BSC: Question of Day: BSC: The Internet
BSC: Question of Day: BSC: The Internet
aspx
Ques. : 2 Storage and memory differ with respect to which of the following characteristics ? 1) Price 3) Speed 5) None of these Ques. : 3 What is e-commerce ? 1) Buying and selling international goods 3) Buying and selling products and services not found in stores 5) Buying and selling of electronic goods 2) Buying and selling products and services over the Internet 4) Buying and selling products having to do with computers Ans.) 2 2) Reliability 4) All of these Ans.) 4
Ques. : 4 Which media have the ability to have data/information stored (written) on them by users more than once ? 1) CD-R disks 3) Zip disks 5) Word processing 2) CD-RW disks 4) OptiDisks Ans.) 5
Ques. : 5 Which of the following functions are not performed by servers ? 1) Email processing 3) Processing Web sites 5) Both CD-RW disks and Zip disks 2) Database sharing 4) Storage Ans.) 1
Ques. : 6 To move the cursor to the end of the document press 1) Ctrl + Esc 3) Ctrl + B 5) None of these Ques. : 7 The shortcut key to print documents is 1) Ctrl + A 3) Ctrl + P 5) None of these 2) Ctrl + B 4) Ctrl + C Ans.) 3 2) Ctrl + End 4) Ctrl + c Ans.) 2
Ques. : 8 The simultaneous processing of two or more Programs by multiple processors is 1) Multiprogramming 3) Time-sharing 5) None of these Ques. : 9 First layer in the OSI reference model is 1) Data link 3) Physical 5) None of these Ques. : 10 Data security threats include 1) Hardware failure 3) Fraudulent manipulation of data 5) None of these 2) Privacy invasion 4) All of the above Ans.) 2 2) Network 4) Application Ans.) 3 2) Multitasking 4) Multiprocessing Ans.) 4
1 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 11 Which of the following is NOT a type of Broadband internet connection? 1) Cable 3) Dial-up 5) None of these 2) DSL 4) Satellite Ans.) 3
Ques. : 12 in making a field this property show that it Cannot be left blank 1) Numeric 3) Calculated 5) None of these 2) Required 4) Validated Ans.) 2
Ques. : 13 There are viruses that are triggered by the Passage of time or on a certain date 1) Boot-sector viruses 3) Time bombs 5) None of these Ques. : 14 The internet is 1) A large network of networks 3) A communication system for the Indian Government 5) None of the above 2) An internal communication system for a Business 4) All of the above Ans.) 4 2) Macro viruses 4) Worms Ans.) 3
Ques. : 15 The main system board of a computer is called the 1) Integrated circuit 3) Processor 5) None of these 2) Motherboard 4) Microchip Ans.) 2
Ques. : 16 If the bit rate for an FSK signal is 1200 bps, the baud rate is ________. 1) 300 3) 600 5) None of these 2) 400 4) 1200 Ans.) 4
Ques. : 17 Which of the following is not a digital-to-analog conversion? 1) ASK 3) FSK 5) None of these 2) PSK 4) AM Ans.) 4
Ques. : 18 . In ________, the amplitude of the carrier signal is varied to create signal elements. Both frequency and phase remain constant. 1) ASK 3) FSK 5) None of these 2) PSK 4) QAM Ans.) 1
Ques. : 19 . The Federal Communications Commission (FCC) allows ______kHz for each AM station. 1) 5 3) 20 5) 30 2) 10 4) 25 Ans.) 2
Ques. : 20 . While there is (are) only _____ way(s) to send parallel data, there is (are) three subclass(es) of serial transmission 1) one; two 3) one; three 5) None of these 2) two; three 4) all of the above Ans.) 3
Ques. : 21 When you save to this, your data will remain intact even when the computer is turned off 1) RAM 3) Secondary storage device 5) None of the above 2) Motherboard 4) Primary storage device Ans.) 3
2 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 22 Ab e-mail account includes a storage area, often called a(n) 1) Attachment 3) Mailbox 5) None of these 2) Hyperlink 4) IP address Ans.) 3
Ques. : 23 The ____tells the computer how to use its components. 1) Utility 3) Application program 5) None of the above 2) Network 4) Operating system Ans.) 4
Ques. : 24 A set of computer programs that helps a computer monitor itself and function more efficiently is a/an 1) Windows 3) DBMS 5) None of the above Ques. : 25 With a CD you can 1) Read 3) Read and write 5) None of the above 2) Write 4) Either read or write Ans.) 1 2) System Software 4) Applications Software Ans.) 2
Ques. : 26 You would use this software to create spreadsheets, type documents, and edit photos 1) Application 3) System 5) None of these 2) Utility 4) Operating Ans.) 1
Ques. : 27 Which key is used in combination with another key to perform a specific task ? 1) Function 3) Arrow 5) None of these 2) Space bar 4) Control Ans.) 4
Ques. : 28 Various applications and documents are represented on the Windows desktop by 1) Symbols 3) Graphs 5) None of these 2) Labels 4) Icons Ans.) 4
Ques. : 29 The contents of il- are lost when the computer turns off 1) Storage 3) Output 5) None of these 2) Input 4) Memory Ans.) 1
Ques. : 30 It is the term given to the act of stealing someone identity and ruining their credit rating 1) Find Error 3) Identity theft 5) None of these 2) Identity 4) Virus Indefinites Ans.) 3
Ques. : 31 The following is responsible for number of logical records in a physical record 1) Blocking factor 3) Boolean algebra 5) None of these 2) Block 4) All of the above Ans.) 1
Ques. : 32 An operation in which data is moved to a different location is referred as 1) Block move 3) Delete 5) None of these 2) Street move 4) All of the above Ans.) 1
3 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
1) Block 3) Street 1 5) None of these Ques. : 34 BLOB is 1) Binary Large Object 3) Object oriented language 5) None of these Ques. : 35 Broadband channel is the 1) The fastest carriers where data transfer rates is of 1 million baud (bits/second) or more 3) Musical channel 5) None of these Ques. : 36 What is the full form of CRT? 1) current ray tube 3) cathode ray tube 5) None of these
2) A long bit string representing complex data 4) Only 1. and 2. are true Ans.) 4
2) The slower carriers where data transfer rates is of 56k baud 4) All of the above Ans.) 1
Ques. : 37 What do you call the rules of a programming language? 1) Procedures 3) Assembly 5) None of these 2) Login 4) Syntax Ans.) 4
Ques. : 38 ____ transforms one interface into another interface 1) Program 3) Data 5) None of these 2) Software 4) compiler Ans.) 2
Ques. : 39 Poor response times are usually caused by 1) Process busy 3) High paging rates 5) None of these 2) High I/O rates 4) Any of the above Ans.) 4
Ques. : 40 Which of the following program is not a utility? 1) Debugger 3) Spooler 5) None of these 2) Editor 4) all of the above Ans.) 3
Ques. : 41 System software are of two types operating systems and 1) applications 3) language trans 5) None of these 2) word processing 4) all of the above Ans.) 3
Ques. : 42 Debugging tools are there to debug errors in 1) printers 3) programs 5) None of these 2) keyboards 4) language Ans.) 3
Ques. : 43 There are two basic types of disks-floppy disk and 1) low disk 3) soft disk 5) None of these Ques. : 44 It is a collection of facts and figures 1) data 3) processing 2) information 4) file 2) hard disk 4) all of the above Ans.) 2
4 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
5) None of these
Ans.) 1
Ques. : 45 It converts accepted instructions into machine language 1) input unit 3) processing unit 5) None of these Ques. : 46 The internet is 1) A large network of networks 3) A communication system for the Indian Government 5) None of the above Ques. : 47 What is a backup? 1) Restoring the information backup 2) An exact copy of a systems information 3) The ability to get a system up and running In the 4) All of the above event of a system crash or failure 5) None of the above Ans.) 4 2) An internal communication system for a Business 4) All of the above Ans.) 4 2) output unit 4) memory unit Ans.) 1
Ques. : 48 There are viruses that are triggered by the Passage of time or on a certain date 1) Boot-sector viruses 3) Time bombs 5) None of these 2) Macro viruses 4) Worms Ans.) 3
Ques. : 49 in making a field this property show that it Cannot be left blank 1) Numeric 3) Calculated 5) None of these 2) Required 4) Validated Ans.) 2
Ques. : 50 Which of the following is NOT a type of Broadband internet connection? 1) Cable 3) Dial-up 5) None of these 2) DSL 4) Satellite Ans.) 3
Ques. : 51 IEEE has defined the specifications for a wireless LAN, called _______, which covers the physical and data link layers. 1) IEEE 802.3 3) IEEE 802.11 5) None of these 2) IEEE 802.5 4) IEEE 802.2 Ans.) 3
Ques. : 52 In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and an optional central base station, known as the access point (AP). 1) ESS 3) CSS 5) none of the above 2) BSS 4) all of the above Ans.) 2
Ques. : 53 In IEEE 802.11, a BSS without an AP is called an _________. 1) an ad hoc architecture 3) client server network 5) None of these 2) an infrastructure network 4) either a or b Ans.) 1
Ques. : 54 In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________. 1) BSSs 3) APs 5) none of the above 2) ESSs 4) all of the above Ans.) 3
Ques. : 55 In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or moving only inside a BSS.
