Beruflich Dokumente
Kultur Dokumente
Subject 1st generation 2nd generation 3rd generation 4th generation 5th generation
Period 1940-1956 1956-1963 1964-1971 1971-present present & beyond
Circuitry Vacuum tube Transistor Integrated Microprocessor ULSI (Ultra Large
chips (IC) (VLSI) Scale Integration)
technology
Memory Capacity 20 KB 128KB 1MB Semiconductor type VLSI and ULSI
and very high
Processing Speed 300 IPS inst. Per 300 IPS 1MIPS(1 Faster than 3rd Very fast
sec. million inst. Per generation
sec.)
Programming Assembly High level C,C++ C,C++,Java All the Higher level
Language Language language languages,
(FORTRAN, Neural networks,
COBOL, ALGOL)
Example of UNIVAC, IBM 1401, IBM IBM 360 series, Pentium series Artificial
computers EDVAC 7094, 1900 series Multimedia, Intelligence,
CDC 3600,D Stimulation Robotics
UNIVAC 1108
Types of computer
Analog computer introduced by Lord Kelvin. Numerical Digital computer that accepts and process data in the form
data are represented by measurable physical variables such of numbers and all the character are converted into binary
as electrical voltage. A thermometer is a simple analog code.
computer. Hybrid computer used the combined feature of analog and
digital machine. you can see hybrid computer in geological
departments.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
1
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
Microcomputer these are small relatively inexpensive
computer designed for personal and office use. It has lowest
storing and processing speed. These can be laptop or
desktop.
Minicomputer powerful as compare to microcomputer it
has higher memory provide faster operating speeds and
large storage capacities than microcomputers. It can be used
as a server and capable of supporting from 2 to 200 users.
Mainframe computer it has very high memory and
processing speed and used as a server (can support
The central processing unit (CPU) is the brain of your
thousands of users)
computer. It handles all the instructions you give your
Super computer can be used for complex type of application
computer. The control unit (CU) is a component of a
i.e. specific research, weather forecasting, Weapon designing
computer's central processing unit (CPU) that directs
etc.
operation of the processor. It tells the computer's memory,
CDC 6600 was the first successful supercomputer.
arithmetic/logic unit and input and output devices how to
Sunway TaihuLight of China is the fastest supercomputer in
respond to a program's instructions.
the world.
PARAM-8000 Indias first Super Computer developed by C-
An arithmetic logic unit (ALU) is a digital circuit used to
DAC Pune in 1998.
perform arithmetic and logic operations. It represents the
Shasra T is considered as Indias fastest super computer,
fundamental building block of the central processing unit
manufactured by Indian Institute of Science.
(CPU) of a computer.
Servers are dedicated computers that serve the needs or
request of other programs or computer.
Instruction Execution: the program which is to be executed
Workstations serve usually one user only.
is a set of instruction which are stored in memory. The CPU
Information appliances are computers specially designed
executes the instructions of program to complete a task and
to perform a specific "user-friendly" functionsuch as
this execution takes place inside the CPU with the help of
playing music, photography.
registers ALU (arithmetic logic unit) and CU(control unit).
An embedded system is a computer system with a
When the processor executes instructions, data is
dedicated function within a larger system.
temporarily stored in small local memory location and these
are called registers.
Hardware and I/O Devices
A computer is an electronic device that accepts data from the Accumulator Register:- which stores the immediate result
user (input), processes the data by performing calculations of arithmetic and logical operations.
and operations on it and generates the desired Output. Memory address register (MAR) :- which contain the
address of memory location to which data is to be stored.
An unprocessed collection or representation of raw facts Program counter :- which contain the address of the next
represented in a manner suitable for communication, instruction to process.
interpretation or processing by humans or by automatic
means, is known as Data.
Personal computers use a number of chips mounted on a
main circuit board called Motherboard. A motherboard is
the physical arrangement in a computer that contains the
computer's basic circuitry and components.
Light Pen is the pen shaped device, which can sense light
and is used to point at spots on a video screen.
A technology enables a high-speed reading of large
quantities of data and transferring these data to the
computer without using a keyboard. It is referred as Optical
Mark Reader (OMR). It uses a beam of light that is reflected
on the paper with marks, to capture presence and absence of
marks.
Types of OS.
1)Batch operating system : Here data and program that
need to be processed are bundled and collected as a batch
and executed together.
