0% found this document useful (0 votes)
80 views41 pages

Computer Awareness

This document provides 26 multiple choice questions about important computer awareness topics for IBPS RRB PO/Clerk Mains exams. The questions cover a range of topics including computer generations, operating systems, software, hardware, and programming languages.

Uploaded by

Sudhir Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views41 pages

Computer Awareness

This document provides 26 multiple choice questions about important computer awareness topics for IBPS RRB PO/Clerk Mains exams. The questions cover a range of topics including computer generations, operating systems, software, hardware, and programming languages.

Uploaded by

Sudhir Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 1
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 2
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

1. Select the Switching Devices that are used in b) Cursor


the First generation of computer. c) Down
a) Vacuum tubes d) Restore
b) Transistors e) Screenshare
c) Integrated Circuits Answer: B
d) Super Large Scale Integrated Chips
e) Large Scale Integrated Circuit 5. ______________ is the process of closing and
Answer: A starting a computer or its operating system from
the initial boot loading sequence.
2. In order to move from one worksheet to a) Warm Boot
another in the MS Excel workbook one should b) Cool Boot
click ______________________. c) Reboot
a) Sheet Tab d) Normal Boot
b) Spreadsheet e) Cold Boot
c) Active Cell 5. Answer: C
d) Scroll Bar
e) Tab Button 6. Which device converts human-
Answer: A understandable data and programs into a form
that computers can understand and process?
3. What type of computer language has the a) Output
feature of using a combination of 1s and 0s? b) Monitor
a) High-Level Language c) Input
b) PASCAL d) All the above
c) Machine Language e) None of the above
d) C++ Answer: C
e) JAVA
Answer: C 7. Which input device is/is used to move the
cursor position on a monitor screen?
4. What does the screen's flickering icon that a) Mouse
indicates the location of the upcoming character b) Joystick
represents? c) Light pen
a) Copy d) Both a and b

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 3
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) Both a and c 11. Database Management System is an


Answer: D application of ______________- generation of
Computers.
8. Which of the following file format can be a) First
added to a PowerPoint show? b) Second
a) .jpg c) Third
b) .gif d) Fourth
c) .wav e) Fifth
d) All the above Answer: C
e) None of the above
Answer: D 12. While working with MS-DOS which
command transfers a specific file from one disk
9. A semiconductor wafer on which thousands to another?
or millions of tiny resistors, capacitors, and a) Copy
transistors are manufactured is known as an b) Paste
integrated circuit (IC). Which element is used to c) Control
make computer chips and IC? d) Cut
a) Copper e) Undo
b) Iron Answer: A
c) Silicon
d) Aluminium 13. Zoom in & out button is available on
e) Silver _________________.
Answer: C a) Scroll Bar
b) Page Layout Tab
10. The shortcut key is____ to add one point to c) Home Tab
the font size of the currently chosen text. d) View Option
a) Ctrl+} e) File Option
b) Ctrl+ { Answer: D
c) Ctrl+]
d) Ctrl+ [ 14. How many rows are there in MS Excel's
e) Ctrl + ( older version?
Answer: C a) 65536
b) 65596

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 4
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

c) 66535
d) 66626 18. When you insert the address of an existing
e) 66696 Web page and press ENTER or the
Answer: A SPACEBAR, Microsoft Office Word
automatically produces a ____________ for you.
15. The Data input was provided through a) Header
________ and ___________ in the third b) Footer
generation of computers. c) Hyperlink
a) Keyboard d) Chart
b) Mouse e) Smart Art
c) CPU Answer: C
d) Both (a) and (b)
e) Both (a) and (c) 19. The number of function keys in a keyboard
Answer: D is _____________-.
a) 14
b) 12
16. In MS-PowerPoint, the maximum zoom c) 13
percentage is ______. d) 11
a) 100% e) 15
b) 200% Answer: B
c) 300% 20. Ctrl, Shift, and Alt are known as
d) 400% ________________ keys.
e) 500% a) function
Answer: D b) modifier
c) alphanumeric
17. Which of the following is not one among the d) adjustment
example of a mobile Operating System? e) toggle
a) Android Answer: B
b) Blackberry
c) Symbian 21. ___________ is the process of loading a set
d) Bada of instructions when a computer is first turned on
e) Safari or booted.
Answer: E a) Bootstrapping

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 5
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

b) Spooling 25. COBOL stands for


c) Scaling ________________________.
d) Multitasking a) Common Business Oriented Language
e) Multi setting b) Central Business Oriented Language
Answer: A c) Common Binary Oriented Language
d) Central Binary Oriented Language
22. The first Unix operating system was written e) Common Business Oriented Level
in ____. Answer: A
a) Machine Language
b) Java 26. Which of the following groups consists of
c) Programming C only output devices?
d) Pascal a) Scanner, monitor, printer
e) Python b) Mouse, monitor, printer
Answer: C c) Keyboard, monitor, printer
d) Monitor, printer, plotter
23. How many columns are there in the old e) Joystick, Plotter, Printer
version of MS Excel? Answer: D
a) 242
b) 246 27. To display the Go To dialog box, press ____
c) 254 in Microsoft Excel.
d) 256 a) Ctrl + G
e) 266 b) Ctrl + A
Answer: D c) Alt + G
d) Alt + O
24. What is the default width of the Excel e) Shift + G
column? Answer: A
a) 5.5
b) 4.98 28. Finding and fixing errors or issues that
c) 6.49 prohibit computer software or a system from
d) 7.83 operating correctly is the process of ________.
e) 8.43 a) Error
Answer: E b) Debugging
c) Syntax

