IBPS-RRBs Officer Scale-1 Previous Year Exam Paper - 2014
Subject : Computer Knowledge
1. Another name for a program is
(a) software
(b) procedure
(c) typology
(d) utilities
(e) userware
2. ................ is a communications technology used by some incoming mail services.
(a) Telnet
(b) TCP
(c) FTP
(d) GIF
(e) POP3
3. The two basic parts of URLs are
(a) ICP and IP
(b) TCP/IP and ISP
(c) TCP and ftp
(d) destination and device
(e) the protocol and the domain name
4. The primary purpose of software is to turn data into
(a) information
(b) programs
(c) objects
(d) charts
(e) websites
5. The ........... database is the most widely used database structur
(a) hierarchical
(b) general
(c) standard
(d) table
(e) relational
NEW! IBPS RRB (Regional Rural Bank) Study Notes
6. Mail from unwanted senders can be blocked by
(a) not buying anything online so that junk mail senders will not having anything to benefit by
(b) sending them nasty replies when they send any mail
(c) using mail filters
(d) clicking the unsubscribe link
(e) e-mailing them and asking to the removed from the list
7. POP denotes
(a) Post Office Program
(b) Post Office Protocol
(c) Protocol on Program
(d) Protocol on Protocol
(e) Program of of Programmer
8. How many gigabytes are there in a petabyte?
(a) 1000
(b) 001
(c) 100
(d) 1000000
(e) 5000000
9. For a browser to connect to other resources, the location or address of the resources must be specified. These addresses are called
(a) MSN
(b) e-mail forms
(c) packets
(d) IDs
(e) URLs
10. The extensions .gov, .edu, .mil, and .net are c
(a) mail to addresses
(b) add-ons
(c) domain codes
(d) DNSs
(e) e-mail targets
11. Software that is actively utilised by end-users (like Word or Photoshop) is called
(a) actionware
(b) operating system
(c) system software
(d) driver
(e) application software
12. Using a ............ helps to place an image into a live video conference.
(a) printer
(b) digital camera
(c) video camera
(d) webcam
(e) scanner
13. Programs designed to perform specific tasks related to managing computer resources are called
(a) operating system
(b) helper software
(c) system software
(d) application software
(e) utility programs
14. A rectangular area on a computer screen that can contain a document, program or messages is referred to as a (n)
(a) field
(b) opening
(c) window
(d) tuplet
(e) cell
15. The storage locations in the internal storage of a CPU are called
(a) reference points
(b) addresses
(c) contents
(d) mask
(e) locations
16. Of the following types of computers, which is the most powerful?
(a) Laptop
(b) Mainframe computer
(c) Minicomputer
(d) Supercomputer
(e) Microcomputer
17. An input device, which can read characters directly from an ordinary piece of paper, is
(a) OMR
(b) POS
(c) OCR
(d) MSI
(e) CD
18. The radian of a number system
(a) has nothing to do with digit position value
(b) equals the number of its distinct counting digits
(c) is more than the number of its distinctcounting digits
(d) is always an even number
(e) is variable
19. Which of the following statements is false?
(a) passwords are case sensitive.
(b) passwords are not echoed on the screen for security resasons.
(c) A good password should be no more than six characters long.
(d) password is a secret code that authenticates a person to the computer.
(e) passwords should be changed frequently
NEW! IBPS RRB (Regional Rural Bank) Study Notes
Download IBPS RRB (Office Assistants) Papers PDF
Download IBPS RRB Officer (Scale-1) Papers PDF