2)Multiprogramming operating system : It allows the
instruction and data from two or more separate process to
reside in primary simultaneously. Multiprogramming system
are multitasking multiuser and multiprocessing operating
system.
3)Single user : It is designed for single user and a single
person use it at a time i.e. DOS windows 95 etc.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
4
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
4)Distributed operating system : It is the one which BASIC (Beginners All Purpose Symbolic Instruction
manages a collection of independent computers and makes Code): first language designed for non-professional
them appear to the user of the system as a single computer. programmers.
5)Real Time Operating System (RTOS) : It is a computing PASCAL: it is developed as a teaching tool for programming
environment that reacts to input within a specific time concepts
period. It is used at those Places in which we Requires higher Language processor (Translator): Programmers write
and Timely Response. their program in one of the high level language because it is
6) Time Sharing System: A time sharing system allows the much easy to code in these language but computer does not
many users to simultaneously share the computer resources. understand any of these language so it is necessary to
Since each action or command in a time-shared system take convert program into a machine language so translator do
a very small fraction of time, only a little CPU time is needed this work.
for each user. Loader: It loads the code which is translated by translator
7)Mobile OS: Windows 10 Mobile is the latest name for into the main memory and makes it ready to execute.
Microsoft's phone and tablet operating system. Google's Linker is used to combine all the object files and convert
latests version of its android OS is Nougat and iOS i.e. them into a final executable program.
iPhone Operating System's latest version is iOS 10. Interpreter converts high level language program into
machine language. It is very slow because it convert program
Computer Languages line by line.
Low level language: these are coded in a form which is easy Compiler: It also translates the program from high level
to understand by the processor. language to machine language. It is very fast because it
Machine language: it is also a type of low level language converts the whole program into machine language.
these can be develop in binary language (0 and 1) . Assembler: It is used for converting the code of low level
Assembly language: it is also a type of low level language language (assembly language) into machine level language.
and using the human readable instruction of the CPU. It is
written as MOV A. MEMORY MANAGEMENT
High level language programmer can write code in simple
easy language, it is user friendly . E.g. C, JAVA 8 bit 1 byte
C language: it is a middle level programming language and 1024 Byte 1 KB (Kilo Byte)
also known as procedural language
1024 KB 1 MB (Mega Byte)
C++ is high level language that uses the OOPS concept.
Fortran: it is known as formula translation .it is used for 1024 MB 1 GB (Giga Byte)
scientific application 1024 GB 1 TB (Tera Byte)
COBOL(Common Business Oriented Language ): used for 1024 TB 1 PB (Peta Byte)
record keeping and data management in business 1024 PB 1 EB (Exa Byte)
organizations.
1024 XB 1 ZB (Zeta Byte)
1024 ZB 1 YB (Yota Byte)
Number System
The radix or base is the number of unique digits, including
zero, used to represent numbers in a positional numeral
system. For example, for the decimal system the radix is ten,
because it uses the ten digits from 0 through 9. And that of
Binary is base 2.
Number System
The data on DRAM continues to move in and out of the
memory as long as power is available and must be
Exclusive- F=xy+xy
NOR
CC (Carbon Copy) in e mail indicates those who are to Phishing is the attempt to acquire sensitive information
receive a copy of a message addressed primarily to another. such as usernames, passwords, and credit card details (and
The list of CC recipients is visible to all other recipients of the sometimes, indirectly, money) by masquerading as a
message. trustworthy entity in an electronic communication.
An additional BCC (blind carbon copy) field is available for A Spoofing attack is a situation in which one person or
hidden notification; recipients listed in the BCC field receive program successfully represents oneself as another by
a copy of the message, but are not shown on any other falsifying data and thereby gaining an illegitimate advantage.
recipient's copy (including other BCC recipients)
Microsoft Office
The Drafts folder retains copies of messages that you have Microsoft Office is an office suite of desktop applications,
started but are not yet ready to send. servers and services for the Microsoft Windows and Mac
operating systems. It includes Microsoft Word, Excel,
The first email was sent by Ray Tomlinson to himself in PowerPoint, Outlook, OneNote, Access and Publisher.
1971.
MS WORD
Computer Security Microsoft Word is a word processor developed by Microsoft.
