Computer Quizzes For IBPS RRB PO/Clerk Mains 2022- 28th October

1.

In MS Excel, ______________ shortcut key is used to create chart?

   A.) F9
   B.) F10
   C.) F11
   D.) F12

Answer: Option 'C'

F11

In MS Excel, F11 key is used to create chart.

DigitalOcean Referral Badge

2.

Which of the following is personal digital assistant of MS Window 10?

   A.) Alexa
   B.) Siri
   C.) Cortana
   D.) Bixby

Answer: Option 'C'

Cortana

Cortana is personal digital assistant of MS Window 10.

DigitalOcean Referral Badge

3.

Which of the following format used in digital video?

   A.) Packets
   B.) Frames
   C.) Media clips
   D.) Units

Answer: Option 'B'

Frames

Digital video consists of a series of image frames that are synchronized with an audio track.

DigitalOcean Referral Badge

4.

What is the default the cell content alignment in Excel?

   A.) left aligned
   B.) centrally aligned
   C.) text left aligned and numbers right aligned
   D.) text right aligned and numbers left aligned

Answer: Option 'C'

text left aligned and numbers right aligned

DigitalOcean Referral Badge

5.

Which of the following layer handles the LAN switching in OSI model?

   A.) Data link Layer
   B.) Session Layer
   C.) Transport Layer
   D.) Presentation Layer

Answer: Option 'A'

Data link Layer

DigitalOcean Referral Badge

6.

Which of the following statemen is correct regarding MS Excel?

I. Ctrl + I is used for italic highlighted selection
II. Ctrl +B is used for bold highlighted selection
III. Ctrl + Page up is used for move between excel worksheet in the same excel document

   A.) Only I
   B.) Only II
   C.) Both I & II
   D.) All I, II & III

Answer: Option 'D'

All I, II & III are correct.

DigitalOcean Referral Badge

7.

——– are attempts by individuals to obtain confidential information from you to falsifying their identity.

   A.) Phishing scams
   B.) Phishing trips
   C.) Spyware scams
   D.) Computer viruses

Answer: Option 'A'

Phishing scams

DigitalOcean Referral Badge

8.

Which of the following is not an input device?

   A.) Mouse
   B.) Printer
   C.) Joystick
   D.) Keyboard

Answer: Option 'D'

Keyboard

All the option given are input devices.

DigitalOcean Referral Badge

9.

Network components are connected to the same cable in the ……… topology

   A.) Star
   B.) Ring
   C.) Bus
   D.) Mesh

Answer: Option 'C'

Bus

DigitalOcean Referral Badge

10.

Which of the following is not the type of antivirus?

   A.) AVG
   B.) McAfee
   C.) Norton
   D.) Avamar

Answer: Option 'D'

Avamar

Except (d), all are type of anti-virus.

DigitalOcean Referral Badge

11.

Bitdefender is an example of ________.

   A.) Virus
   B.) Antivirus
   C.) Messaging app
   D.) Worm

Answer: Option 'B'

Antivirus

DigitalOcean Referral Badge

12.

Translates low level assembly language mnemonic into machine code

   A.) Assembler
   B.) Compiler
   C.) Interpreter
   D.) Both (a) and (b)

Answer: Option 'B'

Compiler

DigitalOcean Referral Badge

13.

What is the use of bridge in network?

   A.) To connect LANs
   B.) To separate LANs
   C.) To control network speed
   D.) All of the above

Answer: Option 'A'

To connect LANs

DigitalOcean Referral Badge

14.

A device that connects networks with different protocols

   A.) Switch
   B.) Gateway
   C.) Server
   D.) Hub

Answer: Option 'B'

Gateway

DigitalOcean Referral Badge

15.

Which virus deletes all the files that it infects?

   A.) Non-resident virus
   B.) Overwrite Virus
   C.) Multipartite Virus
   D.) Polymorphic Virus

Answer: Option 'B'

Overwrite Virus

An overwriting virus (over writing infector) is a malicious program which, after infection, will effectively destroy the original program code, typically by overwriting data in the system’s memory (overwrites the host program).

DigitalOcean Referral Badge

16.

Which of the following isn’t a characteristic of High level languages?

   A.) machine code
   B.) interactive execution
   C.) user-friendly
   D.) platform independent

Answer: Option 'A'

machine code

High Level Language isn’t in machine language. It is converted to machine language for further processing.

DigitalOcean Referral Badge

17.

Which of the following is most oriented to scientific programming?

   A.) FORTRAN
   B.) BASIC
   C.) RPG
   D.) COBOL

Answer: Option 'A'

FORTRAN

Fortran is a

DigitalOcean Referral Badge

18.

Which of the following are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser?

   A.) Shareware
   B.) Ransomware
   C.) Bloatware
   D.) Adware

Answer: Option 'D'

Adware

Adwares are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser. Sometimes, hackers embed malware along with it to compromise systems. So, security professionals treat it as modern-day PUP (potentially unwanted programs).

