0% found this document useful (0 votes)
285 views25 pages

Computer Awareness For Rbi Assistant Mains

1) The document contains 49 questions related to computer fundamentals, software, and technologies. The questions cover topics like operating systems, hardware, networking, databases, and programming languages. 2) The questions are multiple choice format with one correct answer provided for each. 3) The questions are designed to test the knowledge of an RBI assistant on various computer related topics.

Uploaded by

Pritish Mohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
285 views25 pages

Computer Awareness For Rbi Assistant Mains

1) The document contains 49 questions related to computer fundamentals, software, and technologies. The questions cover topics like operating systems, hardware, networking, databases, and programming languages. 2) The questions are multiple choice format with one correct answer provided for each. 3) The questions are designed to test the knowledge of an RBI assistant on various computer related topics.

Uploaded by

Pritish Mohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

RBI ASSISTANT –COMPUTER QUESTIONS SET

(1)-Which of the following is not anti-viruses software?


1. Norton
2. F-Prot
3. Oracle
4. McAfee
5. None of these
Ans-3. Oracle
Solution:-5- Oracle Database is an object-relational database management
system produced and marketed by oracle corporation.

(2)-What is a compiler?
1. A compiler does a conversion line by line as the program is run
2. A compiler converts the whole of a higher level program code into
machine code in one step
3. A compiler is a general purpose language providing very ecient
execution
4. A compiler convert program in low level language
5. None of these
Ans-2- A compiler converts the whole of a higher level program code into
machine code in one Step.
Solution: A compiler is a software program that transforms high-level source
code into a low level object code (binary cod5)in machine language, which
can be understood by the
processor. Compiler convert the whole programe in a single step.

(3)- FORTRAN programming language is more suitable for_____


1. Business Applications
2. Marketing Applications
3. Scientic Applications
4. Website designing
5. None of these
Ans-3. Scientic Applications
Solution: FORTRAN (Formula Translation) is a general-purpose, imperative
programming language that is especially suited to numeric computation and
scientic computing.

(4)-In MS excel, the name of the worksheet is displayed in which of the


following?
1.Title tab
2.Active Tab
3.Sheet Tab
4.Named Tab
5.Action Tab
Ans-3- Sheet Tab

(5)-If one wants to move around through the document on the computer
screen, which of the following is used?
1. Page Up
2. Page Down
3. Home+ Tab
4. Scroll Bar
5. Alt+ Tab
Ans-4- Scroll Bar

(6)- What is the full form of SRP?


1. Server Response Principle
2. Single Responsibility Principle
3. Statutory Repository Principle
4. Single Response Principle
5. None of the above
Ans-2- Single Responsibility Principle

(7)-Which of the following is a variant of Read Only Memory (ROM)?


1. PROM
2. EPROM
3. EEPROM
4. Only (2) and (3)
5. All of the above
Ans-5- All of the above

(8)- Digital Subscriber Line connection is an example of which of the


following?
1.Wireless
2.Broadband
3.Categorized
4.Router
5.None of the above
Ans-2- Broadband

(9)-Under which menu in Microsoft excel can "Macros" be found?


1. Insert
2. File
3. Data
4. Tools
5. Format
Ans-4- Tools

(10)-In which of the following communication type , data can be sent in one
direction only?
1. Halfplex
2. Simplex
3. Duplex
4. Half-Duplex
5. None of the above
Ans-2- Simplex

(11)- Which PowerPoint view displays each slide of the presentation as a thumbnail
and is useful for rearranging slides?
1. Slide Sorter
2. Slide Master
3. Slide Show
4. Auto Content
5. Auto Display
Ans-1- Slide Sorter
(12)- Which one of the following gates in computing logic is called an Universal
gate?
1. OR
2. AND
3. NOT
4. NAND
5. None of the above
Ans-4- NAND

(13)- We often use antivirus software in our computer to make it free from virus.
An antivirus software is an example of which of the following?
1. Application Software
2. System Software
3. Utility Software
4. Operating System
5. None of the above
Ans-3- Utility Software

(14)-We often come across the abbreviation TCP with respect to a computer. The
full form of TCP is?
1. Total Computer Protocol
2. Total Computer Programming
3. Transmission Control Protocol
4. Transfer Computer Programming
5. Transformation Control Programming
Ans-3-Transmission Control Protocol

(15)-The standard code used by the computer industry to represent


characters is known as?
1. TSCII
2. ASCII
3. RSCI
4. EBCICI
5. EBDCU
Ans-2- ASCII- American Standard Code for Information Interchange

(16)- Which of the following is used for scanning a document containing text?
1. Magnetic Ink Character Recognition
2. Optical Mark Reader
3. Optical Character Recognition
4. Bar Code Reader
5. Punch Card Reader
Ans-3- Optical Character Recognition

(17)- Which of the following devices is used to extend the length of a network
without signal degradation?
1. Modem
2. Hub
3. Switch
4. Repeater
5. Augmenter
Ans- 4-Repeater

(18)- Which of the following corresponds to the size of a MAC address?


