Sunday, October 14, 2012

IBPS CLERK COMPUTER AWARNESS PAPER

1. The banks use ................ device to minimize conversion process.




(a) Keyboard



(b) MICR



(c) OCR



(d) Scanner



2. .................. can't be used for source of data automation.



(a) POS terminal



(b) OCR



(c) Keyboard



(d) UPC



3. Under which case will intranet be an effective networking tool?



(a) In a distributed decision-making environment



(b) Where heterogeneous applications are involved



(c) In a centralised organization



(d) In a decentralised organization



4. When an organization gives contract for development of software, it has to give data to the service provider. In Such cases, the ownership of data should be_________



(a) Transferred to the service provider



(b) With the client/organization that outsource services



(c) Shared by both parties



(d) Not transferred



5. A modem performs_________



(a) Modulation



(b) Demodulation



(c) Data compression



(d) All of these



6. Which of the following is NOT done by modem?



(a) Transmission Speed



(b) Data Accuracy



(b) Error detection and Correction



(d) Data Compression



7. A program coded in programming language is____________.



(a) Target code



(b) Source code



(c) Block



(d) None of these



8. "Platform" in computer world means___________.



(a) Computer hardware used



(b) Operating Systems used



(c) Both of these



(d) None of these



9. Which of these biometric tools use thermal sensors along with infrared rays for identification?



(a) Key stroke dynamics



(b) Iris Retinal scans



(c) Speech recognition



(d)Fingerprint scanning



10. What is incorrect about software?



(a) It can manipulate computer



(b) It has programs, instructions



(c) It can be touched



(d) It can be touched



11. Disadvantage of distributed database is.



(a) Unreliability



(b) Easy implementation



(c) Insecurity



(d) High communication cost



12. Which of the following transmission techniques let computer to alternatively send and receive data?



(a) Simplex



(b) Half duplex



(c) Full duplex



(d) Multiplexing



13. What is NOT a feature of networking?



(a) Reliability



(b) Greater storage space



(c) Connectivity



(d) All are features of networking



14. Taking back-up of a file against crash is a



(a) Preventive measure



(b) Curative measure



(c) Decisive measure



(d) None of these



15. A memory that is referred by its contents instead of physical address is called ________



(a) Associative memory



(b) Content addressable storage



(c) Both (a) and (b)



(d) None of these



16. Most dangerous risk in leaking of information is :



(a) Ready access to online terminals



(b) Online processing of data



(c) Ignorance about the existence of risk



(d) All of these



17. A camera is an



(a) Input device



(b) Can be either input or output



(c) Processing machine



(b) Output device



18. Using anti-virus software is



(a) Preventive measure



(b) Detective measure



(c) Corrective measure



(d) All the above



19. An online transaction is



(a) One that is done in real time



(b) Transaction done via internet



(c) One that is done via telephone



(d) None of these



20. A clerk in a bank has to access data n customer account. Logical access control for these users would be.



(a) Use of individual passwords



(b) Use of an Accounts Receivable Section password



(c) Use of individual passwords plus separate access passwords for customer data and product data



(d) Can't say



21. To stop unauthorized access to the computer system we should



(a) Have a trustworthy system administrator



(b) Have a good passwords policy



(c) Have a sound encryption policy



(d) All of the above



22. Which cannot assure data accuracy in an application?



(a) Limit and reasonableness test



(b) Echo checking



(c) Control total



(d) None of these



23. Maximum storage space is available on



(a) CDs



(b) ROM



(c) Hard disks



(d) Floppies



24. Jon Von Neumann developed:



(a) First electronic chip flip flop



(b) Stored-program concept



(c) The first electronic computer



(d) None of these



25. Which of the following is single user computer with many features and good processing power?



(a) Minicomputer



(b) Workstation



(c) Macintosh



(d) None of these



Answers



1. (b) 2. (d) 3. (c) 4. (b) 5. (d) 6. (b) 7. (b) 8. (c) 9. (c) 10. (d)



11. (c) 12. (b) 13. (d) 14. (b) 15. (b)16. (c) 17. (b) 18. (a) 19. (b) 20. (a)



21. (b) 22. (a) 23. (b) 24. (a) 25. (b)

IBPS CLERK COMPUTER AWARNESS PAPER

1. The banks use ................ device to minimize conversion process.




(a) Keyboard



(b) MICR



(c) OCR



(d) Scanner



2. .................. can't be used for source of data automation.



(a) POS terminal



(b) OCR



(c) Keyboard



(d) UPC



3. Under which case will intranet be an effective networking tool?



(a) In a distributed decision-making environment



(b) Where heterogeneous applications are involved



(c) In a centralised organization



(d) In a decentralised organization



4. When an organization gives contract for development of software, it has to give data to the service provider. In Such cases, the ownership of data should be_________



(a) Transferred to the service provider



(b) With the client/organization that outsource services



(c) Shared by both parties



(d) Not transferred



5. A modem performs_________



(a) Modulation



(b) Demodulation



(c) Data compression



(d) All of these



6. Which of the following is NOT done by modem?



(a) Transmission Speed



(b) Data Accuracy



(b) Error detection and Correction



(d) Data Compression



7. A program coded in programming language is____________.



(a) Target code



(b) Source code



(c) Block



(d) None of these



8. "Platform" in computer world means___________.



