Computer Quizzes For IBPS RRB PO Clerk Mains 2022 - 18th October

1.

Which of the following key combination can be used to open task manager?

   A.) Ctrl + Shift + Tab
   B.) Ctrl + Shift + ESC
   C.) Ctrl + Shift + T
   D.) Ctrl + Shift + O

Answer: Option 'B'

Ctrl + Shift + ESC

Ctrl + Shift + ESC can be used to open task manager

2.

Who among the following is known as the Father of The Internet?

   A.) Tim Berners-Lee
   B.) Vint Cerf
   C.) Douglas Englebart
   D.) Charles Babbage

Answer: Option 'B'

Vint Cerf

Tim Berners-Lee- Inventor of the World Wide Web. Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the continued development of the Web.
Raymond Tomilson-Sent the first e-mail (to himself)
Douglas Englebart- Father of computer mouse
Charles Babbage- Father of computers, inventor of analytical engine and difference engine
Vint Cerf- Father of the Internet. Cerf is the co-designer of the TCP/IP protocols and the architecture of the Internet.

3.

What key links records from one database table to a record or records in another database table?

   A.) Primary key
   B.) Foreign key
   C.) Principal key
   D.) Link key

Answer: Option 'B'

Foreign key

A FOREIGN KEY is a key used to link two tables together. A FOREIGN KEY is a field (or collection of fields) in one table that refers to the PRIMARY KEY in another table. The table containing the foreign key is called the child table, and the table containing the candidate key is called the referenced or parent table.

4.

__________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.

   A.) Phishing
   B.) Spyware scams
   C.) Viruses
   D.) Computer viruses

Answer: Option 'A'

Phishing

phishing is a type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information (i.e., username, password, account number, etc.).

5.

Which one of the following is not an e-mail service provider?

   A.) Hotmail
   B.) Gmail
   C.) Bing
   D.) Yahoo mail

Answer: Option 'C'

E-mail service providers allow you to create an e-mail account. Hotmail, Gmail and Yahoo Mail allow you to create a free e-mail account, but Bing doesn’t.

6.

Trackball is an example of a/an ______.

   A.) Programming device
   B.) Pointing device
   C.) Software device
   D.) Printing device

Answer: Option 'B'

Pointing device

Trackball is an example of a pointing device (mouse).

7.

Stored data in which of the following remains intact even after the computer is turned off?

   A.) RAM
   B.) Motherboard
   C.) Primary Storage Device
   D.) Secondary Storage Device

Answer: Option 'D'

Secondary Storage Device

stored data in secondary storage is not deleted when power turns off.

8.

A graphical input device that can generate digital signals that represent the movement of a pen is known as

   A.) Light pen
   B.) Data tablet
   C.) Touch Panel
   D.) Mouse

Answer: Option 'A'

Light pen

A light pen is a computer input device in the form of a light-sensitive wand used in conjunction with a computer’s CRT display. It allows the user to point to displayed objects or draw on the screen in a similar way to a touchscreen but with greater positional accuracy.

9.

How many columns are there in latest version of MS Excel?

   A.) 65536
   B.) 16,384
   C.) 1,050,000
   D.) 2,001,000

Answer: Option 'B'

16,384

16,384 columns are there in latest version of MS Excel

10.

What resides on the motherboard and connects the CPU to other components on the motherboard?

   A.) Input unit
   B.) System bus
   C.) ALU
   D.) Primary memory

Answer: Option 'B'

System bus

A system bus is a single computer bus that connects the major components of a computer system, combining the functions of a data bus to carry information, an address bus to determine where it should be sent, and a control bus to determine its operation.
 

11.

What is Remote Desktop Connection?

   A.) It was known as Terminal Services in Windows Server 2008 and earlier, it is one of the components of Microsoft Windows.
   B.) a technology that allows you to carry your computer in remote areas.
   C.) a technology that allows you to sit at the client computer and connect to the host remote computer in a different location
   D.) both (A) and (C)

Answer: Option 'D'

both (A) and (C)

Remote Desktop Services (RDS), known as Terminal Services in Windows Server 2008 and earlier, is one of the components of Microsoft Windows that allows a user to take control of a remote computer or virtual machine over a network connection.

12.

The principle that Internet service providers should enable access to all content and applications equally regardless of the source is known as?

   A.) Net Servicing
   B.) Net Equality
   C.) Net Neutrality
   D.) Fair Usage Policy

Answer: Option 'C'

Net Neutrality

Net neutrality is the principle that Internet service providers and governments regulating most of the Internet must treat all data on the Internet the same, and not discriminate or charge differentially by user, content, website, platform, application, type of attached equipment, or method of communication.

13.

Which of the following is an advantage of the database approach?

   A.) Elimination of data redundancy
   B.) Ability to associate related data
   C.) Increased security
   D.) All (A), (B) and (C)

Answer: Option 'D'

All (A), (B) and (C)

Elimination of data redundancy, Ability to associate related data and Increased security all are an advantage of the database approach.

14.

A device that not only provides surge protection, but also furnishes the computer with battery backup power during a power outage is ______

   A.) Battery strip
   B.) UPS
   C.) Surge strip
   D.) USB

Answer: Option 'B'

UPS
An uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.

15.

In Microsoft word, to identify which kind of errors uses green underline and red underlines respectively?

   A.) Possible spelling error and possible grammatical error
   B.)

Possible instance of inconsistent formatting and possible spelling error

   C.) Either (a) and (d)
   D.) Possible grammatical error and possible spelling error

Answer: Option 'D'

Possible grammatical error and possible spelling error

In Microsoft word, to identify possible grammatical error uses green underline and possible spelling error uses red underlines respectively.

16.

How many rows are there in latest version of MS Excel?

   A.) 65536
   B.) 16,384
   C.) 1,048,576
   D.) 1,050,000

Answer: Option 'C'

1,048,576

In latest version there are 1,048,576 rows by 16,384 columns.

17.

For which of the following function, “%” and “/” signs respectively used in MS Excel?

   A.) Addition and division
   B.) Division and Percent
   C.) Percent and Exponential
   D.) Percent and division

Answer: Option 'D'

Percent and division

In MS Excel “%” and “/” signs used for Percent and division respectively.

18.

Match the following:

Column- A                       Column- B

(j) .com                             (p) Organization
(k) .edu                            (q) Military
(l) .org                              (r) education
(m) .mil                            (s) commercial

   A.) j-p, k-s, l-r, m-q
   B.) j-s, k-r, l-p, m-q
   C.) j-p, k-s, l-q, m-r
   D.) j-q, k-s, l-r, m-p,

Answer: Option 'B'

j-s, k-r, l-p, m-q

Hence option (b) is correct

19.

Which of the following layer provides services such as file transfer, data base access and email, remote login to hosts?

   A.) Data link Layer
   B.) Application Layer
   C.) Presentation Layer
   D.) Physical Layer

Answer: Option 'B'

Application Layer

The application layer in the OSI model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers.

20.

OSI model has how many layers?

   A.) Two layers
   B.) Five Layers
   C.) Eight Layers
   D.) Seven Layers

Answer: Option 'D'

Seven Layers

OSI Model stands for Open System Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.


Computer Quizzes For IBPS RRB PO Clerk Mains 2022 - 18th October Download Pdf

Recent Posts