Top 100 RRB Computer Awareness PDF
Top 100 RRB Computer Awareness PDF
1) Which layer of the OSI Model is responsible for software command. When we start our Computer then
the transmission and reception of unstructured raw there is an operation which is performed automatically
data between a device and a physical transmission by the Computer which is called as Booting.
medium?
5) Which of the following is a component of the 7) Who among the following was the inventor of
Central Processing Unit that directs the operation of ENIAC which is the first electronic general-purpose
the processor? computer?
Answer: d) Answer: d)
The control unit (CU) is a component of the CPU that John William Mauchly and J. Presper Eckert are the
directs the operation of the processor. It tells the scientists credited with the invention of the Electronic
computer's memory, arithmetic and logic unit and input Numerical Integrator and Computer (ENIAC), the first
and output devices how to respond to the instructions general-purpose electronic digital computer, which was
that have been sent to the processor. It directs the completed in 1946.
operation of the other units by providing timing and
control signals.
8) Which among the following was the first
commercial electronic computer developed specially
6) Which of the following is a smaller and faster for scientific and military purposes?
memory which stores copies of the data from
frequently used main memory locations? a) UNIVAC I
Which of the above statements is not correct? 11) Which of the following computer performs
intense numerical calculations such as weather
a) Both 1 and 2 forecasting and complex scientific computations?
Answer: c) d) Supercomputer
d) Servers Answer: b)
a) Ralph Benjamin
14) Which key is referred to as a toggle key because
its function goes back and forth every time it is b) Herman Hollerith
pressed?
c) Kenyon Taylor
a) Shift key
d) Douglas Engelbart
b) Caps Lock key
Answer: d)
c) Spacebar key
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
a) Click b) Plotter
b) Tools b) Microwave
Answer: b) Answer: d)
When it comes time to send your Excel spreadsheet, it's Digital subscriber line is a family of technologies that
important to protect the data that you're sharing. In are used to transmit digital data over telephone lines.
Excel to protect a worksheet; you can choose Protection DSL is widely understood to mean asymmetric digital
and the Protect Sheet from Tools menu. Click General subscriber line, the most commonly installed DSL
options and read-only recommended checkbox and save technology, for Internet access.
the document.
a) Web page
27) Which among the following technologies is used
to transmit digital data over telephone lines? b) Home page
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
30) Who among the following English scientist is 32) Which among the following feature displays each
credited for the invention of the World Wide Web in slide of the PPT as a thumbnail and is used to
the year 1989? rearrange them?
Answer: d) Answer: c)
English scientist Tim Berners-Lee invented the World Slide sorter view is one of the important features
Wide Web in 1989. He wrote the first web browser in included in the Microsoft PowerPoint. Slide sorter view
1990 while employed at CERN near Geneva, allows the use of a computer to see all the presentations
Switzerland. The World Wide Web has been central to in Power Point at the same time. You can get to Slide
the development of the Information Age and is the Sorter view from the task bar at the bottom of the slide
primary tool billions of people use to interact on the window, or from the View tab on the ribbon. Slide
Internet. Sorter view displays all the slides in your presentation in
horizontally sequenced, thumbnails.
Answer: c)
c) Junk
The Data layer is the second layer of the seven-layer
d) Hoaxes OSI model of computer networking. This layer is the
protocol layer that transfers data between adjacent
Answer: a) network nodes in a wide area network (WAN) or
between nodes on the same local area network (LAN)
Spam is the use of electronic messaging systems to send segment. Two types of Data Link layer devices are
unsolicited bulk messages, especially advertising, commonly used on networks: bridges and switches.
indiscriminately. The most widely recognized form of
spam is email spam.
36) Which device is used in the Network layer of the
OSI Model among the following list of devices?
34) _______ is the on-demand delivery of compute
power, database, storage, applications, and other IT a) Application gateway
resources through internet?
b) Router
a) Parallel computing
c) Repeater
b) Distributed computing
d) Bridges
c) Cloud computing
Answer: b)
d) Virtual computing
In the seven-layer OSI model of computer networking,
Answer: c) the network layer is layer 3. The network layer is
responsible for packet forwarding including routing
Cloud computing is the delivery of computing services- through intermediate routers. The network layer
including servers, storage, databases, networking, provides the means of transferring variable-length
software, analytics, and intelligence over the Internet to network packets from a source to a destination host via
offer faster innovation, flexible resources, and one or more networks.
economies of scale.
