0% found this document useful (0 votes)
228 views32 pages

Ibps RRB Clerk Computer 2020 23 Questions

rrb clerk computer pyq

Uploaded by

anaspirant351
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views32 pages

Ibps RRB Clerk Computer 2020 23 Questions

rrb clerk computer pyq

Uploaded by

anaspirant351
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 1
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

S. No Topics Page No

1. RRB Clerk Mains 2023 Memory Based Paper 02

2. RRB Clerk Mains 2022 Memory Based Paper 08

3. RRB Clerk Mains 2021 Memory Based Paper 16

4. RRB Clerk Mains 2020 Memory Based Paper 24

RRB Clerk Mains 2023

1. What is the shortcut key for a new Ctrl+U and start typing. When you want to stop
presentation in PowerPoint? underlining, press Ctrl+U again.
a) Ctrl + B
b) Ctrl + N 3. In which year is the internet invented?
c) Ctrl + J a)1980
d) Ctrl + M b) 1982
e) Ctrl + D c) 1983
Ans: B d) 1985
Ctrl + N is the shortcut to create a new e) 1988
presentation in MS PowerPoint. Ans: C
The invention of the internet is considered to be
2. What is the shortcut key for Underline? Jan. 1, 1983, but the vision started decades
a) Ctrl + U before.January 1, 1983 is considered the official
b) Ctrl + N birthday of the Internet. Prior to this, the various
c) Ctrl + J computer networks did not have a standard way
d) Ctrl + M to communicate with each other.
e) Ctrl + D
Ans: A 4. Which component is used to convert digital
The quickest way to underline text is to press signal to analogue signal over telephone line?

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 2
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

a) Transistors d) Extension of Video slide


b) Capacitors e) Slideshare
c) Modem Ans: C
d) Internet A doc refers to a file extension for Microsoft
e) Fax Word documents. This type of file is primarily
Ans: C used for creating and editing text documents.
Modem stands for MOdulator/DEModulator. A
modem converts digital signals generated by the 7. What is the shortcut key for Bold in MS
computer into analog signals which can be Word?
transmitted over a telephone or cable line and a) Ctrl + B
transforms incoming analog signals into their b)Ctrl + N
digital equivalents. c)Ctrl + J
d)Ctrl + M
5. What is the maximum storage capacity of e)Ctrl + D
CD? Ans: A
a) 700MB Ctrl + B is used to make the selected text bold in
b) 500MB MS Word.
c) 250MB 8. Which of the following is not an input
d) 800MB devices?
e) 750MB a) Microphone
Ans: A b) Mouse
Compact discs hold 700MB of data (equivalent c) Joystick
to 80 minutes of audio, hundreds of high-quality d) Scanner
digital images, and small video files). Unlike e) Plotter
DVDs, CDs are not yet available in double-sided Ans: E
or dual-layer formats. All the other option except (e) is an input device.

6. Doc and Docs are used for _________. 9. Which of the following is named to monitor
a) Extension of Presentation technology used for the widest view angle?
b) New Sheet in the spreadsheet a) LED
c) Extension for Document File b) TFT

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 3
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

c) TGH A computer cannot boot if it does not have an


d) GIF operating system. An operating system is the
e) GIT most critical piece of software in a computer. It
Ans: B acts as a bridge between the user and the
TFT is used to monitor technology for the widest hardware of the computer. Hence, a computer
view angle cannot boot without an operating system.

10. What is the primary task of the command 12. What is the shortcut key for Clear all
prompt in the Operating system? formatting in MS Word?
a) User Interface a)Ctrl+Enter
b) Interlinking Networks b) Ctrl+ Spacebar
c) Monitor technology c) Alt+ Tab
d) Store Cache memory d)Alt+Enter
e) Installation e) Ctrl+Enter+F5
Ans: A Ans: B
In the Windows operating systems, the Press Ctrl + Spacebar to clear formatting such
Command Prompt is a program that emulates as font, font size, and bold.
the input field in a text-based user interface
screen with the Windows Graphical User 13.Where does the mail go when it is deleted in
Interface (UI). It can be used to perform entered Gmail?
commands and perform advanced a)Spam
administrative functions. b) Junk
c) Trash
11.The computer cannot boot if it does not have d) Social
___________. e) Important
a) Power Ans: C
b) OS When you delete a message, it stays in your
c) Memory trash for 30 days. After 30 days, the message is
d) Modem permanently deleted from your account and
e) Antenna can't be recovered.
Ans: B

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 4
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

14.What is the shortcut key for Save in MS of Microsoft Office software.


