0% found this document useful (0 votes)
366 views

500 Computer Special

1. The document contains 15 multiple choice questions related to computer fundamentals such as operating systems, networks, and software. 2. The questions cover topics like file extensions, shortcut keys, operating system interfaces, icons, bugs, functions, passwords, commands, data structures, and early computer networks. 3. The correct answers to each question are provided to test the examinee's knowledge of basic computer concepts.

Uploaded by

Rutul Rathod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
366 views

500 Computer Special

1. The document contains 15 multiple choice questions related to computer fundamentals such as operating systems, networks, and software. 2. The questions cover topics like file extensions, shortcut keys, operating system interfaces, icons, bugs, functions, passwords, commands, data structures, and early computer networks. 3. The correct answers to each question are provided to test the examinee's knowledge of basic computer concepts.

Uploaded by

Rutul Rathod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

Telegram @BankingGK

Computer Question for IBPS RRBs Mains [PO & Clerk]


[IBPS RRBs Office Assistant Online Exam 2016] [IBPS RRBs Office Assistant Online Exam 2016]
1. ,d dEI;wVj flLVe esa do.doc.xls, .exe, bR;kfn 1. What do.doc.xls, .exe, represent in a com-
D;k fu:fir djrk gS\ puter system?
(1) Qkby ,DlVsa'ku (1) File Extension (2) HTML language
(2) HTML ySXost a (3) Mk;jsDVjh (3) Directory (4) File Format
(4) Qkby QkWeZV
s (5) uksM (5) Node
2. ,d u;k MkWD;wesaV cukus dh 'kkWVZdV ^dh^ D;k 2. What is the shortcut key to create a new
gksrh gS\ document?
(1) Ctrl + S (2) Ctrl + Shift + O
(1) Ctrl + S (2) Ctrl + Shift + O
(3) Ctrl + N (4) Ctrl + Shift + Alt + W
(3) Ctrl + N (4) Ctrl + Shift + Alt + W
(5) Ctrl + Q
(5) Ctrl + Q
3. gkMZ dkWih 'kCn dk iz;ksx fd;k tkrk gS\
3. Hard copy is a term used to describe?
(1) fizaVsM vkmViqV
(2) jkbZfVax vkWu , gkMZ cksMZ (1) Printed output
(3) LVksfjax buQkWeZ's ku vkWu nh gkMZ fMLd (2) Writing on a hard board
(4) , dkWih vkWQ n QkbYl lsOM bu gkMZ Mªkbo (3) Storing information on the hard disk
(5) buesa ls dksbZ ugha (4) A copy of the files saved in hard drive
4. vkWijsfVax flLVe dks ;wtj vkSj dEI;wVj ds (5) None of these
chp _______Hkh dgk tkrk gS 4. Operating system is also called the ____
(1) czht (2) baVjQsl between the user and the computer.
(3) lapkj (dE;qfuds'ku) (1) Bridge (2) Interface
(4) baVjsD'ku (5) VksiksykWth (3) Communication
5. LØhu ij ,d flEcy ds :i esa fMLd dks (4) Interaction (5) Topology
fu:fir djrk gS ftlds ek/;e ls vki MkWD;weVas 5. A symbol on the screen that represents a
;k izksxzke pqu ldrs gS] ftls dgk tkrk gS\ disk, document or program that you can se-
] (1) dh (Key) (2) dSi lect is known as.
(3) vkbdu (4) ekWfuVj (1) Key (2) Cap
(5) ØksVkuk (3) Icon (4) Monitor
6. dE;qfuds'ku ykbUl vkSj :VlZ dk laxzg QkWeZ (5) Cortana
djrs gS\ 6. The collection of communication lines and
(1) ySu (LAN) (2) gc (HUB) routers form the.
(3) oSu (WAN) (4) eSu (MAN) (1) LAN (2) Hub
(5) dE;qfuds'ku lc~usV (Communication (3) WAN (4) MAN
Subnet) (5) Communication Subnet
7. ,d cx (Bug) dk eryc gksrk gS\ 7. A bug means
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [1]

Telegram @BankingGK
Telegram @BankingGK

(1) ok;jl bUQsD'ku (1) A virus infection


(2) dEI;wVj cwfVax esa leL;k (2) Problem in booting a computer
(3) lhih;w (CPU) ds vanj dhVk.kq (Insects) (3) Problems caused by insects getting in-
dh otg ls mRiUu leL;k side the CPU
(4) lapkfyr dEI;wVj esa ,jj ;k izkx s zke esa =qfV (4) Mistake in a program or error in the
(5) buesa ls dksbZ ugha working of a computer
8. ,d QaD'ku dsoy fjVuZ gks ldrk gS& (5) None of these
(1) uks oSY;w (2) ,dy oSY;w 8. A function can return only.
(3) nks oSY;w (1) No value (2) Single value
(3) Two values
(4) ;k rks nks oSY;w ;k pkj oSY;w
(4) Either two or four values
(5) ikap oSY;w ls vf/kd
(5) More than five values
9. dEI;wVj flLVe ds fy, igqWap izkIr djus ds 9. Coded entries which are used to gain ac-
fy, dksMsM ,aVªh dk mi;ksx fd;k tkrk gSA cess to a computer system are called.
bldks dgrs gS& (1) Entry codes (2) Passwords
(1) ,aVªh dksM~l (2) ikloMZl (3) Security commands
(3) flD;ksfjVh dekaM~l (4) Codewords (5) None of these
(4) dksMoM~l Z (5) buesa ls dksbZ ugha 10. ____ is the process of carrying out com-
10. _________ dSfjax vkmV dekaM~l dh izfØ;k mands.
gS (1) Fetching (2) Executing
(1) Qsfpax (2) ,fXtD;wfVax (3) Storing (4) Decoding
(3) LVksfjax (4) fMdksfMax (5) None of these
(5) buesa ls dksbZ ugha 11. To access the services of operating sys-
11. vkWijsfaVx
a flLVe dh lfoZlt s dks ,sDlsl djus tem, the interface is provided by the.
ds fy, baVjQsl }kjk iznku dh tkrh gS& (1) System calls (2) API
(1) flLVe dkWy (2) ,ihvkbZ (API) (3) Library
(3) ykbczjs h (4) ,lsacyh baLVªD'ku (4) Assembly instructions
(5) None of these
(5) buesa ls dksbZ ugha
12. Which one of the following error will be
12. fuEufyf[kr ,jj esa ls dkSu lk ,d vkWijsfVax handle by the operating system?
flLVe }kjk gSaMy fd;k tk,xk\ (1) Power failure
(1) ikWoj Qsfy;j (2) Lack of paper in printer
(2) fizaVj esa dkxt dh deh (3) Connection failure in the network
(3) usVodZ esa dusD'ku dh foQyrk (4) All of the above
(4) mi;qZDr lHkh (5) buesa ls dksbZ ugha (5) None of the above
13. OSX D;k gS& 13. The OSX has?
(1) eksuksfyfFkd dusZy (1) Monolithic kernel
(2) gkbfczM dusZy (3) ekbØks dusZy (2) Hybrid kernel (3) Microkernel
(4) eksuksfyfFkd dusZy fon ekWM~;wYl (4) Monolithic kernel with modules
(5) mi;qZDr esa ls dksbZ ugha (5) None of the above
14. LVªDpj ;k MkVk ds QkWesZV dks dgk tkrk gS\ 14. The structure of format of data is called?
(1) flaVDs l (2) flesfa VDl (1) Syntax (2) Semantics
(3) LVªDV (4) mi;qZDr esa ls dksbZ ugha (3) Struct (4) None of the above
(5) xzkej (5) Grammar
15. dEI;wVj vkSj dhcksMZ ds chp dE;qfuds'ku izlkj.k 15. Communication between a computer and a
keyboard involves _________ transmis-
ds fy, ______ lfEefyr gksrk gS\
sion?
[2] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1)vkWVksefs Vd (2) gkWQ&MqIysDl (1) Automatic (2) Half duplex


(3)Qqy&MqIysDl (4) flaIysDl (3) Full duplex (4) Simplex
(5)mi;qDr esa ls dksbZ ugha (5) None of the above
16. igyk usVodZ Fkk& 16. The first network was.
(1) CNNET (2) NSFNET (1) CNNET (2) NSFNET
(3) ASAPNET (4) ARPANET (3) ASAPNET (4) ARPANET
(5) Internet (5) Internet
17. ckbujh vytsczk esa a + b ________ }kjk 17. In binary algebra, a + b can be implemented
dk;kZfUor fd;k tk ldrk gSA by.
(1) AND xsV (2) OR xsV
(1) AND gate (2) OR gate
(3) NOT xsV (4) FOR xsV
(3) NOT gate (4) FOR gate
(5) INTO xsV
(5) INTO gate
18. vf/kdka'kr% oYMZ okbM osc ist ySXa ost esa dekaM
18. Most World Wide Web pages contain com-
dks 'kkfey djrk gS\
(1) NIH (2) URL mands in the language.
(3) HTML (4) CSS (1) NIH (2) URL
(5) HTP (3) HTML (4) CSS
19. ,l,eVhih (SMTP) dk vFkZ gS\ (5) HTP
(1) flEiy esy VªkalQj izksVksdkWy 19. SMTP stands for?
(2) flEiy esy VªkaliksVZ izksVksdkWy (1) Simple Mail Transfer Protocol
(3) lSEiy esy VªkalQj izksVksdkWy (2) Simple Mail Transport Protocol
(4) lSEiy esy VªkaliksVZ izksVksdkWy (3) Sample Mail Transfer Protocol
(5) buesa ls dksbZ ugha (4) Sample Mail Transport Protocol
20. Qk;jokWYl dk mi;ksx fdlds fo:) lqj{kk ds (5) None of these
fy, fd;k tkrk gS 20. Firewalls are used to protect against?
(1) vuvkWFkjkbTM vVSDl (1) Unauthorized Attacks
(2) fof'kax (3) ,DlVuZy fjlkslZt s (2) Vishing (3) External Resources
(4) MsVk Mªkbosu vVSDl (4) Data Driven Attacks
(5) fQf'kax (5) Phishing
21. osc ij iksLVsM ilZuy ykWXl ;k tuZy ,aVªh 21. Personal logs or journal entries posted on
tkuk tkrk gS\ the web are known as?
(1) fyLVloZl (2) oscdkLV
(1) Listservs (2) Webcasts
(3) CykWXl (4) lCtsDV Mk;jsDVjht
(3) Blogs (4) Subject Directories
(5) buesa ls dksbZ ugha
(5) None of these
22. fMLd ,Dlsl Vkbe gS\
(1) dEI;wVj }kjk ,d MkVk fjDosLV dks izkslsl 22. Disk access time is?
djus esa yxk dqy le; (1) Total time taken by the computer to pro-
(2) fMLd Mªkbo ds yksds'ku ,fj;k dk irk cess a data request
yxkuk vkSj fMLd Mªkbo tgkWa jhM djus ds fy, (2) Time taken for a disk drive to locate the
MkVk laxzfgr fd;k tkrk gS] bl izfØ;k esa yxk area on the disk where the data to be read is
dqy le; stored
(3) ,d MkVk iSdSV dks ,d fufnZ"V LFkku ls (3) Time taken for a packet of data to get
nwljs LFkku ij izkIr djus esa yxk le; from one designated point to another
(4) Vªkl
a Qj ds iwjk gksus vkSj 'kq: djus ds chp (4) Time interval between starting the trans-
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [3]

