COPMUTER AWARENESS

CWE CLERK COMPUTER SERIES-1
1.     Outlook Express is a__
(a)   E-Mail Client
(b)   Scheduler
(c)   Address Book
(d)   All of the above
(e)   None of these
2.     Which key should be pressed to start a new page in MS-Word?
(a)   Down Cursor Key
(b)   Enter Key
(c)   Shift+Enter
(d)   Ctrl+Enter
(e)   Shift+ Ctrl+Enter
3.     Which type of software is similar to an Accountant’s Worksheet?
(a)   Word processing
(b)   Database
(c)   Spreadsheets
(d)   Graphics
(e)   File Manager
4.     The Network Connecting several Computers all over the World is
(a)   Intranet
(b)   Internet
(c)   Anet
(d)   Network
(e)   IAN
5.     In Windows by default the files when deleted are sent to___
(a)   Dust Bin
(b)   Recycle Bin
(c)   Waste Bin
(d)   Recycle Waste Bin
(e)   None of these
6.     Which of the following is an Operating System?
(a)   MS Windows
(b)   Mac
(c)   MSDOS
(d)   Windows NT
(e)   All of the these
7.     A terminal that cannot process any information is called____
(a)   Direct Access terminal
(b)   Intelligent terminal
(c)   Smart terminal
(d)   Blind terminal
(e)   Dumb terminal
8.     The Keys labeled 0-9 on the keyboard are called____
(a)   Function Keys
(b)   Numeric Keys
(c)   Typewriter Keys
(d)   Special Keys
(e)   Alpha Keys
9.     The most popular Internet Activity is____
(a)   Downloading Music
(b)   Watching Movie Trailers
(c)   Shopping for books
(d)   E-mailing
(e)   None of these
10.  In a Spreadsheet, a cell is defined as the____
(a)   Intersection of a table and a tippet
(b)   Intersection of a file and a database
(c)   Intersection of a row and column
(d)   Intersection of a field and a record
(e)   None of these
ANSWERS:       1.A       2.D       3.C       4.B       5.B       6.E       7.E       8.B       9.D       10.C




