Computer Awareness For Rbi Assistant Mains
Computer Awareness For Rbi Assistant Mains
(2)-What is a compiler?
1. A compiler does a conversion line by line as the program is run
2. A compiler converts the whole of a higher level program code into
machine code in one step
3. A compiler is a general purpose language providing very ecient
execution
4. A compiler convert program in low level language
5. None of these
Ans-2- A compiler converts the whole of a higher level program code into
machine code in one Step.
Solution: A compiler is a software program that transforms high-level source
code into a low level object code (binary cod5)in machine language, which
can be understood by the
processor. Compiler convert the whole programe in a single step.
(5)-If one wants to move around through the document on the computer
screen, which of the following is used?
1. Page Up
2. Page Down
3. Home+ Tab
4. Scroll Bar
5. Alt+ Tab
Ans-4- Scroll Bar
(10)-In which of the following communication type , data can be sent in one
direction only?
1. Halfplex
2. Simplex
3. Duplex
4. Half-Duplex
5. None of the above
Ans-2- Simplex
(11)- Which PowerPoint view displays each slide of the presentation as a thumbnail
and is useful for rearranging slides?
1. Slide Sorter
2. Slide Master
3. Slide Show
4. Auto Content
5. Auto Display
Ans-1- Slide Sorter
(12)- Which one of the following gates in computing logic is called an Universal
gate?
1. OR
2. AND
3. NOT
4. NAND
5. None of the above
Ans-4- NAND
(13)- We often use antivirus software in our computer to make it free from virus.
An antivirus software is an example of which of the following?
1. Application Software
2. System Software
3. Utility Software
4. Operating System
5. None of the above
Ans-3- Utility Software
(14)-We often come across the abbreviation TCP with respect to a computer. The
full form of TCP is?
1. Total Computer Protocol
2. Total Computer Programming
3. Transmission Control Protocol
4. Transfer Computer Programming
5. Transformation Control Programming
Ans-3-Transmission Control Protocol
(16)- Which of the following is used for scanning a document containing text?
1. Magnetic Ink Character Recognition
2. Optical Mark Reader
3. Optical Character Recognition
4. Bar Code Reader
5. Punch Card Reader
Ans-3- Optical Character Recognition
(17)- Which of the following devices is used to extend the length of a network
without signal degradation?
1. Modem
2. Hub
3. Switch
4. Repeater
5. Augmenter
Ans- 4-Repeater
(22)- exe file extension is used for which of the following file types?
1. Media files
2. Archived files
3. Image files
4. Exectubale files
5. Compressed files
Ans- 4- Exectubale files
(26)- Mr. Swamy needs to design invitation card. What type of computer
program is suitable?
1. MS-Word
2. Desktop Publishing
3. Simulation
4. MS-Access
5. None of the above
Ans-2- Desktop Publishing
1. Electronic Bus
2. Universal Serial Bus
3. Control Unit
4. Memory Bus
5. All of the Above
Ans-3. Control Unit
(33)- When a computer is turned on, which of the following is run by BIOS in order
to check whether all the hardware components are working properly?
1. Booting
2. Warm Booting
3. Cold Booting
4. Power on Self Test
5. None of the Above
Ans-4-Power on Self Test
(34)-Which of the following was used in first generation computers as
processor?
1. Magnetic Ink
2. Vacuum Tubes
3. Integrated Circuits
4. Microchips
5. None of the above
Ans-2- Vacuum Tubes
(40)- The full form of the abbreviation GIF is which of the following?
1. Graphics Interchange Format
2. Graph Interaction Formula
3. General Introduction Formula
4. Graphics International Formula
5. General International Function
Ans-1- Graphics Interchange Format
(43)- In 1997, a super computer named Deep Blue defeated the then World
Chess Champion Gary Kasparov in a chess match. The supercomputer was
developed by which of the following companies?
1. Sony Inc
2. Microsoft Inc
3. Apple Inc
4. IBM
5. None of the above
Ans-4- IBM
(49)- A server uses ____ applications software to support its client computers.
1)back-end
2)front end
3)programming
4)java
5)none of these
ANS- 1)back-end
(50)- Each Web address is actually a series of numbers, which is usually called as
____
1)Domain Name
2)URL
3)http
4)HTML
5)IP address
ANS- 5)IP address
(58)- In Excel, _____ allows users to bring together copies of workbooks that
other users have worked on independently.
1)Copying
2)Merging
3)Pasting
4)Compiling
5)None of these
ANS -2)Merging
(59)- _____________ allows users to upload files to an online site so they can be
viewed and edited from another location.
