Home » Computers for IT Officers » Computer Questions and Answers

Computer Questions and Answers

Computer Questions and Answers for IT Officers/IBPS Bank Exams-2016

Computer Awareness (IT Officers Professional Knowledge) plays a very crucial role to get the good score in IBPS IT Officers Exams. Although, the applicants are from computer background they need to concentrate more on this section to get the good score. Because In IT Officers Exam we get 50 questions from professional knowledge of IT Officers and totally for 75 marks and there is negative marks concept and also, the accuracy of right answers is also important. So, while attempting the exam, we have to keep in mind about negative marks and accuracy of right answers. Here we are providing some important Computer Questions and Answers for IT Officers Exam – 2016.

 IT Officers Exam Pattern -2016

S.No.Test NameQuestionsMarks AllottedTotal Time
1English5025

120 minutes

or

2 hours

2Professional Knowledge5075
3Reasoning5050
4Quantitative Aptitude5050
Total200 Qs200 mark
  1. Which of the given options is not a web server?
    1. Apache
    2. IIS
    3. Jigsaw
    4. Zibo
  1. Which of the following is the first web-based e-mail service?
    1. Hotmail
    2. Gmail
    3. Yahoo Mail
    4. Rediff Mail                                                                                                                                                                
  1. Who is known as the father of java programming language?
    1. James Gosling
    2. James Smith
    3. Saber Bhatia
    4. Bill Board.
  1. The amount of time that a unique user interacts with a web application is known as ……………….
    1. Application
    2. Session
    3. Cookie
    4. None of these.
  2. Encryption is primarily being used with ………………………..
    1. Transaction Entry
    2. File Retention
    3. Computer Processing
    4. Data Communication.

     

  3. Memory management is the feature of …………………..
    1. Processor
    2. Operating System
    3. MS Word
    4. Animation
  4. Toolbar Displays …..
    1. Collection of menu item
    2. Collection of buttons
    3. One single menu item
    4. None of these
  5. A person who is responsible for the development of the new product (such as instant coffee) in affirming is called a ……………..
    1. Development manager
    2. Project manager
    3. Brand manager
    4. Market manager
    5. None

9. ………………. Is the part of OLE growth curve?

  1.  Active X
  2. OLE controls
  3. Direct X
  4. All of these

10.In computer terminology, ‘.tmp’ extension refers usually to the ……………………..

  1. Image file.
  2. Temporary file.
  3. Video file
  4. Text file

11.A popular technique for forecasting is ………………………

  1. Regression analysis
  2. Correlation analysis
  3. Monte Carlo
  4. Waterfall model




12. In E-mail BCC means …………

  1. Black carbon copy
  2. Blind carbon copy
  3. Batch computer copy
  4. Business carbon copy

13. A key verifier machine which is used for controlling ……………..

  1. Transaction entry
  2. Data communication
  3. Transaction Organization
  4. Computer processing.
  5. None of these

14. While using e-cash, a customer’s digital signature is done by using …..

  1. Customer public key
  2. Vendor’s public key
  3. Bank’s private key
  4. customer private key

15. .WAV file format is associated …………………… files.

  1. Sound
  2. Video
  3. Image
  4. Log file.

16. The compiler is an example of …………. type of software.

  1. An application software
  2. Programming tool.
  3. A System software
  4. Testing tool.

17. Machine language is also known as …………………..

  1. High-level language
  2. Source code
  3. Low-level language
  4. Assembly language

18. The file created yesterday is referred as the ……………………..

  1. Son file.
  2. father file
  3. grandfather file
  4. mother file

19. The …………………… file which can includes some music?

  1. .wav
  2. pdf
  3. doc
  4. jpeg.

20. The post installation audit seeks to assure that ………………..

  1. The system is accurate and secure.
  2. Manager information needs are being met.
  3. Both (A) and (B)
  4. None of the above.




21. Which of the following is responsible for the management and coordination of activities and the sharing of the resources of the computer?

  1. Random Access Memory
  2. Application software
  3. Motherboard
  4. Operating System.

22.…………… company is also named as “Big Blue”.

  1. I-soft
  2. Microsoft
  3. Middle-East
  4. CGI

23.Internet access components in E-commerce infrastructure involves ……………

  1. (a) TCP/IP package
  2. (b) Kiosks
  3. (c) Web browsers
  4. (d) All of these.

24. In computers the smallest and basic unit of information storage is …………………….

  1. Bit
  2. Byte
  3. Newton
  4. MegaByte.

25. ATM uses ………….. Length packets.

  1. Fixed
  2. Adaptive
  3. Variable
  4. Increasing

COMPUTER AWARENESS QUESTIONS for IBPS Bank Exams




26.The software which is copyrighted and is provided to the user at no cost is known as ……………..

  1. Freeware
  2. Shareware
  3. Firmware
  4. Wrap wire

27. In network technology UTP means ………………

  1. Uniformly Terminating Port
  2. Ubiquitous Teflon Port
  3. Unshielded Twisted Pair
  4. Unshielded T-Connector Port

28. What is the natural element is the primary ingredient in computer chips?

  1. Carbon
  2. Silicon
  3. Iron
  4. Uranium

29. Which type of network topology is best suited for businesses which must carefully control and coordinate the operations of distributed branch outlets?

  1. Ring
  2. Star
  3. Mesh
  4. None

30. An important application of cryptography, which is used in computerized commercial and financial transaction?

  1. Data processing
  2. Digital marketing
  3. Digital signature
  4. Media convergence

31. It is a plastic card that is similar to a credit card. It has a silicon chip embedded in it. It can store 64 kilobytes of data and instructions ………….

