Hello Aspirants,
Welcome to Stratus – IBPS Clerk Course 2015: Practice Test.
It will help you to know where you stand before appearing for the actual exam. IBPS Clerk Course 2015: Practice Test platform will help you to practice, analyze and improve your performance, by providing detailed solutions for all the questions.
Our Motto is to boost your confidence,which plays a key role in success;Because “Your Success = Our Success”
Title: Main Practice Test 1 – Computer
Category: Mock Test
Test Time: 1 hrs
- Kindly start the quiz, after the page is fully loaded.
- After completing the practice test, please enter your name & E-mail id,so that you could find your name and results on scoreboard list.
No Registration & No Fees – Absolutely Free Free
Try Demo Exam Now to understand our tool.
Help & Request : Share our Practice Test Page with your friends and FB Group
Stratus – IBPS Clerk Course 2015
Note:
- If you find any error or mistake, Please let us know
IBPS Clerk Course 2015: Main Practice Test 1 – Computer Leaderboard
IBPS Clerk 2015 Prelim & Main Exam Syllabus & Pattern
_____________________________________________________________________
Quiz-summary
0 of 75 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
Information
All the Best
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 75 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Computer Awareness 0%
-
Kindly Enter Your Name & Email ID in Leader-board
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- Answered
- Review
-
Question 1 of 75
1. Question
1 pointsCategory: Computer AwarenessWhich of the following places the common data elements in order from smallest to largest?
Correct
Incorrect
-
Question 2 of 75
2. Question
1 pointsCategory: Computer AwarenessA protocol that allows a user to log on to a remote computer which is also known as remote login is……
Correct
Incorrect
-
Question 3 of 75
3. Question
1 pointsCategory: Computer AwarenessThe creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called …………..
Correct
Incorrect
-
Question 4 of 75
4. Question
1 pointsCategory: Computer AwarenessUnauthorized access to information by using a terminal that is already logged on with an authorized ID is called …..
Correct
Incorrect
-
Question 5 of 75
5. Question
1 pointsCategory: Computer AwarenessMalicious modification or destruction of data such as changing information on Web sites is called …….
Correct
Incorrect
-
Question 6 of 75
6. Question
1 pointsCategory: Computer AwarenessModifying data for fun and profit is defined as…….
Correct
Incorrect
-
Question 7 of 75
7. Question
1 pointsCategory: Computer AwarenessThe most widely used type of database management system is the………
Correct
Incorrect
-
Question 8 of 75
8. Question
1 pointsCategory: Computer AwarenessThe process of analyzing large data sets in search of new, previously undiscovered relationships is known as:
Correct
Incorrect
-
Question 9 of 75
9. Question
1 pointsCategory: Computer AwarenessKeys that are used in combination with some other key, they have been programmed to perform certain tasks is called………
Correct
Incorrect
-
Question 10 of 75
10. Question
1 pointsCategory: Computer AwarenessA list of rules for transferring data over a network is called?
Correct
Incorrect
-
Question 11 of 75
11. Question
1 pointsCategory: Computer AwarenessWhich protocol provides e-mail facility among different hosts?
Correct
Incorrect
-
Question 12 of 75
12. Question
1 pointsCategory: Computer AwarenessWhich of the following memory is non-volatile?
Correct
Incorrect
-
Question 13 of 75
13. Question
1 pointsCategory: Computer AwarenessSignals can be analog or digital and a computer that processes the both type of signals is known as?
Correct
Incorrect
-
Question 14 of 75
14. Question
1 pointsCategory: Computer AwarenessThe magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as…….
Correct
Incorrect
-
Question 15 of 75
15. Question
1 pointsCategory: Computer AwarenessA language translator that analyses and executes the source code in-line-by-line manner without looking at the entire program is called a/an
Correct
Incorrect
-
Question 16 of 75
16. Question
1 pointsCategory: Computer AwarenessThe difference between memory and storage is that memory is _____ and storage is _______
Correct
Incorrect
-
Question 17 of 75
17. Question
1 pointsCategory: Computer AwarenessWhich of the following is the first computer to use Stored Program Concept?
Correct
Incorrect
-
Question 18 of 75
18. Question
1 pointsCategory: Computer AwarenessThe programs which are as permanent as hardware and stored in ROM is known as……….
Correct
Incorrect
-
Question 19 of 75
19. Question
1 pointsCategory: Computer AwarenessAn email feature, which is used to send a copy of an email to one or many other people at the same time that you are sending it to the main recipient/s is called…….