Telegram @BankingGK
Telegram @BankingGK

dk le; varjky fer and the completion of the transfer


(5) buesa ls dksbZ ugha (5) None of these
23. __________ fcV dh ,d flaxy fcV LVªhe 23. ______ transmits one bit of a byte, one at a
ds :i esa ,d le; esa ,d ckbV ls ,d fcV] time as a single bit stream of bit.
VªkalfeV djrk gSA (1) Serial port (2) USB Port
(1) lhfj;y iksVZ (2) ;w,lch iksVZ (3) Parallel port (4) Address bus
(3) iSjsyy iksVZ (4) ,Mªsl cl (5) None of these
(5) buesa ls dksbZ ugha 24. Clock speed is a speed at which _____ ex-
24. ?kM+h dh ,d xfr gS ftlls _______ funsZ'k ecutes instructions.
fu"ikfnr gksrk gSA (1) Microprocessor
(1) ekbØksizkl
s lj (2) jkse (ROM) (2) ROM (3) Cache
(3) dSp (Cache) (4) jSe (RAM) (4) RAM (5) Hardware
(5) gkMZo;
s j 25. The internet was originally a project for
25. baVjusV ewy :i ls dkSu ls ljdkjh ,tsl
a h dh which government agency?
,d ifj;kstuk Fkh\ (1) ARPA (2) NSF
(1) ARPA (2) NSF (3) NSA (4) FCC
(3) NSA (4) FCC (5) NASA
(5) NASA 26. BIT is a short form of?
26. fcV ,d 'kkWVZ QkWeZ gS\ (1) Megabyte (2) Binary language
(1) esxkckbV dk (2) ckbujh ySXosat dk (3) Binary information unit
(3) ckbujh buQkWeZ's ku ;wfuV dk (4) Binary number
(4) ckbujh uacj dk (5) Binary digit
(5) ckbujh fMftV dk 27. Date and time are available on the desktop
27. MsV vkSj Vkbe MsLdVkWi ij miyC/k gksrk gS\ at?
(1) dhcksMZ (2) fjlkbfdy fcu (1) Keyboard (2) Recycle bin
(3) ekbZ dEI;wVj (4) VkLd ckj (3) My computer
(5) buesa ls dksbZ ugha (4) Task bar (5) None of these
28. dEI;wVj dk og Hkkx tks vius lHkh QaD'ku dks 28. The part of a computer that coordinates all
dkWfMZusV~l djrk gS __________ ds :i esa its functions is called its.
tkuk tkrk gS\ (1) ROM program (2) System board
(1) jkse (ROM) izkx s zke (3) Arithmetic logic unit
(2) flLVe cksMZ (3) vFkZefs Vd ykWftd ;wfuV (4) Control unit (5) None of these
(4) dUVªksy ;wfuV (5) buesa ls dksbZ ugha 29. Powerful keys that let you exit a program
29. ikWojQqy dht (Keys) tks ,d izkx s zke dks ckgj when pushed.
izsf"kr djus ds fy, iq'k fd;k tkrk gS\ (1) Arrow keys (2) Spacebar
(1) ,sjks dht (Keys) (3) Escape key (4) Return key
(2) Lisl ckj (3) ,Ldsi dh (Key) (5) None of these
(4) fjVuZ dh (Key)(5) buesa ls dksbZ ugha 30. Oracle is a?
30. vksjsdy (Oracle) gS\ (1) RDBMS
(1) vkjMhch,e,l (RDBMS) (2) Hardware
(2) gkMZo;s j (3) flLVe lkW¶Vos;j (3) System software
(4) gkMZ ysoy ySaXost
(4) High level language
(5) mi;qZDr esa ls dksbZ ugha
(5) None of the above
31. VoIP dk vFkZ gS\
31. VoIP stands for?
[4] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) oksV vksoj vkbZih (2) okWbl vksoj vkbZih


(1) Vote over IP (2) Voice over IP
(3) okWbl vkWu vkbZih (4) osM a j vkWu vkbZih
(3) Voice on IP (4) Vendor on IP
(5) otZu vksoj vkbZih (5) Version over IP
32. fuEufyf[kr esa ls dkSu&lk dEI;wVj ySaXost
32. Which of the following computer languages
lkbfVfQd ySXa ost ds fy, iz;qDr ,d xf.krh;
is a mathematically oriented language used
<ax ls vfHkeq[k ySaXost gS for scientific problems?
(1) QkWjVªku (FORTRAN) (1) FORTRAN (2) COBOL
(2) dkscksy (COBOL) (3) LISP (4) PROLOG
(3) fyLi (LISP) (4) izky s kWx (PROLOG)
(5) ANDROID
(5) ,aMkª ;
W M (ANDROID) 33. What type of graphical model is used to
33. MsVkcsl dks ifjHkkf"kr djus ds fy, fdl rjg
define a database
ds xzkfQdy ekWMy dk iz;ksx fd;k tkrk gS (1) Flowchart (2) Organizational model
(1) ¶ykspkVZ (2) vkWxsZukbts'ku ekWMy
(3) E-R diagram
(3) bZ&vkj (ER) Mk;xzke (4) Programmming model
(4) izkx
s zkfeax ekWMy (5) buesa ls dksbZ ugha
(5) None of these
34. ________ ekbØkslkW¶V ds izksxzkfeax ,fj;k esa
34. ______ is microsoft's latest entry into the
uohure ,aVªh gSA programming arena.
(1) tkok (2) usV (1) Java (2) NET
(3) fotqvy csfld (4) ikLdy (3)Visual Basic (4) Pascal
(5) Mqiy (5) Drupal
35. gkMZ fMLd dks VªSd esa foHkkftr fd;k tkrk gS
35. A hard disk is divided into tracks which are
vkSj vkxs bls ________ esa mifoHkkftr fd;k
further subdivided into.
tkrk gSA (1) Clusters (2) Sectors
(1) dyLVlZ (2) lsDVlZ (3) Vectors (4) Quarters
(3) osDVlZ (4) DokVZlZ (5) Hemispheres
(5) xksyk)ksZ (Hemispheres) 36. Which one of the following is NOT a com-
36. fuEufyf[kr esa ls dkSu ,d dEI;wVj izksxzkfeax
puter programming language.
ySaXost ugha gS\ (1) BASIC (2) COBOL
(1) csfld (2) dkscksy (3) Java script (4) LISP
(3) tkok fLØIV (4) fyLi (5) Android
(5) ,aMkª ;M 37. ______ program provides access to Web
37. _______ izksxzke osc fjlkslZ rd igqWap iznku
resources.
djrk gSA (1) Web (2) ISP
(1) osc (2) vkbZ,lih (3) Browser (4) URL
(3) czkmtj (4) ;wvkj,y (URL) (5) HTML
(5) ,pVh,e,y (HTML) 38. Which of the following is not a networking
38. buesa ls dkSu ,d usVofdZx fMokbl ugha gS\device?
(1) xsVos (2) fyuDl (Linux) (1) Gateways (2) Linux
(3) :VlZ (4) eksMse (3) Routers (4) Modem
(5) Qk;jokWy (5) Firewall
39. fdlh Hkh dEI;wVj flLVe dk czsu gksrk gS\
39. The brain of any computer system is.
(1) ,,y;w (ALU) (2) eseksjh (Memory) (1) ALU (2) Memory
(3) lhih;w (CPU) (4) daVªksy ;wfuV (3) CPU (4) Control unit
(5) jSe (RAM) (5) RAM
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [5]

Telegram @BankingGK
Telegram @BankingGK

40. usVodZ cSaMfoM~Fk dk D;k vFkZ gksrk gS\ 40. What is the meaning of Bandwidth in Net-
(1) dE;qfuds'ku pSuy dk Vªkalfe'ku {kerk work?
(2) usVodZ ls tqM+k dEI;wVj (1) Transmission capacity of a communica-
(3) usVodZ esa vkbZih ds Dykl dk iz;ksx tion channels
(4) usVodZ iznkrk dk gksLV (2) Connected Computers in the Network
(5) buesa ls dksbZ ugha (3) Class of IP used in Network
[IBPS Bank PO/MT CWE Mains Online Exam 20.11.2016] (4) Host of network provider
41. fuEufyf[kr esa ls dkSu ,d eksckby vkWijsfVax (5) None of these
flLVe ugha gS\ [IBPS Bank PO/MT CWE Mains Online Exam 20.11.2016]
(1) ckMk (1) lQkjh 41. Which among the following is not a mobile
(3) flfEc;u (4) ehxks operating system?
(5) osc vks,l (1) Bada (2) Safari
42. ekbØkslkW¶V foaMkst 8 vkSj gk;j otZu~l esa (3) Symbian (4) MeeGo
QksYMj dks fjuse djus gsrq fuEufyf[kr esa ls (5) WebOS
fdl ^dh^ dk iz;ksx 'kkWVZdV ds :i esa fd;k tk 42. Which among the following key can be
ldrk gS\ used as a shortcut to rename a folder in
(1) F2 (2) F4 (3) F6 Microsoft Windows 8 and higher versions.
(4) F9 (5) F11 (1) F2 (2) F4
43. AT & T us viuh yEch nwjh ds usVodZ ds ikj (3) F6 (4) F9
(5) F11
[email protected] gsrq fMftVy dEI;wVj MkVk
43. AT&T designed its first commerical modem,
dks ,sukykWx flxuYl esa ifjofrZr djus ds fy,
specifically for converting digital computer
vius igys O;kolkf;d eksMes dk fuekZ.k fd;k data to analog signals for transmission
FkkA bl eksMse dk uke D;k gS\ across its long distance network. What is
(1) VsysDl (2) ehesDl the name of the modem?
(3) dE;w loZ (4) csy 103 MkVklsV (1) Telex (2) Memex
(5) MkVkQksu (3) CompuServe (4) Bell 103 dataset
44. bafVxzsVsM fpIl ;k IC dk iz;ksx dEI;wVj dh (5) Data phone
fdl tujs'ku ls vkjaHk gqvk Fkk\ 44. Integrated Chips or IC's were started to be
(1) igyh tujs'ku (2) nwljh tujs'ku in use from which generation of computers.
(3) rhljh tujs'ku (4) pkSFkh tujs'ku (1) Ist Generation (2) 2nd Generation
(5) ikapoha tujs'ku (3) 3rd Generation(4) 4th Generation
45. dEI;wVj izkx s zkfeax esa lkW¶Vos;j vkSj ,sfIyds'kuksa (5) 5th Generation
dk fuekZ.k djus ds fy, lc:fVu MsfQfu'kal] 45. In computer programming there is set of
izkVs ksdkWYl vkSj VwYl ds lewg dk izko/kku fd;k subroutine definitions, protocols and tools
x;k gSA fuEufyf[kr esa ls dkSu&lk 'kCn ^,d for building software and applications.
,fIyds'ku fdl izdkj nwljs ,fIyds'ku ls ckr Which among the following is a term for
dj ldrk gS^ ls lacf/kr vko';drkvksa dks iwjk sets of requirements that govern how one
djus okyk ,d lsV gS\ application can talk to another?
(1) ;wih,l (2) ,ihvkbZ (1) UPS (2) API
(3) CGI (4) J2EE
(3) lhthvkbZ (4) ts2bZbZ
(5) OLE
(5) vks,ybZ
46. BSoDs can be caused by poorly written
46. BSoDs izk;% nks"kiw.kZ fy[kkoV okys fMokbl
device drivers or malfunctioning hardware,
MªkbolZ] ;k gkMZo;s j vifØ;k tsls nks"kiw.kZ eseksjh] such as faulty memory, power supply is-
fo|qr vkiwfrZ esa xM+cM+h] dEiksusUV~l ds vf/kd sues, overheating of components, or hard-
[6] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

