IBPS Bank PO CWE computer Awareness
1. Which among the following is a device , that is used in computers to add
external components?
(A)Storage Device such as USB
(B)Keyboard
(C)Ports / System Boards
(D)RAM
Answer ©
2. The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following?
(A)Access time
(B)Response time
(C)Entrance time
(D)Ping Time
Answer(d)
3. The terms “push and pull services” in context with the Banking are used in which among the following generally?
(A)Rural Banking
(B)Unit Banking
(C)Online Banking
(D)Mobile Banking
Answer(d)
4. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip
At which among the above locations CVV or Card Security Code of an ATM is found?
(A)1 & 2
(B)2 & 3
(C)1 & 3
Ans C
(D)1, 2 & 3 Answer
6. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
(A)Segmentation
(B)Documentation
(C)Data Management
(D)Data History
Answer(B)
7. Which among the following is an example of “Card not present transaction” in context with the Credit / Debit Cards?
(A)A person paying a restaurant bill by giving details of his credit card
(B)A person making an online purchase using his / her credit card
(C)A person making a purchase using mobile banking
(D)Both 2 & 3
Answer(d)
8. Consider the following:
1. Application software
2. Hardware
3. Operating systems
The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
(A)Only 1
(B)1 & 2
(C)1, 2 & 3
(D)None of them
Answer(d)
9. As a person working in internet banking environment, why you should be aware of the “Dictionary attack”?
(A)It is used to inject worms or viruses in the system
(B)It is used to determine a password
(C)It is used to access customer’s account by determining other details
(D)It is used for stealing info from the Credit Card
Answer(b)
10. Consider the following:
1. Software
2. Hardware
3. Internet Programs
The terms Bug and Debugging are generally used in which among the above?
(A)1 & 2
(B)2 & 3
(C)1 & 3
(D)1, 2 & 3
Answer(D)
11. What is ISO 9362 is related to in context with Banking Technology?
(A)RTGS Transfers
(B)NEFT Transfers
(C)SWIFT Transfers
(D)All of them
Answer©
12. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
(A)United States
(B)United Kingdom
(C)Entire Europe
(D)Australia
Answer(A)
13. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
(A)Bit Rate
(B)Response Time
(C)Command Line Interface
(D)Random memory
Answer(A)
14. Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
(A)Downtime
(B)Uptime
(C)Response time
(D)Runtime
Answer(A)
15. What would be the number of bytes, transferred at the rate of 1 Kilobit per second?
(A)100
(B)108
(C)125
(D)140
Answer©
16. Which public sector bank was the banking partner in Commonwealth Games 2010?
(a) Central Bank of India
(b) State Bank ofIndia
(c) Bank ofBaroda
(d) None of these
Answer-(a)
17 A group of attribute/field in a database is known as a______.
a) Record -ans
b) File
c) Database
d) Entry
e) None
18 Which layer of OSI model, firstly make use of unit of data called “Packet”?
a) Datalink Layer
b) Transport Layer
c) Network Layer-ans
d) Presentation Layer
e) None
19 Which layer of OSI model, firstly make use of unit of data called “Packet”?
a) Datalink Layer
b) Transport Layer
c) Network Layer-ans
d) Presentation Layer
e) None
20 A computer programmer
a) can draw only flowchart
b) can enter data quickly
c) does all the thinking for a computer-ans
d) can operate all type of computer equipment
e) None
21 A Trojan horse is
a) An ad ware program
b) A virus disguised as a useful program.-ans
c) A program that blows up every time you use it
d) A spy ware which steal information over internet
e) None
22 A goal of data mining includes which of the following?
a) To confirm that data exists
b) To create a new data warehouse
c) To analyze data for expected relationships-ans
d) To explain some observed event or condition
e) None of the above
23 A goal of data mining includes which of the following?
a) To confirm that data exists
b) To create a new data warehouse
c) To analyze data for expected relationships
d) To explain some observed event or condition
e) None of the above-ans
24 The process of finding errors in software’s source code
a) Debugging -ans
b) Compiling
c) Testing
d) Running
e) None
25 The section of CPU which selects, interprets and sees to the execution of program
instructions?
a) ALU
b) Control Unit -ans
c) Register Unit
d) Processing Unit
e) None
Tweet
(A)Storage Device such as USB
(B)Keyboard
(C)Ports / System Boards
(D)RAM
Answer ©
2. The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following?
(A)Access time
(B)Response time
(C)Entrance time
(D)Ping Time
Answer(d)
3. The terms “push and pull services” in context with the Banking are used in which among the following generally?
(A)Rural Banking
(B)Unit Banking
(C)Online Banking
(D)
Answer(d)
4. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip
At which among the above locations CVV or Card Security Code of an ATM is found?