1. 16 bits
2. 32 bits
3. 8 bits
4. 128 bits
5. 48 bits
Ans-5-48 bits

(19)-Which of the following is considered as the world's first microprocessor?


1. Intel One
2. Intel 4004
3. Intel Uno
4. Intel 6006
5. Intel 3003
Ans-2- Intel 4004

(20)- Which of the following is described as a stored link of a webpage


designed to give quicker access later?
1. Hyperlink
2. Bookmark
3. URL
4. HTTPS
5. Address
Ans-2- Bookmark

(21)- Clock rate of microprocessor is calculated in which of the following?


1. Ampere
2. Hertz
3. Ampere-hour
4. Hertz-hour
5. None of the above
Ans-2- Hertz

(22)- exe file extension is used for which of the following file types?
1. Media files
2. Archived files
3. Image files
4. Exectubale files
5. Compressed files
Ans- 4- Exectubale files

(23)- Which of the following is a term that cannot be used to name a


Windows folder?
1. can
2. make
3. for
4. con
5. lull
Ans-4- con

(24)-Which of the following companies developed the .avi format?


1. Microsoft
2. Apple
3. IBM
4. Sun Microsystems
5. Google
Ans-1- Microsoft
(25)- What is the expanded form of UTP in computing jargon?
1. Unshielded Twisted Pair
2. Unified Transmission Protocol
3. Uniaxial Transmission Protocol
4. Underwritten Transfer Program
5. None of the above
Ans-1- Unshielded Twisted Pair

(26)- Mr. Swamy needs to design invitation card. What type of computer
program is suitable?
1. MS-Word
2. Desktop Publishing
3. Simulation
4. MS-Access
5. None of the above
Ans-2- Desktop Publishing

(27)- Which of the following can't spread virus?


1. An e-mail with attachment
2. A plain text mail
3. Downloading files over the web
4. Installing Programs from Non-Trusted Sources
5. None of the above
Ans- 2. A plain text mail

(28)- Full form of CAM with respect to the computers is –


1. Computer Aided Manual
2. Computer Aided Manufacturing
3. Computer Added Manufacturing
4. Computer Added Manual
5. Computer Aiding Manufacturing
Ans-2. Computer Aided Manufacturing

(29)-The address of a memory location is identified by which among the following?


1. Address Bus
2. Identification Bus
3. Identity Bus
4. Attrition Bus
5. Electronic Identification Bus
Ans-1- Address Bus

(30)- In MS Word, the function key used to check spellings is -?


1. F5
2. F6
3. F7
4. F8
5. F9
Ans-3- F7

(31)- Any communication between memory and ALU of a computer is performed by


which among the following?

1. Electronic Bus
2. Universal Serial Bus
3. Control Unit
4. Memory Bus
5. All of the Above
Ans-3. Control Unit

(32)- In railways, which of the following types of computers is used?


1. Mini Computers
2. Super Computers
3. Micro Computers
4. Main Frame Computers
5. Server Computers
Ans- 4- Main Frame Computers

(33)- When a computer is turned on, which of the following is run by BIOS in order
to check whether all the hardware components are working properly?
1. Booting
2. Warm Booting
3. Cold Booting
4. Power on Self Test
5. None of the Above
Ans-4-Power on Self Test
(34)-Which of the following was used in first generation computers as
processor?
1. Magnetic Ink
2. Vacuum Tubes
3. Integrated Circuits
4. Microchips
5. None of the above
Ans-2- Vacuum Tubes

(35)- The Central Processing Unit of a computer consists of which of the


following?
1. Memory Unit, Application Software, System Software
2. Control Unit, Arithmetic Logic Unit, Primary Storage
3. Control Unit, UPS, CD-ROM
4. Memory Unit, Processing Unit
5. Arithmetic-Logic Unit, Memory Device, Peripheral Devices
Ans-2- Control Unit, Arithmetic Logic Unit, Primary Storage

(36)- A logic gate is known as the elementary building block of ......