5 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 56 It converts accepted instructions into machine language 1) input unit 3) processing unit 5) None of these 2) output unit 4) memory unit Ans.) 1
Ques. : 57 By default the bottom margin in the word document is 1) 2 inch 3) 3 inch 5) None of these 2) 1 inch 4) 1.5 inch Ans.) 2
Ques. : 58 A file name cannot contain in MS-Word database file 1) a letter 3) underscore 5) None of these Ques. : 59 Selection of text involves only 1) single word 3) paragraph or paragraphs and complete document 5) None of these Ques. : 60 Replace option is available in 1) Edit menu 3) Tools menu 5) None of these 2) File menu 4) Insert menu Ans.) 1 2) line or multiple lines 4) All of the above Ans.) 4 2) number 4) space Ans.) 4
Ques. : 61 The purpose of the primary key in a database is to 1) Unlock the database 3) Uniquely identify a record 5) None of the above 2) Provide a map of the data 4) Establish constraints on database operations Ans.) 2
Ques. : 62 The instructions that tell a computer how to carry out the processing tasks are referred to as computer 1) Programs 3) Input devices 5) None of these 2) Processors 4) Memory modules Ans.) 1
Ques. : 63 The ________________ is the amount of data that a storage device can move from the storage medium to the computer per second. 1) Data migration rate 3) Data transfer rate 5) None of these 2) Data digitizing rate 4) Data access rate Ans.) 3
Ques. : 64 C, BASIC, COBOL and Java examples of _languages. 1) Low-level 3) System programming 5) None of the above 2) Computer 4) High-level Ans.) 2
Ques. : 65 A______________ is a microprocessor-based computing device. 1) Personal computer 3) Workstation 5) None of these 2) Mainframe 4) Server Ans.) 1
6 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 67 What is the term used to describe the amount of space you have to transmit to and from the Internet? 1) Internet speed 3) Router 5) None of these 2) Network speed 4) Bandwidth Ans.) 4
Ques. : 68 Which of the following high-speed circuits is the fastest? 1) T1 3) T3 5) None of these 2) T2 4) DS3 Ans.) 4
Ques. : 69 What type of communication media is the most widely used cabling for data transfer today? 1) Cat 5 3) Coaxial 5) None of these 2) Twisted pair 4) Optical fiber Ans.) 1
Ques. : 70 What type of network device allows you to share your connection to the Internet with other computers in your home? 1) Ethernet card 3) Router 5) None of these 2) NIC 4) Cat 5 Ans.) 3
Ques. : 71 To open a new file in MS-Word, the shortcut key is 1) Ctrl + X 3) Ctrl + Y 5) None of these 2) Ctrl + N 4) Ctrl + V Ans.) 2
Ques. : 72 What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper? 1) Search & Replace 3) Soft Copy 5) None of these 2) Pagination 4) WYSIWYG Ans.) 4
Ques. : 73 Alignment buttons are available on which toolbar? 1) Status 3) Formatting 5) None of these 2) Standard 4) a and b Ans.) 3
Ques. : 74 Which of the following is not an option of edit menu? 1) Cut 3) Paste 5) None of these 2) Copy 4) Page setup Ans.) 4
Ques. : 75 A file name cannot contain in MS-Word database file 1) a letter 3) underscore 5) None of these 2) number 4) space Ans.) 4
Ques. : 76 Analyzing the current system is performed during the __________ phase. 1) development 3) implementation 5) None of these 2) design 4) needs analysis Ans.) 4
Ques. : 77 In __________, team members start with the big picture and move to the details.
7 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 78 A __________ is very good at accepting written input 1) pen 3) tablet PC 5) none of these 2) stylus 4) mouse Ans.) 3
Ques. : 79 The pattern of printed lines on most products are called __________. 1) prices 3) scanners 5) none of these 2) barcodes 4) OCR Ans.) 2
Ques. : 80 To convert paper into an editable document, a scanner would employ __________ technology. 1) UPC 3) conversion 5) none of these 2) scanning 4) OCR Ans.) 4
Ques. : 81 To place your image into a live video conference, a __________ is usually used. 1) webcam 3) video camera 5) none of these 2) digital camera 4) scanner Ans.) 1
Ques. : 82 Speech recognition programs must eliminate __________ before they can successfully recognize the spoken sounds. 1) jargon 3) accents 5) none of these 2) dialects 4) background noise Ans.) 4
Ques. : 83 There are three sampling methods: __________. 1) quantized, sampled, and ideal 3) ideal, natural, and flat-top 5) None of these 2) ideal, sampled, and flat-top 4) all of the above Ans.) 3
Ques. : 84 ______ finds the value of the signal amplitude for each sample; ____ finds the change from the previous sample. 1) DM; PCM 3) DM; CM 5) None of these Ques. : 85 The first step in PCM is ________. 1) quantization 3) sampling 5) None of these 2) modulation 4) all of the above Ans.) 3 2) PCM; DM 4) all of the above Ans.) 2
Ques. : 86 What is the name of the series of Laptop computers manufactured by IBM called? 1) LapPad 3) Aptiva 5) None of these 2) ThinkPad 4) Notepad Ans.) 2
Ques. : 87 What is the name of the 64-bit Microprocessor developed by AMD? 1) Opteron 3) iMac 5) None of these 2) RISC-9000 4) Athlon Ans.) 1
Ques. : 88 Which computer peripheral manufacturer quotes Empowering your PC? 1) Canon 3) Mercury 2) Epson 4) Samsung
8 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
5) None of these
Ans.) 3
Ques. : 89 Nortel is a company which manufactures: 1) Software 3) Cables 5) None of these 2) Processors 4) Network equipment Ans.) 4
Ques. : 90 Data (information) is stored in computers as 1) Files 3) Floppies 5) None of these Ques. : 91 Page stealing 1) Is a sign of an efficient system 3) Should be the tuning goal 5) None of these 2) Is taking page frames from other working sets 4) Is taking larger disk spaces for pages paged out Ans.) 2 2) Directories 4) Matter Ans.) 1
Ques. : 92 The processing of an application takes place between a client and a ____ processor. 1) Front end 3) Middle end 5) None of these 2) Back end 4) Both A and B Ans.) 4
Ques. : 93 The____ is not formal enough to be implemented directly in a programming language. 1) Object oriented data model 3) Object oriented model 5) None of these 2) ER model 4) Analysis model Ans.) 1
Ques. : 94 Which of the following device can store large amounts of data? 1) Floppy Disk 3) CDROM 5) None of these 2) Hard Disk 4) Zip Disk Ans.) 2
Ques. : 95 Which of the following is not a valid capacity of a floppy disk? 1) 360KB 3) 1.24 MB 5) None of these 2) 720KB 4) 1.44 MB Ans.) 3
Ques. : 96 Which of the following device is used only in LAN (Local Area Network)? 1) Gateway 3) NIC 5) None of these Ques. : 97 Which program can be used for email? 1) Internet Explorer 3) NetMeeting 5) None of these 2) Outlook Express 4) FrontPage Ans.) 2 2) Modem 4) Router Ans.) 3
Ques. : 98 cable carries signals in the form of fluctuating light in a glass. 1) Coaxial 3) Two wire open line 5) None of these 2) Twisted pair 4) Fiber optics Ans.) 4
Ques. : 99 _______ is used for scanning the pictures and putting them in digitized form in the computer. 1) CD-ROM 3) Bar-coder 5) None of these 2) Plotter 4) Scanner Ans.) 4
9 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 100 Which statement is valid? 1) 1 KB = 8 bytes 3) 1 KB = 1024 bytes 5) None of these 2) 1 MB = 8 KB 4) 1 MB = 1024 bytes Ans.) 3
Ques. : 101 Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the ________. 1) header 3) flag 5) none of the above 2) trailer 4) All the above Ans.) 3