xje gksus ;k gkMZos;j }kjk viuh fufnZ"V lhek ware running beyond its specification lim-
ds ckgj ju djus ds dkj.k gks ldrk gS BSoD its. Which color screen is displayed when
,jj gksus ij LØhu dkSu lk jax fMLIys djrk encountered a BSoD Error.
gS\ (1) Red (2) Grey
(1) yky (2) LysVh (3) Black (4) Blue
(3) dkyk (4) uhyk (5) Green
(5) gjk 47. Which among the following is the smallest
47. dEI;wVj LØhu esa fuEufyf[kr esa ls dkSu best unit in an image in a computer screen?
dh lcls NksVh ;wfuV gS\ (1) Unit (2) Pixel
(1) ;wfuV (2) fiDly (3) Array (4) Resolution
(3) ,sjs (4) fjlkWY;w'ku (5) Clip
(5) fDyi 48. Microsoft Word is a word processor devel-
48. ekbØkslkW¶V oMZ ekbØkslkW¶V }kjk fodflr ,d oped by Microsoft. In MS Word spelling
oMZ izkls l
s j gSA Lisfyax psd ,e-,l-oMZ dh ,d Check is a feature available in which tab.
egRoiw.kZ fo'ks"krk gS] ;g fo'ks"krk fdl VSc esa (1) File (2) Home
miyC/k gS\ (3) Insert (4) Review
(1) Qkby (2) gkse (5) References
(3) bUlVZ (4) fjO;w
49. There is a network that can connect net-
(5) fjQjsUl
works ranging from small location or area
49. ;g ,d usVodZ gS tks NksVs {ks=ksa ;k O;kid Lrj to a bigger range including public packet
ij cM+s {ks=ksa esa QSys lHkh usVodksZ] ftlesa ifCyd
network and large corporate networks. That
iSdsV usVodZ vkSj cM+s dkWiksZjsV usVodZ 'kkfey
network's enterprise allows users to share
gS] dks tksMr+ k gSa ;g usVodZ ;wtlZ dks ,fIyds'kuks]a
access to applications, services and other
lsokvksa vkSj dsUnzh; :i ls vofLFkr vU; fjlkslt Zs
dks ,Dlsl djus vkSj lk>k djus dh vuqefr centrally located resources. Its ability for a
nsrk gSA cM+s HkkSxksfyd {ks= dks ,Dlsl djus dh huge geographical access has transformed
bldh ;ksX;rk us usVofdZx dks ifjofrZr dj networking. Which among the following is
fn;k gSA fuEufyf[kr esa ls ml usVodZ dk uke that network?
crkb,\ (1) SAN (2) CAN
(1) SAN (2) CAN (3) LAN (4) WAN
(3) LAN (4) WAN (5) MAN
(5) MAN 50. Which among the following is not an Ob-
50. fuEufyf[kr esa ls dkSu ,d vkWCtsDV vkWfj,VsaM ject Oriented Programming Language?
izksxzkfeax ySfXot ugha gS\ (1) Python
(1) ikbFku (2) ikLdy (2) Pascal
(3) tkok (4) C++ (3) Java
(5) :ch (4) C++
51. fuEufyf[kr esa ls dkSu ,d DykmM dE;wfVax (5) Ruby
buok;jesaV gS tks nks IysVQkWe~l ds e/; 51. Which cloud is a cloud computing environ-
vkWdsZLVªs'ku ds lkFk ifCyd DykmM lfoZl] ment that uses a mix of on premises, private
izkbosV DykmM] FkMZ ikVhZ vkSj vkWu&izheslt
s ds cloud and third party, public cloud services
feJ.k dk iz;ksx djrk gS vkSj fo'ks"k :i ls with orchestration between the two plat-
MkbuSfed ;k vf/kd ifjorZu'khy odZyksM ds forms and it is particularly valuable for dy-
fy, egRoiw.kZ gS\ namic or highly changeable workloads?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [7]

Telegram @BankingGK
Telegram @BankingGK

(1) MkbuSfed DykmM (2) ,Mokal DykmM (1) Dynamic Cloud


(3) gkbfczM DykmM (4) 'ks;fjax DykmM (2) Advance Cloud
(5) dEckbUM DykmM (3) Hybrid Cloud (4) Sharing Cloud
52. ;fn vki fØMsuf'k;Yl ds vk/kkj ij fdlh (5) Combined Cloud
O;fDr dks vius usVodZ dh flD;qfjVh esu~Vsu 52. If you are allowing a person on the network
djus dh vuqefr nsrs gks rks ;g izfØ;k D;k based on the credentials to maintain the
dgykrh gS\ security of your network, then this act re-
(1) vkWFksufVds'ku (2) vkWVkse's ku fers to the process of _____.
(3) Qk;jokWy (4) bu~fØI'ku (1) Authentication
(5) fMfØI'ku (2) Automation (3) Firewall
53. 1's vkSj 0's ds la;kstu dk iz;ksx fuEufyf[kr esa (4) Encryption (5) Decryption
ls fdl izdkj dh dEI;wVj ySfa Xot dh fo'ks"krk 53. The use of combination of 1's and 0's is
gS\ feature of which of the following type of
(1) gkbZ ysoy ySafXot (2) ikLdy computer Language?
(3) e'khu ySfXot (4) C (1) High Level Language
(5) dkscksy (2) PASCAL (3) Machine Language
54. fuEufyf[kr esa ls og dkSu lk fopkj.kh; fl)kar (4) C (5) COBOL
gS tks baVjusV dk fofu;eu djus okys baVjusV 54. Which among the following is a recently
lsok iznkrkvksa vkSj ljdkj dks dE;wfuds'ku ds debated principle that internet service pro-
ek/;e] lEc) midj.k ds izdkj] IysVQkWeZ viders and governments regulating the
,fIyds'ku] osclkbV] dUVsUV ds vk/kkj ij ;wtlZ internet should treat all data on the internet
ds lkFk HksnHkko u djus ;k fHkUu&fHkUu 'kqYd u the same, not discriminating or charging dif-
olwyus ds vykok baVjusV ij miyC/k lHkh ferentially by user, content, website, plat-
MkVk ds fy, ,dleku 'kqYd yxkus dk funsZ'k form, application type of attached equip-
nsrk gS\ ment, or mode of communication?
(1) dkWedkLV (2) usV&fujis{krk (1) Comcast (2) Net Neutrality
(3) fr;Zd&usV (4) usV&cU/kqrk (3) Oblique net (4) Net Fraternity
(5) Qs;j osc (5) Fair Web
55. fuEufyf[kr esa ls dkSu dEI;wVj flLVe dh ,d 55. Which among the following is an important
egRoiw.kZ lfdZVjh gS tks izkslslj ds vkWijs'ku circuitry in a computer system that directs
dks funsZ'k nsrh gS\ the operation of the processor?
(1) eseksjh (2) vMªsl cl (1) Memory (2) Address Bus
(3) ,D;wE;qyV s j (4) ,,y;w (3) Accumulator (4) ALU
(5) daVªksy ;wfuV (5) Control Unit
56. ,e,l oMZ ,d VsDLV ;k MkWD;wesaV ,fMfVax 56. MS Word is a text or document editing ap-
,fIyds'ku izkx s kz e gS tks ,e,l vkWfQl lqbV ds plication program that comes in the pack-
iSdst ds varxZr vkrk gS fuEufyf[kr esa ls age of MS Office Suite. Which among the
dkSu&lk fodYi ,e,l oMZ ls lacf/kr ugha gS given options is not related with MS Word?
(1) ist ysvkmV (2) ,aVh ok;jl
(1) Page Layout (2) Antivirus
(3) esfyax~l (4) QkWesZV isaVj
(3) Mailings (4) Format Painter
(5) LekVZ vkVZ
(5) Smart Art
57. fuEufyf[kr esa ls dkSu 4 fcV~l ds ,d lewg ds 57. Which among the following is another name
fy, iz;qDr gksus okyk nwljk uke gS\ for a group of 4 bits?
(1) fucy (2) ckbV
(1) Nibble (2) Byte
[8] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(3) fdyksckbV (4) esxkckbV (3) Kilo Byte (4) Mega Byte
(5) isVkckbV (5) Peta Byte
58. fn, x, fodYiks esa ls dkSu vkbZch,e dk 58. Which among the given operations is IBM's
lqijdEI;wVj gS\ Supercomputer?
(1) frgkus (2) luosrsgw ykbV (1) Tihane-2 (2) Sunway Taihu Light
(3) okVlu (4) 'kkLjk&Vh (3) Watson (4) Shasra-T
(5) czu
s (5) Brain
59. ekbØksl kW ¶V ikoj IokbaV lkW ¶ Vos ; j es a 59. Which is a feature included in Microsoft
fuEufyf[kr esa ls fdl Qhpj dks 'kkfey fd;k Power Point software that allows the user
x;k gS tks ;wtj dks izstsUVs'ku esa ,d gh le; to see all the slides in a presentation at one
esa lHkh LykbM~l ns[kus dh vuqefr nsrk gS\ time?
(1) LykbM lkWVZj (2) LykbM ekLVj (1) Slide Sorter (2) Slide Master
(3) gSaMvkmV ekLVj (3) Handout Master
(4) LykbM gsMj (5) jhfMax O;w (4) Slide Header (5) Reading View
60. fn, x, fodYiks esa ls fdlesa ¶yS'k eseksjh ugha 60. Which among the given operations does
gksrh\ not have flash memory?
(1) isu Mªkbo (2) gkMZ fMLd (1) Pen Drive (2) Hard Disk
(3) dkj jsfM;ks (4) eseksjh dkM~Zl (3) Car Radio (4) Memory Cards
(5) eseksjh fLVd (5) Memory Stick
[IBPS Bank Clerk CWE Mains Online Exam 01.01.2017] [IBPS Bank Clerk CWE Mains Online Exam 01.01.2017]

61. dksM dh LØSe~cfyax dgykrh gS 61. The scrambling of code is known as :


(1) bufØI'ku (2) Qk;jokWfyax (1) Encryption (2) Firewalling
(3) LØSe~cfyax (4) fMdsI'ku (3) Scrambling (4) Deception
(5) ijeqfVax (5) Permuting
62. VoIP dk foLrkfjr :i D;k gS\ 62. What is the full form of VoIP?
(1) okWbl vkWQ baVjusV ikoj (1) Voice of Internet Power
(2) okWbl vksoj baVjusV izksVksdkWy (2) Voice Over Internet Protocol
(3) okWbl vkWu baVjusV izksVksdkWy (3) Voice on internet Protocol
(4) osjh vkWfIVekbTM baVjusV izksVksdkWy (4) Very Optimized Internet Protocol
(5) osjh vkWfQf'k;y baVjusV izksVksdkWy (5) Very Official Internet Protocol
63. vkWfQl ls ckgj tkrs le; vki vius dEI;wVj 63. Why do you log off from your computer
dks ykWx vkWQ D;ksa djrs gS\ when going out from your office?
(1) dksbZ vkidh QkbYl] ikloM~Zl bR;kfn dh (1) Someone might steal your files, pass-
pksjh dj ldrk gS words etc.
(2) fo|qr dh cpr ds fy, (2) In order to save electricity.
(3) fu"iknu {kerk esa o`f) djus gsrq ykWfxx (3) logging off is essential to increase per-
vkWQ djuk t:jh gS formance.
(4) ckgj tkus ls igys ykWfxx vkWQ djuk (4) logging off is mandatory you before go
vfuok;Z gS out.
(5) fu;fer :i ls csgrj dk;Z djus ds fy, (5) logging off is a good exercise to perform
ykWfxx vkWQ ,d vPNh vknr gSA regularly.
64. fuEufyf[kr esa ls dkSu dEI;wVj ds dk;Z ds 64. Which of the following is not responsible
fy, mrjnk;h ugha gS\4 for the performance of the computer?
(1) dhcksMZ esa fo|eku vusdksa dqft;Wa dht (1) no. of keys in the keyboard
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [9]

Telegram @BankingGK
Telegram @BankingGK

(2) fofM;ks@xzkfQDl oMZ dk uke (2) name of the video/graphics word.


