IBPS-RRBs Officer Scale-1(Mains);Exam Paper - 2018 Subject : Computer Knowledge
IBPS-RRBs Officer Scale-1(Mains);Exam Paper - 2018
Subject : Computer Knowledge
Computer Knowledge :
161. Servers are computers that provide resources to other computers connected to a ____.
A. Network
B. Mainframe
C. Supercomputer
D. Client
E. Port
162. What is EDI?
A. Electronic distant interface
B. Electronic development interface
C. Electronic data interface
D. Electronic data interchange
E. None of these
163. In MS-Excel, all formula starts with the sign of______.
A. #
B. @
C. =
D. +
E. None of these
164. Where is printer attached?
A. serial port
B. parallel port
C. SCSI
D. Interface port
E. None of these
165. A character is represented in EBCDIC by___________.
A. one bit
B. four bits
C. eight bits
D. sixteen bits
E. None of the above
166. Firewalls are generally used to protect against___.
A. fire Attacks
B. data Driven Attacks
C. virus Attacks
D. unauthorized access
E. None of these
167. Which key is used in combination with another key to perform a specific task?
A. Function
B. Control
C. Arrow
D. Space Bar
E. None of these
168. A website's main page is called it's _______.
A. home page
B. browser page
C. search page
D. index page
E. none of these
169. The network in which every node is connected to two other nodes is called _____.
A. Bus Network Topology
B. Star Network Topology
C. Ring Network Topology
D. All of the above
E. None of these
170. Underlined text, such as text and folder names is referred to as a __.
A. Hyperlink
B. Menu
C. Source drive
D. Resource locator
E. None of these
171. The smallest unit in a digital system is _____.
A. byte
B. kilobyte
C. word
D. character
E. bit
(e-Book) IBPS RRB Officer Scale-I Previous Year Papers
(e-Book) IBPS RRB Office Assistants Previous Year Papers
Download IBPS RRB Officer (Scale-1) Papers PDF
172. Which bar is usually located below the Title Bar that provides categorized options?
A. Menu Bar
B. Status Bar
C. Toolbar
D. Scroll Bat
E. None of the above
173. Portrait and Landscape are
A. Page Orientation
B. Paper Size
C. Page Layout
D. Both C and D
E. All of the above
174. __________refers to the unauthorized copying and distribution of software.
A. Hacking
B. Software Piracy
C. Software literacy
D. Cracking
E. Copyright
175. This type of software works with end-users,application software, and Computer Hardware to handle the majority of technical details:
A. Communications software
B. Application software
C. Utility software
D. System software
E. None of these
176. Which of the following keys is used to delete characters to the left of the cursor?
A. Alt + Delete
B. Shift
C. Esc
D. Delete
E. Backspace
177. A web site is a collection of_______.
A. graphics
B. programs
C. algorithms
D. web pages
E. charts
178. When a computer is switched on, the booting process performs
A. Integrity Test
B. Power-On Self-Test
C. Correct Functioning Test
D. Reliability Test
E. Shut-down
179. The term ‘user interface’ refers to ______.
A. what the user sees on the screen and how they can interact with it
B. how the operating system responds to user commands
C. the means by which the user interacts with the peripheral devices on the computer
D. the monitor that is available for the computer
E. None of the above
180. The keyword shortcut to launch task manager___.
A. Alt+ F4
B. Ctrl+ F4
C. Ctrl+ Alt+ Del
D. Alt+ Del
E. None of these
181. Which protocol provides e-mail facility among different hosts?
A. FTP
B. SMTP
C. TELNET
D. SNMP
E. None of these
182. LAN stands for
A. Local Area Nodes
B. Large Area Network
C. Large Area Nodes
D. Local Area Network
183. Macros stored In the global macro sheet can be used
A. In the current document only
B. in any document
C. can be used only with other macros of the global macro sheet
D. None of the above
E. All of the above
184. The topology with highest reliability is_______.
A. Bus topology
B. Star topology
C. Ring topology
D. Mesh topology
E. None of these
185. Which of the following is NOT a type of broadband internet connection?
A. Cable
B. DSL
C. Dial-up
D. Satellite
E. None of these
186. A computer on a network that access resources provided by another computer called _____.
A. A Server
B. A computer
C. A Brewers
D. A Beta test and Beker call
E. None of these
187. What is the full form of HTTP?
A. Hyper Text Transfer Protocol
B. Hyper Text Transition Protocol
C. Hyper Text Transfer Program
D. Hyper Text Transition Program
E. Hyper Text Trivial Protocol
188. Why are headers and footers used in document?
A. To enhance the overall appearance of the document
B. To mark the starting and ending of a page
C. To make large document more readable
D. To allow page headers and footers to appear on document when it is printed
E. None of these
189. Which is the following shortcut key is used to checking spelling?
A. F1
B. F2
C. F7
D. F9
E. None of these
190. Which part of the system software always resides in main memory?
A. Text editor
B. Assembler
C. Linker
D. Loader
E. None of these
191. Which of the following is not a web browser?
A. MOSAIC
B. Chrome
C. Facebook
D. Netscape navigator
E. None of these
192. ________ is when the computer is turned on and the operating system is loading.
A. Booting
B. Spoofing
C. Formatting
D. Initiating
E. Loading
193. A (n)__________ allows sharing of a broadband Internet connection.
A. hub
B. adapter
C. router
D. switch
E. plug
194. Why are headers and footers used in document?
A. To enhance the overall appearance of the document
B. To mark the starting and ending of a page
C. To make large document more readable
D. To allow page headers and footers to appear on document when it is printed
E. None of these
195. SMPS stands for________.
A. Switched Mode Power Supply
B. Start Mode Power Supply
C. Store Mode Power Supply
D. Single Mode Power Supply
E. None of these
196. Electronic funds transfer is the exchange of money______.
A. From one place to another
B. From one account to another
C. From one bank to another
D. All of above
E. None of these
197. Programs designed specifically to address special purpose applications are called _______.
A. operating system
B. system software
C. application software
D. management information systems
E. None of these
198. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
E. None of these
199. Pressing CTRL + 9 in Excel _____.
A. Prints 9
B. Prints
C. Prints 9 followed by spaces
D. Inserts 9 cells at the current location
E. Hides the current row
(e-Book) IBPS RRB Officer Scale-I Previous Year Papers
(e-Book) IBPS RRB Office Assistants Previous Year Papers
Download IBPS RRB Officer (Scale-1) Papers PDF