Excel?
a) Ctrl + B 17. What is said to be a technique used in web
b)Ctrl + N browsers to update the content of a webpage?
c)Ctrl + S a) Reload
d)Ctrl + M b) Readable
e)Ctrl + D c) Domain
Ans: C d) Scroll
To quickly save a file, press Ctrl+S. e) Transit
Ans: A
15.The footergroup is in which tab? Refresh and Reload are terms used
a)View interchangeably. They both mean the same
b) Insert thing; it is a technique used in web browsers to
c)Home update the content of a webpage. Refreshing or
d) Table Reloading your browser helps to show the most
e) Picture Format recent version of the page you're currently on.
Ans: B
The header and footer controls are in the 18. Which of the following is not available in MS-
Header & Footer group of the Insert tab (Insert > Word?
Header & Footer). a) Pivot Table
b) Header
16.What is the online version of MS Office c) Picture Format
package? d) Help
a) Microsoft XS e) Table
b) Microsoft 365 Ans: A
c) Microsoft VS
d) Microsoft 265 19. A Public digital ledger is ______________.
e) Microsoft 376 a) Share drive
Ans: B b) Blockchain
The Microsoft Office 365 suite is a hosted, c) Transistor
online version of the traditional installed version d) Website

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 5
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

e) Browser Ans: B
Ans: B The file extension of MS PowerPoint is .ppt. .
A blockchain is a digitally distributed, ppt is a file with a PPT extension representing a
decentralized, public ledger that exists across a PowerPoint file that consists of a collection of
network. slides for displaying as SlideShow.

20.What is the full form of WAN? 23.Which of the following is Primary Memory?
a) Wide Area Notion a) SSD
b) Waste Area Network b) RAM
c) Wide Area Network c) Hard drive
d) Wide Air Network d) Optical drive
e) World Active Net e) USD Drive
Ans: C Ans: B
21.Whatof the following stimulatesHuman-Level ROM (Read Only Memory) and RAM make up
Intelligence? the primary memory.
a) AI
b) PI 24.Which of the following is not an Operating
c) PL System?
d) DS a) Linux
e) CD b) Unix
Ans: A c) Microsoft
Artificial intelligence (AI) is the simulation of d) Android
human intelligence in machines that are e) Oracle
programmed to think and act like humans. Ans: E
Some examples of operating systems include
22.What is the filrextension of Power Point? Apple macOS, Unix Operating System,
a)ptp Microsoft Windows, Google's Android OS, Linux
b) ppt Operating System, and Apple iOS.
c) pop
d) pt 25.Who built the first Mechanical Calculator?
e)popt a) Charles Babbage

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 6
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

b) Blaise Pascal Browser?


c) Thomas Cook a) Firefox
d)John Pascal b) Edge
e) George Bernandes c) Safari
Ans: B d) Avast
The first mechanical calculating machine was e) Opera
made by Blaise Pascal. Ans: D

26.What is the full form of UPS? 29. What refers to the action of reducing or
a)Uninterruptible Power Supply decreasing the size, extent, or quantity of
b)Uninterruptible Power System something?
c) Understanding Power System a) Minimize
d) Unique Power Supply b) Maximize
e) Unique Product System c) Scroller
Ans: A d)Drop
The full form of UPS is Uninterruptible Power e)Sleep
Supply. UPS is a type of power supply system Ans: A
with an integrated battery, and in the absence of Minimization refers to the action of reducing or
primary mode or when power is shut down, the decreasing the size, extent, or quantity of
battery is used for the power source. something.

27.Which of the following is not a part of a Laser 30.Which of the following memory is greater?
printer? a) KB
a)Scanner Parts b) GB
b) Paper Tray c) MB
c)Imaging Unit d) PB
d) OPC Drum Unit e) TB
e)Microfibre Ans: D
Ans: E

28. Which of the following is not a Web

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 7
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

RRB Clerk Mains 2022

1. Which one of the following is the default word


processor for Microsoft Windows? 4. Which folder would you generally associate
a) MS WORD your mails going in after they are deleted in
b) MS PAINT GMAIL?
c) WordPad a) Primary
d) Notepad b) Spam
e) None of these c) Draft
Ans: C d) Starred
Wordpad is the default Microsoft Word e) Trash
Processor. Ans: E
The deleted email goes in the trash folder and
2. First Web browser was created by _________ stays there till 30 days if not cleared.
a) Tim Berners Lee 5. The term that defines the intention of a
b) James Gosling person to extort money from another person
c) Rosen Hall (preferably the owner) is?
d) Charles Babbage a) Ransomware
e) Alan Turing b) Malware
Ans: A c) Spyware
Tim Berners Lee also invented the HTML and d) Adware
HTTP protocol e) None of these
Ans: A
3. Which of the following is an input device? Hackers use this technique to charge money for
a) Screen/Monitor unlocking the files and folders and all relevant
b) Speakers data of the owner to give it back. The money is
c) LCD transferred through bitcoin (cryptography).
d) Scanner
e) All of the above 6. In MS Excel, which command is not a valid
Ans: D cell reference?
Scanner is an input device and the rest are a) AB20
output devices b) A21

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 8
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

c) AB#20 All files and sub-folders in the current folder are


d) AB$45 selected.
e) None of these
Ans: C 9. The keyboard shortcut CTRL + Z is for which
AB#20. We do not use # for cell referencing in of the following function?
MS Excel. a) Redo
b) Undo
7. When you connect to the _________ the c) Cut
computer connects to a server. Fill in the blanks d) Paste
a) Protocol driven messaging e) None of the above
b) Internet Ans: B
c) Intranet 10. The shortcut Windows Logo Key + Up Arrow
d) Client key is used to carry out which of the following
e) None of these function?
Ans: C a) Close the active window
When our compute connects to the internet it b) Switch between the windows opened
starts communicating with a server at the ISPs c) Minimize the active window
disposal. d) Copy the address of the active window
e) None of these
8. What is the output, when a folder is opened in Ans: C
a Windows computer and CTRL +A keys are
pressed simultaneously? 11. In MS- Excel the shortcut key combination to
a) All files and sub-folders in the current folder apply/remove strikethrough is?
are selected. a) CTRL +5
b) The window switches between the apps b) CTRL +3
opened. c) CTRL +2
c) The Files other than those present inside the d) CTRL +4
concerned folders are selected. e) CTRL +1
d) Only the first 5 files are selected. Ans: A
e) None of these
Ans: A 12. The __________ feature helps to align all the