A Computer Virus is a computer program or code that can
replicate itself and spread from one computer system to It is used for creating, editing, formatting, storing, retrieving
another system. A computer virus has the capacity to corrupt and printing of a text document.
or to delete data on your computer and it can utilize an e-
mail program to spread the virus to other computer systems Microsoft Word's native file formats are denoted either by a
.In the worst case scenario, it can even delete everything on .doc or .docx file extension.
your hard disk .The purpose of it is to disrupt the operation A Cursor is an indicator used to show the position on a
of the computer or the program. computer monitor or other display device that will respond
to input from a text input or pointing device.
Some examples of Computer Virus are Trojan viruses.
Stealth viruses, worms, malware (malicious software), Basic Keys (Common Tasks)
Disk Killer, Stone virus, Sunday, Cascade, Nuclear, Word Ctrl + N Create a new document
Concept, etc. Ctrl + B Make letters bold
Ctrl + I Make letters italic
Malware, short for malicious software, is any software Ctrl + U Make letters underline
used to disrupt computer operation, gather sensitive Ctrl + Shift+ < Decrease font size one value
information, or gain access to private computer systems. It Ctrl + Shift + > Increase the font size one value
can appear in the form of executable code, scripts, active Ctrl + [ Decrease the font size by 1 point
content, and other software. Ctrl + ] Increase the font size by 1 point
Ctrl+ Spacebar Remove paragraph or character
Antivirus Software is used to scan the hard disk to remove formatting.
the virus from them. Some of the famous anti viruses Ctrl + C Copy the selected text or object
available are Avast, Norton, Avira, Kaspersky, AVG, etc. Ctrl + X Cut the selected text or object
A person who uses his or her expertise to gain access to Ctrl + V Paste text or an object
other peoples computers to get information illegally or do Ctrl + Alt + V Paste special
damage is a Hacker. Alt+ Ctrl + S Split the document Window
Authorization is the function of specifying access rights to Ctrl + Z Undo the last action
resources related to information security and computer Ctrl + Y Redo the last action
security in general and to access control in particular. More
formally, "to authorize" is to define an access policy. To create a document, we use New command at the menu.
Print Preview is used to see the document before the Header and Footer option is used to display information
printout is taken. such as title and page number of the document.
Cut and Paste options are used to move the data from one The bar at the top of the window that bears the name of the
part of the document to another. window, is known as Title Bar.
A screen element of MS Word that is usually located below
the title bar that provides categorized options is called Menu
Bar.
MS EXCEL
Microsoft Excel is a spreadsheet application developed by
Microsoft for Microsoft Windows and Mac OS.
Control Keys + Function keys It features calculation, graphing tools, pivot tables, and a
macro programming language called Visual Basic for
Ctrl+F2 Choose the print preview command Applications.
(Microsoft office Button)
Ctrl+F3 Cut on the spike The intersection of a row and column is called a Cell.
Ctrl+F4 Close the window
Ctrl+F6 Go to the next window The cell in which we are currently working is known as
Active Cell.
Ctrl+F9 Insert an empty field
Ctrl+F10 Maximise the document window Microsoft Excel's native file formats are denoted either by a
Ctrl+F11 Lock a field .xls or .xlsx file extension.
A Worksheet is made of columns and rows, wherein columns
Ctrl+F12 Choose the Open command
run Vertically and rows run Horizontally.
(Microsoft Office Button)
Up to Excel 2003, the standard amount of columns has been
Portrait and Landscape options are available in 256 and 65,536 rows.
Orientation category of Page Setup. Excel 2007 onwards, the maximum number of rows per
Alignment refers to the position of text between the worksheet increased to 1,048,576 and the number of
margins. columns increased to 16,384.
Auto complete is a feature in word that automatically
completes the spelling of days of the week and months of the Microsoft Excel has the basic features of all spreadsheets,
year that have more than five letters in their names. using a grid of cells arranged in numbered rows and letter-
named columns to organize data manipulations like
Function Keys arithmetic operations
F1 Get help or visit Microsoft office Online.
F2 Move text or graphic. The letter and number of the intersecting column and row is
F4 Repeat the last action the Cell Address.
F5 Choose the Go To command (Home tab).
F6 Go to the nest pane or frame. Short cut key to insert a new worksheet in MS-Excel is ALT +
F7 Choose the spelling command (Review tab) Shift + F1 + or F11.
