Search This Blog

Showing posts with label CWE -IBPS. Show all posts
Showing posts with label CWE -IBPS. Show all posts

Aug 12, 2011

IBPS CWE sample questions


1. The Foreign Exchange Reserve of India are kept in the custody of……
(A) World Bank
(B) International Monetary Fund
(C) Prime Minister Rahat Kosh
(D) Reserve Bank of India
(E) None of these

2. The Reserve Bank of India issues coins and notes of various denominations. At present RBI does not issue coins of which of the following denominations ?
(A) 10 paise
(B) 20 paise
(C) 25 paise
(D) 50 paise
(E) 1•00 Rupee

3. The European Union has adopted which of the following as a common currency ?
(A) Dollar
(B) Dinar
(C) Yen
(D) Peso
(E) Euro

4. Various Banks in the country have installed machines which disburse money to general public. These machines are called……
(A) Coin dispensing machines
(B) ATMs
(C) Debit Card Machines
(D) Ledger Machines
(E) None of these

5. Which of the following names is not associated with the insurance business in India ?
(A) Bajaj Allianz
(B) LIC
(C) GIC
(D) Tata AIG
(E) GE Money

6. Commodity Exchanges at various places in India are trading in many metals like gold, silver, etc. Many times we read in newspapers that gold no more has emained the highest trading option and has been replaced by a non-traditional metal known as……
(A) copper
(B) steel
(C) zinc
(D) white gold
(E) None of these

7. Which of the following is known as Plastic money ?
1. Demand Draft
2. Credit Card
3. Debit Card
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 2 and 3
(E) All 1, 2 and 3

8. Many a time we see a term in newspapers ‘IPO’. What is the full form of the same ?
(A) Indian Public Offer
(B) Institutional Purchase
(C) Industrial Purchase Order
(D) Indian Purchase Offer
(E) Initial Public Offer

9. Many a times we read in financial newspapers a term/name NMCEX. What is the full form of the same ?
(A) New Multi Capital Exchange
(B) National Medium Commodity Exchange
(C) National Multi Commodity Exchange
(D) Net Marketable Commodity Exchange
(E) None of these

10. Many Banks these days are entering into business of offering loans against property. This business of the banks can be categorized under which of the following heads of banking ?
(A) Corporate Banking
(B) Personal Banking
(C) Merchant Banking
(D) Portfolio Management Service
(E) None of these

11. Which of the following organizations/banks has done a commendable work in the field of micro finance and was awarded Nobel Prize also in the past ?
(A) Gramin Bank of Bangladesh
(B) CRY
(C) ASHA
(D) NABARD
(E) None of these

12. Nobel Prizes are not given for the performance in the area of…
(A) Literature
(B) Physics
(C) Chemistry
(D) Music
(E) Medical Science

13. In which of the following Hindi films has actor Shahrukh Khan played the role of a Hockey Coach ?
(A) Guru
(B) Chak De India
(C) Om Shanti Om
(D) Jab We Met
(E) None of these

14. Which of the following countries has not made any significant investment in India ?
(A) Japan
(B) USA
(C) Nepal
(D) Britain
(E) France

15. Which of the following is considered an informal method of getting credit/finance ?
(A) Internet Banking
(B) Branch visits
(C) Going to money lenders
(D) Tele Banking
(E) All of these

16. Which amongst the following nations is not a member of the SAARC ?
(A) Bangladesh
(B) Bhutan
(C) Nepal
(D) Maldives
(E) South Africa

17. Which of the following indexes is developed to measure life expectancy, level of literacy, education and standard of living of people in a country ?
(A) Inflation
(B) Sensex
(C) Human Development Index
(D) SLR
(E) None of these

18. Which of the following is not a Public Sector Unit/Undertaking/Agency ?
(A) ECGC
(B) SEBI
(C) SIDBI
(D) Axis Bank
(E) BHEL

19. Which of the countries represent letter ‘C’ in the category known as BRIC countries ?
(A) Canada
(B) Chile
(C) Cuba
(D) Croatia
(E) China

20. Who amongst the following addresses the nation on the Independence Day from the ramparts of the Red Fort, Delhi ?
(A) President of India
(B) UPA Chairperson
(C) Speaker of the Lok Sabha
(D) Prime Minister of India
(E) None of these

21. Which of the following awards is given for excellence in the field of sports ?
(A) Kalidas Samman
(B) Dhyanchand Award
(C) Shram Vir Award
(D) Shanti Swarup Bhatnagar Award
(E) None of these

22. Which of the following does not represent the name of a bank working in India ?
(A) YES
(B) HDFC
(C) TATA
(D) Kotak Mahindra
(E) Axis

