Computer Questions for IBPS RRB Mains 2017

Dear Readers,

Computer Questions for IBPS RRB Mains 2017

Computer efficiency is now important in almost every stream and computer awareness is an important section in bank recruitment Examination. Practice with these 15 questions of Computer Knowledge for IBPS RRB Mains Exam 2017.

Q1. What does the SMTP in an SMTP server stand for?
(a) Simple Mail Transfer Protocol 
(b) Serve Message Text Process 
(c) Short Messaging Text Process 
(d) Short Messaging Transfer Protocol
(e) Simple Messaging Text Process

S1. Ans. (a)
Sol. SMTP stands for Simple Mail Transfer Protocol

Q2. Which among the following was the first graphical web browser?
(a) Mosaic 
(b) WAIS
(c) CERN
(d) Gopher
(e) None of the above

S2. Ans. (a)
Sol. NCSA Mosaic, or simply Mosaic, is a discontinued early web browser. It has been credited with popularizing the World Wide Web. It was the first graphical web browser.

Q3. Inheritance is the ability of an object to pass on its characteristics to its :
(a) subclasses 
(b) off-spring
(c) super classes
(d) parents
(e) none of the above

S3. Ans. (a)
Sol. A superclass passes its characteristics to it's subclass in concept of inheritance in programming languages. 

Q4. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) DRAM
(b) RAM
(c) CMOS
(d) CPU
(e) None of these 

S4. Ans.(c)
Sol. The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, additionally, the system clock resets when the CMOS loses power.

Q5. Which type of system can learn and adjust to new circumstances by themselves?
(a) Database management system
(b) Expert systems
(c) Geographical systems
(d) Neural networks 
(e) File based systems

S5. Ans (d)
Sol. Neural Network is a computer system modelled on the human brain and nervous system.

Q6. What is the maximum size of text field in Access?
(a) 6400 characters 
(b) 6880 characters 
(c) 6499 characters 
(d) 255 characters 
(e) None of these 

S6. Ans.(d)
Sol. The maximum size of text filed in Access is 255 characters.

Q7. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting

S7. Ans.(c)
Sol. Software piracy is the illegal copying, distribution, or use of software.

Q8. Type _______to start a numbered list, and then press SPACEBAR or the TAB key.
(a) 1# 
(b) 1$
(c) 1. 
(d) 1*
(e) None of these 

S8. Ans.(c)
Sol. 1. -> Spacebar -> enter, will start numbered list.

Q9. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall

S9. Ans.(c)
Sol. Common uses of web beacon are email tracking and page tagging for web analytics. Its alternative names are web bug, tracking bug, tag, or page tag. 

Q10. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics                                        
(b) Caves
(c) Biometrics                     
(d) RFID
(e) All of above

S10. Ans. (c)
Sol. Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance. 

Q11. What is Disk operating system referred for?
(a) Memory management system
(b) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
(c) DOS
(d) Both (b) and (c) 
(e) None of these

S11. Ans. (d)
Sol. Both (b) and (c) are true about Disk Operating System. A disk operating system (abbreviated DOS) is a computer operating system that can use a disk storage device, such as a floppy disk, hard disk drive, or optical disc. A disk operating system must provide a file system for organizing, reading, and writing files on the storage disk.

Q12. What is included in an e-mail address?
(a) Domain name followed by user’s name
(b) User’s name followed by domain name
(c) User’s name followed by postal address
(d) User’s name followed by street address
(e) None of these

S12. Ans. (b)
Sol. An email address consists of two parts, a local-part or user name and a domain-part separated by an “@” – in, steve is the local-part or user name and is the domain-part.

Q13. Which of the following communications modes support two-way traffic but in only one direction of a time?
(a) simplex
(b) half-duplex
(c) three-quarters duplex
(d) All of the above
(e) None of these

S13. Ans. (b)
Sol. Half Duplex support two-way traffic but in only one direction of a time. For example, a walkie-talkie is a half-duplex device because only one party can talk at a time. In contrast, a telephone is a full-duplex device because both parties can talk simultaneously. 

Q14. Where are the files deleted from the hard disk sent to?
(a) recycle bin 
(b) floppy disk
(c) clipboard 
(d) clipart
(e) dekstop

S14. Ans. (a)
Sol. Files deleted from the hard disk sent to the recycle bin.

Q15. Which number system is used by computers to store data and perform calculations?
(a) binary 
(b) octal
(c) decimal 
(d) hexadecimal
(e) None of these

S15. Ans. (a)
Sol. Computers generally use binary number system.