F8 Extend a selection
F9 Update the selected fields Sheet tab is the tab at the bottom of the worksheet window
F10 Show key tips that displays the name of the worksheet.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
11
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
Normally placed on the left side of the interface, this pane
A Microsoft office document that contains one or more contains two tables - the Slides tab and Outline tab.
worksheets is known as a Workbook.
Status Bar
Shortcut Keys of MS-Excel A horizontal strip at bottom; that provides information about
Key Description the open presentation like slide number, applied Theme, etc.
F2 Edit the selected cell It also includes the view and zoom options.
F5 Go to a specific cell
F7 Spell check selected text and/or View Buttons
document Essentially there are three view buttons displayed right
F11 Create chart beneath on the status bar with zoom-in and zoom-out.
Ctrl + Shift + ; Enter the current time Normal view - Clicking this enables Normal view, Shift-
Ctrl + ; Enter the current date clicking this gets you to Slide Master view.
Shift + F3 Open the Excel insert function window Slide Sorter view - Clicking this displays zoom-able
Shift + F5 Bring up Find and Replace box. thumbnails of every slide in the open presentation Shift-
Ctrl + A Select all contents of the worksheet clicking this button gets you to Handout Master view.
Ctrl + B Bold highlighted selection Slide Show from current slide - Show the presentation
Ctrl + I Italic highlighted selection as a full screen slideshow from the current selected slide.
Ctrl + U Underline highlighted selection
Ctrl + P Bring up the print dialog box to begin Slide Area: Displays the active slide
printing
Ctrl + Z Undo last action Task Pane: It contains more options and appears when you
Ctrl + F9 Minimise current workbook choose an option in one of the Ribbon tabs.
Ctrl + F10 Maximise currently selected workbook
Ctrl + F6 Switch between open SHORTCUTS OF POWERPOINT
workbooks/window To do this Press
Ctrl + page up Move between Excel worksheet in the Start the presentation form the F5
same Excel document. beginning
Ctrl + Page Move between Excel worksheets in the Perform the next animation for N, ENTER, PAGE DOWN,
Down same Excel document advance to the next slide RIGHT,
Ctrl + Tab Move between two or more open Excel ARROW, DOWN ARROW,
files or
Alt + = Create a formula to sum all of the above SPACEBAR
cells Perform the previous P, PAGE UP, LEFT
Ctrl + Insert the value of the above cell animation or return to the ARROW, UP ARROW, or
into cell currently selected. previous slide BACKSPACE
Ctrl + Arrow Move to next section to text Go to slider number number + ENTER
key End a presentation ESC or HYPHEN
Ctrl + Space Select entire column Return to the first slide 1 + ENTER
Shift + Space Select entire row Redisplay hidden pointer or CTRL + P
change the pointer to a pen
Redisplay hidden pointer or CTRL + A
PowerPoint change the pointer to an arrow
Go to the first or next TAB
Microsoft PowerPoint is a slide show presentation hyperlink on a slide
program developed by Microsoft. It was officially Go to the last or previous SHIFT + TAB
launched on May 22, 1990, as a part of the Microsoft hyperlink on a slide
Office suite.
Filename extension: .ppt, .pptx, .pps or .ppsx
DATABASE MANAGEMENT SYSTEM
Ribbon DBMS is the acronym of Data Base Management System.
The Ribbon is the strip of buttons across the top of the main DBMS is a collection of interrelated data and a set of
window. The Ribbon has tabs which in turn contain groups programs to access this data in a convenient and efficient
of buttons for various options - some groups also contain way. It controls the organization, storage, retrieval, security
galleries (for example galleries for Themes and Theme and integrity of data in a database.
Colors.)
Slides/Outline Pane
1. CD-ROM is a _______?
(a) Semiconductor memory (b) Memory registers
(c) Magnetic memory (d) Cache Memory
(e) None of the above
2. Actual execution of instructions in a computer takes
place in?
(a) ALU (b) Control Unit (c) Storage unit
(d) Control bus (e) None of the above
3. Modem stands for _______.
52. If you will be displaying or printing your document (a) A type of secondary memory
on another computer, youll want to make sure and (b) Modulator demodulator
select the _____________ option under the Save tab. (c) Mainframe operating device memory
A) Embed Fonts (d) Multiprocessing device
B) Embed True Type Fonts (e) None of the above
C) Save True Type Fonts D) Save Fonts 4. ________ Controls access to the resources on a
E) Font Face network.
