Prints 9 followed by spaces
(4) Inserts 9 cells at the current location
(5) Hides the current row

Answer

185. To change the name of an Excel worksheet

(1) Click on the worksheet tab by holing CTRL key and type a new name
(2) Choose Save AS option from file menu
(3) Add a (?) at the end of file name while saving the workbook
(4) Press CTRL+ SHIHT keys and new name
(5) Double click at the worksheet tab and type a new name

Answer

186. A computer used at supermarkets, departmental stores and restaurant etc is called……..terminal

(1) P-O-S
(2) Dumb
(3) Intelligent
(4) Smart
(5) Calculating

Answer

187. ………………acts as temporary high speed holding area between the memory and the CPU thereby improving processing capabilities

(1) ROM
(2) RAM
(3) Temporary memory
(4) Cache memory
(5) Flash memory

Answer

188. A document that explains how to use a software program is called …………..manual

(1) User
(2) System
(3) Software
(4) Program
(5) Technical

Answer

189. The process that deals with the technical and management issues of software development is

[1] Delivery process
[2] Control process
[3] Software process
[4] Testing process
[5] Monitoring process

Answer

190. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
(1) ER model
(2) Data base
(3) Data Model
(4) DBMS
(5) None of these

Answer

191. You can protect sensitive data from prying eyes using…………….

(1) Encryption
(2) Passwords
(3) File locks
(4) File permissions
(5) none of these

Answer

192. Android is………….

(1) Operating system
(2) Application
(3) Interface
(4) Software
(5) A collection of all these

Answer

193. ………………..search engine sends request for information to several search engines simultaneously and compiles the results
(1) Meta
(2) Individual
(3) Directory
(4) Subject directory
(5) none of these

Answer

194. ………………………search method is conducted for a specific title, domain, URL,, or host

(1) Keyword
(2) Field
(3) Boolean
(4) Miscellaneous
(5) Logical

Answer

195. To access a website or web con – tent from a web server, the client sends a(n)…………..

(1) Information
(2) Message
(3) Request
(4) Response
(5) Interrupt

Answer

196. An http request contains ……………parts

(1) 2
(2) 5
(3) 3
(4) 4
(5) 1

Answer

197. Through an administrator or another user can access someone else’s computer remotely

(1) Administrator
(2) Web server
(3) Web application
(4) HTTP
(5) Telnet

Answer

198. Telnet is a …………….based computer protocol

(1) Sound
(2) Text
(3) Image
(4) Animation
(5) Digits

Answer

199. To allow someone else schedule your meetings and appointments………….. feature of Outlook is used

(1) Monthly calendar
(2) Event manager
(3) Appointments
(4) Delegate Access
(5) None of these

Answer

200. P2P is a ………………………………application architecture

(1) Client/ server
(2) Distributed
(3) Centralized
(4) 1-tier
(5) None of these

Answer