1)General-purpose applications
2)Microsoft Outlook
3)Web-hosted technology
4)Office Live
5)None of these
ANS- 3)Web-hosted technology
(60)- A mistake in an algorithm that causes incorrect results is called a ?
1)Logical error
2)Syntax error
3)Procedural error
4)Compiler error
5)Machine error
ANS- 1)Logical error
(62)- The method of Internet access that requires a phone line, but offers faster
access speeds than dial-up is the____ connection.
1)Cable access
2)Satellite access
3)fiber-optic service
4)Digital Subscriber Line (DSL)
5)Modem
ANS- 4)Digital Subscriber Line (DSL)
(63)- A program, either talk or music that is made available in digital format for
automatic download over the Internet is called a ?
1)Wiki
2)Broadcast
3)Modcast
4)Blog
5)Podcast
ANS- 5)Podcast
(64)- What type of monitoring file is commonly used on and accepted from
Internet sites?
1)Smartware
2)Phishes
3)Cookies
4)Trojans
5)None of the above
ANS- 3)Cookies
(65)- The software that secretly collects information about the web client's
internet habits?
1)Detectware
2)Spam
3)Spyware
4)Pharming
5)All of the above
ANS- 3)Spyware
(68)- The process of converting analog signals into digital signals so they can be
processed by a receiving computer is referred to as ____
1)Modulation
2)Demodulation
3)Synchronizing
4)Digitizing
5)Transmission
ANS- 1)Modulation
(69)- What is the full form of SMTP?
1)Swift Mail Transmission Program
2)Simple Mail Transfer Protocol
3)Swift Mail Transfer Program
4)Spam Mail Trash Program
5)None of these
ANS- 2)Simple Mail Transfer Protocol
(70)- A high speed device used in CPU for temporary storage during processing is
called ____
1)Register
2)Bus
4)Translator
5)Hub
ANS- 1)Register
(72)- In local area networks, each network host is connected to a central hub
with a point-to-point connection in ____topology.
1)Bus Topology
2)Ring Topology
3)Star Topology
4)Mesh Topology
5)Point to Point Topology
ANS- 3)Star Topology
(73)- 3000 GB is approximately equal to ___
1)30 KB
2)3 GB
3)3 TB
4)30 GB
5)40 TB
ANS- 3)3 TB
(74)- Which process checks to ensure the components of the computer are
operating and connected properly?
1)Booting
2)Processing
3)Saving
4)Editing
5)None of these
ANS- 1)Booting
(75)- In Excel, the contents of the active cell are displayed in the ________.
1)footer bar
2)tool bar
3)task bar
4)menu bar
5)formula bar
ANS- 5)formula bar
(81)- IBM 360 series, 1900 series etc are examples of which generation of
computers?
1)1 st Generation
2)2 nd Generation
3)3 rd Generation
4)4 th Generation
5)5 th Generation
ANS- 3)3 rd Generation
(87)- Removing and replacing devices without turning off the computer is
referred to as ____
1) Hot Swapping
2) USB Swapping
3) Bay Swap
4) Plug-n-play
5) None of the above
ANS- 4) Plug-n-play
(88)-To protect the computer from computer hacker intrusions _____ need to
be installed.
1) Firewall
2) Mailer
3) Macro
4) Script
5) Coding
ANS- 1) Firewall
(89)- _____ is a condition that occurs between files when similar data is kept in
different formats in two different files.
1) Data redundancy
2) Information Overloaded
3) Duplicate Data
4) Data Consistency
5) Data Inconsistency
ANS- 5) Data Inconsistency
(90)- MIME stands for ____
1) Multipurpose Internet Mail Extensions
2) Multimedia Internet Mail Extensions
3) Multilevel Internet Mail Extensions
4) Multiple Internet Mail Extensions
5) Multipurpose Internet Mail Executable
ANS- 1) Multipurpose Internet Mail Extensions
(93)- The rectangular area of the screen that displays a program, data and/or
information is a ____
1) Title Bar
2) Menu Bar
3) Button
4) Dialogue Box
5) Window
ANS- 5) Window
(95)- A(n) _____ is a special audio and visual effect applied in power point to
text or content.
1) Animation
2) Flash
3) Wipe
4) Dissolve
5) None of the above
ANS- 1) Animation
(98)- The process of transferring files from a computer on the internet to our
computer is called _____
1) Downloading
2) Uploading
3) FTP
4) JPEG
5) Downsizing
ANS- 1) Downloading
(99)- Which port connects special type of music instruments to sound cards?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI
ANS- 4) MIDI
(100)- A Central Computer that holds collections of data and program for many
PCs, Workstation and other computers is a/an _____
1) Supercomputer
2) Minicomputer
3) Laptop
4) Server
5) Tablet
Ans- 4) Server