Institute of Banking Personnel Selection has Organized Common Written Examination (CWE) Recruitment to the posts in Clerical Cadre in 19 Public Sector Banks - (CWE Clerks-II) Which held on 15th December 2012 . Solved Question Paper are given below.
1. ____________ is the example of Toggle Key
1) Alt 2) Shift 3) Control 4) Escape 5) Caps Lock
Answer - Caps Lock
2. _______ is a feature for scheduling and multiprogramming
to provide an economic interactive system of two or more users
1) Time Sharing 2) Multi-Tasking 3) Time tracing 4)
Multiprocessing 5) None of These
Answer - Time Sharing
3. ROLLBACK in database is _______ Statement
1) TCL 2) DCL 3) DML 4) DDL 5) SDL
Answer - TCL
4. Video Controller
1) Controls the resolution of images on screen
2) controls the signals to be sent and receive from the
processor for display
3) Handles the entire electronic work behind the formation
of images on the screen
4) Is responsible for the fresh rate of the screen monitor
Answer - Handles the entire electronic work behind the
formation of images on the screen
5. Disk stores the information in
1) Tables 2) Rows and Columns 3) Blocks 4) Tracks and Sectors 5) All of these
Answer - Tracks and Sectors
6. Which files can be executed without mentioning its
extension name
1) .exe 2) .bat 3) .com 4).bat 5) All of these
Answer - All of these
7. A programming language having a _____ is slow in
execution
1) Interpreter 2) Compiler 3) Assembler 4) Linker 5) None of these
Answer - Interpreter
8. The word processor used by DOS to write the programs or
instructions
1) WordStar 2) WordPad 3)Notepad 4)WordPad 5) EDIT
Answer - EDIT
9. ______ provides total solutions to reduce data
redundancy, inconsistency, dependence
and unauthorized access of data
1) DBMS 2) Tables 3) Database 4) Protection Passwords 5) Centralization of data
Answer - DBMS
10. Codec refers to
1) coder-decoder 2) Co-declaration 3)Command declaration 4) Command decoding
5) None of these
Answer - coder-decoder
11. Origin of internet can be tracked from
1) Arpanet 2) Radio Networks 3)Satellite Networks 4) Indian Army Networks
5) Air Force Networks
Answer - Arpanet
12. To connect networks of similar protocols _____ are used
1) Routers 2) Bridges 3) Gateways 4) Dial-up Routers
5) None of these
Answer - Bridges
13. Decimal equivalent of (1111)2
1) 11 2) 10 3)1 4) 15 5)13
Answer - 15
14. ________ is one reason for problems of data integrity
1) Data availability Constraints 2) Data inconsistency 3)
Security Constraints
4) Unauthorized access of data 5)Data redundancy
Answer - Data redundancy
15. Dr. E.F. Codd represented _____ rules that a database
must obey if it has to be considered truly relational
1) 10 2) 8 3) 12 4) 6 5) 5
Answer - 12
16. “>” in DOS command is use
1) Compare two values 2) Redirect input 3) Redirect output
4) Filter data 5)
None of these
Answer - Redirect output
17. System proposal is prepared in ______ phase of SDLC
1) Conception 2) Initiation 3) Analysis 4) Design 5)
Construction
Answer - Initiation
18. A data warehouse
1) Contains numerous naming conventions and formats
2) Is organized around important subject areas
3) Contains only Current data
4) Can be updated by end user
5) Explains some observed event or condition
Answer - Is organized around important subject areas
19. Which of these is considered intelligent CASE tool
1) Toolkit 2) Methodology companion 3) Workbench 4) Upper CASE
5)Lower CASE
Answer - Workbench
20. Super computer was developed by Indian scientists
1) Param 2) Super301 3) Compaq Presario 4) Cray YMP 5) Blue
Gene
Answer - Param
21. The errors that can be find out by a compiler are
1) Logical errors 2) Internal errors 3) Semantic errors 4)
Syntax errors
5) Execution errors
Answer - Syntax errors
22. ______ is used to add or put into your document such as
picture or a text
1) TV 2) Squeeze in 3) Push in 4) Insert 5)None of these
Answer - Squeeze in
23. Office assistant is _____
1) An application allows you to take notes and save them in
a file
2) A button on the standard tool bar that executes the Save
command
3) A collection of Autocorrect options in the word
4) An animated character that offers help and suggestions
5) None of these
Answer - An animated character that offers help and
suggestions
24. Pressing CTRL+9 in Excel
1) Prints 9 2)
Prints 3) Prints 9 followed by spaces
4) Insert 9 cells at the current location 5) Hides the current row
Answer - Hides the current row
25. To change the current name of an Excel worksheet
1) Click on the worksheet tab by holding CTRL key and type a
new name
2) Choose SAVE AS option from file menu
3) Add a(?) at the end of the file name while saving the
workbook
4) Press CTRL+SHIFT keys and new name
5) Double click at the worksheet tab and type a new name
Answer - Double click at the worksheet tab and type a new
name
26. A computer used at super markets, departmental stores
and restaurant etc is called ______
terminal
1) P-O-S 2) Dumb 3) Intelligent 4) Smart 5) calculating
Answer - P-O-S
27. ________ acts as temporary high speed holding area
between the memory
and the CPY thereby improving processing capabilities
1) ROM 2) RAM 3) Temporary Memory 4) Cache Memory 5) Flash Memory
Answer - Cache Memory
28. A document that explains how to use a software program
is called _______ manual
1) User 2) System 3) software 4) Program 5) Technical
Answer - User
29. The process that deals with the technical and management
issues of software development is
1) Delivery process 2) Control process 3) Software process
4) Testing process
5) Monitoring process
Answer - Software process
30. A collection of conceptual tools for describing data,
relationships, semantics and constraints is referred to as ____
1) ER model 2) Data base 3) Data models 4) DBMS 5)None of
these
Answer - Data models
31. You can protest sensitive data from prying eyes using
1) Encryption 2) Passwords 3) File Locks 4)File Permissions
5) None of these
Answer - File Permissions
32. Android is a ____
1) Operating system 2) Application 3)Interface 4) Software 5) A collection of these
Answer - A collection of these
33. ________ search engine sends request for information to
several search engines simultaneously
and compiles the results
1) Meta 2) Individual 3) Directory 4) Subject Directory 5) None of these
Answer - Meta
34. _______ search method is conducted for a specific title,
domain, URL, or host
1) Keyword 2) Field 3) Boolean 4) Miscellaneous 5) Logical
Answer - Field
35. To access a website or web content from a webserver, the
client sends a(n) _____
1) Information 2) Message 3) Request 4) Response 5)
Interrupt
Answer - Request
36. An http request contains ______ parts
1) 2 2) 5 3) 3 4) 4 5) 1
Answer - 3
37. Through ________ an administrator or another user can
access someone else’s computer remotely
1) Administrator 2) Web server 3) Web application 4) HTTP 5)
Telnet
Answer - Telnet
38. Telnet is a ______ based computer protocol
1) Sound 2) Text 3) Image 4) Animation 5) Digits
Answer - Text
39. To allow someone else schedule your meetings and
appointments, ______ feature of outlook
is used
1) Monthly Calendar 2) Event Manager 3) Appointments 4)
Delegate Access 5) None of these
Answer - Delegate Access
40. P2P is a ________ application architecture
1) Client/Server 2) Distributed 3) Centralized 4) 1-Tier 5) None of these
Answer - Distributed