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 9
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

text to fit within the defined margins in a word b) Exception Handling


processor. c) Query
a) Font d) Interrupt Handler
b) Word wrap e) Both a & b
c) Auto text Ans: E
d) font size After we install a software in a computer, the
e) None of these update messages that we see are known as trap
Ans: B or exception handling. Whereas the hardware
interrupts are called polling and vectored.
16. The Themes section of MS PowerPoint is
13. The correct full form of VGA is? found under?
a) Volatile Geographic Access a) Home tab
b) Video Graphics Array b) Design tab
c) Video Graphics Adapter c) Insert tab
d) Video Geographic Array d) Animation tab
e) None of these e) None of these
Ans: B Ans: B

14. Among the following which one of them is a


permanent storage device?
a) Cache
17. When an operating system enables a
b) Optical Disk
person to interact with the computer through the
c) SSD
use of symbols, icons, visualmetaphors and
d) Hard Disk
pointing devices, it is classified as _______?
e) Both c & d
a) Command line interface
Ans: E
b) Graphical user interface
Hard Disk and SSD, both are permanent
c) Touch user interface
storage devices
d) Voice user interface
e) None of these
15. A software interrupt is also called _______
Ans: B
a) Trap
In a GUI, the user interacts with the computer

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 10
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

system through symbols, icons, pointing independently is called?


devices. a) Copying
b) Appending
18. MAC address is a ____________ c) Merging
a) 48 bit physical address d) Compiling
b) 48 bit logical address e) Pasting
c) 32 bit device address Ans: C
d) 32 bit physical address The merging feature helps bring together
e) None of these different copies of workbooks that other users
Ans: A have worked on independently.
The Media Access Control address is a
hardware address/Ethernet address. It is 48 bit 21. Other than the <b> tag in HTML, which of
physical address. It is mentioned/imprinted on the following options can be used to make the
the NIC text bold?
a) <table>
19. The device that converts a decimal number b) <strong>
to a binary is called? c) <thick>
a) encoder d) <bold>
b) decoder e) None of these
c) Accumulator Ans: B
d) Assembler
e) None of these 22. Windows 7 was launched in?
Ans: A a) 20 October, 2009
An encoder converts information from one b) 15 August. 2008
format or code to another. An encoder can be c) 22 October, 2009
used to encode the decimal number to binary d) 22 October, 2010
number. e) None of these
Ans: C
20. The feature that allows multiple users in MS
Excel to bring together different copies of 23. What is the binary equivalent of (471)8
workbooks that other users have worked on a) 100111111

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 11
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

b) 100000001 HTML?
c) 100111001 a) Rownum
d) 100111011 b) Rowid
e) None of these c) Rowspan
Ans: C d) All of these
100111001. Make groups of three → 4 = 100, e) None of these
7= 111, 1 = 001 Ans: C
Rowspan attribute in HTML specifies the
24. 1 Petabyte (PB) = 1024 __? number of rows a cell should span.That is if a
a) KB row spans two rows, it means it will take up the
b) MB space of two rows in that table.
c) TB
d) GB 27. The shortcut key used for aligning the text
e) EB centrally in MS Office is ____
Ans: C a) CTRL + R
TB. 1024 Terabytes = 1 Petabyte b) CTRL + H
c) CTRL + T
25. The Caps Lock key is also called a toggle d) CTRL + E
key because ____ e) CTRL + C
a) It cannot be used to input data Ans: D
b) It changes its status while pressed.
c) It can be used to insert numbers. 28. Windows 95 is an example of which of the
d) It can be used to insert function keys following type of OS?
e) None of these a) Single-User Single-Input OS
Ans: B b) Multi-processing OS
It changes its status while pressed. Toggle Keys c) Multi-threading OS
are On-OFF in nature. Examples:- Num Lock, d) Single-User OS
Caps Lock and Scroll lock e) Real-Time OS
Ans: D
26. Which one of the following attribute is used A single-user operating system is a type of
to combine two or more rows into a single cell in operating system developed and intended for

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 12
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

use on a computer or similar machine that will b) Pixel evaluation


only have a single user at any given time. This c) Malware Protection
type of OS is typically used on devices like d) Windows defending
wireless phones and two-way messaging e) All of the above
devices. Ans: E
The primary task of the OS is to manage the
29. The maximum limit of worksheet functions in Process. Memory, Device and Network & not
MS-Excel is? Network traffic. Hence all the above mentioned
a) 255 are not the main function.
b) 64
c) 347 32. For a fixed internet in home or office, which
d) 341 of the following method can be a mode of
e) None of these accessing the internet efficiently?
Ans: D a) Mobile hotspot
The maximum number of available worksheet b) Mobile Broadband
functions is 341, whereas the maximum sheets c) DSL (Digital Subscriber Line)
that can be added is 255. d) Home Wi-Fi
e) Public Wi-Fi
30. All formulas in MS Excel start with Ans: C
a) + DSL (Digital Subscribers Line). A Digital
b) – Subscriber Line is used in home and office
c) * spaces to provide high speed internet
d) = broadband facility.
e) ()
Ans: D 33. ICs (Integrated Circuits) were used in which
All the functions in MS Excel start with“ =”. generation?
Example =SUM(cell range) a) First
b) Second
31. Which of the following is not the main c) Third
function of the OS? d)Fourth
a) Network traffic management e) None of these

