Computer Questions for RRB Mains 2016

Q1. Which of the following is a programming language for creating special programs like applets? 
(a) Java 
(b) cable
(c) domain name 
(d) Net

Q2. A ___________ search engine is a search tool that uses another search engine’s data to produce their own results from the Internet.
(a) Meta 
(b) Individual
(c) Directory 
(d) Subject directory
(e) None of these

Q3. Which of the following is file extension for Word documents?
(a) WRD 
(b) TXT
(c) DOC 
(d) FIL
(e) None of these
Q4. __________ ports connect special types of music instruments to sound cards.
(a) MIDI
(b) CPU
(c) USB 
(d) BUS
(e) OCR
Q5. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
(a) Floppy diskette
(b) Hard disk 
(c) Permanent disk
(d) Optical disk
(e) None of the above
Q6. What is the new default font used in MS Word document?
a) Times New Roman 
b) Arial
c) Algerian
d) Preeti
e) Calibri

Q7. When the computer is already ON, then the process to restart it is called ____.
(a) Cold booting 
(b) Warm booting 
(c) Shut down 
(d) Logging OFF
(e) None of these 
Q8. The operating system acts as a device management that keeps track of devices. Channels and control units is called as _______.
(a) I/O dispatch 
(b) I/O manger 
(c) I/O traffic controller 
(d) I/O receiver 
(e) I/O gainer 

Q9. The icons on the __________ are organized according to function and according to the most commonly used commands in MSWord.
(a) GUI
(b) Icon layout 
(c) toolbars
(d) Windows 
(e) None of these 

Q10. If you wish to extend the length of the network without having the signal degrade, you would use a _____. 
(a) Repeater 
(b) Router 
(c) Gateway 
(d) Switch 
(e) None of these 
Q11. What is a Firewall in Computer Network? 
(a) The physical boundary of Network 
(b) An operating System of Computer Network 
(c) A system designed to prevent unauthorized access  
(d) A web browsing Software 
(e) None of these 
Q12. The data to be encrypted at the sender site is called _____ and the data to be decrypted at the receiver end is called _____. 
(a) Secret key, public key  
(b) Public key, secret key 
(c) Plain text, cipher text 
(d) Cipher text, plain text 
(e) None of these

Q13. Functions of keys F1, F2 and F3 are _____________ respectively.
(a) activating menu bar, search and renaming selected icon
(b) search, reboot and activating menu bar
(c) activating help, renaming selected icon and search
(d) reboot, activating help and refresh
(e) activating help, reboot, renaming selected icon
Q14. Name the input device from the given options, that cannot be used to work in MS Office?
(a) Scanner 
(b) Mouse 
(c) Keyboard 
(d) Joy stick 
(e) All of the above 
Q15. Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running?
(a) Macro Viruses
(b) File infector virus
(c) Resident Viruses
(d) Boot virus
(e) Worms