Monday, 22 February 2016


Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.

Q.1.    A mistake in an algorithm that cause incorrect results is called?
     a) Logical error    b) Syntax error
     c) Compiler error
     d) Machine error
     e) Procedural error

Q. 2.    What is URL?
     a)    A computer software program
     b)    A type of programming object
     c)    The address of a document or page on the World Wide Web
     d)    An acronym for Unlimited Resources for learning
     e)    A piece of hardware

Q. 3.    Which of the following would you find on LinkedIn?
     a) Games     b) Connections
     c) Chat     d) Applications
     e) None of these

Q. 4.    Which of the following is the first step in seizing a window?
     a)    Point to the title bar
     b)    Pull down the view menu to display the toolbar
     c)    Point to any corner or border
     d)    Pull down the view menu and change to large icons
     e)    None of these

Q. 5.    _____ is a technique that is used to send more than one call over a single line?
     a) Digital transmission
     b) Infrared transmission
     c) Digitizing     d) Streaming
     e) Multiplexing

Q. 6.    Which of these is a point-and-draw device?
     a) Mouse     b) Scanner
     c) Printer    d) CD-ROM
     e) Key board

Q. 7.    The letter and number of the intersecting column and row is the?
     a) Cell location    b) Cell position
     c) Cell address
     d) Cell coordinates
     e) Cell contents

Q. 8.    Which of the following is not a means of personal communication on the internet?
     a) Chat    b) Instant messaging
     c) Instanotes    d) Electronic mail
     e) None of these

Q. 9.    NIC is the acronym for?
     a) Network Integrated Card
     b) Network Intranet Card
     c) Network Interface Card
     d) No Internet Connection
     e) None of the above

Q. 10.    In Power Point, the Header & Footer button can be found on the Insert tab in which group?
     a) Object group
     b) Illustrations group
     c) Text group    d) Tables group
     e) None of these

 Q.11.    _____ is a set of computer programs used on a computer to help perform tasks?

     a) An instruction    b) Software
     c) Memory    d) A processor
     e) None of these

Q. 12.    A string of eight 0s and 1s is called a?
     a) Megabyte    b) Byte
     c) Kilobyte    d) Giga byte
     e) Kilo bite

Q. 13.    Which of the following is not a threat to security and privacy?
     a) Hackers    b) Spam
     c) Viruses    d) Identify theft
     e) None of these

Q. 14.    A collection of programs that controls how the computer system runs and processes information is called?
     a) Operating system
     b) Computer    c) office
     d) Compiler     e) Interpreter

Q. 15.    Who among the following is the father of super computer?
     a) Charles Babbage
     b) Billgates    c) Steve Jobs
     d) Jeff Stronstrup
     e) Seymour Cray

Q. 16.    What do you understand by the term 'Booting'?
     a)    The process of starting the computer from the power-off position
     b)    Connecting the computer to the electric switch
     c)    Increasing the memory of the computer
     d)    The process of shut down the computer
     e)    None of these

Q. 17.    Housing all hardware, software, Storage and processing in one site location is called?
     a) Time sharing
     b) A distributed system
     c) Centralized processing
     d) A host computer
     e) None of these

Q. 18.    _____ process rearranges file fragments into contiguous files?
     a) Folder folding
     b) Defragmentation
     c) Unflagging    d) Disk scanning
     e) File filling

Q. 19.    _____ means that the data contained in a database is accurate and reliable?
     a) Data redundancy
     b) Data integrity
     c) Data reliability
     d) Data consistency
     e) None of these

Q. 20.    _____ is the process of carrying out commands?
     a) Fetching    b) Sorting
     c) Executing    d) Decoding
     e) None of these

Q. 21.    In Windows environment Ctrl + Z is used to?
     a) Copy    b) Paste
     c) Cut    d) Undo
     e) None of these

Q. 22.    PCB is the acronym for?
     a) Processing Cache Block
     b) Pixel Control Block
     c) Process Control Block
     d) Program Control Block
     e) None of these

Q. 23.    A hybrid computer uses a _____ to convert digital signals from a computer into analog signals?
     a) Modem     b) Modulator
     c) Demodulator    d) Decoder
     e) None of these

Q. 24.    Hyperlinks cannot be?
     a) Of special shapes like banners
     b) Pictures    c) Text
     d) Drawing objects like ovals
     e)    All of the above can be hyperlinks

Q. 25.    Network components are connected in a linear sequence in _____ topology?
     a) Star    b) Ring
     c) Bus      d) Mesh    e) Mixed

Q. 26.    A directory within the directory?
     a) Mini Directory
     b) Junior Directory
     c) Part Directory
     d) Sub Directory
     e) None of these