53. In Word, the mailing list is known as the ____________. (a) Server (b) Client
A) Data sheet B) Source C) Data source (c) Both ((a) and ((b) (d) Memory
D) Sheet E) Hyperlink (e) None of the above
54. To delete 3-D rotation from the shape, point to 3-D 5. The wider the bus, the _______ the transfer of data
Rotation, and then click _____. (a) Greater the number of transfer steps required and
A) Non Rotation B) Not Rotation C) None Rotation the slower
D) No Rotation E) None of these (b) Greater the number of transfer steps required and
55. In Microsoft Office Power-Point 2007, a _____ is a the faster
connection from one slide to another slide in the (c) Fewer the number of transfer steps required and the
same presentation or to a slide in another slower
presentation, an e-mail address, a Web page, or a (d) Fewer the number of transfer steps required and
file. the faster
A) Hyphenation B) Header C) Footer (e) None of the above
D) Hyperlink E) None of these 6. What does 'GIF' Stands for?
56. In PowerPoint, which of the following is the default (a) Graphics Interchange Format
page setup orientation for notes pages, outlines and (b) Geo Interchange Format
handouts? (c) Graphical Interconnection Format
A) Vertical B) Landscape C) Portrait (d) Graphics Interlace Format
D) All of these E) None of these (e) Graphics Interchange File
57. In slide layout panel, how many layouts are available 7. Cache and main memory will lose their contents
for next layout by default? when the power is off. They are _______.
A) 4 B) 7 C) 12 (a) dynamic (b) static (c) volatile
D) 15 E) None of these (d) non-volatile (e) faulty
58. In Access, this operation copies a backup file from 8. How can the user determine what programs are
the storage medium back onto the computer : available on a computer ?
A) Restore B) Recreate C) Copy (a) Checking the hard disk properties
D) Structure E) None of these (b) Viewing the installed programs during the booting
process
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
20
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
(c) Checking the operating system for a list of (b) drag from the top cell in the column to the last cell in
installed programs the column
(d) Checking the existing files saved on the disk (c) click the column heading
(e) None of these (d) click the row heading
9. Processing involves ________. (e) None of the above
(a) inputting data into a computer system 21. 30,000 bytes is equal to
(b) transforming input into output (a) 30 KB (b) 3 MB (c) 3 GB
(c) displaying output in a useful manner (d) 3 TB (e) None of these
(d) providing relevant answers 22. Terminal is a:
(e) None of these ((a) device to give power supply to computer
10. Which process checks to ensure the components of (b) Point at which data enters or leaves the
the computer are operating and connected properly? computer
(a) Booting (b) Processing (c) Saving (c) The last instruction in a program
(d) Editing (e) None of these (d) any input /output device
11. What kind of programming language is Java? (e) None of these
(a) Object-oriented programming language 23. Which part of a computer cannot be touched?
(b) Relational programming language (a) Mouse (b) Monitor (c) Hardware
(c) Sixth-generation programming language (d) Software (e) None of these
(d) Database management programming language 24. Manipulation of data in computer is called
(e) None of these (a) Boot (b) Processing (c) Simplification
12. Formatting a disk results in all the data being? (d) Format (e) Clean disk
(a) Saved to the disk (b) Copied from the disk 25. Which computer bus connects the main memory to the
(c) Deleted from the disk memory controller in computer systems?
(d) All of the above (e) None of the above (a) Data Bus (b) Memory Bus
13. What type of web technology creates an online (c) I/O Bus (d) Both ((b) and ((c)
community where people can make statements and (e) None of these
others can read and respond to those statements? 26. _____ and _____ are the two types of computer memory.
(a) I-Journal (b) Podcast (c) ASP (a) RAM and CPU (b) ROM and CPU
(d) Blog (e) None of these (c) RAM and ROM (d) RAM and BIOS
14. What is a common medium used for thieves to steal (e) BIOS and ROM
others' identities? 27. What is the full from of CRT?
(a) Telephone (b) Pick pocketing(c) Burglary (a) Cathode Ray Tube
(d) Email (e) None of the above (b) Computer Resolution and Transparency
15. Application software? (c) Cathode Resolution and Transparency
(a) Is used to control the operating system (d) Computer RAM Trash
(b) Is designed to help programmers (e) None of these
(c) Performs specific task for computer users 28. Which among the following is not hardware?