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 6
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

d) Refixing 32. Which of the following is the advantage of


e) Problem Solving RADIUS?
Answer: B I. It is a great mechanism for providing multiple
access for Admin
29. To select text by shading as you drag the II. It provides a unique identity to each user in a
mouse arrow over the text is referred to as session
________. III. It has a variety models and less cost
a) Clip art consuming
b) Highlight a) Only I
c) Fetch b) Only I and II
d) Decode c) Only II and III
e) Smart Art d) Only III
Answer: B e) All I, II, and III
Answer: B
30. Even after a worksheet is saved, Microsoft
Office Excel allows you to undo and redo up to 33. Which of the following shortcut key insert a
___ actions. hyperlink?
a) 56 a) Ctrl+K
b) 65 b) Ctrl+ F
c) 79 c) Ctrl+N
d) 92 d) Ctrl+H
e) 100 e) Ctrl+L
Answer: E Answer: A

31. ______ is a protocol that aids in network 34. Which of the following is not a component of
authentication network security?
a) RADIUS a) DNS
b) OAuth2 b) Firewall
c) SAML c) Intrusion Detection System(IDS)
d) LDAP d) VPN
e) Kerberos e) Windows Vista
Answer: E Answer: A

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 7
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

35. _____ is the easiest and more secure way to c) Multiple bit error
exchange files between a server and client on a d) Burst error
computer network e) None of the above
a) FTP Answer: D
b) IP
c) HTTP 39. Which of the following is not an error
d) DNS detection method?
e) None of the above a) Encryption
Answer: A b) Simple Party Check
c) Two Dimensional Party Check
36. Which of the following is true? d) Checksum
a) 1 Exabytes = 1024 Terabytes e) Cyclic Redundancy Check
b) 1 Pettabytes = 1024 Exabytes Answer: A
c) 1 Zettabytes = 1024 Pettabytes
d) 1 Exabyte= 1024 Zettabytes 40. ________is a technique used to regulate the
e) 1 Yottabyte =1024 Zettabytes flow of data between different nodes in a
Answer: E network.
a) Flow Control
37. _____ is a personal computer that is b) Congestion Control
specially designed for personal use and c) Error Control
generally consists of a single chip? d) Numerical Control
a) Mainframe computer e) Control Structure
b) Mini Computer Answer: A
c) Super Computer
d) Analog Computer 41. Which of the following statement is true
e) MicroComputer according to mini computer?
Answer: E I. It is used by companies for manufacturing
control of the process
38. When several consecutive bits are flipped II. It uses magnetic disks or tapes for secondary
mistakenly in digital transmission it creates storage
_____error III. Easy to set up and use with a wide range of
a) Bit suffering error software and applications available.
b) Single bit error a) Only I

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 8
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

b) Only I and II according to the closed-loop control system?


c) Only II and III I. It is easier to build
d) Only III II. It is comparatively slower
e) All I, II, and III III. It is more reliable
Answer: B IV. Optimization can be done very easily
a) Only I and IV
42. What does “A” stand for in ACPI? b) Only I and II
a) Advanced c) Only II and III
b) Accelerated d) Only III and IV
c) Automatic e) All I, II , III and IV
d) Active Answer: D
e) Access
Answer: A 46. What is the full form of FCS?
43. Which of the following is not a storage a) Frame Check System
device? b) Frame check Standard
a) USB c) Filesystem Check Sequence
b) Tape Drive d) Frame Check Sequence
c) Modem e) File Check Separate
d) Cloud Answer: D
e) Magnetism
Answer: C 47. Which of the following device is both an
input and output device?
44. ______ is a light-sensitive device consisting a) Audio Card
of a photo cell and an optical system placed in a b) Network Cards
small tube c) Modems
a) Mouse d) Touch Screen
b) Joy stick e) All the above
c) Touchpad Answer: E
d) Light Pen
e) Trackball 48. ______ is a template definition of the
Answer: D methods and variables in a particular kind of
object.
45. Which of the following statements is true a) Structure

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 9
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

b) Union c) Only I and IV


c) Class d) Only I, II, and III
d) Object e) All I, II, III and IV
e) Enumeration Answer: E
Answer: C
52. ____ is a local network of two or more
49. _____ is a way of organizing and storing data homogeneous computer
to ease the accessing and modification of data. a) Computer Cluster
a) Stack b) Grid Computing
b) Database c) Cloud computing
c) Data structure d) Utility computing
d) Array e) Parallel computing
e) Queue Answer: A
Answer: C
53. ____ computing is a decentralized computing
50. ______is the engine that runs the entire infrastructure or process in which computing
functions of a computer with the help of control resources are located between the data source
signals in the proper sequence? and the cloud or any other data center.
a) Control Unit a) Fog Computing
b) Flow Control b) Edge computing
c) Control Structure c) Distributed Computing
d) Congestion Control d) Traditional Computing
e) Error Control e) Cloud Computing
Answer: A Answer: A

51. Which of the following areas grid computing 54. How many mathematical operations are
is used? performed by difference engines?
I. Predictive a) Five
II. Modeling b) Four
III. Automation c) One
IV. Simulation d) Two
a) Only I and III e) Three
b) Only I and II Answer: C

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 10
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

c) Database Administrator
55. What does AMQP stand for? d) System Administrator
a) Automatic Mail Queuing Protocol e) None of the above
b) Advanced Mail Queuing Protocol Answer: A
c) Automatic Message Queuing Protocol
d) Advanced Message Queuing Protocol 59. _____ is not used for long storage and
e) Advanced Message Query Protocol backup of files, but only for quick file transfer.
Answer: D a) Flash Drive
b) Hard Drive
56. Which of the following is called as Router- c) Hard Disk
to-Router virtual private network? d) Floppy Disk
a) Site-to-Site e) None of the above
b) Remote access Answer: A
c) Cloud
d) Mobile 60.11 _____ specifies the distinct address for
e) SSL each resource on the internet
Answer: A a) URL
b) URI
57. ______is a server application that acts as an c) URN
intermediary between a client requesting a d) Anchor Tag
resource and the server providing the resource. e) Link
a) Name Server Answer: A
b) Application Server
c) Web Server 61. ____ is a digital data transmission unit in
d) File Server computing networking and telecommunication.
e) Proxy Server a) Link
Answer: E b) Frame
c) URL
58. ______ is a type of technological profession d) Anchor Tag
that is maintained by the highly skilled e) Network
connectivity of the network. Answer: B
a) Network Engineer
b) Network Administrator 62. _____is a technique used to regulate the flow

