Latest Banking jobs   »   IBPS RRB Mains Computer Quiz: 8th...

IBPS RRB Mains Computer Quiz: 8th September

Dear Aspirants,
ibps-rrb-computer-quiz

IBPS RRB PO/Clerk Computer Quiz

Computer Knowledge section can help you to improve your overall score if in case other sections are tougher than the expectation. We are providing you with a question set based on the types and patterns of questions asked in the Computer Knowledge section in previous years.
We already rolled the study plan for IBPS RRB MAINS 2019Computer Quiz of 8th September 2019 covers Topic Practice set.


Q1.Which of the following is the highest unit of storage in computer field?
(a) Yottabyte
(b) Exabyte
(c) Terabyte
(d) Zettabyte
(e) Gigabyte

S1.Ans.(a)
Sol. Yottabyte > Zettabyte > Exabyte > Petabyte > Terabyte > Gigabyte > Megabyte > Kilobyte > byte > bit.

Q2.JPEG is an image format. What does it stand for?
(a) Justified Picture Enabled Graphics
(b) Justified Photographic Enabled Graphics
(c) Joint Picture Experts Graphics
(d) Joint Photographic Experts Group
(e) None of these

S2.Ans.(d)

Q3.Which of the following is the default page setup orientation for notes pages, outlines and handouts?
(a) Hyphenation
(b) Landscape
(c) Portrait
(d) Footer
(e) Header
S3.Ans.(b)
Sol. Page orientation is the way in which a rectangular page is oriented for normal viewing. By default, PowerPoint slide layouts appear in landscape orientation.

Q4._____ is a program which make easy to use a computer.  
(a) Operating system
(b) Application
(c) Utility
(d) Network
(e) None of these

S4.Ans.(a)
Sol. Operating System acts as an interface between the computer components and the user making it easy for the end user to operate the system.

Q5.Cache memory acts between ___________ .
(a) CPU and RAM
(b) RAM and ROM
(c) CPU and hard disk
(d) All of these
(e) None of these

S5.Ans.(a)
Sol. Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. This memory is typically integrated directly with the CPU chip or placed on a separate chip that has a separate bus interconnect with the CPU.

Q6.Write through technique is used in which memory for updating the data. 
(a) Virtual memory
(b) Main memory
(c) Auxiliary memory
(d) Cache memory
(e) None of the above

S6.Ans.(d)
Sol. Write through is a storage method in which data is written into the cache and the corresponding main memory location at the same time. The cached data allows for fast retrieval on demand, while the same data in main memory ensures that nothing will get lost if a crash, power failure, or other system disruption occurs.

Q7.Which among the following is a type of error that a compiler can check?
(a) Syntax Error
(b) Power Failure
(c) Network Failure
(d) All of the above
(e) None of the above

S7.Ans.(a)
Sol. Syntax Errors – These are invalid code which the compiler doesn’t understand. The compiler will detect them as it can’t compile them.

Q8.Which of the following number system has base-16?
(a) Unary number system
(b) Binary number system
(c) Octal number system
(d) Hexadecimal Number System
(e) None of the above
S8.Ans.(d)
Sol. Hexadecimal number system has base 16, Octal- Base 8, Binary- Base 2 and Decimal- Base 10.

Q9.Pascal is______.
(a) A high-level programming language
(b) Named after Blaise Pascal
(c) Named after mathematician that facilitates structured programming techniques
(d) All of the above
(e) None of the above

S9.Ans.(d)
Sol. Pascal is an imperative and procedural programming language, which
Nicklaus Wirth designed in 1968–69 and published in 1970, as a small, efficient language intended to encourage good programming practices using structured programming and data structuring.

Q10.What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication?
(a) Phishing
(b) Spoofing
(c) Identity theft
(d) Authentication
(e) Spamming

S10.Ans.(a)
Sol. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Leave a comment

Your email address will not be published. Required fields are marked *