(a) Computer hardware used



(b) Operating Systems used



(c) Both of these



(d) None of these



9. Which of these biometric tools use thermal sensors along with infrared rays for identification?



(a) Key stroke dynamics



(b) Iris Retinal scans



(c) Speech recognition



(d)Fingerprint scanning



10. What is incorrect about software?



(a) It can manipulate computer



(b) It has programs, instructions



(c) It can be touched



(d) It can be touched



11. Disadvantage of distributed database is.



(a) Unreliability



(b) Easy implementation



(c) Insecurity



(d) High communication cost



12. Which of the following transmission techniques let computer to alternatively send and receive data?



(a) Simplex



(b) Half duplex



(c) Full duplex



(d) Multiplexing



13. What is NOT a feature of networking?



(a) Reliability



(b) Greater storage space



(c) Connectivity



(d) All are features of networking



14. Taking back-up of a file against crash is a



(a) Preventive measure



(b) Curative measure



(c) Decisive measure



(d) None of these



15. A memory that is referred by its contents instead of physical address is called ________



(a) Associative memory



(b) Content addressable storage



(c) Both (a) and (b)



(d) None of these



16. Most dangerous risk in leaking of information is :



(a) Ready access to online terminals



(b) Online processing of data



(c) Ignorance about the existence of risk



(d) All of these



17. A camera is an



(a) Input device



(b) Can be either input or output



(c) Processing machine



(b) Output device



18. Using anti-virus software is



(a) Preventive measure



(b) Detective measure



(c) Corrective measure



(d) All the above



19. An online transaction is



(a) One that is done in real time



(b) Transaction done via internet



(c) One that is done via telephone



(d) None of these



20. A clerk in a bank has to access data n customer account. Logical access control for these users would be.



(a) Use of individual passwords



(b) Use of an Accounts Receivable Section password



(c) Use of individual passwords plus separate access passwords for customer data and product data



(d) Can't say



21. To stop unauthorized access to the computer system we should



(a) Have a trustworthy system administrator



(b) Have a good passwords policy



(c) Have a sound encryption policy



(d) All of the above



22. Which cannot assure data accuracy in an application?



(a) Limit and reasonableness test



(b) Echo checking



(c) Control total



(d) None of these



23. Maximum storage space is available on



(a) CDs



(b) ROM



(c) Hard disks



(d) Floppies



24. Jon Von Neumann developed:



(a) First electronic chip flip flop



(b) Stored-program concept



(c) The first electronic computer



(d) None of these



25. Which of the following is single user computer with many features and good processing power?



(a) Minicomputer



(b) Workstation



(c) Macintosh



(d) None of these



Answers



1. (b) 2. (d) 3. (c) 4. (b) 5. (d) 6. (b) 7. (b) 8. (c) 9. (c) 10. (d)



11. (c) 12. (b) 13. (d) 14. (b) 15. (b)16. (c) 17. (b) 18. (a) 19. (b) 20. (a)



21. (b) 22. (a) 23. (b) 24. (a) 25. (b)

Tuesday, October 2, 2012

Hey friends here i am posting vacancies got through from RTI ITI 253 EXCISE 1154 PO 189 CBI 76 CSS 322 DA 433 STAT INV 556 AEO 84 EXAMINER 16 CAG(AUDITOR) 2941 CGA 242 CBDT(TA) 3420 CBEC(TA) 2237 JA 754 CAG(ACCOUNTANT) 418

UP SI RESULT WILL BE DECLRED BY 15 OF OCT आज आप सभी को चहकते हुए देखकर बहुत अच्छा लग रहा है. काफी दिनों की मायूसी के बाद एक शुभ समाचार मिलने की खुशी क्या होती है, यह आपको देखकर समझा जा सकता है. ईश्वर करे आगे इस भर्ती प्रक्रिया में कोई बाधा न आये. वैसे आप सभी का संचार तंत्र काफी मजबूत है, ये तो मै समझ गया हूँ. अखबार में समाचार आया नहीं कि आप सब तक पहुँच गया लेकिन मुझे तो आप सब से ही जानकारी मिली तो इसके लिए आप सभी का आभार. कुछ मित्रगण अभी भी निराशावादी विचारों में डूबे हुए है. अरे मित्रों कम से कम कुछ देर तो खुशी और संतुष्टि के पल बिता लीजिए और सबको बिताने दीजिए. भविष्य में क्या होने वाला है, यह तो कोई नहीं जनता फिर हम यह क्यों मान के चले कि कुछ अच्छा हो ही नहीं सकता. क्या आज जो समाचार आया है, उसकी उम्मीद आपने की थी? खुद पर और भगवान पर भरोसा रखिये और खुश रहिये. धन्यवाद!

पुलिस भर्ती प्रक्रिया तीन हफ्ते में शुरू कर सरकार : हाईकोर्ट इलाहाबाद (एसएनबी)। इलाहाबाद हाईकोर्ट ने प्रदेश सरकार को पुलिस भर्ती प्रक्रिया तीन सप्ताह में शुरू कर कोर्ट में अनुपालन रिपोर्ट देने को कहा है। न्यायमूर्ति अमर सरन व न्यायमूर्ति पंकज नकवी की खण्डपीठ ने मोहम्मद कासिम की जनहित याचिका पर यह आदेश दिया। याचिका में कहा गया कि गत वर्ष दिसम्बर माह में पुलिस भर्ती की प्रक्रिया पिछली सरकार ने प्रारम्भ की थी, परन्तु चुनाव अधिसूचना की वजह से प्रक्रिया ठप पड़ गयी थी।