38) Which among the following code is used and is 40) Which computer program interprets software
accepted worldwide in the present day computing? programs written in assembly language into machine
language?
a) EBCDIC
a) Compiler
b) ASCII
b) Interpreter
c) ISCII
c) Assembler
d) Both a and b
d) Both a and c
Answer: b)
Answer: c)
ASCII stands for American Standard Code for
Information Interchange. ASCII is the most common An assembler is a program that takes basic computer
format for text files in computers and on the Internet. In instructions and converts them into a pattern of bits that
an ASCII file, each alphabetic, numeric, or special the computer's processor can use to perform its basic
character is represented with a 7-bit binary number (a operations. It is a type of computer program that
string of seven 0s or 1s). interprets software programs written in assembly
language into machine language.
a) FTP
42) Which among the following is a computer
program which converts each high-level program b) TCP
statement into the machine code?
c) SMTP
a) Simulator
d) HTTP
b) Compiler
Answer: d)
c) Decoder
Hypertext Transfer Protocol is the set of rules for
d) Interpreter transferring files such as text, graphic images, sound,
video, and other multimedia files on the World Wide
Answer: d) Web. It was designed for communication between web
browsers and web servers, but it can also be used for
An interpreter is a computer program that is used to other purposes.
directly execute program instructions written using one
of the many high-level programming languages. It is a
computer program, which converts each high-level 45) _______ is a tool used to convert hand-drawn
program statement into the machine code. images into a format suitable for computer
processing?
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
b) Megahertz Answer: c)
c) Nano seconds A bit short for binary digit is the smallest unit of data in
a computer. A bit has a single binary value, either 0 or
d) Characters per second 1.The bit is a basic unit of information in information
theory, computing, and digital communications.
Answer: a)
A bit per second (bps) is a measure used to show the 50) Which among the following system is housed on a
average rate at which data is transferred between a single microprocessor board with the programs
computer and a data transmission system. As the term stored in ROM?
implies, the speed in bps is equal to the number of bits
transmitted or received each second. a) Mini computer
b) Mainframe computer
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
d) Supercomputer Answer: b)
c) Spreadsheet Answer: b)
Fire wire also called IEEE 1394 is another popular
d) Application Software connector for adding peripherals to your computer. Fire
wire is most often used to connect digital camcorders,
Answer: d) external hard drives, and other devices that can benefit
from the high transfer rates (up to 480 Mbps) supported
Application software is software designed to perform a by the Fire wire connection.
group of coordinated functions, tasks, or activities for
the benefit of the user. It is generally a program or
collection of programs used by end users. It can be 54) What is the term used for the software that is
called an application or simply an app. intentionally designed to cause damage to a
computer, server, client, or computer network?
55) _______ is a method of trying to gather personal 57) Which of the following term is used for the
information using deceptive e-mails and websites? collection of one or more spreadsheets in a single file
in Microsoft Excel?
a) Phishing
a) Template
b) Hacking
b) Document
c) Cyber Bullying
c) Workbook
d) Cyber stalking
d) Both a and c
Answer: a)
Answer: c)
Phishing is a cybercrime in which a target or targets are
contacted by email, telephone or text message by In Microsoft Excel workbook is a collection of one or
someone posing as a legitimate institution to lure more spreadsheets, also called worksheets, in a single
individuals into providing sensitive data such as file. A workbook is a file that contains one or more
personally identifiable information, banking and credit worksheets to help you organize data. You can create a
card details, and passwords. The information is then new workbook from a blank workbook or a template.
used to access important accounts and can result in
identity theft and financial loss.
58) Which of the following data transmission
medium made of tiny threads of glass or plastic can
56) What is the term used for the program or transmit huge amount of information at the speed of
hardware device that filters the information coming light?
through an internet connection to a network or
computer system? a) Copper cable
d) Cookies Answer: d)
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
Answer: a) a) Germanium
b) IP d) TELNET
c) URL Answer: b)
68) _____________ is an electrical apparatus that 70) Which of the following two keys can be used in
provides emergency power to a load when the input combination with other keys to perform shortcuts
power source or mains power fails? and special tasks?
