Ibps RRB Clerk Computer 2020 23 Questions
Ibps RRB Clerk Computer 2020 23 Questions
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 1
.
S. No Topics Page No
1. What is the shortcut key for a new Ctrl+U and start typing. When you want to stop
presentation in PowerPoint? underlining, press Ctrl+U again.
a) Ctrl + B
b) Ctrl + N 3. In which year is the internet invented?
c) Ctrl + J a)1980
d) Ctrl + M b) 1982
e) Ctrl + D c) 1983
Ans: B d) 1985
Ctrl + N is the shortcut to create a new e) 1988
presentation in MS PowerPoint. Ans: C
The invention of the internet is considered to be
2. What is the shortcut key for Underline? Jan. 1, 1983, but the vision started decades
a) Ctrl + U before.January 1, 1983 is considered the official
b) Ctrl + N birthday of the Internet. Prior to this, the various
c) Ctrl + J computer networks did not have a standard way
d) Ctrl + M to communicate with each other.
e) Ctrl + D
Ans: A 4. Which component is used to convert digital
The quickest way to underline text is to press signal to analogue signal over telephone line?
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 2
.
6. Doc and Docs are used for _________. 9. Which of the following is named to monitor
a) Extension of Presentation technology used for the widest view angle?
b) New Sheet in the spreadsheet a) LED
c) Extension for Document File b) TFT
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 3
.
10. What is the primary task of the command 12. What is the shortcut key for Clear all
prompt in the Operating system? formatting in MS Word?
a) User Interface a)Ctrl+Enter
b) Interlinking Networks b) Ctrl+ Spacebar
c) Monitor technology c) Alt+ Tab
d) Store Cache memory d)Alt+Enter
e) Installation e) Ctrl+Enter+F5
Ans: A Ans: B
In the Windows operating systems, the Press Ctrl + Spacebar to clear formatting such
Command Prompt is a program that emulates as font, font size, and bold.
the input field in a text-based user interface
screen with the Windows Graphical User 13.Where does the mail go when it is deleted in
Interface (UI). It can be used to perform entered Gmail?
commands and perform advanced a)Spam
administrative functions. b) Junk
c) Trash
11.The computer cannot boot if it does not have d) Social
___________. e) Important
a) Power Ans: C
b) OS When you delete a message, it stays in your
c) Memory trash for 30 days. After 30 days, the message is
d) Modem permanently deleted from your account and
e) Antenna can't be recovered.
Ans: B
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 4
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 5
.
e) Browser Ans: B
Ans: B The file extension of MS PowerPoint is .ppt. .
A blockchain is a digitally distributed, ppt is a file with a PPT extension representing a
decentralized, public ledger that exists across a PowerPoint file that consists of a collection of
network. slides for displaying as SlideShow.
20.What is the full form of WAN? 23.Which of the following is Primary Memory?
a) Wide Area Notion a) SSD
b) Waste Area Network b) RAM
c) Wide Area Network c) Hard drive
d) Wide Air Network d) Optical drive
e) World Active Net e) USD Drive
Ans: C Ans: B
21.Whatof the following stimulatesHuman-Level ROM (Read Only Memory) and RAM make up
Intelligence? the primary memory.
a) AI
b) PI 24.Which of the following is not an Operating
c) PL System?
d) DS a) Linux
e) CD b) Unix
Ans: A c) Microsoft
Artificial intelligence (AI) is the simulation of d) Android
human intelligence in machines that are e) Oracle
programmed to think and act like humans. Ans: E
Some examples of operating systems include
22.What is the filrextension of Power Point? Apple macOS, Unix Operating System,
a)ptp Microsoft Windows, Google's Android OS, Linux
b) ppt Operating System, and Apple iOS.
c) pop
d) pt 25.Who built the first Mechanical Calculator?
e)popt a) Charles Babbage
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 6
.
26.What is the full form of UPS? 29. What refers to the action of reducing or
a)Uninterruptible Power Supply decreasing the size, extent, or quantity of
b)Uninterruptible Power System something?
c) Understanding Power System a) Minimize
d) Unique Power Supply b) Maximize
e) Unique Product System c) Scroller
Ans: A d)Drop
The full form of UPS is Uninterruptible Power e)Sleep
Supply. UPS is a type of power supply system Ans: A
with an integrated battery, and in the absence of Minimization refers to the action of reducing or
primary mode or when power is shut down, the decreasing the size, extent, or quantity of
battery is used for the power source. something.