DigitalOcean Referral Badge

19.

Which of the following is known as malicious software?

   A.) Maliciousware
   B.) Illegalware
   C.) Badware
   D.) Malware

Answer: Option 'D'

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware.

DigitalOcean Referral Badge

20.

Which of the following protocol deals with emails?

   A.) FTP
   B.) SMTP
   C.) TCP
   D.) UDP

Answer: Option 'B'

SMTP

Simple Mail Transfer Protocol

DigitalOcean Referral Badge

21.

When a real-time telephone call between people is made over the Internet using computers, it is called ___________.

   A.) a chat session
   B.) an E-mail
   C.) an instant message
   D.) Internet telephony

Answer: Option 'D'

Internet telephony

An Internet telephony service provider (ITSP) offers digital telecommunications services based on Voice over Internet Protocol (VoIP) that are provisioned via the Internet.

DigitalOcean Referral Badge

22.

MIDI stands for:

   A.) Memory Interface Digital Instrument
   B.) Musical Instrument Digital Interface
   C.) Musical Interface Digital Instrument
   D.) Multiple Interface Digital instrument

Answer: Option 'B'

Musical Instrument Digital Interface

MIDI (Musical Instrument Digital Interface) is a protocol designed for recording and playing back music on digital synthesizers that is supported by many makes of personal computer sound cards.

DigitalOcean Referral Badge

23.

Which type of system has their own programming and do not receive input?

   A.) Embedded computer
   B.) Super computer
   C.) Microcomputer
   D.) Both (b) and (c)

Answer: Option 'A'

Embedded computer

An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system

DigitalOcean Referral Badge

24.

The most widely used type of database management system is the:

   A.) Flat database
   B.) Network database
   C.) Relational database
   D.) Hierarchical database

Answer: Option 'C'

Relational database

A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as invented by E. F. Codd. Relational databases have often replaced legacy hierarchical databases and network databases because they are easier to understand and use.
 

DigitalOcean Referral Badge

25.

Which is the command used to remove text or graphics from a document and the information is then stored on a clipboard, so you can paste it later on?

   A.) Cut
   B.) Chop
   C.) Chew
   D.) Clip

Answer: Option 'A'

Cut

The Office Clipboard stores text and graphics that you copy or cut from anywhere, and it lets you paste the stored items into any other Office file.

DigitalOcean Referral Badge

26.

Which of the following technologies is used in answer sheets to check them electronically?

   A.) MICR
   B.) OMR
   C.) OCR
   D.) Bar code

Answer: Option 'B'

OMR

OMR stands for Optical Mark Recognition. This technology is used to read the marked data on documents. It is widely used in examinations to check the marked answers.

DigitalOcean Referral Badge

27.

Which of the following number systems is considered as a base-10 number system?

   A.) Decimal number system
   B.) Binary number system
   C.) Octal number system
   D.) Hexadecimal number system

Answer: Option 'A'

Decimal number system

Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.

DigitalOcean Referral Badge

28.

ISP stands for ____________.

   A.) Intranet Service Provider
   B.) Internet Service Provider
   C.) Inter Serve Provider
   D.) International Special Products

Answer: Option 'B'

Internet Service Provider

DigitalOcean Referral Badge

29.

The process of transferring files from a computer on the Internet to your computer is called ______________.

   A.) Uploading
   B.) Forwarding
   C.) FTP
   D.) Downloading

Answer: Option 'D'

Downloading

DigitalOcean Referral Badge

30.

In which of the following security threat, a fraudster installs malicious code on a personal computer or server?

   A.) Smishing
   B.) Phishing
   C.) Pharming
   D.) Vishing

Answer: Option 'C'

Pharming

DigitalOcean Referral Badge

31.

What is a data warehouse?

   A.) Contains numerous naming conventions and formats
   B.) Can be updated by end users
   C.) Contains only current data
   D.) Is organized around important subject areas

Answer: Option 'D'

Is organized around important subject areas

DigitalOcean Referral Badge

32.

What is data integrity?

   A.) It is the data contained in the database that is non- redundant.
   B.) It is the data contained in the database that is accurate and consistent.
   C.) It is the data contained in the database that is secured
   D.) It is the data contained in the database that is shared

Answer: Option 'B'

It is the data contained in the database that is accurate and consistent.

Data integrity is the overall completeness, accuracy and consistency of data. This can be indicated by the absence of alteration between two instances or between two updates of a data record, meaning data is intact and unchanged.

DigitalOcean Referral Badge

33.

A __________ is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.

   A.) Rows
   B.) Key
   C.) Fields
   D.) Attributes

Answer: Option 'B'

Key

Key is a property of the entire relation (relation is a table).

DigitalOcean Referral Badge

34.

Which of the following is the most important/powerful computer in a typical network?

   A.) Desktop
   B.) Network client
   C.) Network server
   D.) Network station

Answer: Option 'C'

Network server

A network server is a computer system, which is used as the central repository of data and various programs that are shared by users in a network.
 