Ques. : 102 . _______ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. 1) Flow 3) Transmission 5) none of the above 2) Error 4) All the above Ans.) 1
Ques. : 103 The Simplest Protocol and the Stop-and-Wait Protocol are for ______ channels. 1) noisy 3) error free 5) neither (a) nor (b) 2) noiseless 4) either (a) or (b) Ans.) 2
Ques. : 104 . In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK _______ to the sender. 1) 5 3) 7 5) none of these 2) 6 4) 8 Ans.) 3
Ques. : 105 In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? 1) 0 to 63 3) 1 to 63 5) none of these 2) 0 to 64 4) 1 to 64 Ans.) 1
Ques. : 106 On receiving an interrupt from an I/O device, the CPU 1) halts for predetermined time 2) branches off to the interrupt service routine after completion of the current instruction
3) hands over control of address bus and data bus 4) branches off to the interrupt service routine to the interrupting device. immediately. 5) None of these Ques. : 107 Data security threats include 1) privacy invasion 3) fraudulent manipulation of data 5) None of these 2) hardware failure 4) encryption and decryption Ans.) 3 Ans.) 2
Ques. : 108 Dijkestra banking algorithm in an operating system, solves the problem of 1) deadlock avoidance 3) mutual exclusion 5) None of these 2) deadlock recovery 4) context switching Ans.) 1
Ques. : 109 The amount of uncertainty in a system of symbol is called 1) Bandwidth 3) Loss 5) None of these 2) Entropy 4) Quantum Ans.) 2
Ques. : 110 Main aim of software engineering is to produce 1) program 3) within budget 5) None of these 2) software 4) software within budget in the given schedule Ans.) 4
10 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 111 When the angle of incidence is _______ the critical angle, the light beam bends along the interface 1) more than 3) equal to 5) None of these 2) less than 4) all of above Ans.) 3
Ques. : 112 Signals with a frequency below 2 MHz use _______ propagation 1) ground 3) line-of-sight 5) None of these 2) sky 4) all of above Ans.) 1
Ques. : 113 Signals with a frequency between 2 MHz and 30 MHz use ______ propagation 1) ground 3) line-of-sight 5) none of the above 2) sky 4) all of above Ans.) 2
Ques. : 114 Signals with a frequency above 30 MHz use _______propagation 1) ground 3) line-of-sight 5) None of these 2) sky 4) all of above Ans.) 3
Ques. : 115 A parabolic dish antenna is a(n) _______ antenna. 1) omnidirectional 3) unidirectional 5) None of these 2) bidirectional 4) horn Ans.) 3
Ques. : 116 The ________ layer is responsible for the process-to-process delivery of the entire message. 1) transport 3) data link 5) None of these 2) network 4) physical Ans.) 1
Ques. : 117 The ______ layer establishes, maintains, and synchronizes the interactions between communicating devices. 1) transport 3) session 5) None of these 2) network 4) physical Ans.) 3
Ques. : 118 The _______ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format. 1) transport 3) data link 5) None of these 2) network 4) presentation Ans.) 4
Ques. : 119 The _________ layer enables the users to access the network. 1) transport 3) data link 5) None of these 2) application 4) physical Ans.) 2
Ques. : 120 TCP/IP is a ______ hierarchical protocol suite developed ____ the OSI model. 1) seven-layer; before 3) six-layer; before 5) None of these Ques. : 121 Data Warehouse provides 1) Transaction Responsiveness 3) Demand and supply Responsiveness 5) None of the above 2) Storage, Functionality Responsiveness to queries 4) All the above Ans.) 2 2) five-layer; before 4) five-layer; after Ans.) 2
11 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 122 CPU does not perform the operation 1) data transfer 3) arithmetic operation 5) None of these 2) logic operation 4) all of the above Ans.) 4
Ques. : 123 Start and stop bits are used in serial communications for 1) Error detection 3) Synchronization 5) None of these 2) Error correction 4) Slowing down the communication Ans.) 3
Ques. : 124 Design recovery from source code is done during 1) reverse engineering 3) reuse 5) None of these Ques. : 125 Hub is a term used with 1) A Star Networks 3) A Router 5) None of these 2) A Ring Networks 4) A Bridge Ans.) 1 2) re-engineering 4) all of the above Ans.) 1
Ques. : 126 While there is (are) only _____ way(s) to send parallel data, there is (are) three subclass(es) of serial transmission. 1) one; two 3) one; three 5) none of the above 2) two; three 4) all of the above Ans.) 3
Ques. : 127 . In ______ transmission, we send 1 start bit (0) at the beginning and 1 or more stop bits (1s) at the end of each byte. 1) synchronous 3) isochronous 5) none of the above 2) asynchronous 4) all of the above Ans.) 2
Ques. : 128 In _____, the level of the voltage determines the value of the bit. 1) NRZ-I 3) TNL-L 5) neither (a) nor (b) 2) NRZ-L 4) both (a) and (b) Ans.) 2
Ques. : 129 In _______encoding, we use three levels: positive, zero, and negative. 1) unipolar 3) polar 5) None of these 2) bipolar 4) all of the above Ans.) 2
Ques. : 130 _______ encoding has a transition at the beginning of each 0 bit. 1) RZ 3) Differential Manchester 5) None of these 2) Manchester 4) all of the above Ans.) 3
Ques. : 131 ________ is the process of converting digital data to a digital signal. 1) Block coding 3) Scrambling 5) None of the above 2) Line coding 4) all of the above Ans.) 2
Ques. : 132 ________ provides synchronization without increasing the number of bits. 1) Scrambling 3) Block coding 5) None of the above 2) Line coding 4) all of the above Ans.) 1
12 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 133 ASK, PSK, FSK, and QAM are examples of ________ conversion. 1) digital-to-digital 3) analog-to-analog 5) none of these 2) digital-to-analog 4) analog-to-digital Ans.) 2
Ques. : 134 The Federal Communications Commission (FCC) allows ______kHz for each AM station. 1) 5 3) 20 5) none of the above 2) 10 4) 25 Ans.) 2
Ques. : 135 Which of the following is not an analog-to-analog conversion? 1) AM 3) FM 5) none of these 2) PM 4) QAM Ans.) 4
Ques. : 136 . A __________ is anything that can cause harm. 1) vulnerability 3) phish 5) None of these 2) phish 4) threat Ans.) 4
Ques. : 137 In the right setting a thief will steal your information by simply watching what you type. 1) snagging 3) social engineering 5) None of these 2) spying 4) shoulder surfing Ans.) 4
Ques. : 138 A __________ is a small program embedded inside of a GIF image. 1) web bug 3) spyware application 5) None of these 2) cookie 4) spam Ans.) 1
Ques. : 139 A hacker contacts you my phone or email and attempts to acquire your password 1) spoofing 3) spamming 5) None of these 2) phishing 4) bugging Ans.) 2
Ques. : 140 The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts. 1) malware 3) phish 5) None of these 2) spam 4) virus Ans.) 1
Ques. : 141 If a process is under statistical control, then it is 1) Maintainable 3) Predictable 5) none of these 2) Measurable 4) Verifiable Ans.) 3
Ques. : 142 In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ? 1) Space division 3) Virtual 5) none of these 2) Time division 4) Packet Ans.) 2
Ques. : 143 Which command is the fastest among the following ? 1) COPY TO 3) COPY FILE 5) none of these 2) COPY STRUCTURE TO 4) COPY TO MFILE-DA T DELIMITED Ans.) 2
Ques. : 144 Leaves of which of the following trees are at the same level ?