(3) fofM;ks@xzkfQDl oMZ dh eseksjh (3) memory in the video/graphics word.
(4) izkslslj dh DykWd LihM (4) the clock speed of the processor.
(5) izksllj esa miyc/k vusdksa dksj (5) no. of cores available in the processor.
65. dEI;wVj LVksj ls fdlh Qkby dks ,Dlsl djus 65. Which of the following is used to access a
ds fy, fuEufyf[kr esa ls fdldk iz;ksx fd;k file from the computer store?
tkrk gS\ (1) Insert
(1) bulVZ (2) fjVªho (2) retrieve
(3) Qkby (4) fiazV (3) file
(5) QkbaM (4) print
66. ______ dks LVksj djus ds fy, gkMZ Mªkbo dk (5) find
iz;ksx fd;k tkrk gSA 66. Hard drive is used to store ____.
(1) okWySVkby MkVk (2) ukWu&okWySVkby MkVk (1) volatile data
(3) ijekusaV MkVk (4) VsEikWjfj MkVk (2) non volatile data
(5) baVjehfMvV MkVk (3) permanent data
67. fuEufyf[kr esa ls dkSu ;wtjuse ds lkFk la[;kvksa (4) temporary data
(uEclZ) vkSj o.kZekyk (vYQkcsV~l) dk ,d (5) intermediate data
dkWe~fcus'ku gS ftldk iz;ksx ;wtj vdkmaV dks 67. Which of the following is the combination
,Dlsl djus ds fy, fd;k tkrk gS\ of numbers, alphabets along with username
(1) ikloMZ (2) ;wtjuse used to get access to user account?
(3) VkbVyuse (4) gkWLV&vkbZMh (1) password
(5) LØhu use (2) username
68. fuEufyf[kr esa ls dkSu ,d izdkj dk lkW¶Vos;j (3) titlename
gS tks fd Lo;a izfrofyr (jsifydsV) gksrk gS (4) host id
rFkk Qkbyksa vkSj flLVe dks uqdlku igqWapk (5) screen name
ldrk gS\ 68. Which of the following is the type of soft-
(1) ok;jl (2) VªkWtu gksflZl ware that has self replicating software that
(3) cwVl (4) okWe~l causes damage to files and system?
(5) cSdMkslZ (1) Viruses
69. _______ dk iz;ksx vR;f/kd cM+h Qkbyksa ds (2) Trojan horses
fy, fd;k tkrk gS ;k ogkWa fd;k tkrk gS tgka (3) Bots
^QkLV fjLikWUl Vkbe^ vf/kd egRoiw.kZ ugha (4) Worms
gksrkA LFkkukUrfjr dh tkus okyh Qkbyksa dks (5) Backdoors
,d vof/k ds nkSjku ,df=r fd;k tkrk gS vkSj 69. _____ is used for very large files or where a
rRi'pkr~ cSp ds :i esa ,d lkFk lsM a dj fn;k fast response time is not critical. The files
tkrk gS to be transmitted are gathered over a pe-
(1) cSp izkl s fs lax (2) vkWuykbu izkl s fs lax riod and then send together as a batch.
(3) Qkby izkl s fs lax (4) MkVk izkl
s fs lax (1) Batch processing
(5) VsDLV izkslsflax (2) Online processing
70. fuEufyf[kr esa ls dkSu&lk flLVe lefiZr (3) File processing(4) Data processing
(MsfMdsVM s ) ilZuy dEI;wVlZ (PCs) dk ,d oxZ (5) Text processing
gS\ 70. Which of the following system is a func-
(1) flaxy ;wtj ds fy, iz;qDr gksus okyk tion of dedicated PCs?
flLVe (1) meant for a single user
[10] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(2) flaxy VkLd ds fy, iz;qDr gksus okyk (2) meant for the single task
flLVe (3) deal with single software
(3) flaxy lkW¶Vos;j ds fy, iz;qDr gksus okyk (4) deal with only editing
flLVe (5) deal for music purpose
(4) dsoy ,fMfVax ds fy, iz;qDr gksus okyk 71. What can possibly be the drawback of e-
flLVe mails?
(5) E;wftd ds fy, iz;qDr gksus okyk flLVe (1) emails requires being physically deliv-
71.. bZ&esy ls laHkor% D;k gkfu gks ldrh gS ered to the user.
(1) HkkSfrd :i ls ;wtlZ dks bZ&esy fMyhoMZ (2) emails infects computer.
djus dh vko';drk gksrh gS (3) emailis are very expensive to transmit.
(2) bZ&esy dEI;wVj dks izHkkfor djrk gS (4) emails are slow to load.
(3) bZ&esy Hkstuk cgqr egWaxk gS (5) people don't check emails regularly.
(4) bZ&esy ds yksM gksus dh xfr Lyks gksrh gS 72. Which of the following is a valid email ad-
(5) yksx fu;fer :i ls bZ esy psd ugha djrs dress?
72. fuEufyf[kr esa ls dkSu ,d oSfyM bZ&esy (1) name.website@info@ed
vMªsl gS\ (2) [email protected]
(1) name.website@info@ed (3) [email protected]
(2) [email protected] (4) [email protected]
(3) [email protected] (5) website@[email protected]
(4) [email protected] 73. Which of the following character set sup-
(5) website@[email protected] ports Japanese and Chinese font?
73. fuEufyf[kr esa ls dkSu&lk dSjDs Vj lsV tkikuh (1) EBCDIC
vkSj pkbuht QkWUV dks liksVZ djrk gS\ (2) ASCII
(1) bZchlhMhvkbZlh (EBCDIC) (3) BC
(2) ,,llhvkbZvkbZ (ASCII) (4) ECBI
(3) chlh (BC) (4) bZlhchvkbZ (ECBI) (5) Unicode
(5) ;wfudksM 74. What is the full form of RTF?
74. vkjVh,Q (RTF) dk iw.kZ :i D;k gS\ (1) Richer Text Formatting
(1) fjpj VsDLV QkWesZfVax (2) Rich Text Format
(2) fjp VsDLV QkWesZV (3) Right Text Fishing
(3) jkbV VsDLV fQf'kax (4) Right Text Font
(4) jkbV VsDLV QkWUV (5) Rich Text Font
(5) fjp VsDLV QkWUV 75. Which of the following is the text alignment
75. fuEufyf[kr esa ls dkSu oMZ izkslsflax lkW¶Vos;j available in word processing software that
esa miyC/k ,d VsDLV vykbaxesaV gS tks nk;sa adjusts the left margin while keeping the
ik'oZ (jkbV ekftZu) dks fdlh izdkj fu;af=r right margin in any way?
djrs gq, ck;sa ik'oZ (ys¶V ekftZu) dks lek;ksftr (1) Justify
djrk gS\ (2) Left Justify
(1) tfLVQkbZ (2) ys¶V tfLVQkbZ (3) Right Justify
(3) jkbV tfLVQkbZ (4) Centre
(4) lsVa j (5) vksfj,Vs'a ku (5) Orientation
76. flLVe dh ?kM+h (DykWd) ds lanHkZ esa fuEufyf[kr 76. Which of the following is false about the
esa ls dkSu lk dFku vlR; gS\ clock of the system?
(1) ;g Vwyckj dh izkWiVhZ gSA (1) It is the property of the toolbar
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [11]

Telegram @BankingGK
Telegram @BankingGK

(2) flLVe le;&le; ij Vkbe lkslZ ds lkFk (2) The system can periodically refresh the
lkFk Vkbe dks fjÝs'k dj ldrk gS time by synchronizing with a time source
(3) flLVe dk Vkbe orZeku rkjh[k vkSj le; (3) System time is the current date and time
n'kkZrk gSA of day.
(4) flLVe Vkbe dks fu;af=r djrk gS ftlls (4) The system keeps time so that your ap-
vkidk ,fIyds'ku lgh le; (Vkbe) dks ,Dlsl plications have ready access to accurate
dj ldrk gS time.
(5) vf/kdka'k flLVe dk csl dksvkWfMZuV s sM (5) The system bases system time on coor-
;wfuolZy Vkbe (UTC) ds flLVe Vkbe ij dinated universal time (UT) (3)
vk/kkfjr gksrk gS 77. Which of the following are properties of
77. fuEufyf[kr esa ls dkSu ;w,lch (USB) dh ,d USB?
izeq[k fo'ks"krk gS\ (1) Platform independent
(1) Lora= IysVQkWeZ (2) vkfJr IysVQkWeZ (2) Platform dependent
(3) vkfJr lkslZ (4) vkfJr lkW¶Vos;j (3) Source dependent
(5) Lora= lkW¶Vos;j (4) Software dependent
78. bZ&esy lsaM djus ;k osc istksa dks fØ,V djus (5) Software independent
dh og izfØ;k ftls fdlh O;fDr ds vkWuykbu 78. An act of sending e-mails or creating web
cSad vdkmaV ØsfMV dkMZ ;k vU; ykWx bu pages that are designed to collect an
bUQkWesZ'ku dks dysDV djus ds fy, fufnZ"V individual's online bank, credit card, or other
fd;k tkrk gS\ login information?
(1) fQf'kax (2) Like~ (1) Phishing (2) Spam
(3) gSfdax (4) ØSfdax (3) hacking (4) cracking
(5) eyos;j (5) Malware
79. fuEufyf[kr esa ls dkSu lqO;ofLFkr :i ls 79. Which of the following is the organized
lafpr var% LFkkfir (baVjfjfyVsM) MkVk dh vfèkd collection of large amount of interrelated
ek=k dk ,d la?kfVr laxgz (dysD'ku) gS ftldk data stored in a meaningfully way used for
iz;ksx eSfuiqys'ku vkSj viMsfVax ds fy, fd;k manipulation and updating?
tkrk gS\ (1) Database (2) File
(1) MkVkcsl (2) Qkby (3) Folder (4) Data mining
(3) QksYMj (4) MkVk&ekbfuax (5) Data source
(5) MkVk lkslZ 80. Which among the following cycle consist
80. fuEufyf[kr esa ls dkSu vius la?kVdks ds :i esa of an Input, processing, output and stor-
buiqV] izkl s fs lax] vkmViqV vkSj LVksjt
s ls fufeZr age as its constituents?
gksrk gS\ (1) Processing (2) Output
(1) izkl
s fs lax (2) vkmViqV (3) Input (4) Storage
(3) buiqV (4) LVksjt
s (5) Data
(5) MkVk 81. The part of a computer that coordinates all
81. dEI;wVj dk og Hkkx tks blds lHkh dk;ksZ dks its functions is called its.
lefUor (dksvkWfMZusV~l) djrk gS] ________ (1) ROM program
dgykrk gSA (2) System board
(1) jkse izkx s zke (2) flLVe cksMZ (3) Arithmetic logic unit
(3) vfjFkesfVd ykWftd ;wfuV (4) Control unit
(4) daVªksy ;wfuV (5) buesa ls dksbZ ugha (5) None of these
82. vksjsdy ,d _______ gSA 82. Oracle is a.
[12] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) vkjMhch,e,l (2) gkMZo;s j (1) RDBMS