DigitalOcean Referral Badge

35.

Which of the following is related to simplex communication?

   A.) Single wire and two-sided communication
   B.) Television
   C.) Two-wire communication
   D.) Walkie-talkie

Answer: Option 'B'

Television

Television is an example of simplex communication.

DigitalOcean Referral Badge

36.

What is UTP in network terminology?

   A.) Unshielded Twisted pair
   B.) Ubiquitous Teflon port
   C.) Uniformly Terminating port
   D.) Unshielded-T-connector port

Answer: Option 'A'

Unshielded Twisted pair

Short for unshielded twisted pair, a popular type of cable that consists of two unshielded wires twisted around each other. Due to its low cost, UTP cabling is used extensively for local-area networks (LANs) and telephone connections.

DigitalOcean Referral Badge

37.

Which of the following features is used to count the number of pages, words, characters, paragraphs and lines in a Word document?

   A.) Orientation
   B.) Page Count
   C.) Word Count
   D.) Margin

Answer: Option 'C'

Word Count

The Word Count command displays the total number of page, words and lines in a document.

DigitalOcean Referral Badge

38.

The cell range that starts in cell A1 and goes over to column J and down to row 15 is _____

   A.) A1-J15
   B.) A1.J15
   C.) A1;J15
   D.) A1:J15

Answer: Option 'D'

A1:J15

DigitalOcean Referral Badge

39.

Using output devices one can ____.

   A.) View or Print Data
   B.) Store Data
   C.) Replicate Data
   D.) Modify Data

Answer: Option 'A'

View or Print Data

Output Devices lets users to view or print data, for example: Monitor (screen display), Printer.

DigitalOcean Referral Badge

40.

Which of the following is a system software?

   A.) Database programs
   B.) Word processors
   C.) Spreadsheets
   D.) Compilers

Answer: Option 'D'

Compilers

DigitalOcean Referral Badge

41.

Fragmentation is –

   A.) Dividing the secondary memory into equal sized fragments
   B.) Fragments of memory words used in a page
   C.) Fragments of memory words unused in a page
   D.) Dividing the main memory into equal size fragments

Answer: Option 'A'

Dividing the secondary memory into equal sized fragments

DigitalOcean Referral Badge

42.

ROM is an example of which of the following?

   A.) Virtual memory
   B.) Nonvolatile memory
   C.) Volatile memory
   D.) Cache memory

Answer: Option 'B'

Nonvolatile memory

ROM is non-volatile memory, meaning that it stores data both while the power is on and when the power is switched off. Unless ROM gets erased, it never forgets data.

DigitalOcean Referral Badge

43.

What is the default the cell content alignment in Excel?

   A.) left aligned
   B.) centrally aligned
   C.) text left aligned and numbers right aligned
   D.) text right aligned and numbers left aligned

Answer: Option 'C'

text left aligned and numbers right aligned

Text left aligned and numbers right aligned is default alignment in

DigitalOcean Referral Badge

44.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker
   B.) analyst
   C.) instant messenger
   D.) programmer

Answer: Option 'A'

hacker

Hacker is someone who seeks and exploits weaknesses in a computer system.

DigitalOcean Referral Badge

45.

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:

   A.) Robotics
   B.) Simulation
   C.) Computer forensics
   D.) Animation

Answer: Option 'C'

Computer forensics

DigitalOcean Referral Badge

46.

Which among the following is not a valid key in a relational database model?

   A.) Primary Key
   B.) Candidate Key
   C.) Foreign Key
   D.) Track Key

Answer: Option 'D'

Track Key

All other are valid keys except for track key.
 

DigitalOcean Referral Badge

47.

Commands at the top of a screen such as File-Edit, Format and Tools to operate and change things are incorporated in __________________.

   A.) Menu bar
   B.) Tool bar
   C.) Word processor
   D.) User friendly

Answer: Option 'A'

Menu bar

DigitalOcean Referral Badge

48.

A _________ typically connects personal computers within a very limited geographical area, usually within a single building.

   A.) FAN
   B.) LAN
   C.) WAN
   D.) TAN

Answer: Option 'B'

LAN

A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings.

DigitalOcean Referral Badge

49.

Which of the following is any malicious computer program which is used to hack into a computer by misleading users of its true intent?

   A.) Worm
   B.) Spyware
   C.) Trojan horse
   D.) Keylogger

Answer: Option 'C'

Trojan horse

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.

DigitalOcean Referral Badge

50.

Which of the following software program that secretly collects information and monitors your actions without your knowledge?

   A.) Adware
   B.) Freeware
   C.) Spyware
   D.) Spooling

Answer: Option 'C'

Spyware

Spyware is the term given to a category of software which aims to steal personal or organizational information. It is done by performing a set of operations without appropriate user permissions, sometimes even covertly.

DigitalOcean Referral Badge

Computer Quizzes For IBPS RRB PO/Clerk Mains 2022- 28th October Download Pdf

Recent Posts