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 13
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

Ans: C The correct answer is Proxy server. It is a server


In Third Generation Computers, ICs were used. that acts as an intermediary device between a
workstation user and the internet so that the
34. The tasks performed by Modem is ____ enterprise concerned with it can receive
a) Checks and reports cases of Virus infection maximum security.
b) Modulates Wavelength
c) Manages traffic over a metered network 36. Full form of PING is __
d) Converts analog signals to digital signals and a) Packet Intranet Group
vice-versa b) Packet Internet Groper
e) None of these c) Packet Internet Grouper
Ans: D d) Packet Infrastructure Group
Converts analog signals to digital signals and e) None of these
vice-versa. A modulator-demodulator or modem Ans: C
is a computer hardware device that converts Packet Internet Grouper
data from a digital format into a format suitable
for an analog transmission medium such as 37. The system of 32 bit numbers in IP
telephone or radio. A modem transmits data by addressing is known as?
modulating one or more carrier wave signals to a) IPv1
encode digital information, while the receiver b) IPv4
demodulates the signal to recreate the original c) IPv6
digital information d) IPv5
e) IPv9
35. The server acting as a mediator between a Ans: B
workstation and internet for the sole purpose of Internet Protocol version 4 (IPv4) is the fourth
maintaining security is ___? version of the Internet Protocol (IP). It is one of
a) Bridge the core protocols of standards-based
b) Hub internetworking methods in the Internet and
c) Repeater other packet-switched networks. IPv4 was the
d) Switch first version deployed for production on SATNET
e) None of these in 1982 and on the ARPANET in January 1983.
Ans: E 38. The protocol used for transmitting files from

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 14
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

one computer to another via the internet is


called ____
a) ARPANET
b) FTP
40. Which type of Internet Service does not
c) IP
require cable or phone lines?
d) POP
a) ISDN
e) None of these
b) Modem
Ans: B
c) Dial Up
File Transfer Protocol is the protocol used for
d) DSL
transmitting files from one computer to the other
e) None of the above
over the internet
Ans: E
One type of internet service devoid of cables is
39. In the Email header there are two fields that
Satellite internet. Satellite internet is wireless
are mentioned, “CC” and “BCC”. What is the full
internet beamed down from satellites orbiting
form of BCC?
the Earth. It’s a lot different from land-based
a) Blind Common Copy
internet services like cable or DSL, which
b) Blind Computer Copy
transmit data through wires running
c) Basic Common Copy
underground.
d) Blind Carbon Copy
e) None of these
Ans: D

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 15
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

RRB Clerk Mains 2021


c) Ctrl + P
1. ________________ is the process of d) F12
segmenting the disc into tracks and sectors e) Ctrl + Alt + Del
a) Tracking Ans: B
b) Threading Pressing the F5 key begins the slideshow from
c) Thrashing the first slide
d) Crashing
e) Formatting 4. Which PowerPoint view works best for adding
Ans: E slide transitions?
The process of dividing the disk into tracks and a) Reading View
sectors is called formatting. In computer disk b) Notes View
storage, a sector is a subdivision of a track on a c) Reading View
magnetic disk or optical disc. When a disk d) Notes View
undergoes a low-level format, it is divided into e) Slide Sorter View
tracks and sectors. Ans: E

2. What is the Shortcut key to insert a page 5. Vacuum Tubes were replaced by___
break? a) Integrated Circuits
a) Ctrl + A b) Printed Circuit Boards
b) Shitf + Ctr l+ Alt + O c) VLSI Chips
c) Ctrl + P d) ULSI Chips
d) Ctrl + I e) Transistors
e) Ctrl + Enter Ans: E
Ans: E Vacuum Tubes were replaced by Transistors.
To insert a page break, press Ctrl+Enter The second-generation computers emerged with
the development of Transistors. The transistor
3. Which of the following Function key is used was invented in 1947 by three scientists J.
for slide show? Bardeen, W.H Brattain and W. Shockley.
a) F4
b) F5 6. Which Function is used to calculate

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 16
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

Remainder in MS Excel.? chrome are examples of ___


a) DIV() a) Utility Software
b) REM() b) OS software
c) REMAINDER() c) Device Drivers
d) MUL() d) Middleware
e) MOD ( ) e) Application Software
Ans: E Ans: E
Returns the remainder after number is divided The Application Software is a computer program
by divisor. The result has the same sign as designed to perform a group of coordinated
divisor. functions, tasks, or activities for the benefit of
the user. Word processing, Spreadsheet, and
7. Magnetic Disk is cheaper than Magnetic Google Chrome are examples of application
Tape? software.
a)True
b)False 10. An operating system component called
Ans: B ____________ is in charge of loading libraries
and programs.
8. Which browser is an inbuilt browser in a) Linker
windows? b) Assembler
a) Chrome c) Editor
b) Solaris d) Compiler
c) Firefox e) Loader
d) Safari Ans: E
e) Internet Explorer In computer systems a loader is the part of an
Ans: E operating system that is responsible for loading
It really depends on the options available. If programs and libraries. It is one of the essential
Microsoft Edge is available then, Edge is the stages in the process of starting a program, as it
correct and appropriate option. Otherwise places programs into memory and prepares
Internet Explorer is the apt option. them for execution