27.Which of the following is not a part of a Laser 30.Which of the following memory is greater?
printer? a) KB
a)Scanner Parts b) GB
b) Paper Tray c) MB
c)Imaging Unit d) PB
d) OPC Drum Unit e) TB
e)Microfibre Ans: D
Ans: E
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 7
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 8
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 9
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 10
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 11
.
b) 100000001 HTML?
c) 100111001 a) Rownum
d) 100111011 b) Rowid
e) None of these c) Rowspan
Ans: C d) All of these
100111001. Make groups of three → 4 = 100, e) None of these
7= 111, 1 = 001 Ans: C
Rowspan attribute in HTML specifies the
24. 1 Petabyte (PB) = 1024 __? number of rows a cell should span.That is if a
a) KB row spans two rows, it means it will take up the
b) MB space of two rows in that table.
c) TB
d) GB 27. The shortcut key used for aligning the text
e) EB centrally in MS Office is ____
Ans: C a) CTRL + R
TB. 1024 Terabytes = 1 Petabyte b) CTRL + H
c) CTRL + T
25. The Caps Lock key is also called a toggle d) CTRL + E
key because ____ e) CTRL + C
a) It cannot be used to input data Ans: D
b) It changes its status while pressed.
c) It can be used to insert numbers. 28. Windows 95 is an example of which of the
d) It can be used to insert function keys following type of OS?
e) None of these a) Single-User Single-Input OS
Ans: B b) Multi-processing OS
It changes its status while pressed. Toggle Keys c) Multi-threading OS
are On-OFF in nature. Examples:- Num Lock, d) Single-User OS
Caps Lock and Scroll lock e) Real-Time OS
Ans: D
26. Which one of the following attribute is used A single-user operating system is a type of
to combine two or more rows into a single cell in operating system developed and intended for
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 12
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 13
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 14
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 15
.
2. What is the Shortcut key to insert a page 5. Vacuum Tubes were replaced by___
break? a) Integrated Circuits
a) Ctrl + A b) Printed Circuit Boards
b) Shitf + Ctr l+ Alt + O c) VLSI Chips
c) Ctrl + P d) ULSI Chips
d) Ctrl + I e) Transistors
e) Ctrl + Enter Ans: E
Ans: E Vacuum Tubes were replaced by Transistors.
To insert a page break, press Ctrl+Enter The second-generation computers emerged with
the development of Transistors. The transistor
3. Which of the following Function key is used was invented in 1947 by three scientists J.
for slide show? Bardeen, W.H Brattain and W. Shockley.
a) F4
b) F5 6. Which Function is used to calculate
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 16
.
9. Word processing, Spreadsheet, and Google 11. ___________ is the amount of time that
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 17
.
passes between when a data request or call for banking sector to speed up the processing and
storage is made by an instruction control unit clearance of checks and other documents.
and when the data is delivered or when the a)Magnetic Information Character Recognition
storage process begins. b)Magnetic Information Cable Recognition
a) Burst Time c)Magnetic Intelligence Character Recognition
b) Switching Time d) Magnetic Ink Character Recognition
c) Format Specifier Time e)None of these
d) Data process Time Ans: D
e) Access Time MICR (magnetic ink character recognition) is a
Ans: E technology invented in the 1950s that's used to
Access time is total time it takes a computer to verify the legitimacy or originality of checks and
request data, and then that request to be met. other paper documents
12. The TCP protocol used in which of the 14. Arogya Setu app uses which technology?
following layer? a) Only GPS
a) Network Layer b) Only Bluetooth
b) Physical Layer c) GPRS
c) Session Layer d) Xender
d) Application Layer e) Bluetooth and GPS
e) Transport Layer Ans: E
Ans: E It is a tracking app which uses the smartphone's
Transmission Control Protocol (TCP) is a GPS and Bluetooth features to track COVID-19
communications standard that enables cases
application programs and computing devices to
exchange messages over a network. It is 15. In order to delete any number of rows and
designed to send packets across the internet columns in MS Excel, shortcut key is _______
and ensure the successful delivery of data and a) Ctrl + Z
messages over networks. b) Ctrl + B
c) Ctrl + P
13. Character recognition technology called d) Ctrl + Shift + *
____________ code is primarily utilized by the e) Ctrl+ -
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 18
.
Ans: E
18. What is unit of measuring printing quality of
16. MAC Address is also known as printer?
____________with 48-bits hardware number of a a) Dots Per Unit Time
computer. b) Dots Per Line
a) Memory Address c) Dots Per Character
b) Physical Address d) Dots per Centimeter
c) Subset Address e) Dots Per Inch
d) Set mapping Address Ans: E
e) Logical Address The output quality of a printer is measured by
Ans: B Dots per inch. In printing, DPI (dots per inch)
MAC addresses are also known as hardware refers to the output resolution of a printer or
addresses or physical addresses. They uniquely image setter, and PPI (pixels per inch) refers to
identify an adapter on a LAN. the input resolution of a photograph or image.
17. _______________ is a protocol for DPI refers to the physical dot density of an
transferring data securely from one network to image when it is reproduced as a real physical
another. entity, for example printed onto paper.
a) POP
b) SMTP 19. What malware is associated with Bitcoin?
c) SFTP a) Etherium Jacking
d) IP b) Byteware
e) UDP c) Crypto jacking
Ans: C d) Ransomware
Secure File Transfer Protocol (SFTP) is a e) Datajacking
network protocol for securely accessing, Ans: C
transferring and managing large files and Cryptojacking (also called malicious
sensitive data. Designed by the Internet cryptomining) is an online threat that hides on a
Engineering Task Force as an extension of computer or mobile device and uses the
Secure Shell (SSH), SFTP enables access, machine’s resources to “mine” forms of online
transfer and management of files over a currency known as cryptocurrencies, mainly
network. Bitcoin.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 19
.
c) Donationware
20. The_________ is a conceptual framework d) Freeware
used to describe the functions of a networking e) Shareware
system. Ans: B
a) TCP Model Software piracy is the illegal copying,
b) OSI Model distributing, sharing, selling or use of software,
c) IP Model whether intentional or not.
d) C
e) D 23. ___________ is the practice of concealing a
Ans: B message within another message or a physical
The OSI Model (Open Systems Interconnection object.