(3) flLVe lkW¶Vos;j (2) Hardware
(4) gkbZ ysoy ySUxq,t (3) System software
(5) mijksDr esa ls dksbZ ugha (4) High level language
83. fuEufyf[kr esa ls dkSu lh dEI;wVj ySUxq,t(5) None of the above
xf.krh; :i ls ,d vksfj,VsM a ySUxq,t gS ftldk
83. Which of the following computer languages
iz;ksx oSKkfud leL;kvksa o lek/kku ds fy,is a mathematically oriented language used
fd;k tkrk gS\ for scientific problems?
(1) QkWjVªkWu (2) dkscksy (1) FORTRAN (2) COBOL
(3) fyLi (4) izky
s kWx (3) LISP (4) PROLOG
(5) ,aMªkW;M (5) ANDROID
84. dwVkafdr izfof"V;kaaW (dksMM
s ,aVhª t) ftldk iz;ksx
84. Coded entries which are used to gain ac-
dEI;wVj flLVe dks ,Dlsl djus ds fy, fd;k cess to a computer system are called.
tkrk gS] dks ________ uke ls tkuk tkrk gSA
(1) Entry codes
(1) ,aVªh dksM~l (2) ikloM~l Z (2) Passwords
(3) flD;qfjVh dekaM~l (3) Security commands
(4) dksMoM~l Z (5) buesa ls dksbZ ugha
(4) Codewords (5) None of these
85. dEI;wVj vkSj dhcksMZ ds e/; ds dE;wfuds'ku esa
85. Communication between a computer and a
__________ Vªkalfe'ku lfEefyr djrk gSA
keyboard involves __________ transmis-
(1) vkWVksefs Vd (2) gkQ&MqIySDl
sion.
(3) Qqy MqIySDl (4) flEIySDl
(1) Automatic (2) Half duplex
(5) buesa ls dksbZ ugha
(3) Full duplex (4) Simplex
86. MkVk bufØI'ku dh izfØ;k dks vks,lvkbZ ekWMy
(5) None of these
ds fuEufyf[kr esa ls fdl ysoy ds varxZr
86. In which of the following level of OSI model,
fu"ikfnr fd;k tkrk gS\
(1) izStsUVs'ku ys;j data encryption is done?
(2) ls'ku ys;j (3) VªkaliksVZ ys;j (1) Presentation layer
(4) usVodZ ys;j (5) MkVk fyad ys;j (2) Session layer (3) Transport layer
87. _____ dEI;wVj flLVe dks bl izdkj fu;af=r (4) Network layer (5) Data link layer
87.
djrk gS ftlls og lwpk: :i ls dk;Z djrk _____ controls the way in which the com-
gS vkSj ,d ek/;e iznku djrk gS ftlds }kjkputer system functions and provides a
;wtj dEI;wVj ds lkFk baVj,DV dj ldrk gSA means by which users can interact with the
(1) vkWijsfVax flLVe computer.
(2) enjcksMZ (3) IysVQkWeZ (1) The operating system
(4) ,fIyds'ku lkW¶Vos;j (2) The motherboard
(5) gkMZo; s j (3) The platform (4) Application software
88. (5) Hardware
fuEufyf[kr esa ls dkSu Qkbcj vkWfIVd dScfyax
dh ,d fo'ks"krk ugha gS\ 88. Which of the following is not a property of
fibre optic cabling?
(1) ;g dkWij dScfyax dh rqyuk esa MkVk dks
rst xfr ls laizsf"kr djrk gS (1) Transmits at faster speeds than copper
(2) dkWij dScfyax dh rqyuk esa vkWfIVd dScfyax
cabling.
ls flXuy dks idM+uk vklku gS (2) Easier to caputre a signal from than cop-
(3) ;g baVjQsjsUl dk fojks/kh gS per cabling.
(4) flXuyksa dks izdk'k rjaxks ds leku dSjh
(3) Very resistant to interference.
djrk gS (4) Carries signals as light waves.
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [13]

Telegram @BankingGK
Telegram @BankingGK

(5) de {kh.krk (ysl vVsu~;q,'ku) (5) Les attenuation


89. DEL dekaM dk iz;ksx fd;k tkrk gS\ 89. DEL command is used to _______.
(1) Qkbyksa dks fMyhV djus ds fy, (1) delete files
(2) Mk;jsDVjh dks fMyhV djus ds fy, (2) delete directory
(3) yscYl dks fMyhV djus ds fy, (3) delete labels
(4) Qkby dk duVsUV fMyhV djus ds fy, (4) delete contents of file
(5) buesa ls dksbZ ugha (5) None of these
90. _______ ,slk lkW¶Vos;j gS ftldk iz;ksx 90. ________ are software which is used to do
fof'k"V dk;Z dks fu"ikfnr djus ds fy, fd;k particular task.
tkrk gSA (1) Operating system
(1) vkWijsfVax flLVe (2) Program (3) Data software
(2) izkxs zke (3) MkVk lkW¶Vos;j (4) Data (5) None of these
(4) MkVk (5) buesa ls dksbZ ugha 91. ______ is the process of dividing the disk
91. _______ fMLd dks VªSDl vkSj lsDVlZ esa into tracks and sectors.
foHkkftr djus dh izfØ;k gSA (1) Alloting (2) Crashing
(1) vykWfVax (2) ØSf'kax (3) Formatting (4) Tracking
(3) QkWesZfVax (4) Vªfs dax (5) Decrypting
(5) fMfØfIVax 92. What type of software creates a smaller file
92. fdl izdkj dk lkW¶Vos;j ,d NksVh Qkby that is faster to transfer over the internet?
fØ,V djrk gS ftls baVjusV ls vf/kd rsth ls (1) Compression (2) Fragmentation
VªkalQj fd;k tk ldrk gS\ (3) Encapsulation (4) Unzipped
(1) dEiz's ku (2) ÝSXesUVs'ku
(5) Abstraction
(3) ,UdSilqy's ku (4) vU;ftIM
93. A process known as ______ is used by
(5) ,sClVªSD'ku
large retailers to study trends.
93. izo`fr;ksa (VªMas l
~ ) dk v/;;u djus gsrq cM+s [kqnjk
O;kikfj;ksa }kjk iz;qDr gksus okyh izfØ;k (1) data mining (2) data selection
________ uke ls tkuh tkrh gS (3) POS (4) data conversion
(1) MkVk ekbfuax (2) MkVk lssyDs 'ku (5) data inversion
(3) ihvks,l (4) MkVk du~otZu 94. The ability to recover and read deleted or
(5) MkVk bUotZu damaged files from a criminal's computer is
94. vijkf/k;ksa ds dEI;wVj ls fMyhV ;k MSfet dh an example of a law enforcement specialty
xbZ Qkbyksa dks iqu% izkIr djus vkSj jhM djus is called ___.
dh ;ksX;rk dkuwu izorZu fo'ks"kKrk dk ,d (1) robotics
mnkgj.k gS ftls _________ dgrs gSA (2) simulation
(1) jkscksfVDl (2) fleqy's ku (3) computer forensics
(3) dEI;wVj QkWjfs Uld (4) animation
(4) ,fues'ku (5) ,UdSilqy's ku (5) encapsulation
95. ________ ,d MkVk gS ftls vFkZiw.kZ jhfr esa 95. _______ is data that has been organised
la?kfVr vkSj izLrqr fd;k tkrk gSA and presented in a meaningful fashion.
(1) izkl
s l s (2) lkW¶Vos;j (1) A process (2) Software
(3) LVksjt s (4) bUQkWeZ's ku (3) Storage (4) Information
(5) MkVk (5) Data
96. MkVk dks izkslsl djus djkus okyk dEiksusUV 96. The components that process data are lo-
fuEufyf[kr esa ls fdlesa fLFkr gksrk gS\ cated in which of the following?
(1) buiqV fMokbl (2) vkmViqV fMokbl (1) Input devices (2) Output devices
[14] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(3) flLVe ;wfuV (4) LVksjt s dEiksusUV (3) System unit (4) Storage component
(5) buesa ls dksbZ ugha (5) None of these
97. lhih;w vkSj eseksjh fuEufyf[kr esa ls fdl fMokbl 97. The CPU and memory are located in which
esa fLFkr gksrs gS\ of the following devices?
(1) enjcksMZ (2) ,Dlisa'ku cksMZ (1) Motherboard (2) Expansion board
(3) LVksjts fMokbl(4) vkmViqV fMokbl (3) Storage device(4) Output device
(5) buesa ls dksbZ ugha (5) System unit
98. ______ vR;f/kd lw{e Lrj ij fMokblksa dk 98. _____ is the revolving around the use of
fuekZ.k djus gsrq uSuks LVªDplZ ds iz;ksx ij nano structures to build devices on an ex-
fopkj djrk gS\ tremely small scale.
(1) uSuks VsDuksykWth (1) Nanotechnology
(2) ekbØks VSDuksykWth (2) Micro technology
(3) dEI;wVj QksjsflDl (3) Computer forensics
(4) vkfVZfQf'k;y baVy s htsUl (4) Artificial Intelligence
(5) osjh LekWy Ldsy VsDukykWth (5) Very small scale technology
99. vkbdu ij fDyd djus ;k Doslpu ds fjLiksUl 99. The steps and tasks needed to process data
esa MkVk dks izkls ls djkus gsrq LVsIl vkSj VkjDl such as responses to questions or clicking
dh vko';drk gksrh gS] ftls _________ an icon, are called _____.
dgrs gS\ (1) instructions
(1) baLVªD'kal (2) vkWijsfVax flLVe (2) The operating system
(3) ,fIyds'ku lkW¶Vos;j (3) Application software
(4) flLVe ;wfuV (5) gkMZo; s j ;wfuV (4) The system unit (5) The hardware unit
100. /kkrq ;k IykfLVd dk og vkoj.k (dsl) tks 100. Which of the metal or plastic case that holds
dEI;wVj ds lHkh HkkSfrd Hkkxks dks lqjf{kr j[krk all the physical parts of the computer?
gS (1) System unit (2) CPU
(1) flLVe ;wfuV (2) lhih;w
(3) Mainframe (4) Platform
(3) esuÝse (4) IysVQkWeZ
(5) Microprocessor
(5) ekbØksikz ls ls j [IBPS Bank Clerk Online Exam 2016]
[IBPS Bank Clerk Online Exam 2016]
101.
In computer terminology, what does UPS
101. dEI;wVj 'kCnkoyh esa ^;wih,l^ dk foLrkfjr
stand for?
:i D;k gS\
(1) Universal Process System
(1) ;wfuolZy izkslsl flLVe
(2) ;wfVfyVh izksxzke lkW¶Vos;j (2) Utility Program Software
(3) vubaVsji~fVcy ikWoj lkslZ (3) Uninterruptible Power Source
(4) ;wtj isyksM lhfj;y (4) User Payload Serial
(5) ;wfVfyVh iSdsV LVksjst (5) Utility Packet Storage
102. ________ ySu ls tqMs+ lHkh fMokblksa dks eslSt 102. A(n) ____ broadcasts messages to all de-
czkWMdkWLV djrk gSA vices connected to a LAN.
(1) fLop (2) iksVZ (1) Switch (2) Port
(3) gc (4) uksM (3) Hub (4) Node
(5) eksMse (5) Modem
103. vkbZ,lih (ISP) ls D;k rkRi;Z gS 103. What does ISP stand for?
(1) baVjus'kuy lfoZl izksVksdkWy (1) Iternational Service Protocol
(2) baVjuy lfoZl iksVZ (2) Internal Service Port
(3) baVjusV lfoZl izkWokbMj (3) Internet Service Provider
(4) baVjusV lpZ izksxzke (4) Internet Search Program
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [15]

