IBPS RRB Mains Computer Quiz: 8th September

| Updated On September 9th, 2019 at 01:29 pm

Dear Aspirants,
ibps-rrb-computer-quiz

IBPS RRB PO/Clerk Computer Quiz

Computer Knowledge section can help you to improve your overall score if in case other sections are tougher than the expectation. We are providing you with a question set based on the types and patterns of questions asked in the Computer Knowledge section in previous years.
We already rolled the study plan for IBPS RRB MAINS 2019Computer Quiz of 8th September 2019 covers Topic Practice set.


Q1.Which of the following is the highest unit of storage in computer field?
(a) Yottabyte
(b) Exabyte
(c) Terabyte
(d) Zettabyte
(e) Gigabyte

About Course:

"Did you Know? In this pack you will get All new content we launch in the next 1 months"
 

This is the most recommended and NRA-CET ready Pack!
 
Use Code 'DREAM' to avail at the best price today

This package Includes IBPS PO Study Material -  Subscribe Now

About Bank Mahapack
If you are preparing for more than 1 Banking & Insurance exams then this is the pack we recommend you buy.

It is most cost-effective and you get access to 100% digital content for Bank & Insurance exams on Adda247.

Banking & Insurance Exams Covered in this Pack

Additionally, you can crack any private bank job exam with content in this pack.

 

Bank & Insurance Mahapack Highlights 

  • Structured course content
  • Recorded classes available if you miss any live class
  • Previous Years’ Papers of all upcoming exams.
  • Full Length Mocks based on the latest pattern with detailed solutions (video solutions for certain topics)
  • Topic level knowledge tests
  • Strategy sessions, time management & Preparation tips from the experts

 

Validity: 1 Month

Bank Maha Pack
  1. Unlimited Live Classes & Recorded Video Courses
  2. Unlimited Tests and eBooks
  3. 1 Lakh+ Selections
Validity
  1. 15 Months
  2. 3 Months
  3. 9 Months
  4. 27 Months
  5. 1 Month
6799 453/month
BUY NOW
S1.Ans.(a)
Sol. Yottabyte > Zettabyte > Exabyte > Petabyte > Terabyte > Gigabyte > Megabyte > Kilobyte > byte > bit.

Q2.JPEG is an image format. What does it stand for?
(a) Justified Picture Enabled Graphics
(b) Justified Photographic Enabled Graphics
(c) Joint Picture Experts Graphics
(d) Joint Photographic Experts Group
(e) None of these

S2.Ans.(d)

Q3.Which of the following is the default page setup orientation for notes pages, outlines and handouts?
(a) Hyphenation
(b) Landscape
(c) Portrait
(d) Footer
(e) Header
S3.Ans.(b)
Sol. Page orientation is the way in which a rectangular page is oriented for normal viewing. By default, PowerPoint slide layouts appear in landscape orientation.

Q4._____ is a program which make easy to use a computer.  
(a) Operating system
(b) Application
(c) Utility
(d) Network
(e) None of these

S4.Ans.(a)
Sol. Operating System acts as an interface between the computer components and the user making it easy for the end user to operate the system.

Q5.Cache memory acts between ___________ .
(a) CPU and RAM
(b) RAM and ROM
(c) CPU and hard disk
(d) All of these
(e) None of these

S5.Ans.(a)
Sol. Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. This memory is typically integrated directly with the CPU chip or placed on a separate chip that has a separate bus interconnect with the CPU.

Q6.Write through technique is used in which memory for updating the data. 
(a) Virtual memory
(b) Main memory
(c) Auxiliary memory
(d) Cache memory
(e) None of the above

S6.Ans.(d)
Sol. Write through is a storage method in which data is written into the cache and the corresponding main memory location at the same time. The cached data allows for fast retrieval on demand, while the same data in main memory ensures that nothing will get lost if a crash, power failure, or other system disruption occurs.

Q7.Which among the following is a type of error that a compiler can check?
(a) Syntax Error
(b) Power Failure
(c) Network Failure
(d) All of the above
(e) None of the above

S7.Ans.(a)
Sol. Syntax Errors – These are invalid code which the compiler doesn’t understand. The compiler will detect them as it can’t compile them.

Q8.Which of the following number system has base-16?
(a) Unary number system
(b) Binary number system
(c) Octal number system
(d) Hexadecimal Number System
(e) None of the above
S8.Ans.(d)
Sol. Hexadecimal number system has base 16, Octal- Base 8, Binary- Base 2 and Decimal- Base 10.

Q9.Pascal is______.
(a) A high-level programming language
(b) Named after Blaise Pascal
(c) Named after mathematician that facilitates structured programming techniques
(d) All of the above
(e) None of the above

S9.Ans.(d)
Sol. Pascal is an imperative and procedural programming language, which
Nicklaus Wirth designed in 1968–69 and published in 1970, as a small, efficient language intended to encourage good programming practices using structured programming and data structuring.

Q10.What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication?
(a) Phishing
(b) Spoofing
(c) Identity theft
(d) Authentication
(e) Spamming

S10.Ans.(a)
Sol. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.