Model) is a conceptual framework used to a) Calligraphy
describe the functions of a networking system. b) Cryptography
The OSI model characterizes computing c) Steganography
functions into a universal set of rules and d) Tomography
requirements in order to support interoperability e) Chorography
between different products and software. Ans: C
Steganography is the technique of hiding secret
21. FTP stands for data within an ordinary, non-secret file or
a) File Text Process message in order to avoid detection; the secret
b) Format Text Protocol data is then extracted at its destination.
c) File Threading Process
d) File Transfer Protocol 24. Which is the spreadsheet software provided
e) File Transmit Protocol by Google?
Ans: D a) iWords
b) Google Docs
22. ______________ is a term used to describe c) Google Preview
the act of illegally using, copying or distributing d) Google Drive
software without ownership or legal rights. e) Google Sheet
a) Free Software Ans: E
b) Software piracy
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 20
.
25. Which of the following function is used for URLs of web pages and links visited in past few
the addition in MS Excel? days?
a) ADD a) Linked List
b) PLUS b) Page List
c) None of these c) Double Paging List
d) SUM d) None of these
e) AMOUNT e) History List
Ans: D Ans: E
Syntax- =SUM(cell ranges) The history list will enable us to see the internet
history that we have been visited. It has a list
26. Which of the following is the professional that stores the URLs of web pages and links that
social networking site that allows Access for job we have visited in the past. Internet history can
opportunities and to connects the industries? have security implications as it allows anyone to
a) Naukri see just what you've been looking at.
b) Scaler
c) Docker 29. A program, either talk numeric that is made
d) Facebook available in digital format for automatic
e) Linkedin download over the internet is called
Ans: E _______________.
a) Blog
27. The 'S' at the end of "HTTPS" stands for b) Podcast
__________________. c) Vlog
a) Stealth d) Broadcast
b) Safe e) Unicast
c) Software Ans: B
d) Secure Podcast is a program, either talk numeric that is
e) None of these made available in digital format for automatic
Ans: D download over the internet
Hypertext Transfer Protocol Secure
30. A/A(n) _________________ is a private
28. What is the name of the list that stores the corporate network, used exclusively by company
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 21
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 22
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 23
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 24
.
b) batch processing
4. Which one is a high speed memory used to c) real time
hold instructions temporarily during Processing? d) remote processing
a) Secondary Memory e) None of the above
b) Main Memory Ans: B
c) Cache Memory This operating system keeps the number of jobs
d) Primary Memory in memory and performs them one at a time.
e) None of These Jobs are processed in a first-come, first-served
Ans: C manner. Each job set is defined as a batch.
It is high speed memory used to hold When a task is finished, its memory is freed, and
instructions temporarily during processing. the work's output is transferred into an output
When CPU requires a data it first search it in spool for later printing or processing. User
cache memory. If it is present there it uses it and interaction is limited in the batch operating
is called cache hit, but if it is not present it goes system
to the main memory and fetches data from main
memory to the cache memory. 7. For which of the MS Office products, it
requires renewal and for which product only
5. Which key is used for closing a opened one-time purchase is required?
window or program? a) MS Office 2019
a) Alt + F4 b) MS Office 365
b) Ctri+F1 c) MS Office 2016
c) Alt +F2 d) MS Office 2010
d) Alt + F3 e)None of these
e) None of these Ans: A
Ans: A
Alt + F4 is used for closing a opened window or 8. What is the reason behind computer
program maloperation?
a) Phishing
6. In which processing user does not have b) Pharming
access to its operation? c) Virus
a) quick processing d) Ransom ware
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 25
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 26
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 27
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 28
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 29
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 30
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 31
.
Ans: D b) RAM
ExtensibleMark-up Language (XML) is a simple, c) ATM
very flexible text format derived from SGML d) Machine
(Standard Generalized Mark-up Language). e) None of these
Ans: C
38. What type of technology scrambles the ATM (Automatic Teller Machine) is example for
contents of files sent via the Internet? embedded system
a) Encryption
b) Encoding 40. Which of the following is a part of session
c) Cryptography layer?
d) Security code a) Transports data across the physical link
e) None of these b) Determines network topology.
Ans: A c) Terminates a session
The contents of files will be sent via internet d) Performs flow control
after the files are encrypted by the process e) Transmission between machines to its above
encryption layer
Ans: C
39. Which of the following is example for The session layer performs the termination and
embedded system? creation of session
a) ROM
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: [email protected] 32