(d) Is used for making design only (a) Motherboard (b) Operating system
(e) All of the above (c) CPU (d) Keyboard
(e) Hard disk drive
16. A set of instruction telling the computer what to do 29. Which of the following is software?
is called? (a) Motherboard (b) CPU
(a) Mentor (b) instructor (c) compiler (c) Microsoft Windows
(d) program (e) debugger (d) RAM (e) All of these
17. A __________ is anything that can cause harm. 30. In computing, a _____ is a directive to a computer
(a) vulnerability (b) redundancy (c) Spam program order to perform a specific task.
(d) threat (e) None of the above (a) Hard boot (b) Hibernation (c) Command
18. A __________ is a small program embedded inside of a (d) Warm boot (e) Format
GIF image. 31. Which of the following is/are modifier keys in a
(a) web bug (b) cookie computer?
(c) spyware application (a) Ctrl (b) Alt (c) Shift
(d) spam (e) None of the above (d) Both 2 and 3 (e) All of the above
19. When you save an Microsoft Access project, what file 32. Which among the following is associated with Internet
format do you use? Mail?
(a) .adp (b) .Xml (c) .mbd (a) Inbox (b) Server (c) Trash
(d) All of these (e) None of the above (d) Drop Box (e) One Drive
20. To select a column the easiest method is to? 33. What is a cursor?
(a) double click any cell in the column (a) It is an indicator
(b) It shows the position on a computer monitor
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
21
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
(c) Cursor is Latin for runner. (a) It is an indicator
(d) Both 1 and 2 (e) All of the above (b) It shows the position on a computer monitor
34. Which among the following is not legitimate type of (c) Cursor is Latin for runner.
computer virus?? (d) Both 1 and 2 (e) All of the above
(a) Boot Virus (b) File infector Virus 48. Which among the following is not legitimate type of
(c) Resident Virus (d) Hangout Virus computer virus??
(e) Macro Virus (a) Boot Virus (b) File infector Virus
35. 30,000 bytes is equal to (c) Resident Virus (d) Hangout Virus
(a) 30 KB (b) 3 MB (c) 3 GB (e) Macro Virus
(d) 3 TB (e) None of these 49. The main folder on a storage device is called
36. Terminal is a: (a) Platform (b) Interface (c) Root Directory
(a) device to give power supply to computer (d) Device Driver (e) None of these
(b) Point at which data enters or leaves the 50. ISDN stands for
computer (a) Integral Service Dynamic Network
(c) The last instruction in a program (b) International Subscriber Dialup Network
(d)any input /output device (c) International Service Digital Network
(e) None of these (d) Integrated Service Digital Network
37. Which part of a computer cannot be touched? (e) None of these
(a) Mouse (b) Monitor (c) Hardware 51. Which technology is used by cell phones to access
(d) Software (e) None of these the internet?
38. Manipulation of data in computer is called (a) Cloud computing (b) Neural Networks
(a) Boot (b) Processing (c) Simplification (c) XML language (d) micro browser software
(d) Format (e) Clean disk (e) None of the above
39. Which computer bus connects the main memory to the 52. Which of the following scrambles a message by
memory controller in computer systems? applying a secret code?
(a) Data Bus (b) Memory Bus (a) Audits (b) Encryption (c) UPS
(c) I/O Bus (d) Both ((b) and ((c) (d) Firewalls (e) Encapsulation
(e) None of these 53. What type of monitoring file is commonly used on
40. _____ and _____ are the two types of computer memory. and accepted from Internet sites?
(a) RAM and CPU (b) ROM and CPU (a) Smartware (b) Phishes (c) Cookies
(c) RAM and ROM (d) RAM and BIOS (d) Trojans (e) None of the above
(e) BIOS and ROM 54. The software that secretly collects information
41. What is the full from of CRT? about the web client's internet habits?
(a) Cathode Ray Tube (a) Detectware (b) Spam (c) Spyware
(b) Computer Resolution and Transparency (d) Pharming (e) All of the above
(c) Cathode Resolution and Transparency 55. Which register is used as a working area in CPU ?
(d) Computer RAM Trash (a) Program counter (b) Instruction registers
(e) None of these (c) Instruction decoder (d) Parity generator
42. Which among the following is not hardware? (e) Accumulator
(a) Motherboard (b) Operating system 56. Which of the following is the valid subnet mask for
(c) CPU (d) Keyboard class B IP Address?
(e) Hard disk drive (a) 251.254.25.5 (b) 255.255.0.0 (C) 155.151.12.9
43. Which of the following is software? (d) 255.0.0.0 (e) 255.255.255.0
(a) Motherboard (b) CPU 57. Repeaters function in which layer?
(c) Microsoft Windows (a) Physical layer (b) Data link layer
(d) RAM (e) All of these (c) Network layer (d) Both (a) and (b)
44. In computing, a _____ is a directive to a computer (e) Session layer
program order to perform a specific task. 58. Name the input device from the given options, that
(a) Hard boot (b) Hibernation (c) Command cannot be used to work in MS Office ?
(d) Warm boot (e) Format (a) Scanner (b) Mouse (c) Keyboard
45. Which of the following is/are modifier keys in a (d) Joy stick (e) All of the above
computer? 59. Select the odd one out :
(a) Ctrl (b) Alt (c) Shift (a) Interpreter (b) operating system
(d) Both 2 and 3 (e) All of the above (c) Compiler (d) Assembler
46. Which among the following is associated with Internet (e) both (a) and (d)
Mail? 60. Name the first widespread computer virus for MS-
(a) Inbox (b) Server (c) Trash DOS?
(d) Drop Box (e) One Drive (a) Brain (b) Handshake (c) Code Red
47. What is a cursor? (d) Melissa (e) Sasser
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
22
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
61. What is ICMP (Internet Control Message Protocol)? (d) Both 1 and 2 (e) All of the above
(a) a protocol that manages memory 72. Which of the following is the name of an application
(b) a protocol used to monitor computers similar to MS Office?
(c) a protocol that handles error and control (a) Libre Office (c) Open Office
messages (c) Neo Office (d) Free Office
(d) both (a) and (b) (e) All of the above
(e) None of these 73. What is the full form of UNIVAC?
62. What is Loading Operating System into main (a) Universal Automatic Computer
memory called? (b) Universal Array Computer
(a) Printing (b) Saving (c) Storing (c) Unique Automatic Computer
(d) Staring (e) Booting (d) Unvalued Automatic Computer
63. What is a group of computers and associated devices (e) None of these
that share a common communications line or 74. The process of converting analog signals into digital
wireless link to a server within a small geographic signals so they can be processed by a receiving
area are called? computer is referred to as
(a) LAN (b) WAN (c) MAN (a)Modulation (b) Demodulation
(d) both (a) and (b) (e) None of these (c) Synchronizing (d) Digitizing
64. _____________ is created when two tables are joined on (e) Transmission
attributes that are neither primary keys nor foreign 75. Which of the following memory has stored data in
keys. large number?
(a) Relation (b) Cardinality (c) Spurious tuple (a) RAM (b) ROM (c) Cache memory
(d) Candidate Key (e) None of the above (d) Hard Disk (e) None of these
65. What does SQL stand for? 76. Generally, web address is located by
(a) Structured Query Language (a) Hyperlink (b) HTTP (c) URL
(b) Structered Questioning Logicstics (d) Locator (e) Browser
(c) Simplfied Query Logic 77. Which of the following is more than TB ?
(d) Simple Questioning Language (a) MB (b) KB (c) PB
(e) Structured Query Logic (d) Bit (e) Bytes
66. From where to where is a multicast message sent? 78. A web address is a unique name at identifies a
(a) From one source to one destination specific _______ on the internet.
(b) From multiple source to multiple destination (a) URL (b) HTML (c) CSS
(c) From multiple sources to one destination (d) Website (e) None of these
(d) From one source to multiple destinations 79. If you wish to extend the length of the network
(e) None of the above without having the signal degrade, you would use a
67. Using the direct broadcast address, (a) Gateway (b) Router (c) Modem
(a) a host sends a packet to all other host on the (d) Repeater (e) Resonator
network. 80. The ______ button on the Quick Access Toolbar allows
(b) a router sends a packet to all other hosts on the you to cancel your recent commands or activities.
network. (a) Search (b) Cut (c) Undo
(c) a host sends a packet to a specific host on the (d) Redo
network. 81. Which of the following is not a binary number?
