Exam Details

Subject computer knowledge
Paper
Exam / Course
Department
Organization rrb rrc ibps
Position
Exam Date 2014
City, State ,


Question Paper

1. Another name for a program is

software

procedure

typology

utilities

userware

2. ...... is a communications technology used by some incoming mail services.

Telnet

TCP

FTP

GIF

POP3

3. The two basic parts of URLs are

ICP and IP

TCP/IP and ISP

TCP and ftp

destination and device

the protocol and the domain name

4. The primary purpose of software is to turn data into

information

programs

objects

charts

websites

5. The ........... database is the most widely used database structur

hierarchical

general

standard

table

relational

6. Mail from unwanted senders can be blocked by

not buying anything online so that junk mail senders will not having anything to benefit by

sending them nasty replies when they send any mail

using mail filters

clicking the un subscribe link

e-mailing them and asking to the removed from the list

7. POP denotes

Post Office Program

Post Office Protocol

Protocol on Program

Protocol on Protocol

Program of of Programmer

8. How many gigabytes are there in a petabyte?

1000

001

100

1000000

5000000

9. For a browser to connect to other resources, the location or address of the resources must be specified. These addresses are called

MSN

e-mail forms

packets

IDs

URLs

10. The extensions

.gov, .edu, .mil, and .net are c

mail to addresses

add-ons

domain codes

DNSs

e-mail targets

11. Software that is actively utilised by end-users (like Word or Photoshop) is called

actionware

operating system

system software

driver

application software

12. Using a ............ helps to place an image into a live video conference.

printer

digital camera

video camera

webcam

scanner

13. Programs designed to perform specific tasks related to managing computer resources are called

operating system

helper software

system software

application software

utility programs

14. A rectangular area on a computer screen that can contain a document, program or messages is referred to as a

field

opening

window

tuplet

cell

15. The storage locations in the internal storage of a CPU are called

reference points

addresses

contents

mask

locations

16. Of the following types of computers, which is the most powerful?

Laptop

Mainframe computer

Minicomputer

Supercomputer

Microcomputer

17. An input device, which can read characters directly from an ordinary piece of paper, is

OMR

POS

OCR

MSI

CD

18. The radian of a number system

has nothing to do with digit position value

equals the number of its distinct counting digits

is more than the number of its distinctcounting digits

is always an even number

is variable

19. Which of the following statements is false?

passwords are case sensitive.

passwords are not echoed on the screen for security resasons.

A good password should be no more than six characters long.

password is a secret code that authenticates a person to the computer.

passwords should be changed frequently

20. The most common method for gaining access to the internet is through a

dumb terminal

keyboard

provider or host computer

virtual provider provider or computer

point-to-point computer

21. Which of the following is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape technology?

Audio interchange file format

Digital data storage

Virtual tape system

Tape archive

Data aggregation

22. A compiler means

keypunch operator

computer data collector

a person who compiles source programs

a program which translates source program into object program

the same thing as a programmer

23. Specialised programs designed to allow particular input or output devices to communicate with the rest of the computer system are called

compilers

action drivers

interpreters

device drivers

operating systems

24. .......... get transmitted across the web by harmful chain letters and hoaxes.

Flames and infections

Flames

Wamings

Viruses

Infections

25. ATM machines run .......... OS.

network

web

embedded

disintegrated

open source

26. Moving from one website to another is called

jumping

applying

surfing

moving

shifting

27. In a client/server network, the user's computer is considered the

client

website

library

server

hoster

28. A program that is used to view websites is called a

word processor

spreadsheet

browser

web viewer

viewer

29. The physical component of a computer that processes data in order to create information is called the

specialware

typology

software

hardware

compiler

30. An emerging trend is to free users from owning and storing applications by using

word processing packages

backup applications

applications packages

storage packages

web-based applications

31. Which is a secondary memory device?

Mouse

Floppy disk

Scanner

CPU

ALU

32. Which of the following is possible with open architecture?

A minimum of six new devices to be added to a computer

Hot swapping of devices.

Users to upgrade and add new devices as they come on the market.

All hardware, input and output devices to be located in one efficient box

A minimum of four new devices to be added to a computer.

33. ............. are special visual and sound effects contained in presentation graphics file.

Attractions

Simulations

Animatronics

Graphics

Animations

34. Step-by-step instructions that run the computer are

CPUs

Programs

Solutions

Hardware

Documents

35. The process of writing computer instructions in a programming language is known as

processing

algorithming

coding

file

instrucitoning

36. Which of the following refers to too much electricity and may cause a voltage surge

Shock

Anomaly

Splash

Spike

Virus

37. Rules for exchaning data between computers are called

procedures

protocols

hyperlinks

programs

hyper-actions

38. Which of the following is used to write webpages?

URL

HTML

HTTP

FTP

Telnet

39. ........... is the most important/powerful computer in a typical network.

Network client

Desktop

Network switch

Network station

Network server

40. Raw, unprocessed facts, including text, numbers, images and sounds, are calle

applets

data

melaware

items

java


Other Question Papers

Subjects

  • computer knowledge
  • general aptitude
  • general awareness
  • general knowledge
  • mental ability
  • reasoning