CWE CLERK COMPUTER SERIES-2

1. ______Is the most widely used medium for telecommunications
a) Twisted Pair
b) Coaxial Cable
c) Optical Fiber
d) None
2. ______Is widely used medium of communication for cable television systems
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None
3. ______Cable consists of one or more filaments of glass fiber wrapped in protective layers that
carries data by means of pulses of light
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None
4. ______Is a computer network used for communications among computers and different information technological devices close to one person
a) Personal Area Network
b) Local Area Network
c) Metropolitan Area Network
d) Wide Area Network
5. ______Is a collection of conceptual tools for describing data, data relationships, data semantics
and constraints
a) Data base
b) Data Model
c) E_R Model
d) None
6. Association among two or more entities called
a) Entity
b) Entity set
c) Relationship
d) Degree of relation
7. DDL stands for
a) Data Definition Language
b) Data Delete Language
c) Data Device Language
d) Database Definition Language
8. SDL stands for
a) Storage Definition Language
b) Save Definition Language
c) Storage Database Language
d) Shortcut Definition Language
9. DML stands for
a) Date Manipulation Language
b) Database Manipulation Language
c) Data Manuscript Language
d) Data Manipulation Language
10. ____Is the language that enable user to access or manipulate data as organized by appropriate
data model
a) DML
b) SDL
c) DDL
d) All of the above
11. ____Is the language to specify the internal schema. (This language may specify the mapping between two schemas)
a) DML
b) SDL
c) DDL
d) None of the above
12. All candidate keys excluding the primary key are known as
a) Compound key
b) Partial key
c) Alternative key
d) None of the above
13. The user commands that are used to interact with a database is called as
a) Query
b) Interaction
c) Command
d) Instruction
14. The updates that are applied to database before it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
15. The updates that are applied to database after it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
16. The updates that are applied to database at the same time when it becomes effective in real
world?
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
17. Match the following (select the test by using the key board)
a) A word from its beginning to its end
b) A paragraph from its begging to its end
c) The entire document
1. CTRL+ DOWN ARROW
2. CTRL+LEFT ARROW
3.CTRL+SHIFT+RIGHTARROW
a) a-3,b-1,c-2
b) a-3,b-2,c-3
c) a-3,b-2,c-1
d) a-2,b-3,c-1
18. Match the following (Move through your document)
a) One character to the left
b) One character to the right
c) One word to the left
d) One word to the right
1. CTRL+RIGHT ARROW
2. CTRL+LEFT ARROW
3. RIGHT ARROW
4. LEFT ARROW
a) a-4,b-3,c-2,d-1
b) a-4,b-2,c-3,d-1
c) a-1,b-3,c-4,d-2
d) a-2,b-1,c-3,d-4
19. Match the following (To move)
a) One paragraph down
b) To the beginning of a document
c) To the end of a document
d) Up one screen at a line
e) Down one screen at a time
1. CTRL+END
2. PAGE DOWN
3. CTRL+HOME
4. CTRL+DOWN ARROW
5. PAGE UP
a) a-5,b-3,c-1,d-4,e-2
b) a-4,b-3,c-2,d-5,e-1
c) a-3,b-4,c-1,d-5,e-2
d) a-4,b-3,c-1,d-5,e-2
20. In a word document Red underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
21. In a word document Green underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
22. In a word document Blue underline indicates?
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
23. By default the Microsoft word document will be saved into a folder called
a) Desktop
b) My documents
c) D drive
d) Personal folder
24. What is the default file name for the word document?
a) Taken from the text at the start of the document
b) Word document
c) Both (a) and (b)
d) None of the above
25. In word-2010____is the key to see numbers and letters displayed over icons, tabs or commands towards the top of your screen?
a) Ctrl key
b) Tab key
c) Alt key
d) None of the above
26. ____ Is the keyboard shortcut key to close the word program
a) Alt+F4
b) Alt+F5
c) Alt+F6
d) Alt+F7
27. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.)
a) Save
b) Save as plain text file
c) Save as
d) All of the above
28. _____Is the file format we can use to distribute the document to some one using totally different word processing program from a different software manufacturer, such as word perfect
a) Word document (.doc)
b) Rich Text Format (.RTF)
c) Both (a) and (b)
d) None of the above
29. _____Is the Icon to magnify or reduce the display
a) Print layout
b) Zoom
c) View
d) All of the above
30. Match the following
a) Cut 1. CTRL+C
b) Copy 2. CTRL+V
c) Paste 3. CTRL+X
a) a-1, b-3, c-2
b) a-2, b-1, c-3
c) a-3, b-1, c-2
d) a-3, b-2, c-1
31. What is text formatting?
a) Formatting characters and words with in a document
b) Saving the word document
c) Both (a) and (b)
d) None of the above
32. By default MS-Word 2010 uses a font called
a) Arial
b) Times New roman
c) Tahoma
d) Caliber
33. Superscript refers to____
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None
34. Subscript refers to ___
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None
35. (a+b)2 is an example for ----
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None
36. CO2 is an example for ---
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None
37. You need to find a particular word or phrase and replace this item with alternative text, what is
the keyboard shortcut key
a) Ctrl+G
b) Ctrl+P
c) Ctrl+H
d) Ctrl+F
38. _____Is the path to create Header/Footer
a) Insert/Header & Footer
b) File/Header & Footer
c) Edit/Header & Footer
d) None of the above
39. __ Is the path to create footnotes
a) References/footnote
b) Insert/footnote
c) Edit/footnote
d) None
40. _____ Is the path to save a document in PDF format
a) Edit/Save as/PDF/Save
b) File/Save as/PDF/Save
c) Both (a) and (b)
d) None of the above


ANSWERS:
1) a 2) b 3) c 4) a 5) b 6) c 7) a 8) a 9) d 10) a 11) b 12) c 13) a 14) b 15) a 16) c 17) a 18) a 19) d 20) a 21) b 22) c 23) b 24) a 25) c 26) a 27) b 28) b 29) b 30) c 31) a 32) d 33) b 34) a 35) b 36) a 37)c 38) a 39) a 40) b
CWE CLERK COMPUTER SERIES-3


1. Compiler is the
(a) name given to the computer operator
(b) Part of the digital machine to store the information
(c) Translator of source program to object
(d) Part of arithmetic logic unit
(e) Operator of Boolean Algebra
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
6. What are the two basic types of memory that your computer uses?
(a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer
9. What digits are representative of all binary numbers?
(a) 0
(b) 1
(c) Both (a) and (b)
(d) 3
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer

ANSWERS:       1.C       2.A       3.B       4.A       5.A       6.A       7.C       8.A       9.C       10.D     11.B                              12.D

