Computer Questions for IBPS RRB Mains 2017

Dear Readers,

Computer Questions for IBPS RRB Mains 2017

Computer efficiency is now important in almost every stream and computer awareness is an important section in bank recruitment Examination. Practice with these 15 questions of Computer Knowledge for IBPS RRB Mains Exam 2017.


Q1. Which of the following are type of Twisted Pair Cable?
(a) Coaxial Cable
(b) Shielded Twisted Pair (STP)
(c) Unshielded Twisted Pair (UTP)
(d) Only (b) and (c)
(e) All of the above

S1. Ans.(d)
Sol. STP and UTP are type of Twisted Pair Cable which are mostly used in all Networks.

Q2. Star Topology is based on a central device that can be a:
(a) HUB
(b) Switch
(c) Modem
(d) Both (a) and (b)
(e) Repeater

S2. Ans.(d)
Sol. Hub and Switch can be used as central device in star topology.

Q3. Routing is done on which layer?
(a) Datalink Layer
(b) Network Layer
(c) Session
(d) Presentation
(e) Application

S3. Ans.(b)
Sol. Routing is done on Network Layer.

Q4. Which among the following device performs modulation and demodulation?
(a) Modem
(b) Fiber optic
(c) Satellite
(d) Coaxial Cable
(e) Repeater

S4. Ans.(a)
Sol. A modem (modulator-demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information.

Q5. What is an ad hoc query?
(a) Pre-planned question
(b) Pre-scheduled question
(c) Spur-of-the-moment question
(d) Question that will not return any results
(e) None of these

S5. Ans (c)
Sol.  An Ad-Hoc Query is a query that cannot be determined prior to the moment the query is issued. It is created in order to get information when need arises and it consists of dynamically constructed SQL which is usually constructed by desktop-resident query tools.

Q6. Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
(a) BIOS
(b) VAIO
(c) I/O
(d) AVG
(e) VMware

S6. Ans. (a)
Sol. BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.

Q7. A _________ is used to direct and dispatch data packets between different networks.
(a) Connection
(b) Bridge
(c) Gateway
(d) Hub
(e) Router

S7. Ans (e)
Sol.  A router is used to route data packets between different networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet (IP packet for example), readdress the packet to the proper Ethernet address, and transmit it on that network.

Q8. Dr. E.F. Codd represented ______ rules that a database must obey if it has to be considered truly relational.
(a) 10
(b) 8
(c) 12
(d) 6
(e) 5

S8. Ans (c)
Sol.  Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.

 Q9. Which of the following is true about Page Preview Mode?
(a) You can see all pages of your document
(b) You can only see the page you are currently working
(c) You can only see pages that do not contain graphics
(d) You can only see the title page of your document
(e) None of the above

S9. Ans. (a)
Sol. In page preview mode you can preview all the pages of the document.

Q10. What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication?
(a) Phishing
(b) Keylogging
(c) Identity theft
(d) Authentication
(e) Spamming

S10. Ans.(a)
Sol. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Q11. OSI model has how many layers?
(a) Two layers
(b) Five Layers
(c) Seven Layers
(d) Six Layers
(e) Eight Layers

S11. Ans.(c)
Sol. OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.

Q12. Network __________ is the arrangement of the various elements (links, nodes, etc.) of a computer network.
(a) memory
(b) topology
(c) mainframe
(d) protocol
(e) devices

S12. Ans.(b)
Sol. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.

Q13. Which of the following terms is associated with Internet?
(a) Plotter
(b) Slide presentation
(c) Bookmark
(d) Pie Chart
(e) Microsoft Excel

S13. Ans.(c)
Sol. A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.

Q14. Which of the following is contained at the end of the file name and helps to determine the type of file?
(a) File property
(b) The nomenclature
(c) The name
(d) File subname
(e) File extension

S14. Ans.(e)
Sol. A filename extension is an identifier specified as a suffix to the name of a computer file.

Q15. How can you access the font size tool on font dialog box in MS Word?
(a) Ctrl + S
(b) Ctrl + Shift + S
(c) Ctrl + P
(d) Ctrl + Shift + P
(e) Alt + P

S15. Ans.(d)
Sol. Ctrl + Shift + P is the shortcut key to access the font size tool on font dialog box.