IBPS CWE IT Officers Online Mocks 5

25 Questions | Total Attempts: 32

SettingsSettingsSettings
IBPS CWE Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 4 parts that are as follows: General Intelligence Quantitative Aptitude Professional Knowledge English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In


Questions and Answers
  • 1. 
    All of the following are examples of real security and privacy risks EXCEPT__________
    • A. 

      Hackers

    • B. 

      Spam

    • C. 

      Viruses

    • D. 

      Identity theft.

  • 2. 
    A process known as ____________ is used by large retailers to study trends.
    • A. 

      Data mining

    • B. 

      Data selection

    • C. 

      POS

    • D. 

      Data conversion

  • 3. 
    ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
    • A. 

      Data

    • B. 

      Point-of-sale (POS)

    • C. 

      Sales

    • D. 

      Query

  • 4. 
    A(n) ____________ system is a small, wireless handheld computer that scans an item's tag and pulls up the current price (and any special offers) as you shop.
    • A. 

      PSS

    • B. 

      POS

    • C. 

      Inventory

    • D. 

      Data mining

  • 5. 
    The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:
    • A. 

      Robotics

    • B. 

      Simulation

    • C. 

      Computer forensics.

    • D. 

      Animation

  • 6. 
    Which of the following is NOT one of the four major data processing functions of a computer?
    • A. 

      Gathering data

    • B. 

      Processing data into information

    • C. 

      Analyzing the data or information

    • D. 

      Storing the data or information

  • 7. 
    ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
    • A. 

      POS

    • B. 

      RFID

    • C. 

      PPS

    • D. 

      GPS

  • 8. 
    Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
    • A. 

      Robotics

    • B. 

      Computer forensics.

    • C. 

      Simulation

    • D. 

      Forecasting

  • 9. 
    Technology no longer protected by copyright, available to everyone, is considered to be________
    • A. 

      Open

    • B. 

      Experimental

    • C. 

      In the public domain

    • D. 

      Proprietary

  • 10. 
    ____________ is the study of molecules and structures whose size ranges from 1 to 100 nano meters.
    • A. 

      Artificial intelligence

    • B. 

      Computer forensics

    • C. 

      Microelectrodes

    • D. 

      Nanoscience

  • 11. 
    ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
    • A. 

      Nanotechnology

    • B. 

      Simulation

    • C. 

      Artificial intelligence (AI)

    • D. 

      Nanoscience

  • 12. 
    ____________ is data that has been organized or presented in a meaningful fashion.
    • A. 

      A process

    • B. 

      Software

    • C. 

      Storage

    • D. 

      Information

  • 13. 
    The name for the way that computers manipulate data into information is called________ .
    • A. 

      Organizing.

    • B. 

      Processing

    • C. 

      Programming

    • D. 

      Storing

  • 14. 
    Computers gather data, which means that they allow users to ____________ data.
    • A. 

      Present

    • B. 

      Input

    • C. 

      Output

    • D. 

      Store

  • 15. 
    After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered as_________
    • A. 

      Data

    • B. 

      Output

    • C. 

      Input

    • D. 

      The process.

  • 16. 
    Computers use the ____________ language to process data.
    • A. 

      Processing

    • B. 

      Kilobyte

    • C. 

      Binary

    • D. 

      Representational

  • 17. 
    Computers process data into information by working exclusively with_________
    • A. 

      Characters

    • B. 

      Numbers

    • C. 

      Words

    • D. 

      Multimedia

  • 18. 
    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of________
    • A. 

      8 bytes

    • B. 

      8 kilobytes

    • C. 

      8 characters

    • D. 

      8 bits

  • 19. 
    Servers are computers that provide resources to other computers connected to a_________.
    • A. 

      Network

    • B. 

      Mainframe

    • C. 

      Supercomputer

    • D. 

      Client

  • 20. 
    Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
    • A. 

      Supercomputers

    • B. 

      Clients

    • C. 

      Laptops

    • D. 

      Mainframes

  • 21. 
    . ____________ are specially designed computers that perform complex calculations extremely rapidly.
    • A. 

      Servers

    • B. 

      Supercomputers

    • C. 

      Laptops

    • D. 

      Mainframes

  • 22. 
    DSL is an example of a(n) ____________ connection.
    • A. 

      Network

    • B. 

      Wireless

    • C. 

      Slow

    • D. 

      Broadband

  • 23. 
    The difference between people with access to computers and the Internet and those without this access is known as the__________
    • A. 

      Digital divide

    • B. 

      Internet divide

    • C. 

      Web divide

    • D. 

      Broadband divide

  • 24. 
     ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.
    • A. 

      Nanotechnology

    • B. 

      Micro-technology

    • C. 

      Computer forensics

    • D. 

      Artificial intelligence

  • 25. 
    Which of the following is the correct order of the four major functions of a computer?
    • A. 

      Process à Output à Input à Storage

    • B. 

      Input à Outputà Process à Storage

    • C. 

      Process à Storage à Input à Output

    • D. 

      Input à Process à Output à Storage