13 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
1) Binary tree 3) A VL-tree 5) none of these Ques. : 145 The baud rate is 1) always equal to the bit transfer rate 3) not equal to the signalling rate 5) none of these
2) equal to twice the bandwidth of an ideal channel 4) equal to half of the bandwidth of an ideal channel Ans.) 2
Ques. : 146 Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ? 1) FTP 3) TELNET 5) none of these 2) TFTP 4) NFS Ans.) 1
Ques. : 147 Networks that use different technologies can be connected by using 1) Packets 3) Bridges 5) none of these 2) Switches 4) Routers Ans.) 4
Ques. : 148 What deletes the entire file except the file structure ? 1) ERASE 3) ZAP 5) none of these 2) DELETE 4) PACK Ans.) 3
Ques. : 149 Which of the following is the process by which a users access to physical data in the application is limited, based on his privileges ? 1) Authorization 3) Access Control 5) none of these 2) Authentication 4) All of these Ans.) 3
Ques. : 150 If the executing program size is greater than the existing RAM of a computer, it is still possible to execute the program if the OS supports: 1) Multitasking 3) paging system 5) none of the above 2) virtual memory 4) all of the above Ans.) 2
Ques. : 151 An example of a universal building block is : 1) EX-OR Gate 3) OR gate 5) None of these 2) AND Gate 4) NOR Gate Ans.) 4
Ques. : 152 An example of a layer that is absent in broadcast networks is 1) Physical layer 3) Network layer 5) None of these Ques. : 153 The ATM cell is : 1) 48 bytes long 3) 64 bytes long 5) None of these Ques. : 154 Congestion control is done by 1) Network layer 3) Presentation layer 5) None of these 2) Physical layer 4) Application layer Ans.) 1 2) 53 bytes long 4) 69 bytes long Ans.) 2 2) Presentation layer 4) application layer Ans.) 3
14 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 155 IP address in B class is given by: 1) 125.123.123.2 3) 192.128.32.56 5) None of these Ques. : 156 Black box testing is done 1) To show that s/w is operational at its interfaces i.e. input and output. 3) At client side 5) None of the above 2) To examine internal details of code 4) all of the above Ans.) 1 2) 191.023.21.54 4) 10.14.12.34 Ans.) 2
Ques. : 157 The unix command used to find out the number of characters in a file is 1) nc 3) chcnt 5) None of these 2) wc 4) lc Ans.) 2
Ques. : 158 A program is located in the smallest available hole in the memory is ______________ 1) best-fit 3) worst-fit 5) None of these Ques. : 159 A page fault 1) is an error specific page 3) occur when a page program occur in a page memory 5) None of these 2) is an access to the page not currently in memory 4) page used in the previous page reference Ans.) 2 2) first-bit 4) buddy Ans.) 1
Ques. : 160 In the process management Round-robin method is essentially the pre-emptive version of _______________. 1) FILO 3) SSF 5) None of these 2) FIFO 4) Longest time first Ans.) 2
Ques. : 161 The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. 1) application 3) data link 5) None of these 2) network 4) physical Ans.) 1
Ques. : 162 What type of communication media is the most widely used cabling for data transfer today? 1) Cat 5 3) Coaxial 5) None of these 2) Twisted pair 4) Optical fiber Ans.) 1
Ques. : 163 Which of the following high-speed circuits is the fastest? 1) T1 3) T3 5) None of these 2) T2 4) DS3 Ans.) 4
Ques. : 164 What is the term used to describe the amount of space you have to transmit to and from the Internet? 1) Internet speed 3) Router 5) None of these 2) Network speed 4) Bandwidth Ans.) 4
Ques. : 165 What is another name for a shared network? 1) WAP 3) Broadband router 5) None of these 2) Switch 4) Hub Ans.) 4
15 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 166 Which of the following concepts means determining at runtime what method to invoke? 1) Data hiding 3) Dynamic loading 5) None of these 2) Dynamic Typing 4) Dynamic binding Ans.) 4
Ques. : 167 Which of the following term is used for a function defined inside a class? 1) Member Variable 3) Classic function 5) None of these 2) Member function 4) Class function Ans.) 2
Ques. : 168 Which of the following concepts of OOPS means exposing only necessary information to client? 1) Encapsulation 3) Data binding 5) all of the above 2) Abstraction 4) Data hiding Ans.) 4
Ques. : 169 Which of the following is an abstract data type? 1) int 3) string 5) None of these 2) double 4) Class Ans.) 4
Ques. : 170 Which of the following concepts means adding new components to a program as it runs? 1) Data hiding 3) Dynamic loading 5) None of these 2) Dynamic typing 4) Dynamic binding Ans.) 3
Ques. : 171 How "Late binding" is implemented in C++? 1) Using C++ tables 3) Using Indexed virtual tables 5) None of these 2) Using Virtual tables 4) Using polymorphic tables Ans.) 2
Ques. : 172 Which of the following cannot be used with the keyword virtual? 1) class 3) constructor 5) None of these 2) member functions 4) destructor Ans.) 3
Ques. : 173 Which one of the following options is correct about the statement given below? The compiler checks the type of reference in the object and not the type of object. 1) Inheritance 3) Abstraction 5) None of these 2) Polymorphism 4) Encapsulation Ans.) 2
Ques. : 174 Which of the following concepts is used to implement late binding? 1) Virtual function 3) Const function 5) None of these 2) Operator function 4) Static function Ans.) 1
Ques. : 175 Which of the following is a mechanism of static polymorphism? 1) Operator overloading 3) Templates 5) None of these 2) Function overloading 4) All of the above Ans.) 4
Ques. : 176 What term is used to identify people coming together from various geographical locations to complete some task? 1) I-team 3) Online work group 5) none of these 2) Virtual team 4) Distributed team Ans.) 2
16 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 177 What type of Web site allows visitors to create and maintain information posted on its site? 1) Open source site 3) Knowledge construction sites 5) none of these 2) Wiki 4) FTP site Ans.) 2
Ques. : 178 Which person oversees an organization's entire information system? 1) CTO 3) CIO 5) none of these 2) CSO 4) CPO Ans.) 3
Ques. : 179 Which type of system includes all technology systems and software across an organization? 1) Knowledge based systems 3) Enterprise resource planning systems 5) none of these 2) Strategic information systems 4) Management information systems Ans.) 3
Ques. : 180 What is the term used to depict aged information systems that are technologically out-of-date? 1) Outdated information systems 3) Archaic systems 5) none of these 2) Obsolete systems 4) Legacy information systems Ans.) 4
Ques. : 181 Which of the following problem causes an exception? 1) Missing semicolon in statement in main(). 3) A syntax error 5) None of these 2) A problem in calling function 4) A run-time error. Ans.) 4
Ques. : 182 What happens if the base and derived class contains definition of a function with same prototype? 1) Compiler reports an error on compilation 3) Only derived class function will get called irrespective of object. 5) none of the above 2) Only base class function will get called irrespective of object 4) Base class object will call base class function and derived class object will call derived class function. Ans.) 4
Ques. : 183 In which of the following a virtual call is resolved at the time of compilation? 1) From inside the destructor. 3) From inside the main(). 5) None of these 2) From inside the constructor 4) Both A and B. Ans.) 4
Ques. : 184 Which inheritance type is used in the class given below? class A : public X, public Y {} 1) Multilevel inheritance 3) Hybrid inheritance 5) None of these 2) Multiple inheritance 4) Hierarchical Inheritance Ans.) 2
Ques. : 185 Which of the following is an invalid visibility label while inheriting a class? 1) public 3) protected 5) None of these 2) private 4) friend Ans.) 4
Ques. : 186 Start and stop bits are used in serial communications for 1) Error detection 3) Synchronization 5) None of these 2) Error correction 4) Slowing down the communication Ans.) 3
Ques. : 187 For a data entry project for office staff who have never used computers before (user interface and userfriendliness are extremely important), one will use 1) Spiral model 3) Prototyping 5) None of these 2) Component based model 4) Waterfall model Ans.) 3
17 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 188 The amount of uncertainty in a system of symbol is called 1) Bandwidth 3) Loss 5) None of these Ques. : 189 Identify the incorrect statement 1) The overall strategy drives the E-Commerce data 2) Data warehousing in an E-Commerce warehousing strategy environment should be done in a classical manner 3) E-Commerce opens up an entirely new world of web server. 5) None of the above 4) E-Commerce security threats can be grouped into three major categories Ans.) 4 2) Entropy 4) Quantum Ans.) 2
Ques. : 190 ______ is not an E-Commerce application 1) House banking 3) Conducting an auction 5) None of these 2) Buying stocks 4) Evaluating an employee Ans.) 4
Ques. : 191 A thread is a light weight process. In the above statement, weight refers to 1) time 3) speed 5) none of the above 2) number of resources 4) all of the above Ans.) 2
Ques. : 192 Everything below the system call interface and above the physical hardware is known as 1) Kernel 3) Shell 5) none of the above 2) Bus 4) Stub Ans.) 1
Ques. : 193 When a programming Language has the capacity to produce new datatype, it is called as 1) Overloaded Language 3) Encapsulated Language 5) none of the above 2) Extensible Language 4) Abstraction Language Ans.) 2
Ques. : 194 Which of the following operating system is better for implementing client-server network 1) Windows 95 3) Windows 2000 5) none of the above 2) Windows 98 4) All of these Ans.) 3
Ques. : 195 Functions defined with class name are called as 1) Inline function 3) Constructor 5) none of the above 2) Friend function 4) Static function Ans.) 3
Ques. : 196 The United States is divided into many _______. 1) LECs 3) IXCs 5) none of the above 2) LATAs 4) All the above Ans.) 2
Ques. : 197 The carrier that handles intra-LATA services is called a(n) _____ . 1) POP 3) LEC 5) none of the above 2) IXC 4) All the above Ans.) 3
Ques. : 198 The carrier that handles inter-LATA services is called a(n) _______. 1) POP 3) LEC 5) none of the above 2) IXC 4) all of the above Ans.) 2
18 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 199 In ______signaling, the same circuit is used for both signaling and data. 1) in-band 3) mixed 5) none of the above 2) out-of-band 4) All the above Ans.) 1
Ques. : 200 . In ________signaling, a portion of the bandwidth is used for signaling and another portion for data. 1) in-band 3) mixed 5) none of the above 2) out-of-band 4) All the above Ans.) 2
Ques. : 201 In _____ coding, we divide our message into blocks, each of k bits, called ___. 1) block; blockwords 3) block; datawords 5) none of the above 2) linear; datawords 4) All the above Ans.) 3
Ques. : 202 We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________. 1) datawords 3) codewords 5) none of the above 2) blockwords 4) All the above Ans.) 3
Ques. : 203 The ________ between two words is the number of differences between corresponding bits. 1) Hamming code 3) Hamming rule 5) none of the above 2) Hamming distance 4) All the above Ans.) 2
Ques. : 204 To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______. 1) 5 3) 11 5) None of these 2) 6 4) All the above Ans.) 2
Ques. : 205 To guarantee correction of up to 5 errors in all cases, the minimum Hamming distance in a block code must be ________. 1) 5 3) 11 5) none of the above 2) 6 4) All the above Ans.) 3
Ques. : 206 . ________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. 1) Attenuation 3) Noise 5) None of these 2) Distortion 4) Decibel Ans.) 2
Ques. : 207 ________ is a type of transmission impairment in which an outside source such as crosstalk corrupts a signal. 1) Attenuation 3) Noise 5) None of these 2) Distortion 4) Decibel Ans.) 3
Ques. : 208 When propagation speed is multiplied by propagation time, we get the ________. 1) throughput 3) distortion factor 5) None of these 2) wavelength of the signal 4) distance a signal or bit has traveled Ans.) 4
Ques. : 209 Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. 1) one-half 3) the same as 5) None of these 2) twice 4) indeterminate from Ans.) 2
19 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 210 A sine wave is ________. 1) periodic and continuous 3) periodic and discrete 5) None of these 2) aperiodic and continuous 4) aperiodic and discrete Ans.) 1
Ques. : 211 A ________ switch is a multistage switch with microswitches at each stage that route the packets based on the output port represented as a binary string. 1) crossbar 3) banyan 5) none of the above 2) TSI 4) all of the above Ans.) 3
Ques. : 212 In a banyan switch, for 8 inputs and 8 outputs, we have _____ stages. 1) 8 3) 3 5) None of these 2) 4 4) 2 Ans.) 3
Ques. : 213 A ________ switch combines space-division and time-division technologies to take advantage of the best of both. 1) TST 3) TTT 5) none of the above 2) SSS 4) all of the above Ans.) 1
Ques. : 214 The most popular technology in time-division switching is called the _________. 1) STI 3) TSI 5) none of the above 2) ITS 4) all of the above Ans.) 3
Ques. : 215 Based on the Clos criteria, if N = 200, then n must be equal to or greater than ____. 1) 10 3) 30 5) None of these 2) 20 4) 40 Ans.) 1
Ques. : 216 The largest portion of the bandwidth for ADSL carries _______. 1) voice communication 3) downstream data 5) none of these 2) upstream data 4) control data Ans.) 3
Ques. : 217 _______ was designed as an alternative to the T-1 line. 1) VDSL 3) SDSL 5) none of these Ques. : 218 HDSL encodes data using _______. 1) 4B/5B 3) 1B2Q 5) none of these 2) 2B1Q 4) 6B/8T Ans.) 2 2) ADSL 4) HDSL Ans.) 4
Ques. : 219 Another name for the cable TV office is the _______. 1) splitter 3) combiner 5) none of these 2) fiber node 4) head end Ans.) 4
Ques. : 220 A traditional cable TV network transmits signals ______. 1) upstream 3) upstream and downstream 5) none of the above 2) downstream 4) all of the above Ans.) 2
20 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 221 What term is used to describe two or more computers that are linked to each other? 1) Star connection 3) Computer network 5) None of these 2) Computer system 4) Net Ans.) 3
Ques. : 222 What interface card do you need to connect to a network? 1) ISP card 3) Router 5) None of these 2) Wireless card 4) NIC Ans.) 4
Ques. : 223 Which of the following is not described as a typical network classification? 1) Local area network 3) Metropolitan area network 5) None of these 2) Wide area network 4) County area network Ans.) 4
Ques. : 224 What type of network device allows you to share your connection to the Internet with other computers in your home? 1) Ethernet card 3) Router 5) None of these 2) NIC 4) Cat 5 Ans.) 3
Ques. : 225 What is another name for a shared network? 1) WAP 3) Broadband router 5) None of these 2) Switch 4) Hub Ans.) 4
