Computer Network Questions for IBPS RRB PO and Clerk Mains 2019

1.

Which of the following is a correct order of precedence in a formula calculation?

   A.) Multiplication and division, subtraction, exponential positive and negative value
   B.) Multiplication and division, positive and negative values, addition and subtraction
   C.) Addition and subtraction, positive and negative values, exponentiation
   D.) None of above

Answer: Option 'D'

None of the given precedence order is correct. Formulas calculate values in a specific order. A formula in Excel always begins with an equal sign (=). The equal sign tells Excel that the succeeding characters constitute a formula. The correct order of precedence is: Reference operators, Negation(sign), Percentage, exponentiation, Multiplication and Division, Addition and subtraction, concatenation of strings and comparison

2.

In which of the following scenarios does Network congestion occur?

   A.) in case of a node termination
   B.) when a system terminates
   C.) when connection between two nodes terminates
   D.) in case of traffic overloading

Answer: Option 'D'

Network congestion occurs when a network node is carrying more data than it can handle. That is typically due to traffic overloading.

3.

Which of the following specialized programs is used in locating information on the Web?

   A.) Search engine
   B.) Information finder
   C.) Web browser
   D.) Search query

Answer: Option 'A'

The search engine searches the Internet for the information you want and displays it on your computer screen. Some popular search engines are Google, Yahoo, Bing, Ask, AOL, Look Smart, and Netscape Search.

4.

Encryption and Decryption are the functions of __________ layer.

   A.) transport
   B.) session
   C.) presentation
   D.) physical

Answer: Option 'C'

Encryption and Decryption are the functions of the presentation layer.

5.

Which of the following components represent the parts of a Central Processing Unit(CPU)?

   A.) Input, output and processing
   B.) Control unit, primary storage and secondary storage
   C.) Control unit, arithmetic logic unit and primary storage
   D.) Control unit, processing and primary storage

Answer: Option 'C'

Control unit, arithmetic-logic unit and primary storage are the parts of the CPU. The storage unit deals with the allocation of memory to the processed data, the Control Unit (CU) controls the flow and processing of the data and the Arithmetic Logic Unit (ALU) carries out the arithmetic operations of calculations of the computer system. 

6.

Which among the following command is an example of a Data Manipulation Command in SQL?

   A.) UPDATE
   B.) SELECT
   C.) CREATE
   D.) Both(a) and (b)

Answer: Option 'D'

Both SELECT and UPDATE are DML commands of SQL. DML is abbreviation of Data Manipulation Language. It is used to retrieve, store, modify, delete, insert and update data in database.

7.

Which term is not related with font?

   A.) Font face
   B.) Font size
   C.) Font color
   D.) Font grammar

Answer: Option 'D'

Font grammar is not related with font. There is no such thing as font grammar.

8.

VIRUS stands for_________

   A.) Vital Information Resources Under Siege
   B.) Viral Important Record User Searched
   C.) Very Interchanged Result Until Source
   D.) Very Intelligent Resources Under Search

Answer: Option 'A'

VIRUS stands for Vital Information Resources Under Siege

9.

Choose the odd one out:

   A.) Brute force attack
   B.) Virtual Reality
   C.) Unethical Phreaker
   D.) Keystroke logging

Answer: Option 'B'

Except Virtual Reality all other are obvious security threats to computers and data.

10.

By an intranet we mean:

   A.) a LAN of an organization
   B.) a Wide Area Network connecting all branches of an organization
   C.) a corporate computer network
   D.) a network connecting all computers of an organization and using the internet protocol

Answer: Option 'D'

An intranet is a private network accessible only to an organization's staff.

11.

Each excel file is called a workbook because:

   A.) It can contain text and data
   B.) It can be modified
   C.) It can contain many sheets including worksheets and chart sheets
   D.) You have to work hard to create it

Answer: Option 'C'

A workbook is a collection of worksheets.

12.

What is Direct X?   

   A.) Operating system
   B.) Software that drives graphics hardware to enable game and multimedia to your system
   C.) Web browser
   D.) Word processing software

Answer: Option 'B'

Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms.

13.

In order to move from one worksheet to another in MS-Excel workbook. One should click ___________.

   A.) active cell
   B.) scroll bar
   C.) sheet tab
   D.) tab button

Answer: Option 'C'

Sheet Tab is used to switch between worksheets.

14.

A function inside another function is called a _______ function.

   A.) Nested
   B.) Round
   C.) Sum
   D.) Grouped

Answer: Option 'A'

A function inside another function is called a nested function.

15.

Which is of the following terms is used for unsolicited e-mail?

   A.) News Group
   B.) Usenet
   C.) Backbone
   D.) Spam

Answer: Option 'D'

Spam is unsolicited e-mail that is mostly sent by an electronic messaging system used by various commercial organizations to send bulk messages to a large number of addresses.

16.

Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player 
   B.) Backup software
   C.) Utility programs
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

17.

State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.

   A.) True, False, True
   B.) False, True, True
   C.) True, True, False
   D.) False, False, False

Answer: Option 'C'

Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.

18.

Which of the following statements is incorrect about a message-switched network?

   A.) It reduces traffic congestion.
   B.) It allows prioritizing of messages.
   C.) It allows broadcasting of messages.
   D.) It is an inexpensive network.

Answer: Option 'D'

In a message-switched network, a packet containing the entire message is transmitted over the network. It is a more expensive network.

19.

A virus that migrates freely within a large population of unauthorized email user is called a __________.

   A.) worm
   B.) plagiarism
   C.) macro
   D.) flame war

Answer: Option 'C'

A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)

 

20.

Which among the following topology requires multipoint connection?

   A.) Star
   B.) Mesh
   C.) Ring
   D.) Bus

Answer: Option 'D'

The point-to-point and Multipoint are two types of line configuration. Both describe a method to connect two or more communication devices in a link. Multipoint connection is used in BUS Topology. All the devices are connected to a single transmission medium, which acts as the Backbone of the connection.


Computer Network Questions for IBPS RRB Download Pdf

Recent Posts