Answer: a) Answer: c)
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
71) Which of the following system provides 73) In which of the following topology, all the devices
communication in both directions, but only one are connected to a single hub through a cable?
direction at a time?
a) Star topology
a) Simplex
b) Bus topology
b) Duplex
c) Ring topology
c) Full Duplex
d) Mesh topology
d) Half Duplex
Answer: a)
Answer: d)
In star topology network, all the devices are connected
A half-duplex (HDX) system provides communication to a single hub through a cable. This hub is the central
in both directions, but only one direction at a time. An node and all others nodes are connected to the central
example of a half-duplex system is a two-party system node. The star topology is considered the easiest
such as a walkie-talkie, wherein one must use over or topology to design and implement. An advantage of the
another previously designated keyword to indicate the star topology is the simplicity of adding additional
end of transmission, and ensure that only one party nodes.
transmits at a time, because both parties transmit and
receive on the same frequency.
74) __________ is an indicator used to show the
current position for user interaction on a computer
72) Which of the following is the process of monitor or other display device?
transferring software programme from a secondary
storage media into the hard disc? a) Blinker
a) Download b) Pointer
b) Upload c) Cursor
d) Upgrade Answer: c)
Answer: c)
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
a) Ctrl + K a) FORTRAN
c) Ctrl + H c) BASIC
d) Ctrl + C d) JAVA
Answer: a) Answer: b)
In an Excel worksheet, select the cell where you want to COBOL stands for Common Business Oriented
insert the hyperlink to make it the active cell. Type a Language. COBOL is a compiled English-like computer
word to act as anchor text and press Enter. Select the programming language designed for business use. It is
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
a) JAVA c) Repeater
b) BASIC d) Gateway
c) COBOL Answer: a)
80) What is the term used for the device that a) Network layer
connects to the network without the use of cables?
b) Transport layer
a) Open source
c) Application layer
b) Distributed
d) Data Link layer
c) Centralized
Answer: c)
d) Wireless
The application layer is present at the top of the OSI
Answer: d) model. It is the layer through which users interact.
SMTP ( Simple mail transfer protocol) FTP( File
A device that allows wireless devices to connect to a transfer protocol) and DNS(Domain name service) are
wired network using Wi-Fi or related standards is called the protocols of application layer of the OSI Model.
wireless device. Examples of wireless devices include
cell phones, PDAs, wireless mice, wireless keyboards,
wireless routers, wireless network cards etc. 83) Which among the following organisation
developed SAGA-220 supercomputer in the year
2011?
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
Answer: d) Answer: a)
A hard disk is an electro-mechanical data storage device Microsoft word 2013 by default saves the documents or
that uses magnetic storage to store and retrieve digital files in .docx format.
information using one or more rigid rapidly rotating
disks (platters) coated with magnetic material. The
platters are paired with magnetic heads, usually 87) Which among the following software is designed
arranged on a moving actuator arm, which read and to help analyze, configure, optimize or maintain a
write data to the platter surface. computer?
a) Specialized software
85) Which of the following term is used for the
unauthorized copying of the software to be used for b) System software
personal gain instead of personal backups?
c) Application software
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
Answer: c) Answer: c)
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS
a) Nibble
92) Which among the following is the shortcut key
for slideshow in Microsoft PowerPoint? b) Bits
a) F5 c) Pixels
d) Bytes
b) F7
Answer: c)
c) F12
A pixel or picture element is a physical point in a raster
d) F4 image, or the smallest addressable element in an all
points addressable display device. It is the smallest
Answer: a) controllable element of a picture represented on the
screen.
A slide show is a presentation of a series of still images
on a projection screen or electronic display device,
typically in a prearranged sequence. F5 key is the 95) Which utility helps the user to arrange used and
shortcut key for slideshow in Microsoft PowerPoint. free space on the hard disk which in turn increases
the processing speed of the disk?
93) Which is the type of ROM in which the chip can a) Encryption
be erased & reprogrammed on the board easily byte
by byte? b) Scan disk
c) PROM Answer: c)
c) Bus Answer: b)
a) Cold booting
98) The web uses which of the following language to
request and serve the web pages and programs? b) Warm booting
Answer: a)
Click Here for High Quality Mock Test Series for: RRB JE RRB NTPC RRB Level 1 SSC CGL SSC CHSL SSC MTS