Ques. : 226 How do you save changes to a PowerPoint presentation? 1) Pull down the File menu and click the Save command 3) click on titel bar 5) None of these 2) Click the Save button on the Standard toolbar 4) Either (a) and (b) Ans.) 4
Ques. : 227 Which of the following can be printed in support of a PowerPoint presentation? 1) Audience handouts 3) An outline 5) None of these 2) Notes 4) All the above Ans.) 4
Ques. : 228 Which toolbars are typically displayed in the Normal view? 1) The Standard toolbar 3) The Drawing toolbar 5) None of these 2) The Formatting toolbar 4) All of the above Ans.) 4
Ques. : 229 Ctrl+Home and Ctrl+End are keyboard shortcuts that move to the beginning or end of the presentation in the: 1) Outline view 3) insert view 5) None of these 2) Slide Sorter view 4) Neither (a) nor (b) Ans.) 5
Ques. : 230 Which menu contains the commands to save the current presentation, or to open a previously saved presentation? 1) The Tools menu 3) The View menu 5) None of these 2) The File menu 4) The Edit menu Ans.) 2
Ques. : 231 A ______________ is a group of two or more computer systems linked together to exchange data and share resources such as printers 1) wireless network adapter 3) Node 5) None of these 2) Network 4) Port Ans.) 2
21 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 232 An expansion board that provides the electronic components to make a connection between a computer and a network is called a ______________. 1) collective network 3) network interface card (NIC) 5) None of these 2) logical address 4) wide area network Ans.) 3
Ques. : 233 A USB communication device that supports data encryption for secure wireless communication for 1) campus area network (CAN) 3) wireless LAN 5) None of these 2) wide area network (WAN) 4) metropolitan area network (MAN) Ans.) 4
Ques. : 234 A typical university or corporate LAN that includes one or more servers and clients is called a __________________. 1) peer-to-peer network 3) security hierarchy 5) None of these 2) wireless LAN 4) client/server network Ans.) 4
Ques. : 235 __________________defines how one Internet-connected computer can contact another to exchange control and confirmation messages 1) WAN switching rules 3) Transmission Control Protocol (TCP) 5) None of these 2) Internet rules 4) Internet Protocol (IP) Ans.) 3
Ques. : 236 ____________________ such as AT&T, NCI, Sprint, BBN, and UUNET maintain the Internet backbone. 1) Telephone companies 3) Network service providers 5) None of these 2) Communications companies 4) Cyberspace companies Ans.) 3
Ques. : 237 The ___________________ layer manages the assembling of a message or file into smaller packets that are transmitted over the Internet. 1) Internet backbone 3) Transmission Control Protocol (TCP) 5) None of these 2) Internet interoperability 4) Internet Protocol (IP) Ans.) 3
Ques. : 238 Documents of the Web that are transported over the Internet are called ____________________. 1) Web pages 3) Web sites 5) None of these 2) HTML pages 4) Hypertext links Ans.) 1
Ques. : 239 Internet Explorer and Safari are examples of ________________. 1) Web pages 3) Web servers 5) None of these 2) Web browsers 4) Web sites Ans.) 2
Ques. : 240 A(n) _______________________ is a numerical identification and logical address that is assigned to devices participating in a computer network 1) top-level domain (TLD) name 3) domain name 5) None of these 2) path 4) Internet Protocol address (IP address) Ans.) 4
Ques. : 241 Wired home networks typically use Cat-5 or Cat-6 Ethernet cables or a home's ____________________ to connect network devices. 1) water pipes 3) telephone system 5) None of these 2) electrical wiring 4) smartphones Ans.) 2
Ques. : 242 Optimized for dial-up connections over noisy telephone lines, the oldest packet-switching protocol for WAN usage, called _______________, is still widely used.
22 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 243 ___________________ is the method used in public switched telephone systems where there is a direct connection between communicating devices. 1) Transaction acquisition 3) Circuit switching 5) None of these 2) Internet protocol 4) Packet switching Ans.) 3
Ques. : 244 _________________ broadcast radio waves that can be picked up by anyone using the correct configuration. 1) Campus area networks (CAN) 3) Wireless networks 5) None of these 2) Broadband networks 4) Wide area networks (WAN) Ans.) 3
Ques. : 245 A(n) _______________________ is a microchip that contains the circuitry to convert an analog signal into a digital signal. 1) communications channel 3) Codec 5) None of these 2) analog-to-digital converter (ADC) 4) digital-to-analog converter (DAC) Ans.) 2
Ques. : 246 ______________________ is a technique that is used to send more than one call over a single line. 1) Multiplexing 3) Streaming 5) None of these 2) Infrared transmission 4) Digital transmission Ans.) 1
Ques. : 247 The leading provider of ________________ is the local cable TV company. 1) broadband 3) coaxial cable 5) None of these 2) digital telephone access 4) digital subscriber lines Ans.) 1
Ques. : 248 ADSL, SDSL, HDSL, and VDSL are examples of different types of _______________________. 1) digital subscriber lines 3) cable-based broadband 5) None of these 2) digital modems 4) subscriber loop carriers Ans.) 1
Ques. : 249 ______________________ is the process that transforms data such as voice, text, graphics, audio, and video into digital form. 1) Wireless data transmission 3) Convergence 5) None of these 2) Digitization 4) Analog transfer Ans.) 2
Ques. : 250 ____________________ refers to an individual's ability to restrict or eliminate the collection, use, and sale of confidential personal information. 1) Privacy 3) Identity theft 5) None of these 2) Bill of Rights for Social Network Users 4) Ethics Ans.) 1
Ques. : 251 The leading provider of ________________ is the local cable TV company. 1) broadband 3) coaxial cable 5) None of these 2) digital telephone access 4) digital subscriber lines Ans.) 1
Ques. : 252 A ________________________ is a small, waist-high curbside installation that connects as many as 96 subscriber telephones. 1) subscriber loop carrier (SLC) 3) virtual private network 5) None of these 2) multiplexing unit 4) network access point Ans.) 1
23 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 253 The __________________ is a digital device capable of handling thousands of calls and is located in the local telephone company's central office. 1) public switched telephone network (PSTN) 3) internal private branch exchange 5) None of these 2) microwave relay station 4) local exchange switch Ans.) 4
Ques. : 254 ADSL, SDSL, HDSL, and VDSL are examples of different types of _______________________. 1) digital subscriber lines 3) cable-based broadband 5) None of these 2) digital modems 4) subscriber loop carriers Ans.) 1
Ques. : 255 _____________________ refers to an individual's ability to restrict or eliminate the collection, use, and sale of confidential personal information. 1) Privacy 3) Identity theft 5) None of these 2) Bill of Rights for Social Network Users 4) Ethics Ans.) 1
Ques. : 256 In a survey, employers ranked __________________ third, right below communication skills and analytical ability. 1) people skills 3) computer literacy 5) None of these 2) Internet skills 4) hard skills Ans.) 3
Ques. : 257 A(n) ______________________ is a computer program that scans resumes and is set to locate keywords. 1) information system 3) Web conference 5) None of these 2) Web interview 4) application tracking system (ATS) Ans.) 4