CWE CLERK COMPUTER SERIES-4

1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ....
(A) Software suites
(B) Integrated software packages
(C) Software processing packages
(D) Personal information managers
(E) none of these
2. A data warehouse is which of the following?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
7. System software is the set of programs that enables your computer's hardware devices and______ software to work together.
(A) Management
(B) Processing
(C) Utility
(D) Application
(E) None of these
8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
9. The following are all computing devices , except.........
(A) Notebook computers
(B) Cellular telephones
(C) Digital scanners
(D) Personal digital assistants
(E) None of these
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel and serial ports ____
(A) Basic input/output system
(B) Secondary input/output system
(C) Peripheral input/output system
(D) Marginal input/output system
(E) None of these
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
13. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
14. Servers are computers that provide resources to other computers connected to a ___________
(A) Mainframe
(B) Network
(C) Supercomputer
(D) Client
(E) None of these
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
17. A database management system (DBMS) is a ............
(A) Hardware system used to create , maintain and provide controlled access to a database
(B) Hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) Software system used to create, maintain, and provide uncontrolled access to a database.
(D) Software system used to create, maintain, and provide controlled access to a database.
(E) None of these


18. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) Data redundancy
(B) Information overload
(C) Duplicate data
(D) Data inconsistency
(E) None of these

ANSWERS:       1.A       2.C       3.D       4.B       5.B       6.C       7.D       8.B       9.C       10.D     11.A                     12.B 13.C            14.B     15.A     16.C     17.D     18.B     19.B     20.D



CWE CLERK COMPUTER SERIES-5
1. In a ring topology, the computer in possession of the ______ can trasmit data
(A) packet
(B) Data
(C) Access method
(D) Token
(E) None of these
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
4. All of the following are examples of real security and privacy risks Except _____
(A) Hackers
(B) Spam
(C) Viruses
(D) Identify theft
(E) None of these
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) Management
(B) Processing
(C) Utility
(D) Application
(E) None of these
8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
9. The following are all computing devices , except.........
(A) Notebook computers
(B) Cellular telephones
(C) Digital scanners
(D) Personal digital assistants
(E) None of these
10. A database management system (DBMS) is a............
(A) Hardware system used to create, maintain and provide controlled access to a database
(B) Hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) Software system used to create, maintain, and provide uncontrolled access to a database.
(D) Software system used to create, maintain, and provide controlled access to a database.
(E) None of these
11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel and serial ports ____
(A) Basic input/output system
(B) Secondary input/output system
(C) Peripheral input/output system
(D) Marginal input/output system
(E) None of these
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
13. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
D) The motherboard
(E) None of these
14. Servers are computers that provide resources to other computers connected to a___________
(A) Mainframe
(B) Network
(C) Supercomputer
(D) Client
(E) None of these
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these

           
ANSWERS:       1.D       2.C       3.D       4.B       5.B       6.C       7.D       8.B       9.C       10.D     11.A                             12.B            13.C     14.B     15.A

CWE CLERK COMPUTER SERIES-6

1. A passive threat to computer security is—
(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these
2. The Secure Electronic Transaction (SET) specification—
(1) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
(2) Provides private-key encryption of all data that passes between a client and a server
(3) Allows users to choose an encryption scheme for the data that passes between a client and a server
(4) Uses a public-key encryption to secure credit-card transaction systems
(5) None of these
3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
(1) TCP/IP
(2) Ethernet
(3)WAP
(4) Token ring
(5) None of these
4. 'DOS' floppy disk does not have—
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS
5. 'MICR' technology used for clearance of cheques by banks refers to—
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these
6. All the information collected during database development is stored in a—
(1) Repository
(2) Data warehouse
(3) RAD
(4) CASE
(5) None of these
7. The……………….component is used by the data analyst to create the queries that access the database.
(1) Data extraction
(2) End-user query tool
(3) End-user presentation tool
(4) Data store
(5) None of these
8. A(n)…………….allows network users to share a single copy of software, which resides on the network server.
(1) single-user license agreement
(2) Network site license
(3) End-user license agreement
(4) Business software license
(5) None of these
9. A polymorphic virus—
(1) Modifies its program code each time it attaches itself to another program or file
(2) Is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
(3) a malicious-logic program that hides within or looks like a legitimate program
(4) Infects a program file, but still reports the size and creation date of the original, uninfected program
(5) None of these
10. Microwave transmission is used in environments where installing physical transmission media is—
(1) Difficult or impossible and where line-of-sight transmission is unavailable
(2) Easy or promising and where line-of-sight transmission is unavailable
(3) Difficult or impossible and where line-of-sight transmission is available
(4) Easy or promising and where line-of-sight transmission is available
(5) None of these
11. Which is NOT a good Web security strategy?
(1) Restrict access to the Web server; keep a minimum number of ports open
(2) Limit the users who can load software, edit or add files.
(3) Add demo programs, so users can test system without accessing production data.
(4) Remove unnecessary compilers and interpreters.
(5) None of these
12. The altering of data so that it is not usable unless the changes are undone is—
(1) Biometrics
(2) Compression
(3) Encryption
(4) Ergonomics
(5) None of these
13. The word FIP stands for—
(1) File Translate Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these
14. Voice mail—
(1) Is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
(2) Permits users to converse in real time with each other via the computer while connected to the Internet
(3) Functions much like an answering machine, allowing callers to leave a voice message for the called party
(4) Involves using video and computer technology to conduct a meeting between participants at geographically separate locations
(5) None of these
  