Correct
Incorrect
-
Question 20 of 75
20. Question
1 pointsCategory: Computer AwarenessA type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called______
Correct
Incorrect
-
Question 21 of 75
21. Question
1 pointsCategory: Computer AwarenessMIME stands for
Correct
Incorrect
-
Question 22 of 75
22. Question
1 pointsCategory: Computer AwarenessAn attacker outside your network pretends to be a part of your network or legal terminal is called _______
Correct
Incorrect
-
Question 23 of 75
23. Question
1 pointsCategory: Computer AwarenessA key that is used to alternate the input mode of a group of keys on a keyboard is known as________
Correct
Incorrect
-
Question 24 of 75
24. Question
1 pointsCategory: Computer AwarenessA long message that needs to be transmitted is broken into smaller packets of fixed size for error free transmission is termed as……..
Correct
Incorrect
-
Question 25 of 75
25. Question
1 pointsCategory: Computer AwarenessWhich of the following is considered as the ‘backbone’ of the World Wide Web?
Correct
Incorrect
-
Question 26 of 75
26. Question
1 pointsCategory: Computer AwarenessA file that contains definitions of the paragraph and character styles for your document and all things you customized like toolbars and menus is called a…….
Correct
Incorrect
-
Question 27 of 75
27. Question
1 pointsCategory: Computer AwarenessA coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database………
Correct
Incorrect
-
Question 28 of 75
28. Question
1 pointsCategory: Computer AwarenessA code that represents English characters as numbers and ranging from 0 to 127 is____
Correct
Incorrect
-
Question 29 of 75
29. Question
1 pointsCategory: Computer AwarenessPrograms designed specifically to address general purpose applications & special-purpose applications are called______
Correct
Incorrect
-
Question 30 of 75
30. Question
1 pointsCategory: Computer AwarenessThe two basic parts of URLs are______
Correct
Incorrect
-
Question 31 of 75
31. Question
1 pointsCategory: Computer AwarenessSpam over instant messenger is called spim while spam over Internet telephony is known as
Correct
Incorrect
-
Question 32 of 75
32. Question
1 pointsCategory: Computer AwarenessThe maximum zoom % in MS Power Point is…….
Correct
Incorrect
-
Question 33 of 75
33. Question
1 pointsCategory: Computer Awareness……….. printer cannot print more than one character at a time.
Correct
Incorrect
-
Question 34 of 75
34. Question
1 pointsCategory: Computer AwarenessWhich of the following is the smallest and fastest computer imitating brain working?
Correct
Incorrect
-
Question 35 of 75
35. Question
1 pointsCategory: Computer AwarenessThe user generally applies ______ to access mainframe or super computer.
Correct
Incorrect
-
Question 36 of 75
36. Question
1 pointsCategory: Computer AwarenessThe load instruction is mostly used to designate a transfer from memory to a processor register is known as_____
Correct
Incorrect
-
Question 37 of 75
37. Question
1 pointsCategory: Computer AwarenessIn laser printers, printing is achieved by deflecting laser beam on to …….. surface of a drum.
Correct
Incorrect
-
Question 38 of 75
38. Question
1 pointsCategory: Computer AwarenessExternal devices such as printers, keyboards and modems are known as……..
Correct
Incorrect
-
Question 39 of 75
39. Question
1 pointsCategory: Computer AwarenessWhich of the following is an Unit that is used to measure the speed of a Printer?
Correct
Incorrect
-
Question 40 of 75
40. Question
1 pointsCategory: Computer AwarenessThe OCR recognises the ____ of the characters with the help of light source.
Correct
Incorrect
-
Question 41 of 75
41. Question
1 pointsCategory: Computer AwarenessA parallel port is most often used by a _____
Correct
Incorrect
-
Question 42 of 75
42. Question
1 pointsCategory: Computer AwarenessThe pattern of printed lines on most products are called____
Correct
Incorrect
-
Question 43 of 75
43. Question
1 pointsCategory: Computer AwarenessThe technique that extends storage capacities of main memory beyond the actual size of the main memory is called……
Correct
Incorrect
-
Question 44 of 75
44. Question
1 pointsCategory: Computer Awareness______ is the ability of a device to ‘jump’ directly to requested data.
Correct
Incorrect
-
Question 45 of 75
45. Question
1 pointsCategory: Computer AwarenessThe metal disks, which are permanently housed in, sealed and contamination free containers are called?