9. Word processing, Spreadsheet, and Google 11. ___________ is the amount of time that

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 17
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

passes between when a data request or call for banking sector to speed up the processing and
storage is made by an instruction control unit clearance of checks and other documents.
and when the data is delivered or when the a)Magnetic Information Character Recognition
storage process begins. b)Magnetic Information Cable Recognition
a) Burst Time c)Magnetic Intelligence Character Recognition
b) Switching Time d) Magnetic Ink Character Recognition
c) Format Specifier Time e)None of these
d) Data process Time Ans: D
e) Access Time MICR (magnetic ink character recognition) is a
Ans: E technology invented in the 1950s that's used to
Access time is total time it takes a computer to verify the legitimacy or originality of checks and
request data, and then that request to be met. other paper documents

12. The TCP protocol used in which of the 14. Arogya Setu app uses which technology?
following layer? a) Only GPS
a) Network Layer b) Only Bluetooth
b) Physical Layer c) GPRS
c) Session Layer d) Xender
d) Application Layer e) Bluetooth and GPS
e) Transport Layer Ans: E
Ans: E It is a tracking app which uses the smartphone's
Transmission Control Protocol (TCP) is a GPS and Bluetooth features to track COVID-19
communications standard that enables cases
application programs and computing devices to
exchange messages over a network. It is 15. In order to delete any number of rows and
designed to send packets across the internet columns in MS Excel, shortcut key is _______
and ensure the successful delivery of data and a) Ctrl + Z
messages over networks. b) Ctrl + B
c) Ctrl + P
13. Character recognition technology called d) Ctrl + Shift + *
____________ code is primarily utilized by the e) Ctrl+ -

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 18
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

Ans: E
18. What is unit of measuring printing quality of
16. MAC Address is also known as printer?
____________with 48-bits hardware number of a a) Dots Per Unit Time
computer. b) Dots Per Line
a) Memory Address c) Dots Per Character
b) Physical Address d) Dots per Centimeter
c) Subset Address e) Dots Per Inch
d) Set mapping Address Ans: E
e) Logical Address The output quality of a printer is measured by
Ans: B Dots per inch. In printing, DPI (dots per inch)
MAC addresses are also known as hardware refers to the output resolution of a printer or
addresses or physical addresses. They uniquely image setter, and PPI (pixels per inch) refers to
identify an adapter on a LAN. the input resolution of a photograph or image.
17. _______________ is a protocol for DPI refers to the physical dot density of an
transferring data securely from one network to image when it is reproduced as a real physical
another. entity, for example printed onto paper.
a) POP
b) SMTP 19. What malware is associated with Bitcoin?
c) SFTP a) Etherium Jacking
d) IP b) Byteware
e) UDP c) Crypto jacking
Ans: C d) Ransomware
Secure File Transfer Protocol (SFTP) is a e) Datajacking
network protocol for securely accessing, Ans: C
transferring and managing large files and Cryptojacking (also called malicious
sensitive data. Designed by the Internet cryptomining) is an online threat that hides on a
Engineering Task Force as an extension of computer or mobile device and uses the
Secure Shell (SSH), SFTP enables access, machine’s resources to “mine” forms of online
transfer and management of files over a currency known as cryptocurrencies, mainly
network. Bitcoin.

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 19
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

c) Donationware
20. The_________ is a conceptual framework d) Freeware
used to describe the functions of a networking e) Shareware
system. Ans: B
a) TCP Model Software piracy is the illegal copying,
b) OSI Model distributing, sharing, selling or use of software,
c) IP Model whether intentional or not.
d) C
e) D 23. ___________ is the practice of concealing a
Ans: B message within another message or a physical
The OSI Model (Open Systems Interconnection object.
Model) is a conceptual framework used to a) Calligraphy
describe the functions of a networking system. b) Cryptography
The OSI model characterizes computing c) Steganography
functions into a universal set of rules and d) Tomography
requirements in order to support interoperability e) Chorography
between different products and software. Ans: C
Steganography is the technique of hiding secret
21. FTP stands for data within an ordinary, non-secret file or
a) File Text Process message in order to avoid detection; the secret
b) Format Text Protocol data is then extracted at its destination.
c) File Threading Process
d) File Transfer Protocol 24. Which is the spreadsheet software provided
e) File Transmit Protocol by Google?
Ans: D a) iWords
b) Google Docs
22. ______________ is a term used to describe c) Google Preview
the act of illegally using, copying or distributing d) Google Drive
software without ownership or legal rights. e) Google Sheet
a) Free Software Ans: E
b) Software piracy

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 20
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

