You are here
Home > Uncategorized > Computer Questions for IBPS RRB PO and Clerk Mains 2017

Computer Questions for IBPS RRB PO and Clerk Mains 2017

Computer Questions for IBPS RRB PO and Clerk Mains 2017

Q1. Which among thefollowing is not a mobile Operating System?

(a) Bada

(b) Safari

(c) Symbian

(d) MeeGo

(e) WebOS

S1. Ans.(b)

Sol. Safari is a webbrowser

Q2. Which among thefollowing key can be used as a shortcut to rename a folder in Microsoft Windows8 and higher versions?

(a) F2

(b) F4

(c) F6

(d) F9

(e) F11

S2. Ans.(a)

Sol. F2 is a shortcutto rename selected object in MS windows 8 and higher versions

Q3. AT&Tdesigned its first commercial modem, specifically for converting digitalcomputer data to analog signals for transmission across its long distancenetwork. What is the name of the modem?

(a) Telex

(b) Memex

(c) CompuServe

(d) Bell 103dataset

(e) Dataphone

S3. Ans.(e)

Sol. In 1960’sAT&T introduces its Dataphone, the first commercial modem. The firstcommercial modem made for converting digital computer data at analog signalsfor transmission across long distance networks

Q4. Integrated Chipsor IC’s were started to be in use from which generation of Computers?

(a) 1stGeneration

(b) 2ndGeneration

(c) 3rdGeneration

(d) 4thGeneration

(e) 5thGeneration

S4. Ans.(c)

Sol. IC were startedto be in use from 3rd generation of computers. In third generation of computer,IC (Integrated circuits) was used as the electronic component for computers.The development of IC gave birth to a new field of microelectronics. The mainadvantage of IC is not only its small size but its superior performance andreliability than the previous circuits. It was first developed by T.S Kilby.This generation of computer has huge storage capacity and higher calculatingspeed.

Q5. In Computerprogramming there is set of subroutine definitions, protocols, and tools forbuilding software and applications. Which among the following is a term forsets of requirements that govern how one application can talk to another?

(a) UPS

(b) API

(c) CGI

(d) J2EE

(e) OLE

S5. Ans.(b)

Sol. An API may befor a web-based system, operating system, database system, computer hardware,or software library. It is an acronym for Application Programming Interface. AnAPI specifies how software components should interact and APIs are used whenprogramming graphical user interface (GUI) components.

Q6. BSoDs can becaused by poorly written device drivers or malfunctioning hardware, such asfaulty memory, power supply issues, overheating of components, or hardware runningbeyond its specification limits. Which color screen is displayed whenencountered a BSOD Error?

(a) Red

(b) Grey

(c) Black

(d) Blue

(e) Green

S6. Ans.(d)

Sol. BSODs appearwhen Microsoft Windows encounters a critical error it can’t recover from, requiringa reboot and possibly resulting in lost work. It stands for blue screen ofdeath. Blue screens are generally caused by problems with your computer’shardware or issues with its hardware driver software. A blue screen occurs whenWindows encounters a “STOP Error.” This critical failure causes Windows tocrash and stop working

Q7. Which among thefollowing is the smallest unit in an image in a computer screen?

(a) Unit

(b) Pixel

(c) Array

(d) Resolution

(e) Clip

S7. Ans.(b)

Sol. In digitalimaging, a pixel, pel, or picture element is a physical point in a rasterimage, or the smallest addressable element in an all points addressable displaydevice; so it is the smallest controllable element of a picture represented onthe screen.

Q8. Microsoft Wordis a word processor developed by Microsoft. In MS Word Spelling Check is afeature available in which tab?

(a) File

(b) Home

(c) Insert

(d) Review

(e) References

S8. Ans.(d)

Sol. In MS WordSpelling and Grammar check is available in Review Tab. Some other optionsavailable in Review are: Research, Thesaurus, Word Count, Translate, Language,New Comment, Tracking, Compare and Protect.

Q9. There is anetwork that can connect networks ranging from small location or area to abigger range including public packet network and large corporate networks. Thatnetwork’s enterprise allows users to share access to applications, services andother centrally located resources. Its ability for a huge geographical accesshas transformed networking. Which among the following is that network?

(a) SAN

(b) CAN

(c) LAN

(d) WAN

(e) MAN

S9. Ans.(d)

Sol. WAN stands forWide Area Network. A wide area network (WAN) is a geographically distributedprivate telecommunications network that interconnects multiple local areanetworks (LANs). In an enterprise, a WAN may consist of connections to acompany’s headquarters, branch offices, colocation facilities, cloud servicesand other facilities.

Q10. Which among thefollowing is not an Object Oriented Programming Language?

(a) Python


(c) Java

(d) C++

(e) Ruby

S10. Ans.(b)

Sol. Pascal is animperative and procedural programming language, designed in 1968/1969 andpublished in 1970 by Niklaus Wirth as a small and efficient language intendedto encourage good programming practices using structured programming and datastructuring.

Q11. Which cloud is acloud computing environment that uses a mix of on-premises, private cloud andthird-party, public cloud services with orchestration between the two platformsand it is particularly valuable for dynamic or highly changeable workloads?

(a) Dynamic Cloud

(b) Advance Cloud

(c) Hybrid Cloud

(d) Sharing Cloud

(e) CombinedCloud

S11. Ans.(c)

Sol. Hybrid cloud isa cloud computing environment which uses a mix of on-premises, private cloudand third-party, public cloud services with orchestration between the twoplatforms. By using a Hybrid approach, companies can maintain control of aninternally managed private cloud while relying on the public cloud as needed.

Q12. If you areallowing a person on the network based on the credentials to maintain thesecurity of your network, then this act refers to the process of ______.


(b) Automation

(c) Firewall

(d) Encryption

(e) Decryption

S12. Ans.(a)

Sol. The process ofidentifying an individual usually based on a username and password. In securitysystems, authentication is distinct from authorization, which is the process ofgiving individuals access to system objects based on their identity.

Q13. The use ofcombination of 1’s and 0’s is feature of which of the following type ofComputer Language?

(a) High LevelLanguage


(c) MachineLanguage

(d) C


S13. Ans.(c)

Sol. Machine Languageuses a combination of 1’s and 0’s.

Q14. Which among thefollowing is a recently debated principle that Internet service providers andgovernments regulating the Internet should treat all data on the Internet thesame, not discriminating or charging differentially by user, content, website, platform,application, type of attached equipment, or mode of communication?

(a) Comcast

(b) NetNeutrality

(c) Oblique-net

(d) NetFraternity

(e) Fair Web

S14. Ans.(b)

Sol. Net Neutralitymeans an Internet that enables and protects free speech. It means that Internetservice providers should provide us with open networks — and should not blockor discriminate against any applications or content that ride over thosenetworks.

Q15. Which among thefollowing is an important circuitry in a computer system that directs theoperation of the processor?

(a) Memory

(b) Address Bus

(c) Accumulator

(d) ALU

(e) Control Unit

S15. Ans.(e)

Sol. The Control Unit(CU) is digital circuitry contained within the processor that coordinates thesequence of data movements into, out of, and between a processor’s manysub-units.


Leave a Reply

error: Content is protected !!