Correct
Incorrect
-
Question 46 of 75
46. Question
1 pointsCategory: Computer Awareness1 nibble equals to_____
Correct
Incorrect
-
Question 47 of 75
47. Question
1 pointsCategory: Computer AwarenessIndia’s first supercomputer is_____
Correct
Incorrect
-
Question 48 of 75
48. Question
1 pointsCategory: Computer AwarenessFloppy disks are organized as______
Correct
Incorrect
-
Question 49 of 75
49. Question
1 pointsCategory: Computer AwarenessStorage that retains its data after the power is turned off is referred to as____
Correct
Incorrect
-
Question 50 of 75
50. Question
1 pointsCategory: Computer AwarenessThe most widely used code that represents each character as a unique 8-bit code is_____
Correct
Incorrect
-
Question 51 of 75
51. Question
1 pointsCategory: Computer AwarenessWhich of the following system software resides in main memory always?
Correct
Incorrect
-
Question 52 of 75
52. Question
1 pointsCategory: Computer AwarenessC ++ language developed by?
Correct
Incorrect
-
Question 53 of 75
53. Question
1 pointsCategory: Computer AwarenessWhich of the following can be used to select the entire document?
Correct
Incorrect
-
Question 54 of 75
54. Question
1 pointsCategory: Computer AwarenessThere are total of ____ actions button in Powerpoint
Correct
Incorrect
-
Question 55 of 75
55. Question
1 pointsCategory: Computer AwarenessWhat is the shortcut key for centering the text selected by the user in word?
Correct
Incorrect
-
Question 56 of 75
56. Question
1 pointsCategory: Computer AwarenessIn Excel,……. allows users to bring together copies of workbooks that other users gave worked on independently.
Correct
Incorrect
-
Question 57 of 75
57. Question
1 pointsCategory: Computer AwarenessWhich of the following characteristics is used to compute dynamically the results from Excel data?
Correct
Incorrect
-
Question 58 of 75
58. Question
1 pointsCategory: Computer AwarenessIn Excel, charts are created using which option?
Correct
Incorrect
-
Question 59 of 75
59. Question
1 pointsCategory: Computer AwarenessWhich of the following is an example of spreadsheet package?
Correct
Incorrect
-
Question 60 of 75
60. Question
1 pointsCategory: Computer AwarenessThe letter and number of intersecting column and row is the ……..
Correct
Incorrect
-
Question 61 of 75
61. Question
1 pointsCategory: Computer AwarenessBy Default on which page the header or footer is printed?
Correct
Incorrect
-
Question 62 of 75
62. Question
1 pointsCategory: Computer AwarenessWhat is the overall term for creating, editing, formatting, storing and retrieving a text document?
Correct
Incorrect
-
Question 63 of 75
63. Question
1 pointsCategory: Computer AwarenessIn E-R diagram, relationship type is represented by_____
Correct
Incorrect
-
Question 64 of 75
64. Question
1 pointsCategory: Computer AwarenessTCP stands for
Correct
Incorrect
-
Question 65 of 75
65. Question
1 pointsCategory: Computer AwarenessWhich of the following domains is used for non-profit organizations?
Correct
Incorrect
-
Question 66 of 75
66. Question
1 pointsCategory: Computer AwarenessA set of flip flops integrated together is called ____
Correct
Incorrect
-
Question 67 of 75
67. Question
1 pointsCategory: Computer AwarenessWhich type of computers uses the 8-bit code called EBCDIC?
Correct
Incorrect
-
Question 68 of 75
68. Question
1 pointsCategory: Computer AwarenessEBCDIC can code up to how many different characters?
Correct
Incorrect
-
Question 69 of 75
69. Question
1 pointsCategory: Computer AwarenessWhich is the first automatic electronic digital computer?
Correct
Incorrect
-
Question 70 of 75
70. Question
1 pointsCategory: Computer AwarenessA…… is required at each end to absorb the signal so that it does not reflect back across the bus.
Correct
Incorrect
-
Question 71 of 75
71. Question
1 pointsCategory: Computer AwarenessA set of stations connected serially by cable is known as
Correct
Incorrect
-
Question 72 of 75
72. Question
1 pointsCategory: Computer AwarenessVoIP stands for
Correct
Incorrect
-
Question 73 of 75
73. Question
1 pointsCategory: Computer AwarenessA program or batch file that waits for a specific time before causing damage is……
Correct
Incorrect
-
Question 74 of 75
74. Question
1 pointsCategory: Computer AwarenessAny deliberate damage to operations or equipments is called_______
Correct
Incorrect
-
Question 75 of 75
75. Question
1 pointsCategory: Computer AwarenessEthical hackers who use their skill to secure the integrity of computer systems or networks is called_______
Correct
Incorrect
_____________________________________________________________________