Computer Network Questions for IBPS RRB PO and Clerk Mains 2019

41.

E-R modeling technique uses which approach?

   A.) top-down approach
   B.) bottom-up approach
   C.) left-right approach
   D.) Both top-down and bottom-up

Answer: Option 'A'

E-R model uses top-down approach; Bottom-up approach is known as normalization.

42.

Each excel file is called a workbook because:

   A.) It can contain text and data
   B.) It can be modified
   C.) It can contain many sheets including worksheets and chart sheets
   D.) You have to work hard to create it

Answer: Option 'C'

A workbook is a collection of worksheets.

43.

What does DDoS stand for?

   A.) Data Denial-of-Service
   B.) Distributed Denial-of-Service
   C.) Distributed Data of Server
   D.) Distribution of Data Service

Answer: Option 'B'

Distributed Denial-of-Service (DDoS) attack is a type of attack that is carried out by using multiple computers. These DDoS attacks aim at targeting computer networks of an organisation, such as Digital Subscriber Line (DSL) and cable.

44.

Which of the following is a term related with scanner?  

   A.) Laser
   B.) TWAIN
   C.) Cartridge
   D.) Both (a) and (b)

Answer: Option 'D'

Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

45.

Which among the following is true regarding charts in Excel 2016?

   A.) It has Line graphs and pie charts only
   B.) It only provides line graphs
   C.) It has many charts including Bar charts, line graphs and pie charts
   D.) It has Bar charts and line graphs only

Answer: Option 'C'

Excel 2016 has many charts including Bar charts, line graphs.

46.

Which of the following statements is incorrect about a message-switched network?

   A.) It reduces traffic congestion.
   B.) It allows prioritizing of messages.
   C.) It allows broadcasting of messages.
   D.) It is an inexpensive network.

Answer: Option 'D'

In a message-switched network, a packet containing the entire message is transmitted over the network. It is a more expensive network.

47.

A nibble refers to: 

   A.) 4 bits
   B.) A value equal to a kilobyte
   C.) A value equal to a megabyte
   D.) The smallest unit of digital information

Answer: Option 'A'

Nibble= 4 Bits

48.

How are data organized in a spreadsheet?

   A.) Lines and spaces
   B.) Layers and planes
   C.) Rows and columns
   D.) Height and width

Answer: Option 'C'

Data in a spreadsheet is organised in Rows and Columns.

49.

Which of the following statements is false in the context of client/server network?

   A.) It is expensive to set up.
   B.) It requires a specialized server.
   C.) It is a slow network.
   D.) It is highly secure.

Answer: Option 'C'

The client/server network contains a centralised server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system. It is highly secure and processes good speed. However, it becomes congested when more clients simultaneously request for a service to the server.

50.

Which of the following component is a part of RAM?

   A.) Magnetic cores
   B.) Micro-Processors
   C.) Photoelectric cells
   D.) Floppy disks

Answer: Option 'A'

Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

51.

Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player 
   B.) Backup software
   C.) Utility programs
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

52.

What does the LOOKUP function do?

   A.) Looks up text that contain ‘UP’
   B.) Used to look in a single row or column and find a value from the same position in a second row or column
   C.) Finds irrelevant records
   D.) All of above

Answer: Option 'B'

LOOKUP function is used to look in a single row or column and find a value from the same position in a second row or column.

53.

A pathway inside a computer that carries data between hardware components is called _____________.

   A.) carrier signal
   B.) data bus
   C.) digital signal
   D.) analog signal

Answer: Option 'B'

A data bus connects internal components to the motherboard and acts as a carrier for the data.

54.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Suits
   C.) Spreadsheets
   D.) Presentation software

Answer: Option 'D'

Word processors are used to create text based documents.

55.

Which of the following is a correct order of precedence in a formula calculation?

   A.) Multiplication and division, subtraction, exponential positive and negative value
   B.) Multiplication and division, positive and negative values, addition and subtraction
   C.) Addition and subtraction, positive and negative values, exponentiation
   D.) None of above

Answer: Option 'D'

None of the given precedence order is correct. Formulas calculate values in a specific order. A formula in Excel always begins with an equal sign (=). The equal sign tells Excel that the succeeding characters constitute a formula. The correct order of precedence is: Reference operators, Negation(sign), Percentage, exponentiation, Multiplication and Division, Addition and subtraction, concatenation of strings and comparison

56.

Which of the following is related to simplex communication?

   A.) Single wire and two-sided communication
   B.) Television
   C.) Two-wire communication
   D.) Walkie-talkie

Answer: Option 'B'

Television is an example of simplex communication.

57.

______ is a set of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer. 

   A.) A computer program
   B.) A programming language
   C.) An assemble
   D.) Computer I/O Device

Answer: Option 'B'

A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behaviour of a machine or to express algorithms.

58.

A function inside another function is called a _______ function.

   A.) Nested
   B.) Round
   C.) Sum
   D.) Grouped

Answer: Option 'A'

A function inside another function is called a nested function.

59.

What is the number of function keys on a keyboard?

   A.) 15
   B.) 12
   C.) 14
   D.) 16

Answer: Option 'B'

There are 12 function keys from F1 to F12 on a keyboard.

60.

Which of the following statements is incorrect about the UNIQUE KEY constraint?

   A.) Unique key columns do not accept duplicate values.
   B.) One table can have only one unique key.
   C.) By default, unique key columns accept null values unless the NOT NULL constraint is specified.
   D.) The same combinations of columns should not make both unique and primary keys.

Answer: Option 'B'

Since one table can have at the most one primary key to avoid duplicates in other columns of the table, unique key can be defined. We can make one or more unique keys in a single table.


Computer Network Questions for IBPS RRB Download Pdf

Recent Posts