Computer Questions for IBPS RRB PO and Clerk Mains 2017

Dear Readers,

Computer Questions for IBPS RRB Mains 2017

Computer efficiency is now important in almost every stream and it is important for every aspirant to clear computer knowledge basics because it is an important section in bank recruitment Examination. Practice with these 15 questions of Computer Knowledge for IBPS RRB Mains Exam 2017.

Q1. Which among the following is not a mobile Operating System?
(a) Bada
(b) Safari
(c) Symbian
(d) MeeGo
(e) WebOS

S1. Ans.(b)
Sol. Safari is a web browser

Q2. Which among the following key can be used as a shortcut to rename a folder in Microsoft Windows 8 and higher versions?
(a) F2
(b) F4
(c) F6
(d) F9
(e) F11

S2. Ans.(a)
Sol. F2 is a shortcut to rename selected object in MS windows 8 and higher versions

Q3. AT&T designed its first commercial modem, specifically for converting digital computer data to analog signals for transmission across its long distance network. What is the name of the modem?
(a) Telex
(b) Memex
(c) CompuServe
(d) Bell 103 dataset
(e) Dataphone

S3. Ans.(e)
Sol. In 1960's AT&T introduces its Dataphone, the first commercial modem. The first commercial modem made for converting digital computer data at analog signals for transmission across long distance networks

Q4. Integrated Chips or IC’s were started to be in use from which generation of Computers?
(a) 1st Generation
(b) 2nd Generation
(c) 3rd Generation
(d) 4th Generation
(e) 5th Generation

S4. Ans.(c)
Sol. IC were started to be in use from 3rd generation of computers. In third generation of computer, IC (Integrated circuits) was used as the electronic component for computers. The development of IC gave birth to a new field of microelectronics. The main advantage of IC is not only its small size but its superior performance and reliability than the previous circuits. It was first developed by T.S Kilby. This generation of computer has huge storage capacity and higher calculating speed.

Q5. In Computer programming there is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is a term for sets of requirements that govern how one application can talk to another?
(a) UPS
(b) API
(c) CGI
(d) J2EE
(e) OLE

S5. Ans.(b)
Sol. An API may be for a web-based system, operating system, database system, computer hardware, or software library. It is an acronym for Application Programming Interface. An API specifies how software components should interact and APIs are used when programming graphical user interface (GUI) components.

Q6. BSoDs can be caused by poorly written device drivers or malfunctioning hardware, such as faulty memory, power supply issues, overheating of components, or hardware running beyond its specification limits. Which color screen is displayed when encountered a BSOD Error?
(a) Red
(b) Grey
(c) Black
(d) Blue
(e) Green

S6. Ans.(d)
Sol. BSODs appear when Microsoft Windows encounters a critical error it can’t recover from, requiring a reboot and possibly resulting in lost work. It stands for blue screen of death. Blue screens are generally caused by problems with your computer’s hardware or issues with its hardware driver software. A blue screen occurs when Windows encounters a “STOP Error.” This critical failure causes Windows to crash and stop working

Q7. Which among the following is the smallest unit in an image in a computer screen?
(a) Unit
(b) Pixel
(c) Array
(d) Resolution
(e) Clip

S7. Ans.(b)
Sol. In digital imaging, a pixel, pel, or picture element is a physical point in a raster image, or the smallest addressable element in an all points addressable display device; so it is the smallest controllable element of a picture represented on the screen.

Q8. Microsoft Word is a word processor developed by Microsoft. In MS Word Spelling Check is a feature available in which tab?
(a) File
(b) Home
(c) Insert
(d) Review
(e) References

S8. Ans.(d)
Sol. In MS Word Spelling and Grammar check is available in Review Tab. Some other options available in Review are: Research, Thesaurus, Word Count, Translate, Language, New Comment, Tracking, Compare and Protect.

Q9. There is a network that can connect networks ranging from small location or area to a bigger range including public packet network and large corporate networks. That network's enterprise allows users to share access to applications, services and other centrally located resources. Its ability for a huge geographical access has transformed networking. Which among the following is that network?
(a) SAN
(b) CAN
(c) LAN
(d) WAN
(e) MAN

S9. Ans.(d)
Sol. WAN stands for Wide Area Network. A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs). In an enterprise, a WAN may consist of connections to a company's headquarters, branch offices, colocation facilities, cloud services and other facilities.

Q10. Which among the following is not an Object Oriented Programming Language?
(a) Python
(c) Java
(d) C++
(e) Ruby

S10. Ans.(b)
Sol. Pascal is an imperative and procedural programming language, designed in 1968/1969 and published in 1970 by Niklaus Wirth as a small and efficient language intended to encourage good programming practices using structured programming and data structuring.

Q11. Which cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms and it is particularly valuable for dynamic or highly changeable workloads?
(a) Dynamic Cloud
(b) Advance Cloud
(c) Hybrid Cloud
(d) Sharing Cloud
(e) Combined Cloud

S11. Ans.(c)
Sol. Hybrid cloud is a cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By using a Hybrid approach, companies can maintain control of an internally managed private cloud while relying on the public cloud as needed.

Q12. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of ______.
(a) Authentication
(b) Automation
(c) Firewall
(d) Encryption
(e) Decryption

S12. Ans.(a)
Sol. The process of identifying an individual usually based on a username and password. In security systems, authentication is distinct from authorization, which is the process of giving individuals access to system objects based on their identity.

Q13. The use of combination of 1’s and 0’s is feature of which of the following type of Computer Language? 
(a) High Level Language
(c) Machine Language
(d) C

S13. Ans.(c)
Sol. Machine Language uses a combination of 1’s and 0’s.

Q14. Which among the following is a recently debated principle that Internet service providers and governments regulating the Internet should treat all data on the Internet the same, not discriminating or charging differentially by user, content, website, platform, application, type of attached equipment, or mode of communication?
(a) Comcast
(b) Net Neutrality
(c) Oblique-net
(d) Net Fraternity
(e) Fair Web

S14. Ans.(b)
Sol. Net Neutrality means an Internet that enables and protects free speech. It means that Internet service providers should provide us with open networks — and should not block or discriminate against any applications or content that ride over those networks.

Q15. Which among the following is an important circuitry in a computer system that directs the operation of the processor?
(a) Memory
(b) Address Bus
(c) Accumulator
(d) ALU
(e) Control Unit

S15. Ans.(e)
Sol. The Control Unit (CU) is digital circuitry contained within the processor that coordinates the sequence of data movements into, out of, and between a processor's many sub-units.

Print Friendly and PDF