25. Which of the following function is used for URLs of web pages and links visited in past few
the addition in MS Excel? days?
a) ADD a) Linked List
b) PLUS b) Page List
c) None of these c) Double Paging List
d) SUM d) None of these
e) AMOUNT e) History List
Ans: D Ans: E
Syntax- =SUM(cell ranges) The history list will enable us to see the internet
history that we have been visited. It has a list
26. Which of the following is the professional that stores the URLs of web pages and links that
social networking site that allows Access for job we have visited in the past. Internet history can
opportunities and to connects the industries? have security implications as it allows anyone to
a) Naukri see just what you've been looking at.
b) Scaler
c) Docker 29. A program, either talk numeric that is made
d) Facebook available in digital format for automatic
e) Linkedin download over the internet is called
Ans: E _______________.
a) Blog
27. The 'S' at the end of "HTTPS" stands for b) Podcast
__________________. c) Vlog
a) Stealth d) Broadcast
b) Safe e) Unicast
c) Software Ans: B
d) Secure Podcast is a program, either talk numeric that is
e) None of these made available in digital format for automatic
Ans: D download over the internet
Hypertext Transfer Protocol Secure
30. A/A(n) _________________ is a private
28. What is the name of the list that stores the corporate network, used exclusively by company

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 21
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

employees. 33. The maximum Zoom percentage in Microsoft


a) Peer to Peer Network PowerPoint is__________.
b) Internet a) 100%
c) LAN b) 200%
d) WAN c) 400%
e) Intranet d) 250%
Ans: E e) 500%
An intranet is a private, network that is Ans: C
contained that is contained within enterprise.
34. The first digital computer and what most
31. In MS — PPT, you can show the shortcut people think of as a computer was called the
menu during the slideshow by __________________.
________________. a) COMPATE
a) Clicking the shortcut button on the formatting b) Digital Calculator
toolbar c) ENIAC
b) Right clicking the previous slide d) Analog Computer
c) Left clicking on the present slide e) None of these
d) Right clicking the current slide Ans: C
e) None of these The first digital computer and what most people
Ans: D think of as a computer was called the ENIAC.
ENIAC stands for Electronic Numerical
32. Memory which forgets everything when you Integrator and Computer. ENIAC was designed
switch off the power is known as by John Mauchly and J. Presper Eckert
______________.
a) Non-Volatile 35. A __________ is a common set of guidelines
b) Dynamic Memory that permits communication between
c) C technological devices.
d) D a) Port
e) Volatile b) Serial Bus
Ans: E c) Synchronization
d) System Software

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 22
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

e) Protocols a) Internet Engineering Task Force


Ans: E b) Internet Technology Chaining
A protocol is a set of rules that governs the c) Internet Architecture Board (IAB)
communications between computers on a d) Internet Assigned Architecture
network. These rules include guidelines that e) Internet Assigning Protocol Committee
regulate the following characteristics of a Ans: C
network: access method, allowed physical The Internet Architecture Board (IAB) is a board
topologies, types of cabling, speed of data of researchers and professionals that manages
transfer. the engineering and technical development
related to the Internet.
36. _________ is a type of cybercrime where a 38. ____________ is the process of copying data
person impersonates a brand or contact that you from one area to another in order to secure it in
trust in order to gain critical personal the event of a disaster, accident, or criminal act.
information. a) None of these
a) Spooling b) Both 3 & 4
b) Phishing c) Disk Cleanup
c) Identity theft d) Data Backup
d) Spoofing e) Data Checkup
e) None of these Ans: D
Ans: D Data Backup refers to the copying of physical or
Spoofing involves faking one's identity, and can virtual files or databases to a secondary location
be used for various attacks such as identity for preservation in case of equipment failure or
theft. Phishing is one such use of spoofing that catastrophe. The process of backing up data is
attempts to steal somebody's personal pivotal to a successful disaster recovery plan
information or credentials by having them
volunteer that information from a nefarious 39. In which year was Internet Explorer first
source that looks legit. released?
a) 1990
37. Which of the following committees guides b) 1988
the progression of the TCP/IP suite and the c) 1996
Internet? d) 1993

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 23
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

e) 1995 code (EBCDIC)


Ans: E d) ANSI C
In July 1995 Microsoft released Internet Explorer e) DAG
1.0 as an add-on to the Windows 95 operating Ans: C
system EBCDIC, in full extended binary-coded decimal
interchange code, data-encoding system,
40. Which of the following uses a unique eight- developed by IBM and used mostly on its
bit binary code for each number and alphabetic computers, that uses a unique eight-bit binary
character as well as punctuation marks and code for each number and alphabetic character
accented letters and non-alphabetic characters? as well as punctuation marks and accented
a) ASCII letters and non-alphabetic characters
b) UNICODE
c) Extended binary-coded decimal interchange

RRB Clerk Mains 2020


1. Which program is /software is made to create c) Open ended market software
a job queue during scheduling of jobs in an d) Vertical Market software
operating system? e) None of these
a) Spooling Ans: B
b) Spoofing Closed source means those computer programs
c) Drive or software whose source codes have not been
d) Compiler published
e) None of these
Ans: A 3. Which is the spreadsheet software provided
A Spooling is a software that controls putting by Google?
jobs on a queue and taking them off one at a a) Google Doc
time from the queue. b) Google Page
c) Google Sheet
2. Microsoft is an example of? d) Google Drive
a) Open Source e) None of these
b) Closed source Ans: C