(A)1 & 2
(B)2 & 3
(C)1 & 3
Ans C
(D)1, 2 & 3 Answer
6. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
(A)Segmentation
(B)Documentation
(C)Data Management
(D)Data History
Answer(B)
7. Which among the following is an example of “Card not present transaction” in context with the Credit / Debit Cards?
(A)A person paying a restaurant bill by giving details of his credit card
(B)A person making an online purchase using his / her credit card
(C)A person making a purchase using mobile banking
(D)Both 2 & 3
Answer(d)
8. Consider the following:
1. Application software
2. Hardware
3. Operating systems
The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
(A)Only 1
(B)1 & 2
(C)1, 2 & 3
(D)None of them
Answer(d)
9. As a person working in internet banking environment, why you should be aware of the “Dictionary attack”?
(A)It is used to inject worms or viruses in the system
(B)It is used to determine a password
(C)It is used to access customer’s account by determining other details
(D)It is used for stealing info from the Credit Card
Answer(b)
10. Consider the following:
1. Software
2. Hardware
3. Internet Programs
The terms Bug and Debugging are generally used in which among the above?
(A)1 & 2
(B)2 & 3
(C)1 & 3
(D)1, 2 & 3
Answer(D)
11. What is ISO 9362 is related to in context with Banking Technology?
(A)RTGS Transfers
(B)NEFT Transfers
(C)SWIFT Transfers
(D)All of them
Answer©
12. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
(A)
(B)
(C)Entire Europe
(D)
Answer(A)
13. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
(A)Bit Rate
(B)Response Time
(C)Command Line Interface
(D)Random memory
Answer(A)
14. Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
(A)Downtime
(B)Uptime
(C)Response time
(D)Runtime
Answer(A)
15. What would be the number of bytes, transferred at the rate of 1 Kilobit per second?
(A)100
(B)108
(C)125
(D)140
Answer©
16. Which public sector bank was the banking partner in Commonwealth Games 2010?
(a) Central Bank of India
(b) State Bank of
(c) Bank of
(d) None of these
Answer-(a)
17 A group of attribute/field in a database is known as a______.
a) Record -ans
b) File
c) Database
d) Entry
e) None
18 Which layer of OSI model, firstly make use of unit of data called “Packet”?
a) Datalink Layer
b) Transport Layer
c) Network Layer-ans
d) Presentation Layer
e) None
19 Which layer of OSI model, firstly make use of unit of data called “Packet”?
a) Datalink Layer
b) Transport Layer
c) Network Layer-ans
d) Presentation Layer
e) None
20 A computer programmer
a) can draw only flowchart
b) can enter data quickly
c) does all the thinking for a computer-ans
d) can operate all type of computer equipment
e) None
21 A Trojan horse is
a) An ad ware program
b) A virus disguised as a useful program.-ans
c) A program that blows up every time you use it
d) A spy ware which steal information over internet
e) None
22 A goal of data mining includes which of the following?
a) To confirm that data exists
b) To create a new data warehouse
c) To analyze data for expected relationships-ans
d) To explain some observed event or condition
e) None of the above
23 A goal of data mining includes which of the following?
a) To confirm that data exists
b) To create a new data warehouse
c) To analyze data for expected relationships
d) To explain some observed event or condition
e) None of the above-ans
24 The process of finding errors in software’s source code
a) Debugging -ans
b) Compiling
c) Testing
d) Running
e) None
25 The section of CPU which selects, interprets and sees to the execution of program
instructions?
a) ALU
b) Control Unit -ans
c) Register Unit
d) Processing Unit
e) None
Tweet
No comments:
Post a Comment
Please suggest your valuable comments here....