1. Central Processing Unit
2. UPS
3. Monitor
4. Digital Circuit
5. Web Address
Ans-4-Digital Circuit

(37)- The decimal number 13 is written in binary number system as which of


the following?
1. 1111
2. 1255
3. 1101
4. 1110
5. None of the above
Ans- 3- 1101
(38)- The general file extension for a backup file of any other file is?
1. .bac
2. .bak
3. .exe
4. .rar
5. None of the above
Ans-2-.bak

(39)-The process of dividing a disk into tracks and sectors is known as


1. Sorting
2. Characterizing
3. Formatting
4. Executing
5. Dividing
Ans-3- Formatting

(40)- The full form of the abbreviation GIF is which of the following?
1. Graphics Interchange Format
2. Graph Interaction Formula
3. General Introduction Formula
4. Graphics International Formula
5. General International Function
Ans-1- Graphics Interchange Format

(41)- ____________is to locate a data item for the purpose of storage


1. Decode
2. Fetch
3. Process
4. Identify
5. Magnify
Ans-2- Fetch

(42)- Digital Subscriber Line connection is an example of which of the following?


1. Wireless
2. Broadband
3. Categorized
4. Router
5. None of the above
Ans- 2- Broadband

(43)- In 1997, a super computer named Deep Blue defeated the then World
Chess Champion Gary Kasparov in a chess match. The supercomputer was
developed by which of the following companies?
1. Sony Inc
2. Microsoft Inc
3. Apple Inc
4. IBM
5. None of the above
Ans-4- IBM

(44)- JDBC stands for ____


1) Java Development Base Connectivity
2) Job Desktop Band Code
3) Java Database Connectivit
4) Job Database Connectivity
5) None of the above
ANS- 3)Java Database Connectivity

(45)- What does S in CMOS stand for ___


1)System
2)Semiconductor
3)Software
4)Source
5)Shelf
ANS- 2)Semiconductor

(46)- What does D in ADSL stand for ____


1)Digital
2)Data
3)Desktop
4)Disk
5)Display
ANS- 1)Digital
(47)- The process of a computer transferring information into the server on the
Internet is called _____
1)Unloading
2)Sorting
3)Downloading
4)Uploading
5)Storing
ANS- 4)Uploading

(48)- Which of the following computers is not considered as a portable


computer?
1)Notebook computer
2)Laptop
3)Mini computer
4)PDA
5)Tablet
ANS- 3)Mini computer

(49)- A server uses ____ applications software to support its client computers.
1)back-end
2)front end
3)programming
4)java
5)none of these
ANS- 1)back-end

(50)- Each Web address is actually a series of numbers, which is usually called as
____
1)Domain Name
2)URL
3)http
4)HTML
5)IP address
ANS- 5)IP address

(51)- Which of the following is the full form of LSI?


1)Low Scale Information
2)Large Scale Information
3)Low Scale Integration
4)Large Scale Integration
5)Local Scale Integration
ANS- 4)Large Scale Integration

(52)- The overall design, construction, organization and interconnecting of the


various components of a computer system is referred as ____
1)Computer Architecture
2)Computer Flowchart
3)Computer Algorithm
4)Computer Document
5)None of these
ANS- 1)Computer Architecture

(53)- Thesaurus tool in MS Word is used for


1)Spelling suggestions
2)Grammar options
3)Synonyms and Antonyms words
4)Deleting a word
5)None of the Above
ANS- 3)Synonyms and Antonyms words

(54)- VPN stands for-------


1)Virtual Personal Network
2)Very Private Network
3)Virtual Private Network
4)Vicious Personal Network
5)None of these
ANS- 3)Virtual Private Network

(55)- An image on a computer screen is made up of a matrix of _____.


1)Byte
2)Pixels
3)Bit
4)Palette
5)None of these
ANS- 2)Pixels
(56)- What is the newest type of database, which is well suited for multimedia
applications, called?
1)Object-oriented database
2)Client/server database
3)Data warehouse
4)Multimedia database
5)None of these
ANS- 1)Object-oriented database

(57)- m-Commerce is best described as __


1)The use of Kiosks in marketing
2)Transporting products
3)Buying and selling goods/services through wireless handheld devices (Phones
usually)
4)Using notebook PC's in marketing
5)None of the above
ANS- 3)-Buying and selling goods/services through wireless handheld devices
(Phones usually)

(58)- In Excel, _____ allows users to bring together copies of workbooks that
other users have worked on independently.
1)Copying
2)Merging
3)Pasting
4)Compiling
5)None of these
ANS -2)Merging

(59)- _____________ allows users to upload files to an online site so they can be
viewed and edited from another location.
1)General-purpose applications
2)Microsoft Outlook
3)Web-hosted technology
4)Office Live
5)None of these
ANS- 3)Web-hosted technology
(60)- A mistake in an algorithm that causes incorrect results is called a ?
1)Logical error
2)Syntax error
3)Procedural error
4)Compiler error
5)Machine error
ANS- 1)Logical error

(61)- A ____ allows us to access our e-mail from anywhere.


