Computer Quiz Set for IBPS Clerk Mains

Dear Readers, we are presenting Computer Quiz for IBPS Clerk-V Mains. Computer section play important role in scoring.


Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.

1. Software design for a specific purpose is called
1) Specific Program
2) Application Program
3) System Program
4) Assembly Program
5) None of these


2. A top-to-bottom relationship among the data items in
a database is established by a
1) Hierarchical scheme
2) Sub scheme
3) Network scheme
4) Relational scheme
5) Any of the above

3. Digitising Tablet is used to
1) sense the presence or absence of mark.
2) identify the product.
3) read text from paper.
4) recognise character.
5) enter drawings and sketches into computer.

4. The most common security failure is
1) user’s carelessness
2) password dependence
3) too much emphasis on preventing physical access
4) insufficient technology used to prevent breaches
5) None of these

5. QIC standard data format is used in
1) Tape cartridge
2) Streamer tape
3) Digital audio tape
4) Tape reel
5) Zip disk

6. Encryption is being used primarily with
1) Computer processing
2) File retention
3) Data storage
4) Data communication
5) Transaction entry

7.Which of the following is required for a plotter to
perform specific commands?
1) Software
2) Hardware
3) Firmware
4) Driver
5) Controller

8. The time it takes a device to locate data and
instructions and make them available to the CPU is known as
1) clock speed
2) a processing cycle
3) CPU speed
4) access time
5) None of these

9. To change written work already done is called
1) file
2) edit
3) cut
4) close
5) None of these

10. Communication between computers is almost always
1) serial
2) parallel
3) serially parallel
4) direct
5) indirect

Answers
1-2
2-1
3-5
4-1
5-2
6-4
7-4
8-4
9-2
10-1

Dear Readers, we are presenting Computer Quiz for IBPS Clerk-V Mains. Computer section play important role in scoring.


Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.

1. Software design for a specific purpose is called
1) Specific Program
2) Application Program
3) System Program
4) Assembly Program
5) None of these


2. A top-to-bottom relationship among the data items in
a database is established by a
1) Hierarchical scheme
2) Sub scheme
3) Network scheme
4) Relational scheme
5) Any of the above

3. Digitising Tablet is used to
1) sense the presence or absence of mark.
2) identify the product.
3) read text from paper.
4) recognise character.
5) enter drawings and sketches into computer.

4. The most common security failure is
1) user’s carelessness
2) password dependence
3) too much emphasis on preventing physical access
4) insufficient technology used to prevent breaches
5) None of these

5. QIC standard data format is used in
1) Tape cartridge
2) Streamer tape
3) Digital audio tape
4) Tape reel
5) Zip disk

6. Encryption is being used primarily with
1) Computer processing
2) File retention
3) Data storage
4) Data communication
5) Transaction entry

7.Which of the following is required for a plotter to
perform specific commands?
1) Software
2) Hardware
3) Firmware
4) Driver
5) Controller

8. The time it takes a device to locate data and
instructions and make them available to the CPU is known as
1) clock speed
2) a processing cycle
3) CPU speed
4) access time
5) None of these

9. To change written work already done is called
1) file
2) edit
3) cut
4) close
5) None of these

10. Communication between computers is almost always
1) serial
2) parallel
3) serially parallel
4) direct
5) indirect

Answers
1-2
2-1
3-5
4-1
5-2
6-4
7-4
8-4
9-2
10-1