Computer Quizzes For IBPS RRB PO/Clerk Mains 2022- 28th October

1.

In MS Excel, ______________ shortcut key is used to create chart?

   A.) F9
   B.) F10
   C.) F11
   D.) F12

Answer: Option 'C'

F11

In MS Excel, F11 key is used to create chart.

2.

Which of the following is personal digital assistant of MS Window 10?

   A.) Alexa
   B.) Siri
   C.) Cortana
   D.) Bixby

Answer: Option 'C'

Cortana

Cortana is personal digital assistant of MS Window 10.

3.

Which of the following format used in digital video?

   A.) Packets
   B.) Frames
   C.) Media clips
   D.) Units

Answer: Option 'B'

Frames

Digital video consists of a series of image frames that are synchronized with an audio track.

4.

What is the default the cell content alignment in Excel?

   A.) left aligned
   B.) centrally aligned
   C.) text left aligned and numbers right aligned
   D.) text right aligned and numbers left aligned

Answer: Option 'C'

text left aligned and numbers right aligned

5.

Which of the following layer handles the LAN switching in OSI model?

   A.) Data link Layer
   B.) Session Layer
   C.) Transport Layer
   D.) Presentation Layer

Answer: Option 'A'

Data link Layer

6.

Which of the following statemen is correct regarding MS Excel?

I. Ctrl + I is used for italic highlighted selection
II. Ctrl +B is used for bold highlighted selection
III. Ctrl + Page up is used for move between excel worksheet in the same excel document

   A.) Only I
   B.) Only II
   C.) Both I & II
   D.) All I, II & III

Answer: Option 'D'

All I, II & III are correct.

7.

——– are attempts by individuals to obtain confidential information from you to falsifying their identity.

   A.) Phishing scams
   B.) Phishing trips
   C.) Spyware scams
   D.) Computer viruses

Answer: Option 'A'

Phishing scams

8.

Which of the following is not an input device?

   A.) Mouse
   B.) Printer
   C.) Joystick
   D.) Keyboard

Answer: Option 'D'

Keyboard

All the option given are input devices.

9.

Network components are connected to the same cable in the ……… topology

   A.) Star
   B.) Ring
   C.) Bus
   D.) Mesh

Answer: Option 'C'

Bus

10.

Which of the following is not the type of antivirus?

   A.) AVG
   B.) McAfee
   C.) Norton
   D.) Avamar

Answer: Option 'D'

Avamar

Except (d), all are type of anti-virus.

11.

Bitdefender is an example of ________.

   A.) Virus
   B.) Antivirus
   C.) Messaging app
   D.) Worm

Answer: Option 'B'

Antivirus

12.

Translates low level assembly language mnemonic into machine code

   A.) Assembler
   B.) Compiler
   C.) Interpreter
   D.) Both (a) and (b)

Answer: Option 'B'

Compiler

13.

What is the use of bridge in network?

   A.) To connect LANs
   B.) To separate LANs
   C.) To control network speed
   D.) All of the above

Answer: Option 'A'

To connect LANs

14.

A device that connects networks with different protocols

   A.) Switch
   B.) Gateway
   C.) Server
   D.) Hub

Answer: Option 'B'

Gateway

15.

Which virus deletes all the files that it infects?

   A.) Non-resident virus
   B.) Overwrite Virus
   C.) Multipartite Virus
   D.) Polymorphic Virus

Answer: Option 'B'

Overwrite Virus

An overwriting virus (over writing infector) is a malicious program which, after infection, will effectively destroy the original program code, typically by overwriting data in the system’s memory (overwrites the host program).

16.

Which of the following isn’t a characteristic of High level languages?

   A.) machine code
   B.) interactive execution
   C.) user-friendly
   D.) platform independent

Answer: Option 'A'

machine code

High Level Language isn’t in machine language. It is converted to machine language for further processing.

17.

Which of the following is most oriented to scientific programming?

   A.) FORTRAN
   B.) BASIC
   C.) RPG
   D.) COBOL

Answer: Option 'A'

FORTRAN

Fortran is a

18.

Which of the following are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser?

   A.) Shareware
   B.) Ransomware
   C.) Bloatware
   D.) Adware

Answer: Option 'D'

Adware

Adwares are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser. Sometimes, hackers embed malware along with it to compromise systems. So, security professionals treat it as modern-day PUP (potentially unwanted programs).

19.

Which of the following is known as malicious software?

   A.) Maliciousware
   B.) Illegalware
   C.) Badware
   D.) Malware

Answer: Option 'D'

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware.

20.

Which of the following protocol deals with emails?

   A.) FTP
   B.) SMTP
   C.) TCP
   D.) UDP

Answer: Option 'B'

SMTP

Simple Mail Transfer Protocol


Computer Quizzes For IBPS RRB PO/Clerk Mains 2022- 28th October Download Pdf

Recent Posts