Q. 27.    LED stands for?
     a) Laser Emitting Diode
     b) Light Emitting Diode
     c) Liquid Emitting Diode
     d) All        e) None of these

Q. 28.    Which of the following is the mail client which works without internet?
     a) MS Access    b) MS outlook
     c) MS InfoPath    d) MS publisher
     e) Both (2) and (3)

Q. 29.    WI-FI Stands for?
     a) Wireless facility
     b) Wireless network
     c) Wireless fidelity
     d) Features of wireless
     e) None of these

Q. 30.    JVM converts source code in to _____ ?
     a) Source code    b) Object code
     c) Byte code    d) All
     e) None of these

Q. 31.    A table is a collection of _____ ?
     a) Files    b) Worksheets
     c) Fields    d) Records
     e) None of these

Q. 32.    User actions such as key strokes or mouse click are referred to as:
     a) Interrupts    b) Tasks
     c) Events    d) Processes
     e) None of these

Q. 33.    What is the extension flash file format?
     a) .swf    b) .flm
     c) .mfh    d) .fls
     e) None of these

Q. 34.    GSM stands for _____?
     a)    General Solutions of Multiple Access
     b)    Global system for mobile communication
     c)    Generation Subscriber Machine
     d)    Gopher Started for machine communication
     e)    None of these

Q. 35.    Which of the following is not relate to MS-Excel?
     a) Formula    b) Function
     c) Table     d) Frame
     e) None of these

Q. 36.    Which of the following is the Short cut to open New Slide _____ ?
     a) Ctrl + M    b) Ctrl + N
     c) Ctrl + O    d) Ctrl + F
     e) Ctrl + A

Q. 37.    _____ is the security against viruses, which monitors both incoming and outgoing traffic?
     a) Encryption    b) Spanning
     c) Firewall    d) Worms
     e) None of these

Q. 38.    'Web Page Spoofing' is sometimes referred to as:?
     a) Spyware    b) Antivirus
     c) Phishing    d) Browsing
     e) None of these

Q. 39.    The 'Resolution power' of a printer indicates its _____ :
     a) Speed    b) Quality
     c) Model    d) All of these
     e) None of these

Q. 40.    The technique that extends storage capacity of main memory beyond the actual size of the main memory is called?
     a) Multitasking
     b) multiprocessing
     c) Virtual storage
     d) Cache storage    e) Switching

Q. 41.    Internet chatting is an example?
     a) Simplex Communication
     b) Duplex Communication
     c) Half Duplex
     d) All of the above
     e) None of these

Q. 42.    What is the name of the logic circuit which can add two binary digits?
     a) Half Adder    b) Full Adder
     c) Parallel Adder
     d) Serial Adder    e) None of these

Q. 43.    Which of the following best defines access time?
     a)    Interval during which a program is executed by the computer
     b)    Time taken for a computer device to transfer information
     c)    Time taken for a device to transfer information from its storage system to the memory
     d)    Duration for which a user is allowed to access the computer facilities
     e)    None of the above

Q. 44.    Who among the following developed yahoo?
     a) Dennis Ritchie
     b) David File & Jerry Yang
     c) Steve Kaze    d) Robert Kahn
     e) Larry page & Sergy Brin

Q. 45.    Wireless communication is an example of which of the following mode of transmission?
     a) Simplex    b) Half duplex
     c) Duplex    d) Both b and c
     e) None of the above

Q. 46.    Which of the following is not associated with hard disk technology?
     a) SATA     b) IDE
     c) UDMA    d) ATA    e) WAP

Q. 47.    Which of the following best defines Operating System?
     a)    An interface between hardware and software
     b)    An interface between hardware and application program
     c)    An interface between user and an application program
     d)    All of the above
     e)    None of the above

Q. 48.    Which of the following is merely an output device and has no processing capabilities?
a) Personal Computer
b) Node    
c) Dumb Terminal
d) Server    
e) None of the above

Q. 49.    If the data is to be stored into a secondary storage medium it must be:
a) Partitioned    
b) Defragmented
c) Formatted    
d) Labeled
e) None of the above

Q. 50.    In MS Word, a redline under a word indicates
     a) Grammar mistake
     b) Spelling Mistake
     c) No Mistakes
     d) Virus Infection
     e) None of the above
     1. a    2. c    3. b    4. a    5. e
     6. a    7. c    8. c    9. c    10. c
     11. b    12. b    13. b    14. a    15. e
     16. a    17. c    18. b    19. b     20. c
     21. d    22. c    23. a    24. e    25. c
     26. d    27. b    28. b    29. c    30. c
     31. d    32. c    33. a    34. b    35. d
     36. a    37. c    38. c    39. b    40. c
     41. b    42. a    43. c    44. b    45. b
     46. e    47. d    48. c    49. c    50. b

No comments:

Post a Comment