Telegram @BankingGK
Telegram @BankingGK

(5) baVjuy lkW¶Vos;j izkslfs lax (5) Internal Software Processing


104. fuEufyf[kr esa ls dkSu flu~ØkWul dE;qfuds'ku 104. Which one of the following means of com-
dk ,d ek/;e gS\ munication is synchronous?
(1) bZ esy ds }kjk fopkj&foe'kZ (1) Discussion via email
(2) eap ij fopkj&foe'kZ dk flyflyk (2) Discussion thread on a forum
(3) CykWx iksLV~l dks lhjht (3) Series of blog posts
(4) baLVsaV eslSaftax (5) 1 vkSj 3 nksuksa (4) Instant Messaging
105. fjys'kuy MkVkcsl esa MkVk dks ,Dlsl vkSj (5) Both (1) and (3)
eSfuiqyVs djus ds fy, iz;Dq r gksus okyh baMLVªh 105. The industry standard programming lan-
LVsaMMZ izksxzkfeax ySUxq,t dgykrh gS\ guage for expressing data access and ma-
(1) 4 th,y (2) vksjsdy nipulation in relational data bases is called.
(3) ,lD;w,y (4) dkscksy (1) 4GL (2) ORACLE
(5) lh,l,l (3) SQL (4) COBOL
106. og fMokbl ;k izkx s zke tks eSlts dks usVodksZ ds (5) CSS
e/; QkWjoMZ djrk gS\ 106. The device or program that forwards mes-
(1) fczt (2) :Vj sages between networks is known as a?
(3) cSdcksu (4) xsVos (1) Bridge (2) Router
(5) iksVZ (3) Backbone (4) Gateway
107. fuEufyf[kr esa ls dkSu foaMkst vkWijsfVax flLVe (5) Port
ds baVjuy gkMZ fMLd ds cSdvi vkSj i;kZIr 107. Which of the following is not a utility in
fu"iknu {kerk dks lqfuf'pr djus okyh Windows OS to ensure backup and ad-
;wfVfyVh ugha gS\ equate performance of an internal hard disk?
(1) cSdvi (2) fMLd Dyhu vi (1) Backup
(3) fMLd fMÝSxesV a j (2) Disk Cleanup
(4) baVjusV ,DlIyksjj (3) Disk Defragmenter
(5) fou fMj LVSV (4) Internet Explorer
108. oYMZ okbM osc ij bUQkWeZ's ku fjlksflZt izLrqr (5) WinDirStat
djus] izkIr djus vkSj ckaf/kr djus ds fy, 108. A software application for retrieving, pre-
iz;qDr gksus okyk lkW¶Vos;j ,fIyds'ku dgykrk senting and traversing information re-
gS\ sources on the World Wide Web is known
(1) czkmtj (2) bZ&esy as
(3) osclkbV (4) gkbijfyad (1) Browser (2) Email
(5) lpZ batu (3) Website (4) Hyperlink
109. jSe ds lanHkZ esa fuEufyf[kr esa ls dkSu lk dFku (5) Search engine
lR; ugha gS\ 109. Which of the following statements is not
(1) ;g izd`fr esa okWySVkby gS correct with respect to RAM?
(2) bls ;kn`fPNd (Randomly) :i ls ,Dlsl (1) It is volatile in nature
fd;k tk ldrk gS (2) It can be accessed randomly
(3) ;g dEI;wVj ds fLop vkWQ gks tkus ds ckn (3) It stores data even when the computer
Hkh MkVk dks cuk, j[krk gS is switched off
(4) bls izkbejh eseksjh ds :i esa fufnZ"V fd;k (4) It is referred to as primary memory
tkrk gS (5) It is the most common type of memory
(5) ;g dEI;wVjksa esa ikbZ tkus okyh lkekU; found in computers.
izdkj dh eseksjh gS
[16] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

110. bafLV~V;wV vkWQ bysfDVªdy ,aM bysDVªksfuDl 110.


802.11 is the standard for _____ developed
bathfu;lZ (vkbZbbZ Zb)Z ds }kjk fodflr 802.11
by the institute of electrical and electronics
_________ ds fy, ,d ekud gSA Engineers (IEEE).
(1) ok;jysl ySu (2) bFkjusV (1) Wireless LANs
(3) CyqVFw k (4) czkMW cSMa ok;jysl
(2) Ethernet (3) Bluetooth
(5) 2 vkSj 3 nksuksa (4) Broadband Wireless
111. fuEufyf[kr esa ls dkSu dEI;wVj flLVe dks bl
(5) Both (2) and (3)
izdkj fu;af=r djrk gS ftlls dEI;wVj flLVe
111. Which of the following controls the way in
dk;Z djrk gS vkSj ,slk ek/;e izkoW kbM djrk gS
which the computer system functions and
ftlds }kjk ;wtj dEI;wVj ds lkFk baVj,DV provides a means by which users can inter-
dj ldrs gS\ act with the computer.
(1) vkWijsfVax flLVe (1) Operating System
(2) enjcksMZ (3) IysVQkWeZ (2) Motherboard (3) Platform
(4) ,fIyds'ku lkW¶Vos;j (4) Application software
(5) lhih;w (5) CPU
112. fØfeuy dEI;wVj ls fMyhV ;k MSest Qkbyksa
112. The ability to recover and read deleted or
dks fjdoj djus vkSj jhM djus dh ;ksX;rk damaged files from a criminals computer is
dkuwu izorZu fof'k"Vhdj.k dk ,d mnkgj.k gS
an example of a lawenforcement specialty
ftls _____ dgrs gSA called.
(1) fleqy's ku (2) ,fues'ku
(1) Simulation (2) Animation
(3) jkscksfVDl (4) dEI;wVj QkWju s flDl
(3) Robotics (4) Computer forensics
(5) fØIVksxzkQh
(5) Cryptography
113. lksi (SOAP) ,d eSlsftax izksVksdkWy gS tks
113. SOAP is a messaging protocol that allows
gkbijVsDLV Vªkl a Qj izkVs ksdkWy (,pVhVhih) vkSj
programs that run on disparate operating
blds ,DlVs u flcy ekdZ v i yS U xq , t
(,Dl,e,y) dh lgk;rk ls fMLiSjV systems to communicate using Hypertext
s vkWijsfVax
flLVe ij ju gksus okys izkx Transfer Protocol (HTTP) and its Extensible
s zkeksa dks dE;qfudsV
djus dh vuqefr nsrk gS SOAP ls D;k rkRi;ZMarkup Language (XML). What does
gS\ SOAP stands for?
(1) flEiy vksfj,aV's ku ,Dlsl izksVksdkWy(1) Simple Orientation Access Protocol
(2) Simple Orientation Application Protocol
(2) flEiy vksfj,aVs'ku ,fIyds'ku izksVksdkWy
(3) flEiy vkWCtsDV ,Dlsl izkV (3) Simple Object Access Protocol
s ksdkWy
(4) flEiy vkWCtsDV ,fIyds'ku izksVksdkWy (4) Simple Object Application Protocol
(5) flEiy vkWijsfVax ,Dlsl izksVksdkWy (5) Simple Operating Access Protocol
114. 114. The data on the tracks of a magnetic disk is
eSXusfVd fMLd ds VªSDl ij MkVk dks _______
:i esa fy[kk tkrk gSA written as.
(1) 'kwU; ;k ,d (2) vi ;k Mkmu (1) Zero or one (2) Up or down
(3) gkbZ ;k yks okWYVst (3) High or low voltage
(4) gkbZ ;k yks MkVk jsV (4) High or low data rate
(5) fVuh eSXusfVd LikWV~l (5) Tiny magnetic spots
115. oMZ MkWD;qeVas ~l esa ,jlZ dh vkWVksefs Vd djsD'ku
115. In word documents the automatic correc-
dks ______ :i esa tkuk tkrk gSA tion of errors is known as
(1) thvkjbZih (2) Lisy psd (1) GREP (2) Spell Check
(3) vkWVks djsDV (4) lpZ ,aM QkbaM (3) Autocorrect (4) Search and Find
(5) fjIysl (5) Replace
JB Classes 66-H-Block, Near Nehru Park, Sri116. What is the
Ganganagar M name of a block of high speed
: 83-85-87-01-01 [17]

Telegram @BankingGK
Telegram @BankingGK

116. gkbZ LihM eseksjh CykWd dk D;k uke gS tgka memory where data is copied when it is re-
MkVk dh dkWih rc dh tkrh gS tc bls jSe ls trieved from the RAM?
izkIr fd;k tkrk gS\ (1) Cache memory
(1) dSp (Cache) eseksjh (2) Flash memory
(2) ¶ys'k eseksjh (3) LØSp eseksjh (3) Scratch memory
(4) dqdht (5) MªSe (DRAM) (4) Cookies (5) DRAM
117. ykblsl a [kjhnus ls iwoZ ;wtj dks ijh{k.k ds :i 117. What is the term used for software offered
esa ;k lhfer vof/k ds fy, iz;ksx gsrq miyCèk in trial form or for a limited period that al-
djk, x, lkW¶Vos;j ds fy, fdl 'kCn dk lows the user to try it out before purchas-
iz;ksx fd;k tkrk gS\ ing a license?
(1) 'ks;jos;j (2) eyos;j (1) Shareware (2) Malware
(3) QeZo; s j (4) iSp (3) Firmware (4) Patch
(5) ,Mos;j (5) Adware
118. ,d QkWeZVs sM xkbM tks MkWD;weaVs tSls ysVj dks 118. A formatted guide that simplifies creating a
fØ,V djus dh izfØ;k ljy cukrk gS\ document such as a letter is called a(n).
(1) Vse~IysV (2) fDyivkVZ (1) Template (2) Clipart
(3) lSyqV's ku (4) fDod ikVZ Vwy (3) Salutation (4) Quick part tool
(5) oMZ vkVZ (5) Word art
119. /kkrq ;k IykfLVd dk og vkoj.k tks dEI;wVj ds 119. The metal or plastic case that houses the
HkkSfrd ?kVdksa dks ,d lkFk j[krk gS] _______ physical components of a computer to-
dgykrk gSA gether is called the.
(1) lsV a ªy izkl s sflax ;wfuV (1) Central Processing Unit
(2) LVksjt s fMokbl(3) enjcksMZ (2) Storage device
(4) flLVe ;wfuV (5) gkMZ Mªkbo (3) Motherboard (4) System unit
120. dEI;wVj flLVe dks usfoxsV djus esa ;wtj dh (5) Hard Drive
lgk;rk djus ds Øe esa dEI;wVj LØhu ij 120. A pictogram displayed on a computer screen
fMLiys gksus okyk fiDVksxzke D;k dgykrk gS\ in order to help the user navigate a com-
(1) vkbdu (2) FkEcusy puter system is called.
(3) U;w QksYMj (4) flEcy (1) Icon (2) Thumbnail
(5) VªS'k (3) New folder (4) Symbol
121. fuEufyf[kr esa ls flXuy ds ekWM;qys'ku vkSj (5) Trash
fMekWMq;qys'ku dk fu"iknu dkSu djrk gS\ 121. Which of the following performs modula-
(1) ,sefIyQk;j (2) lSVy s kbV tion and demodulation of signal.
(3) dkWfDl;y dscy (1) Amplifier (2) Satellite
(4) ekWMe s (5) Qkbcj vkWfIVd (3) Coaxial cable (4) Modem
122. og gkMZos;j fMokbl tks esu dEI;wVj flLVe (5) Fiber Optic
dk Hkkx ugha gS ysfdu bls ckn esa flLVe esa 122. A hardware devices that is not part of the
'kkfey fd;k tkrk gS vkSj _____ ds :i esa main computer system and is often added
fufnZ"V fd;k tkrk gS\ later to the system is referred to as an?
(1) dusZy (2) isfjQsjy (1) Kernel (2) Peripheral
(3) viMsV (4) iSp (3) Update (4) Patch
(5) jftLVªh (5) Registry
123. fuEufyf[kr esa ls dkSu lk fodYi dkWeu MkVk 123. Which of the following places the common
byhesaV~l dks NksVs ls cM+s Øe esa O;ofLFkr data elements in order from smallest to larg-
djrk gS\ est?
(1) dSjsDVj] fjdkWMZ] Qkby] QhYM] MkVkcsl (1) Character, record, file, field, database
[18] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(2) dSjsDVj] fjdkWMZ] Qkby] MkVkcsl QhYM (2) Character, record, file, database, field
(3) QhYM] Qkby] fjdkWMZ] djSDVj] MkVkcsl (3) Field, file, record, character, database
(4) QhYM] fjdkWMZ] Qkby] djSDVj] MkVkcsl (4) Field, record, file, character, database
(5) dSjDs Vj] QhYM] fjdkWMZ] Qkby] MkVkcsl (5) Character, field, record, file, database
124. ASCII dk foLrkfjr :i gS\ 124. ASCII stands for?
(1) vesfjdu LVSaMMZ dksM QkWj bUQkWesZ'ku (1) American standard code for Information
baVjpst Interchange
(2) vesfjdu LVscy dksM QkWj baVjus'ku (2) American Stable Code for International
baVjpst Interchange
(3) vesfjdu LVSaMMZ dsl QkWj bfLVV~;'w kuy (3) American Standard Case for Institutional
baVjpsat Interchange
(4) vesfjdu LVSaMMZ dksM QkWj baVjpsat (4) American Standard Code for Interchange
bUQkWeZ's ku Information
(5) vesfjdu LVSM a MZ dsl QkWj bUQkWe'Zs ku baVjpst (5) American Standard Case for Information
125. fuEufyf[kr esa ls dkSu dEI;wVj }kjk orZeku esa Interchange.
iz;ksx fd, tkus okys vkWijsfVax flLVe izksxzke 125. Which of the following holds the operating
vkSj MkVk dks fu;af=r djrk gS\ systems programs and data the computer
(1) enjcksMZ (2) jkse (ROM) is currently using?
(3) izkl
s l s j (4) jSe (RAM) (1) Motherboard (2) ROM
(5) gkMZ Mªkbo (3) Processor (4) RAM
126. fuEufyf[kr esa ls dkSu dEI;wVj dE;qfuds'kal (5) Hard drive
dks ckf/kr djus dh rduhd ls lacf/kr gS\ 126. Which of the following refers to a technique
(1) gSfdax (2) fLufQax for intercepting comptuer communications?
(3) izhVsDlfVax (4) Liwfyax (1) Hacking (2) Sniffing
(5) fQf'kax (3) Pretexting (4) Spooling
127. gYds vkSj xgjs fpUg okys dksM ftUgsa izdk'kh; (5) Phishing
:i ls i<+k tk ldrk gS] ______ dgykrs gSA 127. Codes consisting of light and dark marks
(1) usekWfuDl (2) fLVªi dksM which may be optically read is knwon as.
(3) fMdksMj (4) Lis'ky dksM (1) Mnemonics (2) Stripe Code
(5) ckj dksM (3) Decoder (4) Special code
128. ikFkost tks flLVe cksMZ ij fofHkUu bysDVªkfW ud (5) Bar code
?kVdksa ds lkFk dE;qfuds'ku dks liksVZ djrs gS] 128. Pathways that support communication
_____ dgykrs gSA among the various electronic components
(1) cl ykbal (2) usVodZ ykbal on the system board are called.
(3) ykWftd ikFk~l (4) xsVost (1) Bus lines (2) Network lines
(5) iksVZl~ (3) Logic paths (4) Gate ways
129. ,e,l&MkWl ,d ______ vkWijsfVax flLVe (5) Ports
gSA 129. MS-DOS is _____ operating system
(1) ;wfuDl (2) ekbØkslkW¶V (1) Unix (2) Microsoft
(3) ykbuDl (4) eSd (3) Linux (4) Mac
(5) ikbFku (5) Python
130. ekWuhVj ds fjtksY;w'ku esa o`f) dks _______ 130. Increasing the resolution of a monitor is
:i esa tkuk tkrk gSA known as.
(1) baVjiksys'ku (2) MkmulSefIyax (1) Interpolation (2) Downsampling
(3) vi~lSefIyax (4) cwfLVax (3) Upsampling (4) Boosting
(5) jsLVsjkbftax (5) Resterizing
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [19]