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 11
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

of data between different nodes in a network e) Picture


a) Congestion Control Answer: E
b) Flow Control
c) Error Control 66. ____ virtualization allows the user’s OS to
d) Fund flow be remotely stored on the server in the data
e) Control structure center.
Answer: B a) Server
b) Desktop
63. ______is a type of topology that contains a c) Storage
central node to which all of the other or different d) Network
nodes are connected through a single bath. e) Data
a) Tree topology Answer: B
b) Mesh topology
c) Star topology 67. The primary software that powers a
d) Bus topology computer is called system software. The
e) Ring topology hardware is activated, controlled, and
Answer: C coordinated when the computer is turned on.
The system software also influences the
64. _____ refers to the location of short-term application programs. What is the other name of
data. System Software?
a) Storage a) Application software
b) Memory b) Background software
c) Flash Drive c) Primary Software
d) Floppy disk d) Property Software
e) Hard disk e) None of these
Answer: B Answer: B

68. The process of confirming that someone or


65. What does the first “P” stand for in PTP? something is who or what it claims to be is
a) Photoshop known as _________________.
b) Private a) Integration
c) Parallel b) Topology
d) Public c) Authentication

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 12
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

d) Security accepts data.


e) Protocol
Answer: C 72. Large organisations employ a type of
communication network known as
69. For successful and trustworthy data ________________ that spans regional, national,
communication, the communicating parties must or international boundaries.
abide by a set of rules known as a) LAN
_______________. b) WAN
a) Protocol c) MAN
b) Transmission d) Internet
c) Message e) Networking
d) Relation Answer: B
e) Integration
Answer: A 73. The DBMS acts as an interface between
________________ and ________________ of an
70. The brain of any computer system is enterprise-class system.
______________. a) User
a) Motherboard b) Database
b) Keyboard c) SQL
c) Mouse d) Both (a) and (b)
d) CPU e) Both (a) and (c)
e) Scanner Answer: D
Answer: D A database management system is an
application that acts as an interface between the
71. ________________ refers to the rate at which user and the database. The user interacts with
the monitor accepts data. the application to access data.
a) User Time
b) Bandwidth 74. The quickest communication channel is a
c) Access Time ___________, but the optical fiber is used for
d) Interlacing data transport rather than actual communication.
e) Response Time a) Microwave
Answer: B b) Scanner
Bandwidth refers to the rate at which the monitor c) Radio Waves

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 13
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

d) Optical Fibre c) Nanoseconds


e) All the above d) MHz or GHz
Answer: E e) None of these
The quickest communication channel is a Answer: D
microwave, but the optical fiber is used for data
transport rather than actual communication. 78. Which of the following is the first Computer
Virus?
75. ____________ in computing is a a) Mcafree
combinational digital circuit that operates on b) Creepers
integer binary integers mathematically and c) Firewall
bitwise. d) Trojan
a) Control Unit e) Harle
b) Arithmetic and Logic Unit Answer: B
c) Memory Unit
d) Input Unit 79. A ___________ is a type of computer
e) Simple Unit application that a computer virus typically
Answer: B connects to.
a) host program
76. __________ is widely used today for b) target program
protecting data in transit in a variety of c) backdoor program
applications such as data transfer on the d) Bluetooth
Internet, and cellular phone networks. e) trojan horse
a) Decryption Answer: E
b) Encryption
c) Integration 80. This device allows you to access data from
d) Data Mining other servers by connecting your computer to a
e) Interpretation phone line. It's called a __________________.
Answer: B a) MODEM
b) MAN
77. The clock rate of CPU is measured in which c) LAN
unit? d) Bridge
a) Milliseconds e) Hub
b) Microhertz Answer: A

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 14
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

a) Control bus
81. Rows of a relation are known as the b) Data bus
_________________. c) Address bus
a) Degree d) Network
b) Tuples e) Register
c) Entity Answer: B
d) All the above
e) None of these 85. A malicious assault known as __________
Answer: D conceals the IP packets' true source to make it
difficult to determine where they originated.
82. Token ring, token bus, and Ethernet are a) spoofing
examples of __________. b) forging
a) LAN c) IP spoofing
b) WAN d) All of these
c) MAN e) None of these
d) Internet Answer: C
e) Networking
Answer: A 86. A software program that is designed to run
once a web page has been accessed that is
83. A _________ is a networking device that usually in the form of banner or popup
forwards data packets between computer advertisements is called _______________.
networks that perform the traffic directing a) Spyware
functions on the Internet. b) Adware
a) Topology c) Aero
b) Protocol d) Applet
c) Wireless e) Archie
d) Router Answer: B
e) Server
Answer: D 87. Which of the following forms of data transfer
is the quickest?
84. __________________ is a collection of signals a) Co-axial Cable
that are used to convey data simultaneously b) Untwisted Wire
from one computer component to another. c) Telephone Lines

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 15
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

d) Fiber Optic Cable of priorities.


e) All the above a) Boot Disk
Answer: D b) Browser
c) Blue Ray
88. Which of the following Keys are said to be d) Bridge
toggle keys? e) Buffer
a) Caps lock Answer: E
b) Number Lock
c) Scroll Lock 92. A computer network is known as a ____that
d) Both (a) and (b) usually spans a city or a large campus.
e) All (a), (b) and (c) a) LAN
Answer: E b) WAN
c) MAN
89. A _________ is a copy of important data that d) Protocol
is stored in an alternative location, so it can be e) SPAN
recovered if deleted or it becomes corrupted. Answer: C
a) Malware
b) Archie 93. Which layer of OSI model defines the type of
c) Backup transmission medium between two devices?
d) Bandwidth a) Physical
e) Baseband b) Transport
Answer: C c) Data Link
d) Session
90. Which is the lowest layer of the OSI model? e) Application
a) Data Link Answer: A
b) Application
c) Network 94. _____________is a type of fraud in which a
d) Physical perpetrator uses email or other forms of contact
e) Transport to pose as a reliable organization or individual.
Answer: D a) Spoofing
91. A ____________is a data area shared by b) Phishing
hardware devices or program processes that c) Spyware
operate at different speeds or with different sets d) Firewall

