Computer Quizzes For IBPS RRB PO/Clerk Mains 2022- 31st October

1.

__________ is also known as inkless printer.

   A.) Thermal printer
   B.) Inkjet printer
   C.) OCR
   D.) Dot Matrix printer

Answer: Option 'A'

Thermal printer

2.

_____________ appears at the bottom of the Excel windows.

   A.) Work sheet tab
   B.) Title bar
   C.) Formula bar
   D.) Name box

Answer: Option 'A'

Work sheet tab

Work sheet tab appears at the bottom of the Excel windows.

3.

The first computers were programmed using which of the following language?

   A.) Assembly language
   B.) Machine language
   C.) Object code
   D.) Source code

Answer: Option 'B'

Machine language

First computers were programmed using machine language.

4.

Computers manipulate data in many ways, and this manipulation is called ___________?

   A.) utilizing
   B.) upgrading
   C.) batching
   D.) processing

Answer: Option 'D'

Manipulation of data in computer is called processing.

5.

Which function key is used for auto spell check?

   A.) F4
   B.) F3
   C.) F7
   D.) F9

Answer: Option 'C'

F7

F7 key is used for auto spell check and writing style checker in Microsoft excel, Microsoft word and Microsoft outlook.

6.

Which of the following can access the server?

   A.) Web Browser
   B.) Web Server
   C.) Web Client
   D.) Internet

Answer: Option 'C'

Web Client

Any computer that has access to the web server is called Web client. And Web server is any computer that uses HTTP protocol.

7.

__________ is a point at which data enters or leave the computer.

   A.) Modem
   B.) Cable access
   C.) Terminal
   D.) Switch

Answer: Option 'C'

Terminal

Terminal is a point at which data enters or leave the computer.

8.

Which of the following shortcut key is used for select entire column and entire row receptively in MS-Excel?

   A.) Ctrl+ Space, Shift + Space
   B.) Ctrl+ Arrow key, Shift + Space
   C.) Ctrl+ Space, Shift + Tab
   D.) Ctrl+ Space, Shift + F5

Answer: Option 'A'

Ctrl+ Space, Shift + Space

In MS-Excel, Ctrl+ Space and Shift + Space shortcut key is used for select entire column and entire row receptively.

9.

Which of the following is an example of secondary memory?

   A.) EPROM
   B.) DRAM
   C.) SRAM
   D.) Compact Disk

Answer: Option 'D'

Compact Disk

Compact Disk is an example of secondary memory

10.

Ethernet uses

   A.) Bus topology
   B.) Ring topology
   C.) Mesh topology
   D.) All of these

Answer: Option 'A'

Bus topology

11.

Which of the following topologies is not of broadcast type?

   A.) Star
   B.) Bus
   C.) Ring
   D.) All of these

Answer: Option 'B'

Bus

12.

Which of the following is an anti-virus program?

   A.) Norton
   B.) K7
   C.) Quick heal
   D.) All of these

Answer: Option 'D'

All of these

13.

Special program which can detect and remove viruses from computer is called-

   A.) Virus
   B.) Groupware
   C.) Anti-Virus
   D.) Custom

Answer: Option 'C'

Anti-Virus

14.

An antivirus is a _________.

   A.) System Software
   B.) Application Software
   C.) A hardware
   D.) Both (A) and (C)

Answer: Option 'B'

Application Software

15.

A computer translator is best described as _________.

   A.) Application Software
   B.) System Software
   C.) Hardware
   D.) Window

Answer: Option 'B'

System Software
 

16.

What is that computer program called which translates one program instruction at a time into machine language?

   A.) Compiler
   B.) CPU
   C.) Interpreter
   D.) Simulator

Answer: Option 'C'

Interpreter Takes Single instruction as input and Compiler Takes Entire program as input.

17.

Which is the device that is used to boost the signal between two cable segments or wireless access points?

   A.) Booster
   B.) Repeater
   C.) Switch
   D.) Router

Answer: Option 'B'

Repeater

18.

Which of the following virus inserts malicious code into executable files — files used to perform certain functions or operations on a system.

   A.) Micro Virus
   B.) Boot Sector Virus
   C.) File Infector Virus
   D.) Polymorphic Virus

Answer: Option 'C'

File Infector Virus
A file infector virus is a type of virus that typically attaches to executable code, such as computer games and word processors. Once the virus has infected a file, it can spread to other programs, and even into other networks that utilize the infected files and programs.

19.

Which of the following is the type of software that has self-replicating software that causes damage to files and system?

   A.) Viruses
   B.) Trojan horses
   C.) Bots
   D.) Worms

Answer: Option 'D'

Worms

A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.

20.

Which of the following is not a high level programming language?

   A.) Assembly
   B.) C++
   C.) Python
   D.) Java

Answer: Option 'A'

Assembly


Computer Quizzes For IBPS RRB PO/Clerk Mains 2022- 31st October Download Pdf

Recent Posts