Important Computer Questions Asked in Previous Year Papers for IBPS Clerk Mains 2016 Set-27:
Dear Readers, the List of important computer Quiz from previous year papers were given here for upcoming IBPS Clerk exams 2016 was given here. Candidates those who are preparing for the exams can use this.
Answer: b)
2). The ability to find an individual item in a file immediately _____ is used.
Answer: a)
3). The Primary purpose of software is to turn data into
Answer: b)
4). Which of the following correctly explains monitor?
Answer: a)
5). What is blog ?
Answer: c)
6). What is extension of Yahoo Messenger data file ?
Answer: d)
7). You can use the tab key to
Answer: d)
8). Manipulation of data in computer is called ____
Answer: b)
9). Which of the following is not related to information security on the Internet ?
Answer: d)
10). A constant is another name for this type of data:
Answer: a)
1). What is meaning of .rtf file ?
a) Red Text Format
b) Rich Text Format
c) Rich Text File
d) Red Text File
e) None of these
Answer: b)
2). The ability to find an individual item in a file immediately _____ is used.
a) file allocation table
b) directory
c) sequential access
d) direct access
e) None of these
Answer: a)
3). The Primary purpose of software is to turn data into
a) web sites
b) Information
c) programs
d) objects
e) None of these
Answer: b)
4). Which of the following correctly explains monitor?
a) Electronic Visual Display
b) Peripheral
c) Input around the Desktop area
d) Pixel based smart Area
e) Both (B) and (D)
Answer: a)
5). What is blog ?
a) Online music
b) Intranet
c) A personal or corporate website in the form of an online journal
d) A personal or corporate Google search
e) None of these
Answer: c)
6). What is extension of Yahoo Messenger data file ?
a) .ymd
b) .ypp
c) .yahoo
d) .yps
e) None of these
Answer: d)
7). You can use the tab key to
a) move a cursor across the screen
b) Indent a paragraph
c) Move the cursor down the screen
d) only (a) and (b)
e) None of these
Answer: d)
8). Manipulation of data in computer is called ____
a) Boot
b) Processing
c) simplification
d) Format
e) Clean Disk
Answer: b)
9). Which of the following is not related to information security on the Internet ?
a) Data Encryption
b) Water marking
c) Data Hiding
d) Information Retrieval
e) None of these
Answer: d)
10). A constant is another name for this type of data:
a) number
b) equation
c) formula
d) description
e) None of these
Answer: a)
1).b) 2).a) 3).b) 4).a) 5).c) 6).d) 7).d) 8).b) 9).d) 10).a)
No comments:
Post a Comment