  1. Bit card
  2. Smart Card
  3. Data Card
  4. Digital Card

32. Authentication mechanisms, which are based on user’s behavioral characteristics or physiological characteristics are known as ………….

  1. Artifact technique
  2. Biometric technique
  3. Access matrix technique
  4. Password

33. A virtual memory system (VMS) means …………

  1. Data are copied from slower ROM to faster RAM.
  2. RAM is accessed as if it were a hard drive.
  3. The hard drive is accessed as if it were RAM.                                                                                                    

34. Client information (name and address, shipping directions, credit terms, etc.) is provided by the …………

  1. a) Order Entry system
  2. b) Manufacturing system
  3. c) Billing system
  4. d) Marketing information system
  5. e) None of the above.

35. Which operating system launched its Hindi version?

  1. a) DOS
  2. b) MINIX
  3. c) LINUX
  4. d) All of those

36. A mobile phone that, apart from making calls has a camera, surfs the net, sends e-mails, play digital music has a calendar and many additional options is the smartphone. These smartphones use which of the following platforms?

  1. a) Symbian operating system
  2. b) Windows smartphone
  3. c) Both (A) and (B)
  4. d) None of those.

37. Once a bad frame is received, the frame relay service can?

  1. a) Simply get it and send an acknowledgment.
  2. b) Simply discard it
  3. c) Provide acknowledgment
  4. d) None

38. The ATM layer in ATM technology deals with ………..

  1. a) Voltages
  2. b) Reassembly of packets
  3. c) Bit timings
  4. d) Cell transport.

39. Which of the subsequent feature does not belong to the frame relay?

  1. a) Multiprogramming
  2. b) Multicasting
  3. c) Normal Speed 1-5 Mbps
  4. d) Maximum payload is 1600.

40. Which technology is deployed for mobile internet solutions?

  1. a) TCP (Transfer Control Protocol)
  2. b) CIDR (Cell Inter-Domain Routing)
  3. c) CDMA (Code Division Multiple Access)
  4. d) CVDT (Cell Variation Delay tolerance).

41.In recent years has been deployed to provide IP connectivity to GSM users ……

  1. a) GPRS (General Packet Radio Service)
  2. b) ATM (asynchronous Transfer Mode)
  3. c) LANs (Local Area Network)
  4. d)TCP (Transfer Control Protocol)

42. A video editing system for Linux …………

  1. a) VSL
  2. b) LVS
  3. c) LIVES
  4. d)LIV

43. A flip-flop is a …………….. The element that stores a binary digit as a low or high voltage.

  1. a) Chip
  2. b) Memory
  3. c) I/O
  4. d)

44. Computers use thousands of flip-flops. To coordinate the overall action, a standard signal known as the ………………. is distributed to every flip-flop.

  1. a) Latch
  2. b) Master
  3. c) Clock
  4. d)

45. Which of the following operations is independent however not associative?

  1. a) AND
  2. b) NAND
  3. c) OR
  4. d) XOR

46. The data in ROM is stored …………….

  1. a) By the user any no. of times
  2. b) By the manufacturer during the fabrication of the device
  3. c) By the user using ultraviolet light
  4. d)

47. Dynamic RAM consumes ………… power and is ……………… then the static RAM.

  1. a) Less, slower
  2. b) Less, faster
  3. c) More, slower
  4. d) More, faster.

48. The binary equivalent of the decimal number 368 is …………..

  1. a) 110110000
  2. b) 111010000
  3. c) 111100000
  4. d) 101110000

49. An assembler that runs on one machine, however, produces machine code for another machine is named …………..

  1. a) Simulator
  2. b) Emulator
  3. c) Cross-assembler
  4. d) Bootstrap loader

50. The first OS (Operating System) used in microprocessors is ……………..

  1. a) Zenix
  2. b) DOS
  3. c) CPIM
  4. d) Mac

51. Exception handling is targeted at ………… error.

  1. a) Logical
  2. b) Compile Time
  3. c) Runtime
  4. d) All of those.

52.The amount of uncertainty in a system of symbol is termed ………….

  1. a) Bandwidth
  2. b) Entropy
  3. c) Loss
  4. d) Quantum

53. All the parts of the computer talk to each other by sending ………….

  1. a) Analog signals
  2. b) Digital signals
  3. c) Smoothly varying signal waves
  4. d) Both (B) and (C).

54. The speed of the cable modem connection varies based on the ………..

  1. a) Type of connection used
  2. b) Distance from Phone Company
  3. c) Number of users online
  4. d) CPU speed.

55. Which of the following protects a computer or network from intruders?

  1. a) Router
  2. b) Hub
  3. c) Switch
  4. d)Firewall

56. ……………. Provides wireless connections for communication devices.

  1. a) Wireless fidelity
  2. b) Bluetooth technology
  3. c) Wi-Fi
  4. d) All of the above.

57. Which of the following is measured in kbps, Mbps, and Gbps?

  1. Memory capacity
  2. PDA Speed
  3. Bandwidth
  4. All of the above.

58. Which of the program is not a utility?

  1. Debugger
  2. Editor
  3. Spooler
  4. All of the above.




59. Which of the following is not a page replacement algorithm?

  1. LIFO (Last In First Out)
  2. FIFO (First In First Out)
  3. LRU (Least Recently Used)
  4. Optimal Method
  5. None.

Check Also

Computer Awareness for Bank Exams – MS-Office|Shortcut keys

Computer Awareness for Bank Exams Important Notes on MS-Office and Shortcut Keys. 1. Shortcut buttons …

Leave a Reply

Your email address will not be published. Required fields are marked *

one × four =