Telegram @BankingGK
Telegram @BankingGK

131. Qkbyksa dks ,d e'khu ls nwljh e'khu rd 131. Which of the following of the TCP/IP pro-
VªkalQj djus ds fy, fuEufyf[kr esa ls fdl tocols is the used for transferring files from
TCP/IP izksVksdkWy dk iz;ksx fd;k tkrk gS\ one machine to another.
(1) ,QVhih (2) ,l,u,eih (1) FTP (2) SNMP
(3) ,l,eVhih (4) vkjihvkbZ (3) SMTP (4) RPE
(5) ,pVh,e,y (5) HTML
132. og buiqV fMokbl tks dEI;wVj izkx s zke esa ;wtlZ 132. An input device that allows the user to con-
dks dSjDs Vj ;k e'khu dks daVªksy djus dh trol a character or machine in a computer
vuqefr nsrk gS\ program is known as?
(1) Plotter (2) Joystick
(1) IykWVj (2) tkW;fLVd
(3) Mouse (4) PDA
(3) ekml (4) ihMh,
(5) Assembler
(5) vlsEcyj 133. The process of writing computer instruc-
133. dEI;wVj baLVªD'kal dks izksxzkfeax ySUxq,t esa tions in a programming language is known
fy[kus dh izfØ;k dgykrh gS as?
(1) fMÝSXesfVax (2) dEikbfyax (1) Defragmenting
(3) fMcfxax (4) dksfMax (2) Compiling (3) Debugging
(5) vlsEcfyax (4) Coding (5) Assembling
134. ue ykWd dh vksj dSIl ykWd dh nksuksa dks 134. The Num Lock key and Caps Lock key are
_____ dht ekuk tkrk gS D;ksfa d tc vki bUgsa considered ____ keys because their func-
izsl djrs gS rks izR;sd ckj buds QaD'ku esa tion changes each time you press them.
ifjorZu vk tkrk gSA (1) Function (2) Toggle
(1) QaD'ku (2) VkWxy (3) Cursor control
(3) dlZj daVªksy (4) daVªky s (4) Control (5) Dual
(5) Mqvy 135. ISDN is an abbreviation for?
135. laf{kIrk{kj ^vkbZ,lMh,u^ dk iw.kZ :i D;k gS\ (1) Interactive Standard Dynamic Network
(2) Intergrated Standard Digital Network
(1) baVj,fDVo LVSaMMZ MkbuSfed usVodZ
(3) Internet Services Data Network
(2) bafVxzsVsM LVSaMMZ fMftVy usVodZ
(4) International Services Digtial Network
(3) baVjusV lfoZlst MkVk usVodZ (5) Integrated Services Digital Network
(4) baVjus'kuy lfoZlst fMftVy usVodZ 136. Which term is used for the practice and
(5) bafVxzVs sM lfoZlst fMftVy usVodZ study of techniques for secure communi-
136. ,Mojljht uked rhljh ikVhZ dh mifLFkfr esa cation in the presence of third parties called
flD;ksj dE;qfuds'ku ds fy, rduhdksa dk vè;;u adversaries?
djus vkSj dk;kZfUor djus ds fy, fdl 'kCn (1) Metagraphy (2) Cartography
dk iz;ksx fd;k tkrk gS\ (3) Holography
(1) esVkxzkQh (2) dkVksx Z kz Qh (4) Cryptography
(3) gkWyksxkz Qh (4) fØIVksxkz Qh (5) Epigraphy
(5) bfixzkQh 137. Which language is directly understood by
137. dEI;wVj fcuk Vªkalys'ku ds fdl ySUxq,t dks the computer without translation?
izR;{k :i ls le> ldrk gS\ (1) BASIC language
(1) csfld ySUxq,t (2) vlsEcyh ySUxq,t (2) Assembly language
(3) gkbZ ysoy ySUxq,t (3) High level language
(4) lh ySUxq,t (5) e'khu ySUxq,t (4) C language
(5) Machine language
138. ASCII }kjk dksMsM dSjsDVlZ ds fdl lewg dk
138. Which set of coded characters are used by
iz;ksx fd;k tkrk gS\ ASCII?
[20] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) 5 fcV (2) 7 fcV (1) 5 bit (2) 7 bit


(3) 12 fcV (4) 32 fcV (3) 12 bit (4) 32 bit
(5) 64 fcV (5) 64 bit
139. MsLdVkWi ifCyf'kax fuEufyf[kr esa ls fdl 139. Desktop publishing is a more sophisticated
izdkj ds lkW¶Vos;j dk ifj"d`r :i gS\ form of which of the following types of soft-
(1) LizMs 'khV (2) xzkfQax ware?
(3) oMZ izkl s fs lax (4) MkVkcsl (1) Spreadsheet (2) Graphing
(3) Word processing
(5) izt
s Us Vs'ku
(4) Database (5) Presentation
140. fuEufyf[kr esa ls dkSu gkMZo;s j dk ,d mnkgj.k 140. Which of the following is not an example of
ugha gS\ Hardware?
(1) LdSuj (2) IykWVj (1) Scanner (2) Plotter
(3) fizV
a j (4) ekWuhVj (2) printer (4) Monitor
(5) ,Yxksfjne (5) Algorithm
[GIC Officer Online Exam 15.05.2017] [GIC Officer Online Exam 15.05.2017]
141. fdlh laxBu ds Loa; ds lalk/kuks ds iz;ksx ls 141. Creating specific application software us-
fof'k"V ,fIyds'ku lkW¶Vos;j fØ,V djus dh ing an organisation's own resources is
izfØ;k ______ dgykrh gSA called _____.
(1) vkmVlksflZx (1) Outsourcing
(2) dUlYVsaV csLM MsoyiesaV (2) Consulatnat based development
(3) bu gkml MsoyiesaV (3) In house development
(4) dUlfVªDV lkW¶Vos;j (4) Constrict Software
(5) ,fIyds'ku lfoZl izko s kbMlZ (5) Application Service Providers
142. dE;qfuds'ku QSflfyVh }kjk fyaDM dbZ i`Fkd~ 142. Data processing performed by several sepa-
rate computers/computer networks, at sev-
dEi;wVjks@ a dEi;wVj usVodksZ }kjk dbZ fofHkUu
eral different locations, inked by a commu-
yks d s ' kuks a ij fu"iknu MkVk iz k s l s f la x nications facility is known as ______.
__________ ds :i esa tkuh tkrh gSA
(1) On line processing
(1) vkWu ykbu izkslsflax (2) Distributed processing
(2) fMLVªhC;wVsM izkl s fs lax (3) Controlled processing
(3) daVªkYs M izkl s fs lax (4) Batch processing
(4) cSp izkl s fs lax (5) Lis'kykbTM izkls fs lax (5) Specialised processing
143. ,l,eVhih (SMTP) ls D;k rkRi;Z gS\ 143. SMTP stands for which of the following?
(1) LVSaMMZ esy VªkalQj izksVksdkWy (1) Standard Mail Transfer Protocol
(2) flaxy esy VªkalQj izkstsDV (2) Single Mail Transfer Project
(3) lksfQfLVdsVsM ,aM esy VªkalQj izksVksdkWy (3) Sohpisticated and Mail Transfer Proto-
(4) flEiy esy VªkalQj izksxzke col
(5) flEiy esy VªkalQj izksVksdkWy (4) Simple Mail Transfer Program
144. fMftVy lfVZfQdsV esa ____ 'kkfey ugha gksrkA (5) Simple Mail Transfer Protocol
(1) lkoZtfud dqath dh vafre frfFk 144. Digital Certificate does not contain ____.
(2) ekfyd ds fMftVy gLrk{kj (1) Expiration date of the public key
(3) ekfyd dh lkoZtfud dqath (2) Digital signature of the owner
(3) Owner's public key
(4) tkjhdrkZ ds fMftVy gLrk{kj
(4) Digital signature of the issuer
(5) ekfyd dk uke
(5) Owner's name
145. bZ&esy eslSt esa czsdSV okys VsDLV dk iz;ksx 145. Why does one use bracketed text in an email
D;ksa fd;k tkrk gS\ message?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [21]