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 16
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) Cracker 98. LAN stands for _______________________


Answer: B a) Lane Area Network
b) Local Army Network
95. ____________ is a program that transforms c) Local Area Network
basic computer instructions into a pattern of bits d) Local Area Networking
that the computer's processor may utilize to e) None of these
carry out its fundamental functions. Answer: C
a) Assembler
b) Compiler 99. A ___________ is someone who utilizes their
c) Interpreter knowledge to break into someone else's
d) Language Translator computers to steal information or do harm.
e) Device Drivers a) Spammer
Answer: A b) Phisher
c) Hacker
96. Which of the following information can be d) Instant Messenger
used to estimate how frequently a user visits a e) All the above
website? Answer: C
a) Cookies
b) Hacker 100. A _____________ is a device that generates
c) Phish the original signal as output from the coded
d) Spammer input signal and converts n lines of input into 2n
e) All the above lines of output.
Answer: A a) Data Rate
b) Data Communication
97. A device operating at the physical layer is c) Daughter Board
called a _________. d) DataBase
a) Router e) Decoder
b) Server Answer: E
c) Repeater
d) Transmitter 101. An_____________ in computing is a shared
e) Integrator boundary that allows two or more independent
Answer: C computer system components to communicate.
a) Hardware

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 17
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

b) Hard Boot Answer: A


c) Hypertext
d) Hotlist 105. Which of the following components
e) Interface connects numerous PCs to a single LAN?
Answer: E a) Repeater
An interface in computing is a shared boundary b) Switch
that allows two or more independent computer c) Hub
system components to communicate. d) Router
102. The network layer is concerned with e) Server
__________ of data. Answer: B
a) bits 106. ____________ in computers refers to the
b) frames total number of pixels (individual points of color)
c) packets on a display monitor, measured in terms of both
d) bytes the horizontal and vertical axes.
e) All the above a) Windows Registry
Answer: C b) Resolution
c) Relational Database
103. Junk E-mail is also called as __________. d) Refresh
a) Spool e) Real Boot
b) Spoof Answer: B
c) Spam
d) Hack 107. _________ are ciphered entries that are
e) None of these used to log into a computer system.
Answer: C a) Entry codes
b) Passwords
104. Installing a ______________ is a good way c) Codewords
to safeguard yourself from computer hacker d) Security Commands
attacks. e) Spycode
a) Firewall Answer: B
b) Trojan
c) Malware 108. The communication technique that allows
d) Spyware data to be transmitted in both directions but only
e) Mailer one at a time is ____________________.

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 18
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

a) Simplex c) Topology
b) Four-wire circuit d) Protocol
c) Half-duplex e) Port
d) Full duplex Answer: D
e) All the above
Answer: C 112. ______________ is the topology that
provides security, robustness, and eliminates
109. Several devices connected to a central hub the traffic factor or control.
by point-to-point links constitute a topology a) Mesh
known as ________________-. b) Star
a) Mesh c) Bus
b) Star d) Ring
c) Bus e) None of these
d) Ring Answer: B
e) None of these
Answer: B 113. Any unwanted, uninvited digital
110. In the field of computer science, communication transmitted in bulk is referred to
____________ is a set of rules that specify the as _____________.
symbol combinations that are regarded as a) Spam
correctly formed statements or expressions in b) Junk
that language. c) Trash
a) Socket d) Port
b) Source Code e) Protocol
c) Software Answer: A
d) Syntax
e) System Unit 114. ___________ files are temporary files that
Answer: D were produced so that your computer or phone
could carry out particular activities but are no
111. In computer science, ____________ is a set longer required.
of guidelines or instructions for transferring data a) Spam
between electronic devices, such as computers. b) Junk
a) Client c) Trash
b) Hardware d) Port

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 19
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) Protocol d) Only II and III


Answer: B e) All I, II, and III
Answer: A
115. A logic gate that is defined to execute the
logical multiplication of binary input is known as 118. ____ converts a human-readable name to a
_____ gate. numeric IP address
a) NOT a) DNS
b) NOR b) DOS
c) OR c) DDOS
d) AND d) VPN
e) NAND e) STP
Answer: D Answer: A

116. _____ is a command line-based operating 119. ______ virus is also called as parasitic virus
system where instructions are given through a) Encrypted
command. b) Source code
a) Window c) Macro
b) Unix d) File
c) Ubuntu e) Boot sector
d) DOS Answer: D
e) Linux
Answer: D 120. Which of the following short key is used to
undo the last deleted action in Excel?
117. Which of the following statement is true a) Ctrl+H
according to the private key? b) Ctrl+Y
I. It is used for encryption and authentication c) Ctrl+Z
purposes d) Ctrl+N
II. The private key mechanism is slower e) Ctrl+O
III. Performance testing checks the reliability, Answer: C
Scalability, and speed of the system.
a) Only I and III 121. Which of the following is not an Ethereum
b) Only I and II Network?
c) Only I a) Public network

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 20
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

b) Private network e) Router


c) Test network Answer: C
d) Live network
e) None of the above 125. ____ is a collection of items of the same
Answer: A data type stored at contiguous memory location
a) Hash table
122. Which of the following function key is used b) Queue
to enable and disable the full screen? c) Stack
a) F11 d) Array
b) F10 e) Linked list
c) F6 Answer: D
d) F12
e) F4
126. The processing of data is the alteration of
Answer: A
raw data to usable data over a process in a
computer. This process data is called as ______
123. ____ is the process of transforming data
a) Storage
into such a format that it can be by different
b) Cache
types of systems using a publicly available
c) Information
algorithm
d) Structure
a) Hashing
e) Analysis
b) Encoding
Answer: C
c) Cryptography
d) Encryption
127. Which describes software manipulating and
e) Decryption
extracting data from stored file i.e. transforming
Answer: B
of the input data to form a useful information in
the CPU?
124. _____ is a networking device that is used to
a) Input
transmit the signal to each port to respond from
b) Output
which the signal was received.
c) Processing
a) Bridge
d) Preparation
b) Repeater
e) Storage
c) Hub
Answer: C
d) Switch

