IBPS RRB Mains Computer Quiz: 9th October

Computer Knowledge section can help you to improve your overall score if in case other sections are tougher than the expectation. We are providing you with a question set based on the types and patterns of questions asked in the Computer Knowledge section in previous years. We already rolled the study plan for IBPS RRB MAINS 2019Computer Quiz of 9th October 2019 covers Topic Miscellaneous.


Q1.Which of the following include the file name and possibly a directory of folders?
(a) File directory
(b) Information packet
(c) File specification
(d) File extension
(e) None of these

S1. Ans.(a)
Sol. A directory is a file system cataloging structure which contains references to other computer files, and possibly other directories.

Q2.Which of the following communication channel, signals can be transmitted between a source and a destination in both direction at same time?
(a) Simplex
(b) Half duplex
(c) Full duplex
(d) Quarter duplex
(e) None of these

S2. Ans.(c)
Sol. A full duplex communication channel is able to transmit data in both directions on a signal carrier at the same time. It is constructed as a pair of simplex links that allows bidirectional simultaneous transmission. Take telephone as an example, people at both ends of a call can speak and be heard by each other at the same time because there are two communication paths between them. Thus, using the full duplex mode can greatly increase the efficiency of communication.

Q3.Which of the following referred as the overall design, construction, organization, and interconnection of the various components of a computer system?
(a) Computer system
(b) Computer architecture
(c) Computer programming
(d) Computer algorithm
(e) Computer flow chart

S3. Ans.(b)
Sol. Computer architecture is a specification detailing how a set of software and hardware technology standards interact to form a computer system or platform. In short, computer architecture refers to how a computer system is designed and what technologies it is compatible with.

Q4.Which of the following is NOT an octal number?
(a) 125
(b) 259
(c) 456
(d) 025
(e) 763

S4. Ans.(b)
Sol. the octal number system uses only eight digits (0 through 7) there are no numbers or letters used above 8.

Q5.If internet services are provided by transmitting data over the wires of telephone network, which of the following is used?
(a) Anodes
(b) Digital Subscriber Line
(c) Digital Anodes
(d) Wireless Diodes
(e) Wires

S5. Ans.(b)
Sol. DSL (Digital Subscriber Line) is a communications medium used to transfer digital signals over standard telephone lines. Along with cable Internet, DSL is one of the most popular ways ISPs provide broadband Internet access.

Q6.Where does encryption and decryption of data take place in OSI model?
(a) Transport layer
(b) Presentation layer
(c) Session layer
(d) Application layer
(e) physical layer

S6. Ans.(b)
Sol. Presentation layer is the second last layer in the OSI model responsible for services like data compression, encryption, decryption, data conversion etc.

Q7.What key links records from one database table to a record or records in another database table?
(a) Primary key
(b) Principal key
(c) Foreign key
(d) Link key
(e) Candidate key

S7. Ans.(c)
Sol. A FOREIGN KEY is a key used to link two tables together. A FOREIGN KEY is a field (or collection of fields) in one table that refers to the PRIMARY KEY in another table. The table containing the foreign key is called the child table, and the table containing the candidate key is called the referenced or parent table.

Q8.What is the process of creating movement from still images?
(a) Transition
(b) Twining
(c) Bit-mapped graphic
(d) Animation
(e) None of these

S8. Ans.(d)
Sol. Animation is a way of making a movie from many still images. The images are put together one after another, and then played at a fast speed to give the illusion of movement.

Q9.Which of the following was used to program the first computer?
(a) High Level language
(b) Machine language
(c) Source code
(d) Object code
(e) ASCII code

S9. Ans.(b)
Sol. Earliest computers used Machine language.

Q10. __________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing
(b) Computer viruses
(c) Spyware scams
(d) Viruses
(e) None of the above

S10. Ans.(a)
Sol. phishing is a type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information (i.e., username, password, account number, etc.).

Check out Computer Knowledge Videos Here

You may also like to Read: