Exam Details
Subject | computer knowledge | |
Paper | ||
Exam / Course | ||
Department | ||
Organization | rrb rrc ibps | |
Position | ||
Exam Date | 2014 | |
City, State | , |
Question Paper
1. Another name for a program is
software
procedure
typology
utilities
userware
2. ...... is a communications technology used by some incoming mail services.
Telnet
TCP
FTP
GIF
POP3
3. The two basic parts of URLs are
ICP and IP
TCP/IP and ISP
TCP and ftp
destination and device
the protocol and the domain name
4. The primary purpose of software is to turn data into
information
programs
objects
charts
websites
5. The ........... database is the most widely used database structur
hierarchical
general
standard
table
relational
6. Mail from unwanted senders can be blocked by
not buying anything online so that junk mail senders will not having anything to benefit by
sending them nasty replies when they send any mail
using mail filters
clicking the un subscribe link
e-mailing them and asking to the removed from the list
7. POP denotes
Post Office Program
Post Office Protocol
Protocol on Program
Protocol on Protocol
Program of of Programmer
8. How many gigabytes are there in a petabyte?
1000
001
100
1000000
5000000
9. For a browser to connect to other resources, the location or address of the resources must be specified. These addresses are called
MSN
e-mail forms
packets
IDs
URLs
10. The extensions
.gov, .edu, .mil, and .net are c
mail to addresses
add-ons
domain codes
DNSs
e-mail targets
11. Software that is actively utilised by end-users (like Word or Photoshop) is called
actionware
operating system
system software
driver
application software
12. Using a ............ helps to place an image into a live video conference.
printer
digital camera
video camera
webcam
scanner
13. Programs designed to perform specific tasks related to managing computer resources are called
operating system
helper software
system software
application software
utility programs
14. A rectangular area on a computer screen that can contain a document, program or messages is referred to as a
field
opening
window
tuplet
cell
15. The storage locations in the internal storage of a CPU are called
reference points
addresses
contents
mask
locations
16. Of the following types of computers, which is the most powerful?
Laptop
Mainframe computer
Minicomputer
Supercomputer
Microcomputer
17. An input device, which can read characters directly from an ordinary piece of paper, is
OMR
POS
OCR
MSI
CD
18. The radian of a number system
has nothing to do with digit position value
equals the number of its distinct counting digits
is more than the number of its distinctcounting digits
is always an even number
is variable
19. Which of the following statements is false?
passwords are case sensitive.
passwords are not echoed on the screen for security resasons.
A good password should be no more than six characters long.
password is a secret code that authenticates a person to the computer.
passwords should be changed frequently
20. The most common method for gaining access to the internet is through a
dumb terminal
keyboard
provider or host computer
virtual provider provider or computer
point-to-point computer
21. Which of the following is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape technology?
Audio interchange file format
Digital data storage
Virtual tape system
Tape archive
Data aggregation
22. A compiler means
keypunch operator
computer data collector
a person who compiles source programs
a program which translates source program into object program
the same thing as a programmer
23. Specialised programs designed to allow particular input or output devices to communicate with the rest of the computer system are called
compilers
action drivers
interpreters
device drivers
operating systems
24. .......... get transmitted across the web by harmful chain letters and hoaxes.
Flames and infections
Flames
Wamings
Viruses
Infections
25. ATM machines run .......... OS.
network
web
embedded
disintegrated
open source
26. Moving from one website to another is called
jumping
applying
surfing
moving
shifting
27. In a client/server network, the user's computer is considered the
client
website
library
server
hoster
28. A program that is used to view websites is called a
word processor
spreadsheet
browser
web viewer
viewer
29. The physical component of a computer that processes data in order to create information is called the
specialware
typology
software
hardware
compiler
30. An emerging trend is to free users from owning and storing applications by using
word processing packages
backup applications
applications packages
storage packages
web-based applications
31. Which is a secondary memory device?
Mouse
Floppy disk
Scanner
CPU
ALU
32. Which of the following is possible with open architecture?
A minimum of six new devices to be added to a computer
Hot swapping of devices.
Users to upgrade and add new devices as they come on the market.
All hardware, input and output devices to be located in one efficient box
A minimum of four new devices to be added to a computer.
33. ............. are special visual and sound effects contained in presentation graphics file.
Attractions
Simulations
Animatronics
Graphics
Animations
34. Step-by-step instructions that run the computer are
CPUs
Programs
Solutions
Hardware
Documents
35. The process of writing computer instructions in a programming language is known as
processing
algorithming
coding
file
instrucitoning
36. Which of the following refers to too much electricity and may cause a voltage surge
Shock
Anomaly
Splash
Spike
Virus
37. Rules for exchaning data between computers are called
procedures
protocols
hyperlinks
programs
hyper-actions
38. Which of the following is used to write webpages?
URL
HTML
HTTP
FTP
Telnet
39. ........... is the most important/powerful computer in a typical network.