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 21
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

an OS of processor core, memory pages and


128. The digital computer internally uses the various types of bandwidth computations to
______ system to represent data and perform compete it.
arithmetic calculations. a) Memory management
a) Hexa decimal b) Time management
b) Decimal c) Device management
c) Octal d) Resource management
d) Binary e) File management
e) Number coded Answer: D
Answer: D
132. Which unit is a component of computers
129. Which refers to the ability of computers to CPU (brain of the computer) it regulates and
perform a variety of tasks such as simple or integrates to direct the operation of the
complex to design a specific application? processor?
a) High speed a) Input unit
b) Versatility b) Memory unit
c) Diligence c) ALU
d) Automation d) Output unit
e) Reliability e) Control unit
Answer: B Answer: E

130. A developer should request service from an 133. ______________________ is a security


operating system or other applications and mechanism used to determine user/client
expose data within a different context and privileges or access levels related to system
multiple channels is called as ______ resources, including computer programs, files,
a) API services, data and application features.
b) GUI a) Authentication
c) VGI b) Automation
d) OS c) Encryption
e) I/O device d) Decryption
Answer: A e) Authorisation
Answer: E
131. _____ is the dynamic and de-allocation by

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 22
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

134. Which is the process of allocating system 137. Which is also known as bistable
resources such as memory, processor time, multivibrator, it’s mainly used in sequential
bandwidth hardware device and application circuits to store data in memory?
used them? a) Register
a) Memory management b) Counters
b) Time management c) Memory Storage
c) Device management d) Flip Flop
d) Process management e) Binary code
e) File management Answer: D
Answer: C
138. Which input device was first invented by
135. The keyboard is used as a text entry C.B. Mirick at the US Naval Research
interface for typing text, numbers and symbols Laboratory in 1926, to manage a machine or
used into software applications. The most character in a computer program?
commonly used keyboard is _________ a) Joystick
a) DVORAK b) Trackball
b) QWERTY
c) AZERTY c) Mouse
d) MAGIC d) Light pen
e) Wireless e) Barcode reader
Answer: B Answer: A

136. Which consists of numerous computers, 139. ________is an operating system scheduler
nodes and sites joined together by LAN lines that chooses processes from the job queue
and it supports many real time products and loads them to execute in the main memory.
different user? a) Distributed
a) Batch b) Real time
b) Time sharing c) Short term
c) Multiprogramming d) Long term
d) Real-time sharing e) Device driver
e) Distributed Answer: C
Answer: E
140. Binary coded decimal (BCD) uses 4 bits

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 23
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

that represents one decimal digit and also a) Error- correcting code
encoded more information. Who introduced b) Binary coded code
BCD? c) Gray code
a) Apple d) Error- detecting code
b) IBM e) Weighted code
c) Honeywell Answer: A
d) AOL
e) QCS 144. MICR is the special ink input technology
Answer: B invented in 1950s used to verify and print certain
characters on the original documents. How
141. Which time is required to complete a many digit code used in this MICR?
process, it can be used in task scheduling and a) 8
operating system algorithms? b) 9
a) Access time c) 12
b) Waiting time d) 6
c) Response time e) 10
d) Turnaround time Answer: B
e) Clock time
Answer: D 145. The difference between the turnaround
142. Which software is commonly used to time and burst time is ______
convert recognize text in scanned documents or a) Access time
an image into an accessible electronic version b) Waiting time
(digital form) of the text? c) Response time
a) Printer d) Turnaround time
b) MICR e) Clock time
c) OMR Answer: B
d) OCR
e) Plotter 146. Which is a chip-based computer
Answer: D component that acts as a temporary storage
area where the computer processor can retrieve
143. What is the process of detecting error in data easily?
transmitting messages and reconstructing the a) Cache
original error-free data to the receiver side? b) Primary

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 24
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

c) Main c) ROM
d) Secondary d) EEPROM
e) Flash e) MROM
Answer: A Answer: A

147. _______ is a situation where a set of 150. ________ is commonly embedded in an


processes are blocked, each process is holding eight bit field, it was introduced by IBM in 1981
a resource and waiting for another resource for on its first personal computer.
their processes. a) Parity code
a) Avoidance b) Weighted code
b) Prevention c) ASCII code
c) Deadlock d) Gray code
d) Blocking e) Bar dot code
e) Throughput Answer: C
Answer: C
151. In OS, what is the storage mechanism
148. Which port device was introduced in 1996 used to retrieve processes from secondary
by American companies including IBM, Intel and storage into main memory in the form of
MS Corporation, to connect hardware to frames?
personal computer? a) Segmentation
a) Infrared b) Paging
b) VGA c) Scheduler
c) USB d) Swapping
d) Modem e) File System
e) DVI Answer: B
Answer: C
152. __________is also known as backbone of a
149. Data written on this memory cannot be computer and it serves as a single platform to
erased as a result. This memory is also called connect all parts of the computer.
as ____________ a) Switches
b) Routers
a) PROM c) Serial port
b) EPROM d) Motherboard

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 25
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) Circuits
Answer: D 156. HTML is the standard markup language for
documents designed to be displayed on a
153. Which language is used to write programs webpage. It was introduced in the year ______
that relate to the specific architecture and by Sir Tim Berners’s lee.
hardware of the particular type of computer? a) 1995
a) High level b) 1994
b) Low level c) 1993
c) Middle level d) 1992
d) Programming e) 1996
e) Human Answer: C
Answer: B
157. In which event, they executed the script
154. Which is used to store large amounts of when the value of the element is changed and
structured and unstructured data and they can trigger an event when the elements get
be used to support wide range of activities? focused?
a) Database a) Keyboard
b) Information b) Form
c) Keys c) Mouse
d) Values d) Clipboard
e) Cells e) Media
Answer: A Answer: B