1)Forum
2)Webmail interface
3)Message Board
4)Weblog
5)None of these
ANS- 2)Webmail interface

(62)- The method of Internet access that requires a phone line, but offers faster
access speeds than dial-up is the____ connection.
1)Cable access
2)Satellite access
3)fiber-optic service
4)Digital Subscriber Line (DSL)
5)Modem
ANS- 4)Digital Subscriber Line (DSL)

(63)- A program, either talk or music that is made available in digital format for
automatic download over the Internet is called a ?
1)Wiki
2)Broadcast
3)Modcast
4)Blog
5)Podcast
ANS- 5)Podcast

(64)- What type of monitoring file is commonly used on and accepted from
Internet sites?
1)Smartware
2)Phishes
3)Cookies
4)Trojans
5)None of the above
ANS- 3)Cookies

(65)- The software that secretly collects information about the web client's
internet habits?
1)Detectware
2)Spam
3)Spyware
4)Pharming
5)All of the above
ANS- 3)Spyware

(66)- What does SQL stand for?


1)Structured Query Language
2)Structered Questioning Logicstics
3)Simplified Query Logic
4)Simple Questioning Language
5)Structured Query Logic
ANS- 1)Structured Query Language

(67)- What is the full form of UNIVAC?


1)Universal Automatic Computer
2)Universal Array Computer
3)Unique Automatic Computer
4)Unvalued Automatic Computer
5)None of these
ANS- 1)Universal Automatic Computer

(68)- The process of converting analog signals into digital signals so they can be
processed by a receiving computer is referred to as ____
1)Modulation
2)Demodulation
3)Synchronizing
4)Digitizing
5)Transmission
ANS- 1)Modulation
(69)- What is the full form of SMTP?
1)Swift Mail Transmission Program
2)Simple Mail Transfer Protocol
3)Swift Mail Transfer Program
4)Spam Mail Trash Program
5)None of these
ANS- 2)Simple Mail Transfer Protocol

(70)- A high speed device used in CPU for temporary storage during processing is
called ____
1)Register
2)Bus
4)Translator
5)Hub
ANS- 1)Register

(71)- A(n) _____ is a set of programs designed to manage the resources of a


computer, including starting the computer managing programs, managing
memory and coordinating tasks between input and output devices.
1)Application suite
2)Compiler
3)Input/output system
4)Interface
5)Operating system (OS)
ANS- 5)Operating system (OS)

(72)- In local area networks, each network host is connected to a central hub
with a point-to-point connection in ____topology.
1)Bus Topology
2)Ring Topology
3)Star Topology
4)Mesh Topology
5)Point to Point Topology
ANS- 3)Star Topology
(73)- 3000 GB is approximately equal to ___
1)30 KB
2)3 GB
3)3 TB
4)30 GB
5)40 TB
ANS- 3)3 TB

(74)- Which process checks to ensure the components of the computer are
operating and connected properly?
1)Booting
2)Processing
3)Saving
4)Editing
5)None of these
ANS- 1)Booting

(75)- In Excel, the contents of the active cell are displayed in the ________.
1)footer bar
2)tool bar
3)task bar
4)menu bar
5)formula bar
ANS- 5)formula bar

(76)- To justify the selected text, the shortcut key is __________.


1)Ctrl + 1
2)Ctrl + J
3)Ctrl + U
4)Ctrl + Alt + K
5)None of these
ANS- 2)Ctrl + J
(77)- Which of the following option may be used to change page-size and
margins?
1)Page Layout
2)View
3)Tools
4)Data
5)None of these
ANS- 1)Page Layout

(78)- The valid format of MS Excel is __________.


1).jpeg
2).png
3).doc
4).exe
5).xls
ANS- 5).xls

(79)- ____ is a slide show presentation program currently developed by


Microsoft, for use on both Microsoft and Apple Macintosh operating systems.
1)MS Excel
2)MS Word
3)MS Powerpoint
4)Notepad
5)Wordpad
ANS- 3)MS Powerpoint

(80)- What was the language used in 4Th Generation Computers?