ANSWERS: 1. (1) 2. (4) 3. (3) 4. (4) 5. (1) 6. (2) 7. (2) 8. (2) 9. (1) 10. (4) 11. (4) 12. (3) 13. (1) 14. (3)


CWE CLERK COMPUTER SERIES-7


1. _ _ _ _ _ _ _ _ is an OOP principle
1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking
5) None
2. COBOL is widely used in _ _ _ _ _ _ _ applications
1) Commercial
2) Scientific
3) Space
4) Mathematical
5) None
3. RAM stands for
1) Random origin money
2) Random only memory
3) Read only memory
4) Random access memory
5) None
4. 1 Byte = ?
1) 8 bits
2) 4 bits
3) 2 bits
4) 9 bits
5) None
5. SMPS stands for
1) Switched mode power supply
2) Start mode power supply
3) Store mode power supply
4) Single mode power supply
5) None
6. The device used to carry digital data on analog lines is called as
1) Modem
2) Multiplexer
3) Modulator
4) Demodulator
5) None
7. VDU is also called
1) Screen
2) Monitor
3) Both 1 & 2
4) printer
5) None
8. BIOS stands for
1) Basic Input Output system
2) Binary Input output system
3) Basic Input Off system
4) all the above
5) None
9. Father of ‘C’ programming language
1) Dennis Ritchie
2) Prof Jhon Kemeny
3) Thomas Kurtz
4) Bill Gates
5) None
10. The 16 bit Microprocessor means that it has
1) 16 address lines
2) 16 Buses
3) 16 Data lines
4) 16 routes 5) None


CWE CLERK COMPUTER SERIES-8

1. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these
2. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these
3. RSA is—
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these
4. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these
5. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these
6. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these
7. All of the following are basic principles of net works,except—
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
8. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these
9. …………….are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these
10. Which one of the following objects is passed to a Java Bean when one of its properties is set via a JSP action?
(1) Servlet Request
(2) Http Servlet Request
(3) Servlet Response
(4) Http Servlet Response
(5) None of these

ANSWERS: 1. (2)       2. (1)      3. (4)      4.(3)     5. (3)    6. (4)     7. (2)    8. (3)    9. (1)    10. (3)

CWE CLERK COMPUTER SERIES-9
1. A goal of normalization is to __________
(A) Minimize the number of relationships
(B) Minimize the number of entities
(C) Minimize the number of tables
(D) Minimize the number of redundancy
(E) None of these
2. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) Extranet
(B) Intranet
(C) Internet
(D) Hacker
(E) None of these
3. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
4. The code that relational database management systems use to perform their database task is referred to as.....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
5. Chip is a common nickname for a (n):
(A) transistor
(B) Resistor
(C) Integrated circuit
(D) Semiconductor
(E) None of these
6. The purpose of the primary key in a database is to:
(A) Unlock the database
(B) Provide a map of the data
(C) Uniquely identify a record
(D) Establish constraints on database operations.
(E) None of these
7. The design of the network is called the network:
(A) Architecture
(B) Server
(C) Transmission
(D) Type
(E) None of these
8. The most frequently used instructions of a computer program are likely to be fetched from:
(A) The hard disk
(B) Cache memory
(C) RAM
(D) Registers
(E) None of these
9. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) Data dictionary
(B) Data table
(C) Data record
(D) Data field
(E) None of these
10. Personal logs or journal entries posted on the Web are known as:
(A) Listservs
(B) Webcasts
(C) Blogs
(D) Subject directories
(E) None of these
ANS (C)

ANSWERS:       1.D       2.A       3.A       4.B       5.C       6.B       7.A       8.B       9.A       10.C    
CWE CLERK COMPUTER SERIES-10