155. Which is a rebuilding of a database or table 158. Which is a programming language that
space after a problem such as media or storage employs a high-level construct to interpret and
failure, power interruption and application execute one command at a time?
failure? a) Scripting
a) Data modelling b) Imperative
b) Data Storage c) Functional
c) Data Integrity d) Markup
d) Data security e) Logic
e) Data recovery Answer: A
Answer: E

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 26
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

159. Which program is designed for a stored data from different locations through
multitasking environment, where two or more several applications and it’s mainly used in
programs share the same memory while running mainframe computer?
parallel? a) Centralized
a) Declarative b) Distributed
b) Imperative c) Cloud
c) Functional d) Traditional
d) Concurrent e) Hierarchical
e) Logic Answer: A
Answer: D
160. Which encompasses the rules and other 163. HTML is a standard markup language
processes restricting the format, type and mainly used for creating webpages. In HTML
volume of data recorded and only valid data is how many levels of headers are used?
entered into a database? a) 4
a) Domain b) 8
b) Internal c) 6
c) Entity d) 5
d) User-defined e) 10
e) Referential Answer: C
Answer: A
164. MySQL comes under which database
161. Which is the primary activity to develop stores the data in a separate table and
protocols and guidelines that ensure long-term organisesit into physical files optimized for
growth for the web and define the key part of speed?
web works? a) Centralized
a) WDA b) Distributed
b) W3C c) Relational
c) W3B d) Traditional
d) W2W e) Hierarchical
e) WMA Answer: D
Answer: B
165. In the global attribute, which key is used to
162. In which database the user access the generate keyboard shortcut for the current

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 27
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

elements and the value is described in the form a) 5


of character? b) 4
a) Control key c) 2
b) Function key d) 3
c) Access key e) 1
d) Modifier key Answer: D
e) Filter key
Answer: C 169. In a worksheet in MS-Excel, what is short-
cut key to hide the entire row?
166. Which system will use the alternate key to a) Ctrl + F9
uniquely identify a row using one or more b) Ctrl + 6
column values that represent a unique c) Ctrl + 9
combination? d) Ctrl + F11
a) Data modelling e) Ctrl + 12
b) Data Storage Answer: C
c) Data Integrity
d) Data security 170. In which generation this PROLOG
e) Data recovery language can be used?
Answer: C a) 1
b) 2
167. Which tag is summarize basic information c) 3
about data, making and working on particular d) 4
instance of the data easier? e) 5
Answer: D
a) Meta
b) Text 171. Which database built to run in a public or
c) Link hybrid environment to store, organize and
d) List manage data within an organization?
e) Object
Answer: A a) Centralized
b) Distributed
168. How many candidate keys are there in c) Cloud
DBMS? d) Traditional

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 28
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) Hierarchical
Answer: C 175. An inline element does not start on a new
line and only takes up as much width as
172. Which error mistake in source code appear necessary. Which of the following is an inline
in separate error window with type and line element?
number to indicated so it can be corrected in a) <p>
edit window? b) <hr>
a) Semantic c) <span>
b) Logical d) <dir>
c) Syntax e) <ul>
d) Run time Answer: C
e) Type
Answer: C 176. In which modelling workbench concept
used both physical and logical data models so it
173. Which text appears half a character above is work with many database vendors?
the normal line and sometimes it rendered in a a) Distributed
smaller font or used in footnotes? b) Centralized
a) Subscript c) Dimension
b) Superscript d) Relational
c) Manuscript e) Hierarchical
d) Smaller text Answer: C
e) Larger text
Answer: B 177. The second ‘S’ defined in CSS is _______
a) Style
174. _________is a text-based detail design tool b) Sheet
it’s an artificial and informal language that helps c) Save
programmers to develop algorithm. d) Single
a) Reserved e) Space
b) Pseudocode Answer: B
c) Looping
d) Keywords 178. Which function is created and used just like
e) Optional words value-returning functions except they do not
Answer: B return the value after the function executes?

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 29
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

a) int b) Embedded
b) char c) Inline
c) void d) External
d) float e) Inbound
e) double Answer: D
Answer: C
182. In which statement creates a loop that
179. The managed database service is a cloud executes the specific statement as long as the
computing service on-demand database test condition is evaluated as false and stops the
consumption coupled with automation of execution?
operations. This is also known as ___________ a) while
a) IaaS b) for
b) DBaaS c) do…while
c) PaaS d) if
d) SaaS e) switch
e) EaaS Answer: A
Answer: B
183. To indent the first paragraph of your report,
180. Which statement can execute one of you should use the ____________ key.
several blocks of code depending on the a) Shift
conditions, if there are no conditions then the b) Tab
default block is executed. c) Backspace
a) While d) Spacebar
b) For e) Alt
c) Do…while Answer: B
d) If
e) Switch 184. A hierarchical database is a data model in
Answer: E which data is stored in the form of records and
organized into tree like structure. The best
181. In which CSS they define all properties in a example of this database is…………
separate file (.css) and then include the HTML a) TCS
file using tag in section? b) IBM
a) Internal c) Microsoft

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 30
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

d) Google Answer: D
e) Amazon
Answer: B 188. Which is a software and hardware-
independent tool for storing and transporting
185. Which database model allows record from and reconstructing arbitrary data?
more than one table to be associated with a a) HTML
single owner record of another table? b) Netscape
a) Network c) XML
b) Distributed d) JavaScript
c) Cloud e) HTML5
d) End-user Answer: C
e) Object-oriented
Answer: A 189. Which is used to provide with a medium of
instruction to establish communication between
186. In which property an element on left and different devices for the exchange of data and
right side of the container, allowing text and other service?
inline elements to wrap around it? a) Message
a) Framework b) Transmission mode
b) Float c) Protocol
c) Flexbox d) Information
d) Tables e) Address
e) Directories Answer: C
Answer: B
190. Which type of computer program is
187. The CSS selectors are the part of CSS rule designed to run a computer's hardware and
set and it used to style the selected content. In program therefore it’s an interface between the
the ID selector they used which symbol to define hardware and user program?
it? a) System
a) / b) Application
b): c) Utility
c); d) Driver
d) # e) Middleware
e) * Answer: A