1)Assembly/Machine Language
2)Fortran, COBOL etc
3)C, C++ only
4)C, C++, Java, DBASE
5)All High level Languages
ANS- 4)C, C++, Java, DBASE

(81)- IBM 360 series, 1900 series etc are examples of which generation of
computers?
1)1 st Generation
2)2 nd Generation
3)3 rd Generation
4)4 th Generation
5)5 th Generation
ANS- 3)3 rd Generation

(82)-JDBC stands for ____


1) Java Database Connectivity
2) Joint Database Connection
3) Java Database Cable
4) Joint Database Cable
5) None of the above
ANS- 1) Java Database Connectivity

(83)- OSI stands for ____


1) Open Sound Interaction
2) Open Source Interaction
3) Operating system Interaction
4) Open Systems Identifier
5) Open systems Interconnection
ANS- 5) Open systems Interconnection

(84)-SQL stands for ___


1) Solid Quantum Language
2) Static Quantitative Language
3) Structured Query Language
4) Service Query Language
5) None of the above
ANS- 3) Structured Query Language

(85)- A collection of interrelated records is called a ____


1) Utility File
2) Management Information system
3) Database
4) Spreadsheet
5) Datasheet
ANS- 3) Database
(86)- _____ shows the files, folders and drives on your computer, making it easy
to navigate from one location to another within the file hierarchy.
1) Microsoft Internet Explorer
2) Windows Explorer
3) My Computer
4) Folders Manager
5) Windows Locater
ANS- 2) Windows Explorer

(87)- Removing and replacing devices without turning off the computer is
referred to as ____
1) Hot Swapping
2) USB Swapping
3) Bay Swap
4) Plug-n-play
5) None of the above
ANS- 4) Plug-n-play

(88)-To protect the computer from computer hacker intrusions _____ need to
be installed.
1) Firewall
2) Mailer
3) Macro
4) Script
5) Coding
ANS- 1) Firewall

(89)- _____ is a condition that occurs between files when similar data is kept in
different formats in two different files.
1) Data redundancy
2) Information Overloaded
3) Duplicate Data
4) Data Consistency
5) Data Inconsistency
ANS- 5) Data Inconsistency
(90)- MIME stands for ____
1) Multipurpose Internet Mail Extensions
2) Multimedia Internet Mail Extensions
3) Multilevel Internet Mail Extensions
4) Multiple Internet Mail Extensions
5) Multipurpose Internet Mail Executable
ANS- 1) Multipurpose Internet Mail Extensions

(91)- What is an email attachment?


1) A receipt sent by the recipient
2) A separate document sent along with an email
3) A list of CC and BCC Recipients
4) A malicious parasite that feeds on messages and destroys the content.
5) None of the above
ANS- 2) A separate document sent along with an email
(92)- The legal right to use software based on specific restrictions is granted via
a _________________
1) Software Privacy Policy
2) Software License
3) Software Password Manager
4) Software Log
5) None of the above
ANS- 2) Software License

(93)- The rectangular area of the screen that displays a program, data and/or
information is a ____
1) Title Bar
2) Menu Bar
3) Button
4) Dialogue Box
5) Window
ANS- 5) Window

(94)- A Collection of information sorted and dealt with as a unit is a _____


1) Disk
2) Data
3) CD
4) Floppy
5) File
ANS- 5) File

(95)- A(n) _____ is a special audio and visual effect applied in power point to
text or content.
1) Animation
2) Flash
3) Wipe
4) Dissolve
5) None of the above
ANS- 1) Animation

(96)- Which of the following is/are the advantages of CD-ROM as a storage


media?
1) CD-ROM is an expensive way to store large amount of data and information.
2) CD-ROM disks retrieve data and information more quickly than magnetic
disks
3) CD-ROM makes lesser errors than magnetic media.
4) All of the above
5) None of the above
ANS- 3)- CD-ROM makes lesser errors than magnetic media

(97)- When a pointer is positioned on ____, it is shaped like a hand.


1) Grammar Error
2) Formatting Error
3) Screen tip
4) Hyperlink
e) Spelling Error
ANS- 4) Hyperlink

(98)- The process of transferring files from a computer on the internet to our
computer is called _____
1) Downloading
2) Uploading
3) FTP
4) JPEG
5) Downsizing
ANS- 1) Downloading
(99)- Which port connects special type of music instruments to sound cards?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI
ANS- 4) MIDI

(100)- A Central Computer that holds collections of data and program for many
PCs, Workstation and other computers is a/an _____
1) Supercomputer
2) Minicomputer
3) Laptop
4) Server
5) Tablet
Ans- 4) Server

You might also like