(d) a host sends a packet to all routers on the network. (a) 110010 (b) 201020 (c) 101010
(e) none of the above (d) 100001 (e) 1011101
68. In computing, a WYSIWYG editor is a system. What 82. Which of the following is a base of hexadecimal
does WYSIWYG stands for? number?
(a) what you see is what you get (a) 8 (b) 2 (c) 10
(b) when you see is where you get (d) 16 (e) 24
(c) when you see is what you get 83. The process of converting analog signals into digital
(d) where you see is when you get signals so they can be processed by a receiving
(e) None of the above computer is referred to as
69. What is the Global Access shortcut key for Opening a (a)Modulation (b) Demodulation
new database in MS Access? (c) Synchronizing (d) Digitizing
(a) Cntrl+A (b) Cntrl+F (c) Cntrl+S (e) Transmission
(d) Cntrl+O (e) Cntrl+N 84. Which of the following memory has stored data in
70. What is the latest version of MS Office available? large number?
(a) Office 365 (b) Office 10 (c) Office 300 (a) RAM (b) ROM (c) Cache memory
(d) Office 250 (e) None of the above (d) Hard Disk (e) None of these
71. Which of the following is an operating system? 85. Generally, web address is located by
(a) Compiler (b) Plotter (c) Mac (a) Hyperlink (b) HTTP (c) URL
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
23
COMPUTER CAPSULE FOR IBPS PO MAINS -2016
(d) Locator (e) Browser (a) From RAM (b) From ROM
86. Which of the following is more than TB ? (c) From the Hard Disk
(a) MB (b) KB (c) PB (d) From a CD (e) None of these
(d) Bit (e) Bytes 99. ___________is designed to communicate instructions to
87. A web address is a unique name at identifies a a machine, particularly a computer. It can be used to
specific _______ on the internet. create programs to control the behavior of a
(a) URL (b) HTML (c) CSS machine or to express algorithms.
(d) Website (e) None of these (a) PROM (b) Programming language
88. If you wish to extend the length of the network (c) Microcontrollers
without having the signal degrade, you would use a (d) EPROM (e) None of the above
(a) Gateway (b) Router (c) Modem 100. Which of the following groups contains all graphical
(d) Repeater (e) Resonator file extensions?
89. The ______ button on the Quick Access Toolbar allows (a) JPG, GIF, BMP (b) GIF, TCF, WMF
you to cancel your recent commands or activities. (c) TCP, JPG, BMP (d) ADP, GIF, PPT (e) JPG, CPX, GCM
(a) Search (b) Cut (c) Undo
(d) Redo (e)New
90. The main folder on a storage device is called
(a) Platform (b) Interface (c) Root Directory
(d) Device Driver (e) None of these
91. What do you call the programs that are used to find
out possible faults and their causes?
(a) Operating system extensions
(b) Cookies (c) Diagnostic software
(d) Boot diskettes (e) None of the above
92. What is Adwords ?
(a) Advertising Service by Microsoft
(b) Advanced Search Engine
(c) Advertising Service by Google
(d) Automatic words Search Engine by Yahoo
(e) Advertising Service by Yahoo
93. Given the following URL -
http://www.example.com:80/path/to/myfile.html,
here, 'www.example.com', ':80' stand for _____ and
______ respectively.
(a) IP and source (b) Domain Name and Port
(c) File name and Path
(d) Path and Port (e) IP and Locator
94. Which of the following is a recent version of
operating systems?
(a) Windows XP (b) Windows 7 Basic
(c) Windows 8 (d) Windows 10
(e) Windows 2013
95. What is the full form of SMTP?
(a) Swift Mail Transmission Program
(b) Simple Mail Transfer Protocol
(c) Swift Mail Transfer Program
(d) Spam Mail Trash Program
(e) None of these
96. A high speed device used in CPU for temporary
storage during processing is called
(a) Register (b) Bus (c) Compiler
(d) Translator (e) Bus
97. Which of the following is used for establishing
connection to other document or locations within a
website?
(a) Hyperlink (b) Web link (c) CSS
(d) Java query (e) HTML Link
98. When a computer is turned on, where does it get the
first instructions that it loads into RAM?
www.bankersadda.com | www.sscadda.com | www.careerpower.in | www.careeradda.co.in
24