Ques. : 258 Computer-related __________________ are typically presented by the developer of a new hardware or software product or by a company specializing in training IT professionals in a new technology. 1) systems engineering 3) online systems 5) None of these 2) training seminars 4) trade shows Ans.) 2
Ques. : 259 Not only are computer literacy skills important in most jobs today and near the top of the list of employment requirements, but they are also essential in the _______________________. 1) job search 3) information systems division 5) None of these 2) Web interview 4) Web conference Ans.) 1
Ques. : 260 ____________________ is a very broad discipline with applications in almost every other discipline imaginable. 1) Technology science 3) Information science 5) None of these 2) Computer science 4) Electrical engineering Ans.) 2
Ques. : 261 Microsoft Access and MySQL are examples of ________________________. 1) multidimensional databases 3) file management programs 5) None of these 2) database management systems (DBMSs) 4) data warehouses Ans.) 2
Ques. : 262 _____________ is a technique in which managers are able to view information in a data warehouse and focus their attention on a specific data element. 1) Analytical research 3) MDX querying 5) None of these 2) Drill down 4) SQL Ans.) 2
Ques. : 263 A(n) _____________________ is a system that includes the collection of people, hardware, software, data records, and activities that process the data and information in an organization.
24 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 264 A ___________________________ handles an organization's day-to-day accounting needs; keeping a verifiable record of every transaction involving money, including purchases, sales, and payroll payments. 1) transactional processing system (TPS) 3) decision support system (DSS) 5) None of these 2) financial support system (FSS) 4) business processing system (BPS) Ans.) 1
Ques. : 265 _______________________ occurs when too much information is provided making processing, absorbing, and validating difficult. 1) Database integration 3) Nonfunctional information 5) None of these 2) Database integration 4) Query integration Ans.) 2
Ques. : 266 A(n) _________________ is a collection of related data that is organized in a manner that makes it easy to access, manage, update, group, and summarize. 1) knowledge base 3) information system 5) None of these 2) data warehouse 4) database Ans.) 4
Ques. : 267 A ___________________ is a descriptive label that helps identify the type of content to be entered into a field. 1) data file 3) data type 5) None of these 2) field name 4) query Ans.) 2
Ques. : 268 A __________, or data file, is a collection of related records. 1) flat file 3) record 5) None of these 2) primary key 4) table Ans.) 4
Ques. : 269 _____________________ means that the data is separate from the applications and that changes in data do not require changes in the structure of forms, reports, or programs access the databases. 1) Data independence 3) Validation 5) None of these 2) Data consistency 4) Data integrity Ans.) 1
Ques. : 270 ___________________ means that the data stored in a database shouldn't be accessible to people who might misuse it. 1) Data independence 3) Data redundancy 5) None of these 2) Data security 4) Data maintenance Ans.) 2
Ques. : 271 A(n) ______________________ is a set of programs designed to manage the resources or a computer, including starting the computer, managing programs, managing memory, and coordinating tasks between input and output devices 1) application suite 3) operating system (OS) 5) None of these 2) Interface 4) input/output system Ans.) 3
Ques. : 272 The ____________ is the central part of the OS that consists of instructions that control the actions the OS uses most frequently. 1) profile 3) kernel 5) None of these 2) bios 4) booting Ans.) 3
Ques. : 273 _________________ memory is storage that is very fast but released when the power goes off.
25 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 274 A database, called the _________________, stores configuration information about installed peripherals and software. 1) BIOS 3) registry 5) None of these 2) profile 4) boot sector Ans.) 3
Ques. : 275 A(n) ___________________ consists of a username, password, and storage space called a user folder or user directory. 1) account 3) buffer 5) None of these 2) swap file 4) authentication Ans.) 1
Ques. : 276 The most popular general-purpose applications are ___________________. 1) application features. 3) productivity programs. 5) None of these 2) multimedia programs. 4) Internet applications. Ans.) 3
Ques. : 277 Features within the application window include the ______________, the document, the title bar, and the three window control buttons. 1) browser 3) shared office interface 5) None of these 2) minimize button 4) application workspace Ans.) 4
Ques. : 278 _________________ appear on the scroll bar and can be clicked to scroll the document line by line. 1) Contextual tabs 3) Scroll arrows 5) None of these 2) Windows borders 4) Restore down buttons Ans.) 3
Ques. : 279 Common command sequences are instructions that open an application, _________________, close a document, and close an application. 1) group icons 3) automatically wrap text 5) None of these 2) save a document 4) access the toolbar Ans.) 2
Ques. : 280 Word, Excel, Access, and PowerPoint are the programs in _________________. 1) Internet browser 3) Open Office 5) None of these 2) common interface 4) Microsoft Office 2010 Ans.) 4
Ques. : 281 _________________________ are specialized operating systems designed for specific applications. 1) Server operating systems 3) Unix operating systems 5) None of these 2) Linux operating systems 4) Embedded operating systems Ans.) 4
Ques. : 282 ___________________ software creates a mirror image of the entire hard disk, including the operating system, applications, files, and data. 1) Utility programs 3) Driver imaging 5) None of these 2) Operating system 4) Backup software Ans.) 3
Ques. : 283 A portion of the disk that is unable to store data reliably is a _______________________. 1) bad sector 3) file manager 5) None of these 2) search utility 4) clean-up utility Ans.) 1
26 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 284 The most popular general-purpose applications are ___________________. 1) application features. 3) productivity programs. 5) None of these 2) multimedia programs. 4) Internet applications. Ans.) 3
Ques. : 285 A person who uses a computer is called a: 1) utilizer 3) user 5) None of these Ques. : 286 Unsolicited e-mail is knows as: 1) ham 3) RAM JAM 5) None of these Ques. : 287 The Internet is also known as: 1) the Bucket 3) Cybernet 5) None of these 2) the Global Interface 4) the Net Ans.) 4 2) bologna 4) spam Ans.) 2 2) software consumer 4) client Ans.) 3
Ques. : 288 Individuals gain access to the Internet by subscribing to a(n): 1) ISP 3) PSI 5) None of these Ques. : 289 Integrated circuits are also called: 1) chips 3) electronic sandwiches 5) None of these 2) slivers 4) flakes Ans.) 2 2) SPI 4) IPS Ans.) 1
Ques. : 290 Supercomputers are oriented to what type of applications: 1) processor-bound 3) I/O-bound 5) None of these 2) inventory management 4) word processing Ans.) 1
Ques. : 291 In a LAN, a server computer performs a variety of functions for its: 1) LAN entity PC 3) client computers 5) None of these 2) subcomputers 4) work units Ans.) 4