23. Twenty-20 matches are played in the game of……
(A) Hockey
(B) Football
(C) Badminton
(D) Tennis
(E) Cricket

24. Which of the following deals between India and one major country was put on a hold for some time as India is finding difficult to implement it ?
(A) 123 Pact with USA
(B) Fifth generation fighter plane deal with Russia
(C) Heavy Water deal with Iran
(D) Border talks with China
(E) None of these

25. Which of the following is a type of tax levied by the Govt. on goods and services ?
(A) SAT
(B) NET
(C) PAN
(D) VAT
(E) None of these enjoy

26. As per the news appeared in some major newspapers India is number two in getting ‘PE’. What is the full form of ‘PE’ as used in the financial world ?
(A) Professional and Ecofriendly
(B) Profitable Equity
(C) Profitable and Economical
(D) Private and Economical
(E) Private Equity

27. Many a times we read in newspapers about ‘Financial Inclusion’. What does it really mean ? [Pick up correct statement(s)]
1. Allow the merger and acquisition of banks so that only few big banks exist and continue to cater to the need of corporate sector.
2. Expending the network of banks in such a way that people from lower strata of society also get the benefit of services provided by banks.
3. Providing Insurance cover to each and every citizen so that he/she can live a healthy and long life.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 and 2
(E) All 1, 2 and 3

28. Which of the following organizations recently issued some guidelines related to ‘Participatory Notes’ as used in financial world ?
(A) RBI
(B) IRDA
(C) SEBI
(D) AMFI
(E) None of these

29. Heavy Water is normally used by which of the following industries ?
(A) Nuclear Power generation plants
(B) Pharma Industry
(C) Paper Industry
(D) Sugar plants
(E) None of these

30. As per news items published in various newspapers, Italy has offered its help in developing ‘SMEs’ in India. What is the full form of ‘SME’ ?
(A) Small and Monopolistic Economy
(B) Small and Medium Enterprises
(C) Speedy and Mechanical
(D) Small and Medium Level Economy
(E) None of these

31. Which of the following statements about the ‘exports’ from India is true ?
1. Exports are showing good rate of growth.
2. Exports are growing in volume but still they are poorer than imports in terms of value.
3. Exports are not improving the way they were growing two years back.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 and 3 are correct
(E) None of these

32. Which of the following countries for the first time elected a lady as its President recently ?
(A) Argentina
(B) China
(C) New Zealand
(D) Russia
(E) None of these

33. The Govt. of India keeps on clearing the proposal of setting up new SEZs at several places. What does the letter ‘S’ represent in the ‘SEZ’ ?
(A) Soft
(B) Small
(C) Special
(D) Supportive
(E) None of these

34. Which of the following is not a foodgrain ?
(A) Wheat
(B) Rice
(C) Maize
(D) Jowar
(E) Cotton

35. Who amongst the following was made the Chairman of the National Land Reforms Council ?
(A) Smt. Sonia Gandhi
(B) Arjun Singh
(C) Pranav Mukherjee
(D) Kamal Nath
(E) Manmohan Singh

36. Various Govt. agencies/organizations are given responsibilities for implementing various policies/decisions of the Govt. of India. Policies about credit flow to the agricultural/priority sector are framed/implemented through which of the following apex bodies ?
(A) ECGC
(B) NABARD
(C) UTI
(D) IDBI Bank
(E) None of these

37. As we read every then and now the Monetary and Credit Policy is reviewed and changes/corrections are made frequently. Who amongst the following exactly takes this decision in India ?
(A) Deputy Chairman, Planning Commission
(B) Prime Minister
(C) Finance Minister
(D) Chairman Finance Commission
(E) None of these

38. The World Bank sanctioned Rs. 18,000 crores to which of the following states for its Poverty Alleviation Programme ?
(A) Karnataka
(B) Gujarat
(C) Maharashtra
(D) Uttar Pradesh
(E) None of these

39. The UNO has declared year 2008 as the year of……
(A) AIDS Prevention
(B) Potato
(C) Water Harvesting
(D) Social Justice to Children
(E) None of these

40. Who amongst the following is the author of the book ‘Pakistan– The Gathering Storms’ ?
(A) Benazir Bhutto
(B) Parvez Musharraf
(C) Arun Shourie
(D) Arun Gandhi
(E) None of these

41. Which of the following is not a gallantry Award ?
(A) Vir Chakra
(B) Jeevan Raksha Padak
(C) Ashok Chakra
(D) Mahavir Chakra
(E) Saraswati Samman

42. Which of the following states has approved sharing Neyyar Irrigation Project water with Tamil Nadu ?
(A) Karnataka
(B) Andhra Pradesh
(C) Kerala
(D) Maharashtra and Karnataka
(E) None of these