1. In a network, the Computer that stores the files and process the data is named as
a) Server
b) Terminal
c) Modem
d) All of the above
2. Viruses are called that because
a) They are viruses
b) They can copy themselves and spread
c) Both (a) and (b)
d) None of the above
3. Which of the can't Spread Virus
a) An e-mail with attachment
b) A plain text mail
c) Downloading files over the web
d) None of the above
4. There is a new Anti-virus software update available, when it is downloaded to your Computer
a) Everyday
b) Only in the night
c) When you next switch on your computer
d) All of the above
5. Numbers are stored and transmitted inside a Computer in
a) Binary form
b) ASCII code form
c) Alphabets form
d) Numerical form
6. CPU capacity can be measured in
a) BPS
b) MIPS
c) MHz
d) MPI
7. MPIS stands for
a) Million Instructions Per Second
b) Million Instructions Per Season
c) Monthly Instructions Per Second
d) Million Inputs Per Second
8. LAN speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
9. Modem speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
10. BPS stands for
a) Bits Per Second
b) Bits Per Season
c) Bytes Per Second
d) Bits Per System
11. In processing cheques which of the following I/O techniques have Banks traditionally followed?
a) OCR
b) MICR
c) Barcode
d) VRT
12. What is object of UPS?
a) Using for storage
b) To increase the speed of a computer
c) Provides backup power
d) All of the above
13. QWERTY is used with reference to
a) Monitor
b) Printer
c) Keyboard
d) Mouse
14. "Zipping" a file means
a) Encrypting the message
b) Compressing the message
c) Transfer the message
d) All of the above
15. Integrated Circuits (IC) Chips used in Computers are made with
a) Gold
b) Silver
c) Silicon
d) Copper

ANSWERS:       1. a      2. b     3. b      4. c       5. b      6. b      7. a       8. c       9. a       10. a     11. b 12. c        13. c     14. b          15. c
CWE CLERK COMPUTER SERIES-11
1. What is the Super Computer developed in India
a) CRAY
b) PARAM
c) Both (a) and (b)
d) None of the above
2. Which of the following is different from other
a) Internet
b) Windows
c) Unix
d) Linux
3. What is the full form of WWW?
a) World Wide Web
b) World With Web
c) Work Wide Web
d) World Wide Wet
4. Which of the following Command is required to reboot the computer
a) CTRL+ALT+DEL
b) CTRL+ALT+TAB
c) CTRL+ALT+SHIFT
d) CTRL+SHIFT+DEL
5. Select the ODD one
a) Operating system
b) Interpreter
c) Compiler
d) Assembler
6. PC stands for
a) Practical Computer
b) Personal Computer
c) Private Computer
d) Personal Contact
7. The computer code for interchange of information between terminals is
a) BCDIC
b) BCD
c) ASCII
d) None of the above
8. The retrieval of information from the computer is defined as
a) Data processing
b) Input
c) Output
d) All of the above
9. Which one of the following is NOT a computer language?
a) MS-Excel
b) BASIC
c) COBOL
d) C++
10. "C" is
a) A letter
b) A word
c) A language
d) An alphabet
11. Difference Engine invented by
a) Charles Babbage
b) John McCarthy
c) Pascal
d) Newton
12. First generation computer systems used
a) Transistors
b) Vacuum Tubes
c) Both (a) and (b)
d) None of the above
13. A byte is made up of
a) Eight bytes
b) Eight binary digits
c) Two binary digits
d) Two decimal points
14. Doing research by using an on-line database instead of a printed set of similar information offers which of the following advantage
a) More current information
b) Easier to understand
c) Better charts
d) None of the above
15. Software programs that allow you to legally copy files and give them away at no cost are called which of the following
a) Time sharing
b) Public domain
c) Shareware
d) None of the above

ANSWERS:       1. b      2. a       3. a       4. a       5. a       6. b      7. c       8. c       9. a       10. c     11. a 12. b        13. B    14. a          15. b                

CWE CLERK COMPUTER SERIES-12

1. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Bridge
(2) Gateway
(3) Router
(4) Modem
(5) All of these
2. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these
3. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these
4. RSA is—
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these
5. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these
6. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these
7. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these
8. All of the following are basic principles of net works, except—
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
9. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these
10. …………….are used to identify a user who returns to a Website.
(1) Cookies  
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these

ANSWERS:  1. (2)         2.(2)      3. (1)     4. (4)     5. (3)    6. (3)     7. (4)     8. (2)    9. (3)     10. (1) 

No comments:

Post a Comment

Google+