Computer Questions for IBPS RRB Mains 2017

Dear Readers,

Computer Questions for IBPS RRB Mains 2017

Computer efficiency is now important in almost every stream and computer awareness is an important section in bank recruitment Examination. Practice with these 15 questions of Computer Knowledge for IBPS RRB Mains Exam 2017.

Q1. Which organisation developed MS DOS?
(a) Apple
(b) Microsoft
(c) Google
(d) IBM
(e) Sun Microsystems

S1. Ans.(b)
Sol. MS DOS stands for Microsoft Disk Operating System it is a discontinued operating system for x86-based personal computers mostly developed by Microsoft.


Q2. Which among the following command is an example of a Data Manipulation Command in SQL?
(a) SELECT
(b) UPDATE
(c) CREATE
(d) Both(a) and (b)
(e) All of the above

S2. Ans.(d)
Sol. Both SELECT and UPDATE are DML commands of SQL. DML is abbreviation of Data Manipulation Language. It is used to retrieve, store, modify, delete, insert and update data in database.

Q3. Which among the following is/are pointing device?
(a) Mouse
(b) Light Pen
(c) Joy Stick
(d) Stylus
(e) All of the above

S3. Ans.(e)
Sol. All the given options are examples of pointing devices.

Q4. What is a hyperlink?
(a) It is a text or image that you can click on to jump to a new document/page.
(b) It is an input type for multimedia files.
(c) It is a collection or directory of web pages.
(d) It is the home page of a site.
(e) None of the above

S4. Ans.(a)
Sol. A hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, tapping, or hovering. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.

Q5. Which of the following is a software used for Remote Connection?
(a) TeamViewer
(b) Picasa
(c) Prisma
(d) Safari
(e) Intel Connect

S5. Ans (a)
Sol.  TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.

Q6. HTML tags are the hidden keywords within a web page that define how the browser must format and display the content. Which type of brackets makes an HTML tag?
(a) Flower brackets { }
(b) Angular brackets < >
(c) Parentheses ( )
(d) Square brackets [ ]
(e) Inverted Comma " "

S6 Ans (b)
Sol.  Most tags in HTML must have two parts, an opening and a closing part. For example, <html> is the opening tag and </html> is the closing tag.

Q7. Which action is performed to change written work already done?
(a) save
(b) edit
(c) file
(d) close
(e) clear

S7. Ans (b)
Sol.  Through edit we can make changes.

Q8. E-R modeling technique uses which approach?
(a) top-down approach
(b) bottom-up approach
(c) left-right approach
(d) Both top-down and bottom-up
(e) None of these

S8. Ans (a)
Sol.  E-R model uses top-down approach; Bottom-up approach is known as normalization.

Q9. Which of the following is a term related with scanner?  
(a) Laser
(b) TWAIN
(c) Cartridge
(d) Browser
(e) Both (a) and (b)

S9. Ans. (e)
Sol.  Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

Q10. A nibble refers to: 
(a) 4 bits
(b) A value equal to a kilobyte
(c) A value equal to a megabyte
(d) The smallest unit of digital information
(e) The same things as a pixel

S10. Ans. (a)
Sol. Nibble= 4 Bits

Q11. Which of the following component is a part of RAM? 
(a) Magnetic cores
(b) Micro-Processors
(c) Photoelectric cells
(d) Floppy disks
(e) Mouse

S11. Ans. (a)
Sol. Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

Q12. Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
(a) Multimedia Player
(b) Backup software
(c) Utility programs
(d) Driver imaging
(e) Antivirus Software

S12. Ans. (e)
Sol. Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

Q13. The software that is used to create text based documents is referred as :
(a) DBMS
(b) Suits
(c) Spreadsheets
(d) Presentation software
(e) Word processor

S13. Ans. (e)
Sol. Word processors are used to create text based documents.

Q14. ______ is a set of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer. 
(a) A computer program
(b) A programming language
(c) An assemble
(d)Computer I/O Device
(e) None of these

S14. Ans. (b)
Sol. A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behaviour of a machine or to express algorithms.

Q15.  What is the number of function keys on a keyboard?
(a) 15
(b) 12
(c) 11
(d) 16
(e) 10

S15. Ans.(b)
Sol. There are 12 function keys from F1 to F12 on a keyboard.