43. Which of the following is not a foreign bank working in India ?
(A) HSBC
(B) Barclays
(C) Standard Chartered
(D) Yes Bank
(E) All are foreign banks

44. Who amongst the following is the Chairman of the 13th Finance Commission ?
(A) Bimal Jalan
(B) Y. V. Reddy
(C) C. Rangarajan
(D) Vijay Kelkar
(E) None of these

45. India has the least or negligible trade relations with …………
(A) Japan
(B) Britain
(C) South Africa
(D) Uganda
(E) Iran

46. Your friend has received a sum of Rs. 10000 from his grandparents. He wants to deposit this sum in a bank under a condition of not to withdraw fully or partially for at least two years. He will be needed to open which type of account in the bank ?
(A) Small savings account
(B) Current account
(C) Fixed deposit account
(D) Demat account
(E) None of these

47. Recently, this was in news that ASEAN is an association of ……
(A) Commonwealth nations
(B) SAARC nations
(C) South-Eastern Asian nations
(D) Oil-exporting nations
(E) African nations

48. Names of two important persons are often visible in newspapers/magazines/electronic media. These names are Dr. C. Rangarajan and Dr. Bimal Jalan. Which of the following facts are identical in the life of both these two persons ?
(A) Both are principal economic advisors to the Prime Minister
(B) Both are the Members of the Lok Sabha
(C) Both are the former Governors of RBI
(D) Both were the Finance Ministers of India
(E) There is nothing similar in both

49. Which of the following places of West Bengal was in news recently, since some violent incidences took place due to an attempt of agricultural land aquisition for industrial purposes ?
(A) Khadakpur
(B) Nandigram
(C) Howrah
(D) Bolepur
(E) None of these

50. In accordance with the reports published in the papers/magazines, the Government of India and some NGOs have declared/started some projects to help/ to provide relief to the farmers in general and specially to perplexed farmers. Which of the following is not such a plan ?
(A) Crop insurance plan
(B) E-Chaupal
(C) Subsidy for chemical fertilizers
(D) Reconstruction of watershade/water-bodies
(E) Mid-day meal

Answers
1. (D) 2. (B) 3. (E) 4. (B) 5. (E) 6. (D) 7. (D) 8. (E) 9. (C) 10. (B)
11. (A) 12. (D) 13. (B) 14. (C) 15. (C) 16. (E) 17. (C) 18. (B) 19. (E) 20. (D)
21. (B) 22. (C) 23. (E) 24. (A) 25. (D) 26. (E) 27. (B) 28. (C) 29. (A) 30. (B)
31. (C) 32. (A) 33. (C) 34. (E) 35. (E) 36. (B) 37. (E) 38. (D) 39. (B) 40. (A)
41. (E) 42. (C) 43. (D) 44. (D) 45. (D) 46. (C) 47. (C) 48. (C) 49. (B) 50. (E)

Source: http://entrance-exam.net

IBPS Computer General Awareness For Bank PO 2010


1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B

3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B

4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B

5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B

7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B

10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A

11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C

17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B

24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A

25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2 Cryptography

26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D

27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B

28. All of these are suggestions for safe computing EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B

29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C

30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B

31. Most computer systems rely solely on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B

32. Creating strong computer security to prevent computer crime usually simultaneously helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A

33. Over ___________ was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D

34. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D

35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B

Fill in the Blank:
36. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging

37. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime

38. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet

39. ____________ is the most common form of computer crime.
Answer: Theft
40. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft

41. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook

42. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy

43. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus

44. Both viruses and ____________ use computer hosts to replicate.
Answer: worms

45. ____________ programs search for and eliminate viruses.
Answer: Antivirus

46. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free

47. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking

48. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking

49. DoS stands for ___________.
Answer: denial of service

50. DDoS stands for ___________.
Answer: distributed denial of service

51. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers

52. ___________ software monitors and records computer transactions.
Answer: Audit-control

53. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography

54. PGP stands for ___________.
Answer: Pretty Good Privacy

55. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID
56. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments


Matching:
57. Match the acts and centers with their purposes:
I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998
II. USA Patriot Act B. defines what kinds of communications are legal online
III. Digital Millennium Copyright Act C. created in 2001 as a response to the terrorist attacks of September 11, 2001
IV. Telecommunications Act of 1996 D. provides instant information on crimes and criminals
V. Communications Decency Act E. declared unconstitutional by the Supreme Court
VI. National Infrastructure Protection Center F. created as a result of the first headline-making worm
VII. National Crime Information Center G. used to arrest a student for writing to crack an Adobe product
Answers: F, C, G, B, E, A, D
58. Match the following rules of thumb about safe computing with the proper descriptions:
I. share with care A. be aware of e-mail from what appear to be legitimate companies
II. handle e-mail carefully B. don’t choose a dictionary word
III. disinfect regularly C. keep your disks in your own computer
IV. take your password seriously D. copy, copy, copy
V. if it’s important, back it up E. encrypt
VI. sensitive info over the Internet? F. use antivirus software
Answers: C, A, F, B, D, E

IBPS Bank Exam Online Practice Tests

IBPS Bank Exam Online Practice Tests  from INDIASTUDY CHANNEL for bank exam aspirants.