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 31
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

language that is intended to communicate


191. In which process the data must be directly with a computer's hardware?
delivered as they are produced by the sender, a) Machine
then in order to produce to the receiver without b) Assembly
any significant delay? c) High level
a) Accuracy d) Device driver
b) Tasks e) Translator
c) Timeliness Answer: B
d) Jitter
e) Transport 195. The basic working concept of the green
Answer: C data centre is based on the working of computer
and their resource having better __________
192. Data centre is the integration of the a) Compatibility
constellation of networking sources and which is b) Efficiency
the first biggest data centre? c) Energy cost
a) Oracle cloud d) Reduce traffic
b) Alibaba Cloud e) High storage area
c) AWS Answer: B
d) GCS
e) Facebook 196. Which is the connection point among
Answer: C network devices such as routers, printers or
switches that can receive and send data from
193. In which topology, it designed a way in one point to another?
which all the stations are connected through a
single cable is known as a backbone network? a) Nodes
a) Bus b) Links
b) Mesh c) Cable
c) Star d) Circuits
d) Hybrid e) Network
e) Tree Answer: A
Answer: A
197. Aword processor is a software program
194. Which is a type of low-level programming capable of creating, storing and printing

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 32
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

documents. Which is a powerful word a) Routers


processor? b) Repeaters
a) Coda c) Hub
b) Pages d) Connectors
c) Click up e) Modem
d) WPS office Answer: B
e) Grammarly
Answer: B 201. ________is a family of software programs
used for editing vector graphics, illustration and
198. The first spreadsheet program is design then created in graphics packages and
__________ which is written for Apple II which consist of object.
computer in 1979. a) Photoshop
a) Google sheets b) Illustrator
b) VisiCalc c) Corel draw
c) Excel d) Ink space
d) Zoho sheets e) GIMP
e) Air table Answer: C
Answer: B
202. Which is used as a connecting device in
199. How many tier rating breakdownsare in the networking system, so it act as a bridge in a
data centre? network and router in an internetwork?
a) 5 a) Brouter
b) 4 b) Repeaters
c) 3 c) Hub
d) 6 d) Gateway
e) 2 e) Modem
Answer: A
Answer: B
203. In which data storage the organization to
200. Which is a dynamic network device used to store a massive amount of unstructured data to
reproduce the signals when they transmit over a store them to easily access it?
greater distance so that signal strength remains a) Object
equal? b) File

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 33
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

c) Block b) Managed service


d) Memory c) Colocation
e) Drive d) Traditional
Answer: A e) Cloud
Answer: B
204. PAN is a computer network for 207. What is the internal code name of the
interconnecting electronic device within an Android 13 version?
individual’s workspace. What is the size of PAN a) Snow cone
ranges? b) Red velvet cake
a) 10m c) Black forest
b) 20m d) Snow cake 2
c) 50m e) Tiramisu
d) 60m Answer: E
e) 40m
Answer: A 208. Which is the maximum acceptable time that
an application, network, or system can be down
205. Which graphics is a form of computer after an unexpected disaster, failure or event
graphics in which visual images are created take place?
directly from geometric shapes defined on a a) RPO
Cartesian plane, such as points, lines, curves b) RTO
and polygons? c) RSO
a) Vector d) RLO
b) Raster e) RDO
c) 3D Answer: B
d) Animation
e) Scaling 209. Which is comprised of a light carrying core
Answer: A in the centre, surrounded by the cladding that
acts to trap the light in a core either it’s in single
206. Which service may help directly with end- or multi-mode?
user system to deploy, manage and secure any a) Coaxial
devices, applications or data a company b) Radio wave
require? c) Fiber-optic
a) Enterprise d) Baseband

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 34
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) Microwave transmission 25, 1983 under the name Multi-tool word for
Answer: C Xenix system?
a) Notepad
210. A __________ is an image or text that b) MS Outlook
appears behind the main text of the document. c) MS Word
a) Smart Art d) MS Excel
b) Clip Art e) MS access
c) Word Art Answer: C
d) Water Mark
e) Book Mark 214. Which is an interconnected computing
Answer: D devices that can exchange data and share
resources with each other while providing nodes
211. Which was the last version of Windows that between them?
was based on the Windows 95 kernel? a) Internet
a) Windows NT b) Intranet
b) Windows XP c) Network
c) Windows 95 d) Connectors
d) Windows ME e) Modem
e) Windows 2000 Answer: C
Answer: D
215. Which is appears on the top of the
212. In which windows version, in Internet document window and allows formatting the
Explorer they launched the "Trustworthy horizontal or vertical alignment of text in a
Computing" programme? document?
a) Windows NT a) File
b) Windows 98 b) Edit
c) Windows 95 c) Ruler
d) Windows XP d) Developer tab
e) Windows 2000 e) Insert
Answer: D Answer: C

213. Which word processor developed by 216. In which year the first antivirus released, in
Microsoft and it was first released on October the United States, John McAfee founded the

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 35
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

McAfee Company and at the end of that year, web standards?


he released the first version of Virus Scan? a) ICANN
a) 1985 b) W3C
b) 1986 c) IAB
c) 1987 d) ISOC
d) 1981 e) IANA
e) 1984 Answer: B
Answer: C
220. Which Microsoft Windows operating
217. Which is make it possible for customers to system released commercially in October 2009
access the internet while also providing as the successor to Windows Vista?
additional services such as email, domain a) Windows 7
registration and web hosting? b) Windows 1
a) ISP c) Windows 9
b) W3C d) Windows 10
c) IAB e) Windows 11
d) ISOC Answer: A
e) IANA
Answer: A 221. Which is cloud-based in the sense that files
are scanned on a remote server without using
218. Which is the mess, plagued with numerous processing power of the user's machine?
bugs and slowest version of windows produced a) Avast
operating system? b) Avira
a) Windows NT c) Norton
b) Windows XP d) Panda
c) Windows 95 e) Bitdefender
d) Windows ME Answer: D
e) Windows 2000
Answer: D 222. Which software with malicious behavior
that aims to gather information about a person
219. Which is designed to bring interested or organization and send it to another entity in a
parties together from different areas of way that harms the user?
information technology to work on developing a) Virus

