IBPS-RRBs Officer Scale-1(Mains);Exam Paper - 2018 Subject : Computer Knowledge



IBPS-RRBs Officer Scale-1(Mains);Exam Paper - 2018

Subject : Computer Knowledge



Computer Knowledge :

161. Servers are computers that provide resources to other computers connected to a ____.

A. Network 
B. Mainframe
C. Supercomputer
D. Client
E. Port

162. What is EDI?
A. Electronic distant interface
B. Electronic development interface
C. Electronic data interface
D. Electronic data interchange
E. None of these

163. In MS-Excel, all formula starts with the sign of______.
A. # 
B. @
C. = 
D. +
E. None of these

164. Where is printer attached?
A. serial port
B. parallel port
C. SCSI 
D. Interface port
E. None of these

165. A character is represented in EBCDIC by___________.
A. one bit
B. four bits
C. eight bits
D. sixteen bits
E. None of the above

166. Firewalls are generally  used to protect against___.
A. fire Attacks
B. data Driven Attacks
C. virus Attacks
D. unauthorized access
E. None of these

167. Which key is used in combination with another key to perform a specific task?
A. Function 
B. Control
C. Arrow
D. Space Bar
E. None of these

168. A website's main page is called it's _______.
A. home page 
B. browser page
C. search page
D. index page
E. none of these

169. The network in which every node is connected to two other nodes is called _____.
A. Bus Network Topology
B. Star Network Topology
C. Ring Network Topology
D. All of the above
E. None of these

170. Underlined text, such as text and folder names is referred to as a __.
A. Hyperlink 
B. Menu
C. Source drive
D. Resource locator
E. None of these

171. The smallest unit in a digital system is _____.
A. byte
B. kilobyte
C. word 
D. character
E. bit

(e-Book) IBPS RRB Officer Scale-I Previous Year Papers

(e-Book) IBPS RRB Office Assistants Previous Year Papers

Download IBPS RRB Officer (Scale-1) Papers PDF

172. Which bar is usually located below the Title Bar that provides categorized options?
A. Menu Bar
B. Status Bar
C. Toolbar 
D. Scroll Bat
E. None of the above

173. Portrait and Landscape are
A. Page Orientation 
B. Paper Size
C. Page Layout
D. Both C and D
E. All of the above

174. __________refers to the unauthorized copying and distribution of software.
A. Hacking
B. Software Piracy
C. Software literacy
D. Cracking
E. Copyright

175. This type of software works with end-users,application software, and Computer Hardware to handle the majority of technical details:
A. Communications software
B. Application software
C. Utility software
D. System software
E. None of these

176. Which of the following keys is used to delete characters to the left of the cursor?
A. Alt + Delete 
B. Shift
C. Esc 
D. Delete
E. Backspace

177. A web site is a collection of_______.
A. graphics
B. programs
C. algorithms 
D. web pages
E. charts

178. When a computer is switched on, the booting process performs
A. Integrity Test
B. Power-On Self-Test
C. Correct Functioning Test
D. Reliability Test
E. Shut-down

179. The term ‘user interface’ refers to ______.
A. what the user sees on the screen and how they can interact with it
B. how the operating system responds to user commands
C. the means by which the user interacts with the peripheral devices on the computer
D. the monitor that is available for the computer
E. None of the above

180. The keyword shortcut to launch task manager___.
A. Alt+ F4 
B. Ctrl+ F4
C. Ctrl+ Alt+ Del
D. Alt+ Del
E. None of these

181. Which protocol provides e-mail facility among different hosts?
A. FTP 
B. SMTP
C. TELNET 
D. SNMP
E. None of these

182. LAN stands for
A. Local Area Nodes
B. Large Area Network
C. Large Area Nodes
D. Local Area Network

183. Macros stored In the global macro sheet can be used
A. In the current document only
B. in any document
C. can be used only with other macros of the global macro sheet
D. None of the above
E. All of the above

184. The topology with highest reliability is_______.
A. Bus topology
B. Star topology
C. Ring topology
D. Mesh topology
E. None of these
 
185. Which of the following is NOT a type of broadband internet connection?
A. Cable 
B. DSL
C. Dial-up
D. Satellite
E. None of these

186. A computer on a network that access resources provided by another computer called _____.
A. A Server
B. A computer
C. A Brewers
D. A Beta test and Beker call
E. None of these

187. What is the full form of HTTP?
A. Hyper Text Transfer Protocol
B. Hyper Text Transition Protocol
C. Hyper Text Transfer Program
D. Hyper Text Transition Program
E. Hyper Text Trivial Protocol

188. Why are headers and footers  used in document?
A. To enhance the overall appearance of the document
B. To mark the starting and ending of a page
C. To make large document more readable
D. To allow page headers and footers to appear on document when it is printed
E. None of these

189. Which is the following shortcut key is used to checking spelling?
A. F1 
B. F2
C. F7 
D. F9
E. None of these

190. Which part of the system software always resides in main memory?
A. Text editor 
B. Assembler
C. Linker 
D. Loader
E. None of these

191. Which of the following is not a web browser?
A. MOSAIC 
B. Chrome
C. Facebook 
D. Netscape navigator
E. None of these

192. ________ is when the computer is turned on and the operating system is loading.
A. Booting 
B. Spoofing
C. Formatting 
D. Initiating
E. Loading

193. A (n)__________ allows sharing of a broadband Internet connection.
A. hub 
B. adapter
C. router 
D. switch
E. plug

194. Why are headers and footers used in document?
A. To enhance the overall appearance of the document
B. To mark the starting and ending of a page
C. To make large document more readable
D. To allow page headers and footers to appear on document when it is printed
E. None of these

195. SMPS stands for________.
A. Switched Mode Power Supply
B. Start Mode Power Supply
C. Store Mode Power Supply
D. Single Mode Power Supply
E. None of these

196. Electronic funds transfer is the exchange of money______.
A. From one place to another
B. From one account to another
C. From one bank to another
D. All of above
E. None of these

197. Programs designed specifically to address special purpose applications are called _______.
A. operating system
B. system software
C. application software
D. management information systems
E. None of these

198. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
E. None of these

199. Pressing CTRL +  9 in Excel _____.
A. Prints 9
B. Prints
C. Prints 9 followed by spaces
D. Inserts 9 cells at the current location
E. Hides the current row

(e-Book) IBPS RRB Officer Scale-I Previous Year Papers

(e-Book) IBPS RRB Office Assistants Previous Year Papers

Download IBPS RRB Officer (Scale-1) Papers PDF