Start your preparations for the exam as soon as possible. Read few books related to bank exam which will give you an insight into the mode of exam. But reading books will not give you much confidence as books keeps an imperfection in your path to success. Here comes the importance of being acquainted with online practice tests which would bring confidence to your burning desire to crack the upcoming IBPS bank exam. IndiaStudyChannel, leading educational portal in India has put a step further by providing free online test which is exclusively prepared according to the IBPS bank exam syllabus.

The unique feature of this online test is that, you can take as many tests at your own convenience. So make use of this online test and succeed in the upcoming IBPS bank exam. We are sure that this online test will bring more confidence in you and will add one more feather to your cap of success. Why wasting time? 



Take the IBPS Bank Exam Online Practice Tests IBPS Bank Exam Online Practice Tests. 

Aug 11, 2011

IBPS CWE sample questions


Aptitude
1. Seema, Meena and Reema begin to jog around a circular stadium and they complete their revolutions in 54 seconds, 42 seconds and 63 seconds respectively. After
approximately how many minutes will they come together at the starting point?
1) 8 minutes
2) 10 minutes
3) 3 minutes
4) 6 minutes
5) 12 minutes

Answer: (4)

2. 10 x 40% of? = 78
1) 650
2) 720
3) 680
5) None of these

Answer: (1)

3. Deepa rides her bike at an average speed of30 km/hr and reaches her destination in 6 hours. Hema covers the same distance in 4 hours. If Deepa increases her average speed by 10 km/hr and Hema increases her average speed by 5 km/hr, what would be the difference in their time taken to reach the destination?
1) 54 minutes
2) 1 hour
3) 40 minutes
4) 45 minutes
5) None of these

Answer: (1)

4. In how many different ways can the letters of the word 'ARMOUR' be arranged?
1) 720
2) 300
3) 640
4) 350
5) None of these

Answer: (5) 
5. Out of the total number of students in a college 12% are interested in sports.3/4 of the total number of students are interested in dancing. 10% of the total number of students are interested in singing and the remaining 15 students are not interested in any of the activities. What is the total number of students in the college?
1) 450
2) 500
3) 600
4) Cannot be determined
5) None of these
Answer: (2)


Reasoning
1. In a certain code language 'how many books' is written as 'sa da na' and 'many more days' is written as 'ka pa da'. How is 'books' written in that code language?
1) sa
2) na
3) sa or na
4) Data inadequate
5) None of these

Ans. (3)

2. In a certain code MAJORITY is written as 'PKBNXSHQ'. How is SANCTION written in that code?
1) TBODMNHS
2) DOBTMNHS
3) TBODSHNM
4) DOBTOPJU
5) None of these

Ans.  (2)

3. The position of the first and the sixth digits in the number 5120397468 are interchanged, similarly the positions of the second and the seventh digits are interchanged and so on. Which of the following will be the fourth digit from the right end after the rearrangement?
1) 1
2) 5
3) 7
4) 9
5) None of these

Ans. (1)     

4. How many such pairs of letters are there in the word OROANISED each of which has as many letters  between them in the word as in the English alphabet?
1) None
2) One
3) Two
4) Three
5) More than three

Ans. (3)

5. How many meaningful English words can be made with the letters ITRM using each letter only once in each word?
1) None
2) One
3) Two
4) Three
5) More than three
Ans. (2)


Computer knowledge
1. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these

Ans: (3)

2. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these

Ans: (4)

3. All of the following are basic principles of net works, except —
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these

Ans: (2)

4. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these

Ans: (3)

5. …………….are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these

Ans: (1)

Aug 1, 2011

CWE -IBPS

IBPS (Institute of Banking and Personnel Selection announced for Common Written Examination (CWE) for Common Bank Probationary Officer (PO) & Management Trainee recruitment

At present 19 banks decided to use CWE 2011 as a Single Common Examination to recruit personnel for the abovesaid cadres..

CWE consists questions from

Reasoning

English Language

Quantitative Aptitude

General Awareness (with Special Reference to Banking Industry) and

Computer Knowledge


It also have a Descriptive Paper on English Composition (Essay, Précis, Letter Writing etc)


General Knowledge Model Paper and Practice Exam

English Language Model Paper and Practice Exam

Quantitative Aptitude Model Paper and Practice Exam