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 36
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

b) Spyware c) Wireless
c) Web d) Wired
d) Spam e) Wi-Fi
e) Firewall Answer: C
Answer: B
226. Website remember information about user
223. The IETF standard documents are also visit, which can both make it easier to visit the
called as _________ site again and make the site more useful to the
a) ISP user?
b) IEEE a) Search engine
c) VPN b) Bookmarks
d) RFC c) Cookies
e) IANA d) History
Answer: D e) Downloads
Answer: C
224. Windows 2000 was released as an
operating system for businesses and people that 227. Which is used to make sure internet users
know how to use computers well. What is the without access are not able to interface with
codename? private networks, or intranets, connected to the
a) Blue internet?
b) Neptune a) Cost-Effective
c) Longhorn b) Spyware
d) Janus c) Web
e) Win ball d) Spam
Answer: B e) Firewall
Answer: E
225. Which is refer to a computer network that
makes use of Radio Frequency (RF) 228. Which is due to other factors like malware,
connections between nodes in the network and junk files, outdated software, or just too many
it is popular in home, businesses and programs running on your device?
telecommunication? a) System slowdown
a) Dial-up b) Complete protection
b) Broadband c) Security holes

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 37
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

d) Limited detection Answer: C


e) No customer support
Answer: A 232. OLE is a Microsoft technology that
facilitates the sharing of application data and
229. A bookmark is a feature in the text editors objects written in different formats from multiple
like Notepad++, which offers the user the ability sources. Define “O”
to mark a line that can be quickly viewed. This a) Open
line can be appeared in what color? b) Operating
a) Red c) Optic
b) Green d) Observe
c) Blue e) Object
d) Black Answer: E
e) Yellow
Answer: C 233. A CIA is the primary goal of network
security. Define “A” in CIA?
230. Which tab consists of table of contents, a) Aspects
Footnotes, Citations & Bibliography, Captions, b) Availability
Index, and Table of Authorities? c) Assist
a) File d) Analogy
b) Edit e) Awareness
c) Reference tab Answer: B
d) Developer tab
e) Home tab 234. __________ is the process of repeating a
Answer: C message multiple times in order to increase
brand awareness and consumer recall.
231. In which user can view the primary a) System slowdown
windows and certain secondary windows on the b) Complete protection
desktop and quickly switch between them? c) Security holes
a) Desktop d) Limited detection
b) Start menu e) Frequently advertisement
c) Taskbar Answer: E
d) Icons
e) Scroll bar 235. The indent is a distance between text

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 38
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

boundaries and page margins. In which type of c) Spyware


indent, the text is little inward form the first line? d) Virus
a) Positive e) Phishing
b) Negative Answer: A
c) Neutral
d) Hanging 239. The header and footer areas are used for
e) Central inserting the document information such as
Answer: D name, number, title and date of the file. The
default size of these in MS Word is…………..
236. How many types of scrollbars are there? a) 0.5 inch
a) 4 b) 1.0 inch
b) 5 c) 1.5 inch
c) 6 d) 0.25 inch
d) 2 e) 1.25 inch
e) 3 Answer: C
Answer: D 240. What is the default size of Page
orientation?
237. Which is the grey colour window that pops a) 8.5*11 inches
on the system to display messages and allow b) 6.5*10 inches
the user to set parameters? c) 7.5*11 inches
a) Dialog box d) 5.5*10 inches
b) Tool bar e) 8.5* 12 inches
c) Taskbar Answer: A
d) Status bar
e) Scroll bar 241. Which type of malware from crypto virology
Answer: A that threatens to publish the victim's personal
data or permanently block access to it unless it
238. In 1986, which is the significant concern paid off?
that can cause damage to the organization and a) Whaling
their user for data losses, decreased productivity b) Trojan horse
and financial losses? c) Ransomware
a) Malware d) Worm
b) Trojan horse e) Phishing

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 39
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

Answer: C
245. How many leading types of web servers?
242. Which detection is proactively detects a) 5
malware by executing, or detonating, code in a b) 4
safe and isolated environment to observe that c) 2
code's behavior and output activity? d) 6
a) System slowdown e) 3
b) Heuristic detection Answer: B
c) Sandbox detection
d) Behavior based detection 246. Which describes physical object with
e) System detection sensor, processing ability, software and other
Answer: C technologies that connect and exchange data
between the networks?
243. Whichisdoesn't involve algorithms, a) IoT
machine learning, or statistics but it relies on b) Block chain
computer programming like Python, R, and Java c) Node
to function? d) Proxy
a) Data harvesting e) Big data
b) Bagging Answer: A
c) Data cleaning
d) Binning 247. Which DNS is best server?
e) Data wrangling a) Cloud flare
Answer: A b) Google public
c) Alternate
244. The CRISP-DM methodology provides a d) Clean browsing
structured approach to planning a data mining e) Quad9
project. Define “S” in CRISP. Answer: B
a) Storage
b) Small 248. Which version of BLE is focused on IoT?
c) Size a) 2.0
d) Standard b) 3.0
e) Security c) 4.0
Answer: D d) 5.0

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 40
Important Computer Awareness Questions for IBPS RRB PO/Clerk Mains

e) 4.1 250. Which is responsible for managing the


Answer: C resources of the web application, such as
memory, threads, and database connections?
249. The first decentralized block chain was a) Web Server
conceptualized by a person or group of person b) Networking device
known as Santoshi Nakamoto in the year c) Data store
………….. d) Web container
a) 2006 e) Firewall
b) 2005 Answer: D
c) 2008
d) 2007
e) 2009
Answer: C

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 41

You might also like