Ques. : 292 An Internet-based online retailer is called a(n): 1) net-tailer 3) cybertailer 5) None of these 2) online tailer 4) e-tailer Ans.) 4
Ques. : 293 What type of computing comprises all computing activities designed to support an organization: 1) professional 3) personal 5) None of these 2) industrial 4) enterprise Ans.) 1
Ques. : 294 Computers that control processes accept data in a continuous: 1) feedback loop 3) data traffic pattern 5) None of these 2) data highway 4) infinite loop Ans.) 1
Ques. : 295 The PC productivity tool that manipulates data organized in rows and columns is called a:
27 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 296 Which PC productivity tool would be helpful in writing a term paper: 1) word processing 3) communications 5) None of these 2) presentation 4) spreadsheet Ans.) 1
Ques. : 297 Which of the following best describes AOL? 1) AOL is like an ISP with training wheels. 3) AOL is an ISP. 5) None of these 2) AOL has only a small portion of the Internet subscribers. 4) AOL is like an ISP, only cheaper. Ans.) 4
Ques. : 298 The heart of the computer is its __________. 1) processor 3) motherboard 5) None of these Ques. : 299 How big is a processor in a computer? 1) About the size of a matchbook 3) About the size of a pencil 5) None of these 2) About the size of a 3 floppy disk 4) About the size of a pinky-fingernail Ans.) 3 2) RAM 4) magnetic disks Ans.) 4
Ques. : 300 Which of the following is an example of system software? 1) Microsoft Word 3) Microsoft Excel 5) None of these 2) Microsoft Outlook 4) Microsoft Windows XP Ans.) 1
Ques. : 301 What is the name given to the weapons which use computerised guidance system? 1) Guided weapons 3) Dumb weapons 5) None of the above 2) Smart weapons 4) Starwars weapons Ans.) 2
Ques. : 302 The ALU of a computer normally contains a number of high speed storage elements called 1) semiconductor memory 3) hard disk 5) None of the above 2) registers 4) magnetic disk Ans.) 2
Ques. : 303 What is the name given to the weapons which use computerised guidance system? 1) Guided weapons 3) Dumb weapons 5) None of the above 2) Smart weapons 4) Starwars weapons Ans.) 2
Ques. : 304 What is the name of the printer which prints all the A's in a line before all the B's? 1) Thermal printer 3) Line printer 5) None of the above 2) Electrostatic printer 4) Ink-jet printer Ans.) 3
Ques. : 305 A _____ is simply an arrangement where multiple disk drives appear as a single disk drive to the user. 1) disk 3) bunch of disks 5) spanned drive 2) disk array 4) disk pack Ans.) 2
Ques. : 306 Which is used to provide the sight information to the right person at the right time for proper decision making? 1) DBMS 3) ISO 2) MIS 4) PSO
28 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ans.) 2
Ques. : 307 Which type of display is the latest to be used for portable computer? 1) LED display 3) Plasma display 5) None of the above Ques. : 308 A floppy disk contains 1) Circular tracks only 3) Both circular tracks and sector 5) None of the above 2) Sectors only 4) All of the above Ans.) 3 2) LCD display 4) Electroluminescent display Ans.) 4
Ques. : 309 Can you tell what passes into and out from the computer via its ports? 1) Data 3) Graphics 5) None of the above 2) Bytes 4) Pictures Ans.) 2
Ques. : 310 The ALU of a computer responds to the commands coming from 1) primary memory 3) external memory 5) None of the above 2) control section 4) cache memory Ans.) 2
Ques. : 311 A family of polynomial block codes designed to correct burst errors is known as 1) Bar codes 3) Fire codes 5) None of the above 2) Gray codes 4) mnemonics codes Ans.) 3
Ques. : 312 To produce high-quality graphics (hardcopy) in color, you would want to use a(n) 1) RGB monitor 3) ink-jet printer 5) All of the above 2) plotter 4) laser printer Ans.) 2
Ques. : 313 The computer code for the interchange of information between terminals is 1) ASCII 3) EBCDIC 5) None of the above 2) BCD 4) All of the above Ans.) 1
Ques. : 314 Which of the following is required when more than one person uses a central computer at the same time? 1) terminal 3) digitizer 5) None of the above 2) light pen 4) mouse Ans.) 1
Ques. : 315 The language that the computer can understand and execute is called 1) Machine language 3) System program 5) None of the above 2) Application software 4) All of the above Ans.) 1
Ques. : 316 Which of the following programs give instructions about operations inside the computer 1) System software 3) Utility 5) None of these 2) Application 4) Compiler Ans.) 1
Ques. : 317 The magnetic disks and drums are like recirculating shift registers because 1) they have about the same storage capacity 3) their access times are about the same 5) None of the above 2) their storage is non volatile 4) stored data is available for reading over and over again in the same order. Ans.) 4
29 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 318 Which of the following time will normally be determined by the requirements of the device to which the transfer is being made 1) Access 3) Cycle 5) None of the above 2) Hold 4) Delay Ans.) 2
Ques. : 319 Tiny rings made of magnetic material that can be polarised to represent binary 1 or 0 is called 1) Magnetic core 3) Card punch 5) None of the above 2) Magnetic disk 4) Floppy disk Ans.) 1
Ques. : 320 Which type of processing that produces output results immediately after input data are entered into a computer system 1) Time-sharing 3) Batch processing 5) None of the above 2) Interactive 4) Real-time processing Ans.) 2
Ques. : 321 A program component that allows structuring of a program in an unusual way is known asc 1) Correlation 3) Diagonalization 5) None of the above Ques. : 322 The radian of a number system 1) Is variable 3) Equals the number of its distinct counting digits 5) None of the above 2) Has nothing to do with digit position value 4) Is always an even number Ans.) 3 2) Coroutine 4) Quene Ans.) 2
Ques. : 323 The section of the CPU that selects, interprets and sees to the execution of program instructions 1) Memory 3) Control unit 5) None of the above 2) Register unit 4) ALU Ans.) 3
Ques. : 324 The average time necessary for the correct sector of a disk to arrive at the read write head is _____ 1) Down time 3) Rotational delay 5) None of the above 2) Seek time 4) Access time Ans.) 3
Ques. : 325 A number that is used to control the form of another number is known as 1) Map 3) Mamtossa 5) None of the above 2) Mask 4) Marker Ans.) 2
Ques. : 326 The personnel who deals with the computer & its management put together are called 1) Software 3) Firmware 5) None of the above Ques. : 327 A modern digital computer has 1) Extremely high speed 3) Almost unlimited array 5) None of the above 2) Large memory 4) All of the above Ans.) 4 2) Humanware 4) Hardware Ans.) 2
Ques. : 328 Which of the following can store information in the form of microscopic pits on metal disks. 1) Laser disks 3) RAM cartridge 5) None of these 2) Tape cassettes 4) Punched cards Ans.) 1
30 of 31
06-10-2013 20:52
IBPS PO Coaching | IBPS Clerk coaching | Bank Clerk Coaching in Delhi... http://www.bscacademy.com/BscStudent/BscStuPrintQuestionOfDay.aspx
Ques. : 329 A device for converting handwritten impressions into coded characters & positional coordinates for input to a computer is 1) Touch panel 3) Wand 5) None of the above 2) Mouse 4) Writing tablet Ans.) 4
Ques. : 330 A storage system for small amounts of data is 1) Magnetic card 3) Punched card 5) None of the above 2) Magnetic tape 4) Optical mark reader Ans.) 1
31 of 31
06-10-2013 20:52