Latest Banking jobs   »   Computer Questions for RBI ASSISTANT MAINS...

Computer Questions for RBI ASSISTANT MAINS 2016

Computer Questions for RBI ASSISTANT MAINS 2016 |_2.1

Q1. Constraints are applied on: 
(a) rows
(b) columns
(c) entire table
(d) entire database
(e) None of these

Q2. In the ER diagram, what does an ellipse represent?
(a) Entity set
(b) Relation between the entity set
(c) Attributes
(d) Link between the attributes and entity set
(e) None of these

Q3. In a database, a column in the table is also called _____.
(a) degree 
(b) tuple
(c) entity
(d) attribute
(e) relations

Q4. Which of the following statements is true for entity integrity?
(a) It states that a table must have a primary key.
(b) It ensures that only a valid range of values are allowed to be stored in a column.
(c) It ensures that all the values in the foreign key match the values in the primary key.
(d) All of the above
(e) None of these

Q5. Which of the following is not a type of SQL statement?
(a) Data manipulation language
(b) Data definition language
(c) Data standard language
(d) Data control language
(e) None of these

Q6. Which one of the following is the standardised language used for commercial applications?
(a) C
(b) COBOL
(c) FORTRAN
(d) C++
(e) Java

Q7. What converts high-level languages into machine language?
(a) Compiler
(b) Accumulator
(c) Operating System
(d) CPU
(e) Browser

Q8. What is the current version of IMAP?
(a) IMAP version 2
(b) IMAP version 3
(c) IMAP version 4
(d) IMAP version 5
(e) IMAP version 6
Q9. The program that is used by search engines to search the Internet for documents using their Web addresses is known as : 
(a) Bing
(b) MSN
(c) Spider
(d) Google
(e) None of these

Q10. Which of the following software posts unwanted advertisements on client’s computer?
(a) Virus
(b) Malware
(c) Worm
(d) Adware
(e) Logic bombs

Q11. __________ is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
(a) Trojan horse
(b) Adware
(c) Spyware
(d) Worm
(e) Viruses

Q12. Selling and buying products and services in electronic mode is called ________.
(a) e-commerce
(b) e-banking
(c) e-learning
(d) online Shopping
(e) e-education

Q13. __________ ensures secure transfer of data over an unsecured network, such as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking 
(d) Spoofing
(e) Cryptography

Q14. The SubSeven is an example of :
(a) antivirus
(b) Spyware
(c) Spam
(d) Adware
(e) Trojan horse

Q15. Which among the following is the most suitable type of network that phone lines would use?
(a) WAN
(b) LAN
(c) WWAN
(d) CAN
(e) SAN
Computer Questions for RBI ASSISTANT MAINS 2016 |_3.1


Computer Questions for RBI ASSISTANT MAINS 2016 |_4.1 Computer Questions for RBI ASSISTANT MAINS 2016 |_5.1
Share your RRB INTERVIEW Experience @ Contact@bankersadda.com

Leave a comment

Your email address will not be published. Required fields are marked *