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 24
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

b) batch processing
4. Which one is a high speed memory used to c) real time
hold instructions temporarily during Processing? d) remote processing
a) Secondary Memory e) None of the above
b) Main Memory Ans: B
c) Cache Memory This operating system keeps the number of jobs
d) Primary Memory in memory and performs them one at a time.
e) None of These Jobs are processed in a first-come, first-served
Ans: C manner. Each job set is defined as a batch.
It is high speed memory used to hold When a task is finished, its memory is freed, and
instructions temporarily during processing. the work's output is transferred into an output
When CPU requires a data it first search it in spool for later printing or processing. User
cache memory. If it is present there it uses it and interaction is limited in the batch operating
is called cache hit, but if it is not present it goes system
to the main memory and fetches data from main
memory to the cache memory. 7. For which of the MS Office products, it
requires renewal and for which product only
5. Which key is used for closing a opened one-time purchase is required?
window or program? a) MS Office 2019
a) Alt + F4 b) MS Office 365
b) Ctri+F1 c) MS Office 2016
c) Alt +F2 d) MS Office 2010
d) Alt + F3 e)None of these
e) None of these Ans: A
Ans: A
Alt + F4 is used for closing a opened window or 8. What is the reason behind computer
program maloperation?
a) Phishing
6. In which processing user does not have b) Pharming
access to its operation? c) Virus
a) quick processing d) Ransom ware

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 25
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

e) None of these as a hard disk drive, solid-state drive, floppy disk


Ans: C or USB flash drive for initial use. In some cases,
Computer viruses aim to disrupt systems, cause the formatting operation may also create one or
major operational issues, and result in data loss more new file systems
and leakage
9. Single party disk relying on the disk controller 11. In Excel, which of the following conditional
for finding out which disk has failed is used by formatting styles shows bars in a cell range
a) RAID level 5 along with values?
b) RAID level 2 a) Data bars
c) RAID level 4 b) Top/bottom rules
d) RAID level 3 c) Highlight cell rules
e) RAID level 1 d) Colour scales
Ans: D e) Range bars
RAID 3 is a RAID configuration that uses a Ans: A
parity disk to store the information generated by Data bars in Excel make it very easy to visualize
a RAID controller instead of striping it with the values in a range of cells
data.
12. What is the purpose of pulse code
10. Which command divides the surface of the modulation in computing technology?
blank disk into sectors and assign a unique a) Converting Analog Signal to Digital Signal
address to each one? b) Converting Digital Signal into Analog Signal
a) Ver c) Amplifying the frequency of Analog Signal
b) Format d) D. Amplifying the frequency of Digital Signal
c) Fat e) E. None of the above
d) Chkdsk Ans: A
e) None of these Pulse code modulation is a method used to
Ans: B convert an analog signal into a digital signal. So
Format command divides the surface of that it can be transmitted through a digital
theblank disk into sectors and assign a unique communication network, and then converted
address to each one. Disk formatting is the back into the original analog signal. The PCM
process of preparing a data storage device such process includes three steps: Sampling,

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 26
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

Quantization, and Coding.


15. The basic function of the server is to assign
13. Question on situation; what will be first step IP addresses to various devices and hosts?
after inserting a pen drive in the computer? a) DHCP
a) Scan and open b) DNS
b) Only Scan c) IP
c) Only Open d) SMTP
d) Format e) None of these
e) None of these Ans: A
Ans: A DHCP Server is basically a server that holds IP
The first step after inserting flash drives is to Addresses and other information related to
Scan and Open. This comes automatically as a configuration. DHCP Client: It is basically a
dialog box opens, with another option of device that receives configuration information
“Continue without scanning”. from the server. It can be a mobile, laptop,
computer, or any other electronic device that
14. Which is the Digital currency with no requires a connection
Regulation and is transferred from one user to
another directly? 16. IP address shows the
a) Bitcoin a) Physical address of the device
b) Tron b) Logical address of the device
c) Doge c) Source address of the device
d) Cryptocurrency d) Destination address of the device
e) None of these e) None of these
Ans: D Ans: B
Cryptocurrencies are digital tokens. They are a An Internet Protocol (IP) address is a unique
type of digital currency that allows people to numerical identifier for every device or network
make payments directly to each other through that connects to the internet. Typically assigned
an online system. Cryptocurrencies have no by an internet service provider (ISP), an IP
legislated or intrinsic value; they are simply address is an online device address used for
worth what people are willing to pay for them in communicating across the internet.
the market.

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 27
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

17. Website is a collection of___ options? program to execute a particular set of


a) HTML documents statements repeatedly.
b) Graphic files
c) Audio and video files 20. Which is the open source Browser?
d) All of the above a) Mozilla Firefox
e) None of these b) UC browser
Ans: D c) Chrome
A website can contain all of the above. d) All of these
e) None of these
18. Which of the following is alphanumeric Ans: A
combination of password? Chrome is not an open source browser unlike
a) Abcd1234 chromium.
b) Abcdefghi
c) 1234567 21. ROM is__ memory and comes under___
d) Abc@123 memory category?
e) None of these a) Volatile and secondary
Ans: D b) Volatile and primary
An alphanumeric password contains numbers, c) Non Volatile and secondary
letters, and special characters (like an d) Non Volatile and primary
ampersand or hashtag). In theory, alphanumeric e) None of these
passwords are harder to crack than those Ans: D
containing just letters As the name suggests Read Only Memory is
19. Which one is used in a program to execute a Non Volatile, as the contents in it remain even
particular set of statements repeatedly? when the power is off.
a) Visual basic
b) Pseudocode 22. Which of the following is a rigid magnetic
c) Condition disc used to store data permanently?
d) Looping a) Hard Disk
e)None of these b) SSD
Ans: D c) SD Card
Looping is control structure which is used in a d) All the three