Network client
Desktop
Network switch
Network station
Network server
40. Raw, unprocessed facts, including text, numbers, images and sounds, are calle
applets
data
melaware
items
java
software
procedure
typology
utilities
userware
2. ...... is a communications technology used by some incoming mail services.
Telnet
TCP
FTP
GIF
POP3
3. The two basic parts of URLs are
ICP and IP
TCP/IP and ISP
TCP and ftp
destination and device
the protocol and the domain name
4. The primary purpose of software is to turn data into
information
programs
objects
charts
websites
5. The ........... database is the most widely used database structur
hierarchical
general
standard
table
relational
6. Mail from unwanted senders can be blocked by
not buying anything online so that junk mail senders will not having anything to benefit by
sending them nasty replies when they send any mail
using mail filters
clicking the un subscribe link
e-mailing them and asking to the removed from the list
7. POP denotes
Post Office Program
Post Office Protocol
Protocol on Program
Protocol on Protocol
Program of of Programmer
8. How many gigabytes are there in a petabyte?
1000
001
100
1000000
5000000
9. For a browser to connect to other resources, the location or address of the resources must be specified. These addresses are called
MSN
e-mail forms
packets
IDs
URLs
10. The extensions
.gov, .edu, .mil, and .net are c
mail to addresses
add-ons
domain codes
DNSs
e-mail targets
11. Software that is actively utilised by end-users (like Word or Photoshop) is called
actionware
operating system
system software
driver
application software
12. Using a ............ helps to place an image into a live video conference.
printer
digital camera
video camera
webcam
scanner
13. Programs designed to perform specific tasks related to managing computer resources are called
operating system
helper software
system software
application software
utility programs
14. A rectangular area on a computer screen that can contain a document, program or messages is referred to as a
field
opening
window
tuplet
cell
15. The storage locations in the internal storage of a CPU are called
reference points
addresses
contents
mask
locations
16. Of the following types of computers, which is the most powerful?
Laptop
Mainframe computer
Minicomputer
Supercomputer
Microcomputer
17. An input device, which can read characters directly from an ordinary piece of paper, is
OMR
POS
OCR
MSI
CD
18. The radian of a number system
has nothing to do with digit position value
equals the number of its distinct counting digits
is more than the number of its distinctcounting digits
is always an even number
is variable
19. Which of the following statements is false?
passwords are case sensitive.
passwords are not echoed on the screen for security resasons.
A good password should be no more than six characters long.
password is a secret code that authenticates a person to the computer.
passwords should be changed frequently
20. The most common method for gaining access to the internet is through a
dumb terminal
keyboard
provider or host computer
virtual provider provider or computer
point-to-point computer
21. Which of the following is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape technology?
Audio interchange file format
Digital data storage
Virtual tape system
Tape archive
Data aggregation
22. A compiler means
keypunch operator
computer data collector
a person who compiles source programs
a program which translates source program into object program
the same thing as a programmer
23. Specialised programs designed to allow particular input or output devices to communicate with the rest of the computer system are called
compilers
action drivers
interpreters
device drivers
operating systems
24. .......... get transmitted across the web by harmful chain letters and hoaxes.
Flames and infections
Flames
Wamings
Viruses
Infections
25. ATM machines run .......... OS.
network
web
embedded
disintegrated
open source
26. Moving from one website to another is called
jumping
applying
surfing
moving
shifting
27. In a client/server network, the user's computer is considered the
client
website
library
server
hoster
28. A program that is used to view websites is called a
word processor
spreadsheet
browser
web viewer
viewer
29. The physical component of a computer that processes data in order to create information is called the
specialware
typology
software
hardware
compiler
30. An emerging trend is to free users from owning and storing applications by using
word processing packages
backup applications
applications packages
storage packages
web-based applications
31. Which is a secondary memory device?
Mouse
Floppy disk
Scanner
CPU
ALU
32. Which of the following is possible with open architecture?
A minimum of six new devices to be added to a computer
Hot swapping of devices.
Users to upgrade and add new devices as they come on the market.
All hardware, input and output devices to be located in one efficient box
A minimum of four new devices to be added to a computer.
33. ............. are special visual and sound effects contained in presentation graphics file.
Attractions
Simulations
Animatronics
Graphics
Animations
34. Step-by-step instructions that run the computer are
CPUs
Programs
Solutions
Hardware
Documents
35. The process of writing computer instructions in a programming language is known as
processing
algorithming
coding
file
instrucitoning
36. Which of the following refers to too much electricity and may cause a voltage surge
Shock
Anomaly
Splash
Spike
Virus
37. Rules for exchaning data between computers are called
procedures
protocols
hyperlinks
programs
hyper-actions
38. Which of the following is used to write webpages?
URL
HTML
HTTP
FTP
Telnet
39. ........... is the most important/powerful computer in a typical network.
Network client
Desktop
Network switch
Network station
Network server
40. Raw, unprocessed facts, including text, numbers, images and sounds, are calle
applets
data
melaware
items
java
Other Question Papers
Subjects
- computer knowledge
- general aptitude
- general awareness
- general knowledge
- mental ability
- reasoning