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 28
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

e) None of these a) A.bay


Ans: A b) B.docking station
Hard disk is a rigid magnetic disk used to store c) C.port
data permanently. d) D.network
e) E.None of these
23. For cleaning up the fragmentation saturated AnsB
on hard disk drives which software will you use? To make a notebook act as desktop as a
a) MS word desktop model, the notebook can be connected
b) Recuva to a docking station, it can be connected to a
c) CCleaner monitor and other devices
d) All of these
e) None of these 26. In UNIX, which command is used to display
Ans: C the message or value of any variable on the
CCleaner, developed by Piriform Software, is a screen
utility used to clean potentially unwanted files a) !chg
and invalid Windows Registry entries from a b) ECHO
computer c) PING
d) INFO
24. Which shortcut key is used to bring pointer e) None of these
to first slide in PowerPoint? Ans: B
a) Ctrl+Tab ECHO is a command typically used in shell
b) Ctrl+Home scripts and batch files to output status text on
c) Ctrl+Capslock the screen.
d) Ctrl+Shift
e) All of these 27. In MS Excel, when does the #N/A error
Ans: B occur?
a) Excel does not recognize the text specified in
25. To make a notebook act as a desktop a formula
model, the notebook can be connected to a b) A value is not available to a function or
________which is connected to a monitor and formula
other devices. c) An invalid cell is referenced

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 29
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

d) A formula includes an argument or operand of d) Non-Corrupted


the wrong type e) None of these
e) None of these Ans: B
Ans: B Volatile memory is a type of memory that
maintains its data only while the device is
28. Bing is a/an__? powered. If the power is interrupted for any
a) Portal reason, the data is lost
b) Internet
c) Search engine 31. Which of the following is considered as the
d) Browser unsolicited commercial email?
e) None of these a) Virus
Ans: C b) Malware
Microsoft owned search engine- Bing c) Spam
d) Both A & B
29. Which is the word processor software used e) All of the above
by apple? Ans: C
a) Word star It is a type of unsolicited email which is generally
b) MS word sent in bulk to an indiscriminate recipient list for
c) Pages commercial purpose. Generally, these types of
d) Open Office mail are considered unwanted because most
e) None of these users don't want these emails at all.
Ans: C
Pages is a powerful word processor that lets you 32. In FTP, there are three types of ______
create stunning documents, and comes included stream block and compressed.
with most Apple devices. a) File type
b) Data type
30. Memory which forgets everything when you c) Transmission mode
switch off the power is known as__ d) Object File
a) Corrupted e) None of these
b) Volatile Ans: C
c) Non-Volatile The three transmission modes that can be used

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 30
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

are stream mode, block mode, and compressed a) management


mode. b) processing
c) utility
33. In Microsoft Excel, which of the following d) application
functions is used for finding the total of a e) None of these
sequence of cells? Ans: D
a) A.TOTAL System software is the set of programs that
b) B.SUM enables your computer’s hardware devices and
c) C.ADD application software to work together
d) D.MERGE
e) E. None of the above 36. Where does a computer add and compare
Ans: B data?
SUM is the formula used for finding the total of a a) Hard Disk
sequence of cells in Excel b) Floppy Disk
c) CPU chip
34. In database ______ is procedural code that d) Memory Chip
is automatically executed in response to certain e) None of The Above
events on a particular table in a database? Ans: C
a) Constraints The CPU or the Central Processing unit also
b) Literals known as the brain of the computer, is the unit
c) Trigger where a computer adds and eventually
d) Schema compares the data
e) None of These
Ans: C 37. Extensible Mark-up Language (XML) is a
A database trigger is procedural code that is simple, very flexible text format, which is derived
automatically executed in response to certain from ______________?
events on a particular table in a database a) HTML
b) ETML
35. System software is the set of programs that c) STML
enables your computer’s hardware devices and d) SGML
________ software to work together e) None of these

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 31
.

IBPS RRB Clerk Mains Memory Based Papers – Computer Awareness

Ans: D b) RAM
ExtensibleMark-up Language (XML) is a simple, c) ATM
very flexible text format derived from SGML d) Machine
(Standard Generalized Mark-up Language). e) None of these
Ans: C
38. What type of technology scrambles the ATM (Automatic Teller Machine) is example for
contents of files sent via the Internet? embedded system
a) Encryption
b) Encoding 40. Which of the following is a part of session
c) Cryptography layer?
d) Security code a) Transports data across the physical link
e) None of these b) Determines network topology.
Ans: A c) Terminates a session
The contents of files will be sent via internet d) Performs flow control
after the files are encrypted by the process e) Transmission between machines to its above
encryption layer
Ans: C
39. Which of the following is example for The session layer performs the termination and
embedded system? creation of session
a) ROM

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 32

You might also like