Telegram @BankingGK
Telegram @BankingGK

(1) baVjusV VªSfQd de djus ds fy, (1) To reduce Internet traffic


(2) bZesy eSlst ds vkdkj dks tfVy cukus ds (2) To complicate the appearance of the
fy, email message
(3) eslSt izkIrdrkZ dks duVsDLV izko s kbM djus (3) To provide a context for the recipient of
ds fy, the message.
(4) bZest fMyhojh dh LihM c<+kus ds fy, (4) To increase the speed of the email deliv-
(5) lsaMj ds Dyse gsrq ery
(5) To flame the sender
146. _______ ,d baVjuy daiuh usVodZ gS tks
146. _____ is an internal company network that
baVjusV vkSj osc VsDuksykWth dk iz;ksx djrk gS uses internet and Web technologies that
tks ;wtlZ dks MkWD;wesaV dk irk yxkus 'ks;j allow users to find and share documents,
djus] lg;ksx djus vkSj ,d nwljs ds lkFk collaborate and communicate with each
dE;wfudsV djus dh vuqefr nsrk gSA other.
(1) ,DlVªkusV (2) baVjusV (1) Extranet (2) Internet
(3) yksdy xsV (4) fMft usV (3) Local net (4) Digi net
(5) baVªkusV (5) Intranet
147. _____ ,d izkslsflax VsDuhd gS tks izkslsflax 147. A processing technique that allows data to
vkjaHk gksus ls iwoZ MkVk dks lafpr djus dh be accumulated before processing
vuqefr nsrk gSA comences is ______.
(1) eYVh VkfLdax (2) MkVk dSIpfjax (1) Multi tasking (2) Data capturing
(3) dEI;wVj MkVk izkl s fs lax (3) Computer data processing
(4) eYVh izkl s fs lax (4) Multi processing
(5) cSp izkl s fs lax (5) Batch processing
148. The exposure of a system to likely risks and
148. tksf[ke vkSj vk'kadkvksa ls ifjiw.kZ flLVe dh threats is called _____.
vofLFkfr _______ dgykrh gSA (1) Vulnerability (2) Weakness
(1) oYuSjfs cfyVh (2) ohdusl (3) Virus attack (4) Worms attack
(3) ok;jl vVSd (4) okWe~Zl vVSd (5) Data Diddling
(5) MkVk fMMfyax 149. A fraud perpetrated by tricking a person
149. fdlh /kks[ksckt vijk/kdrkZ }kjk fdlh O;fDr into disclosing confidential information,
dks Qqlykdj mldh xksiuh; lwpuk] tSls such as a password is called.
ikloMZ] izkIr djus dh izfØ;k dgykrh gS\ (1) scavenging (2) hacking
(1) LdSofs Utax (2) gSfdax (3) password cracking
(3) ikloMZ ØSfdax (4) lks'ky bathfu;fjax (4) social engineering
(5) Vªkts u gkslZ (5) a Trojan horse
150. esy etZ ,d Qhpj gS tks laHkor% fuEufyf[kr 150. Mail merge is a feature likely to be found in
esa ls fdl lkW¶Vos;j iSdst esa ik;k tkrk gS\ which of the following software packages?
(1) MsLdVkWi ifCyf'kax izkx s zke (1) Desktop publishing program
(2) oMZ izkl s slj (3) MkVkcsl (2) Word processor
(4) LizM s 'khV (5) bZesy izksxzke (3) Database (4) Spreadsheet
(5) Email program
[IBPS RRBs Office Assistant Mains Online Exam 2016]
[IBPS RRBs Office Assistant Mains Online Exam 2016]
151. fuEufyf[kr esa ls dkSu&lk eksckby vkWijsfVax 151. Which among the following is not a mobile
flLVe ugha gS\ Operating System?
(1) ckMk (2) lQkjh (1) Bada (2) Safari
(3) flfEc;u (4) ehxks (3) Symbian (4) MeeGo
(5) oscvks,l (5) WebOS
152. lhih;w (CPU) dk fgLlk gS] tksfd dEI;wVj vkSj 152. The part of CPU which coordinates all func-
vU; ?kVdksa ds lHkh dk;ksZ dk leUo; djrk gSA tions of computer and other components
[22] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) enj cksMZ (2) leUo; cksMZ is.


(3) daVªksy ;wfuV (4) ,,y;w (1) Mother Board
(5) buesa ls dksbZ ugha (2) Coordination Board
153. dEI;wVj esa 1 fuCcy cjkcj gksrk gS\ (3) Control Unit (4) ALU
(1) 4 ckbV~l (2) 8 fcV~l (5) None of these
(3) 2 fcV~l (4) 4 fcV~l 153. In computing, 1 nibble is equal to _____.
(5) 2 ckbV~l (1) 4 bytes (2) 8 bits
154. vkWuykbu ØsfMV dkMZ ysu&nsu esa fdl izdkj (3) 2 bits (4) 4 bits
dh lalkf/kr gksrh gS\ (5) 2 bytes
(1) baLVsaV izkl s fs lax (2) cSp izkl
s fs lax 154. Online credit card transactions involve
(3) eSuqvy izkslfs lax which type of processing?
(1) Instant processing
(4) ysunsu izkl s sflax
(2) Batch processing
(5) fn, x, fodYiks esa ls dksbZ ugha
(3) Manual processing
155. ;wuhoSd (UNIVAC) dh D;k fLFkfr gksrh gS\ (4) Transaction processing
(1) ;wfuolZy vkWVksesfVd dEI;wVj (5) None of these given as options
(2) ;wfuolZy vjsZ dEI;wVj 155. What does UNIVAC stand for?
(3) ;wfud vkWVksefs Vd dEI;wVj (1) Universal Automatic Computer
(4) vuoSY;wM vkWVksesfVd dEI;wVj (2) Universal Array Computer
(5) fn, x, fodYiks esa ls dksbZ ugha (3) Unique Automatic Computer
156. fl)kar gS fd baVjusV lsok iznkrk lzksr dh (4) Unvalued Automatic Computer
ijokg] fd, fcuk] lHkh lkexzh vkSj vuqiz;ksxksa (5) None of these given as options
rd igqp aW dks l{ke djrk gS] vkSj fo'ks"k mRiknksa 156. The principle that Internet service provid-
;k osclkbVksa dks /;ku esa j[krs gq, ;k vo:) ers enable access to all content and appli-
fd;s fcuk mUgsa Kkr fd;k tkrk gSA cations regardless of the source, and with-
(1) usV rVLFkrk out favoring or blocking particular products
(2) lkoZtfud mi;ksfxrk or websites is known as.
(3) xzV s FkzkWVfyax fl)kar (1) Net neutrality (2) Public utility
(4) fcuk ck/kkvksa ds mi;ksx (3) Non throttling principle
(5) fn, x, fodYiks esa ls dksbZ ugha (4) Usage sans barriers
157. fuEu fn, x, fodYiksa esa ls dkSu lk vkbZch,e (5) None of these given as options
(IBM) dk lqij dEI;wVj gS\ 157. Which among the given options is IBM's
(1) frgkus&2 (2) luos Vk;gq ykbV Supercomputer?
(3) okVlu (4) 'kkljk&Vh (1) Tihane-2 (2) Sunway Taihu Light
(5) czu
s (3) Watson (4) Shasra-T
(5) Brain
158. dEI;wVj }kjk fu"ikfnr fd, x, cqfu;knh dk;Z
158. The basic operations performed by a com-
gksrk gS\ puter are.
(1) vadxf.krh; lapkyu
(1) Arithmetic operation
(2) rkfdZd lapkyu (2) Logical operation
(3) lacf/kr rFkk laxzg.k (3) Storage and relative
(4) mijksDr lHkh (4) All of the above
(5) fn, x, fodYiks esa ls dksbZ ugha (5) None of these given as options
159. nks izeq[k izdkj ds dEI;wVj fpIl gksrs gS\ 159. The two major types of computer chips are
(1) ckgjh eseksjh fpi (1) External memory chip
(2) izkFkfed eseksjh fpi (2) Primary memory chip
(3) ekbØksizkl s l s j fpi (3) Microprocessor chip
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [23]

Telegram @BankingGK
Telegram @BankingGK

(4) 2 vkSj 3 nksuksa (4) Both (2) and (3)


(5) mi;qZDr fn;s x, lHkh fodYi ds :i esa gSA (5) All of the above given as options
160. ekbØkslkW¶V oMZ ds fdl VSc ds varxZr orZuh 160. Under which tab of Microsoft Word is spell
tkap lqfo/kk miyC/k gS\ check feature available?
(1) fjO;w (2) ysvkmV (1) Review (2) Layout
(3) fMtkbu (4) O;w (3) Design (4) View
(5) Qkby (5) File
161. fuEu QaD'kal dqaft;kas (Keys) esa ls dkSu lk 161. Which of the following function keys
Qkby dk uke cnyus ds fy, dhcksMZ 'kkWVd Z V serves as the keyboard shortcut for Rename
ds :i esa dk;Z djrk gS\ of File?
(1) F1 (2) F2 (1) F1 (2) F2
(3) F6 (4) F9 (3) F6 (4) F9
(5) F12 (5) F12
162. fdl daiuh us loZizFke ekWMse dk vkfo"dkj 162. Which company first invented MODEM?
fd;k\ (1) IBM (2) AT&T
(1) vkbZch,e (2) ,Vh ,aM Vh
(3) Microsoft (4) Seagate
(3) ekbØkslkW¶V (4) lhxsV
(5) Betel
(5) csVy
163. Which among the following is the smallest
163. dEI;wVj LØhu esa best esa lcls NksVh bdkbZ
unit in an image in a computer screen?
fuEu esa ls dkSu lh gS\
(1) Unit (2) Pixel
(1) ;wfuV (2) fiDlsy
(3) ,sjs (4) jslksyq'ku (3) Array (4) Resolution
(5) fDyi (5) Clip
164. fLofpax fMokbl ds :i esa ekbØksizkslsljksa ds 164. Microprocessors as switching devices are
fy, tks tujs'ku (ih<+h) ds dEI;wVj gS\ for which generation computers.
(1) izFke tujs'ku (2) f}rh; tujs'ku (1) First Generation
(3) r`rh; tujs'ku (4) prqFkZ tujs'ku (2) Second Generation
(5) iape tujs'ku (3) Third Generation
165. esuÝse vkSj lqij dEI;wVj ds chp eq[; varj (4) Fourth Generation
D;k gS\ (5) Fifth Generation
(1) lqij dEI;wVj esuÝse dEI;wVj ls cgqr cM+k 165. What is the main difference between a main-
gksrk gS frame and a super computer?
(2) lqij dEI;wVj esuÝse dEI;wVj ls cgqr (1) Super computer is much larger than main-
NksVk gksrk gSA frame computers
(3) lqij dEI;wVj dqN izkxs zke dks ftruh tYnh (2) Super computers are much smaller than
gks lds fu"ikfnr djus ds fy, Qksdl djrk mainframe computers
gS] tcfd esuÝse viuh 'kfDr dk mi;ksx (3) Supercomputers are focused to execute
djrk gS rkfd dbZ izksxzkeksa dks leorhZ :i ls few programs as fast as possible while main-
fu"ikfnr fd;k tk ldsA frame uses its power to execute as many
(4) lqij dEI;wVj ftruk laHko gks mrus izkxs kz eksa programs concurrently
dks fu"ikfnr djus ds fy, dsfUnzr gksrk gS] (4) Supercomputers are focused to execute
tcfd esuÝse ftruh tYnh gks lds dqN izkx s kz eksa as many programs as possible white main-
dks fu"ikfnr djus ds fy, viuh 'kfDr dk frame uses its power to execute few pro-
mi;ksx djrk gS grams as fast as possible
[24] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(5) esuÝse dEI;wVj lqij dEI;wVj ls cgqr cM+k (5) Mainframe computer is much larger than
gksrk gSA Super computer
166. ASCII vkSj EBCDIC izpfyr djsDVj dksfMax 166. ASCII and EBCDIC are the popular charac-
flLVe gSA EBCDIC dk 'kCn la{ksi D;k gS\ ter coding systems. What does EBCDIC
(1) ,DlVsaMM s ckbujh dksMsM Msfley baVjpat
s stand for?
dksM (1) Extended Binary Coded Decimal Inter-
(2) ,DlVsM a Ms chV dksM Msfley baVjpst a dksM change Code
(2) Extended Bit Code Decimal Interchange
(3) ,DlVsM a M s chV dsl Msfley baVjpst
a dksM Code
(4) ,DlVsaMsM ckbujh dsl Msfley baVjpsat (3) Extended Bit Case Decimal Interchange
dksM Code
(5) fn, x, fodYiks esa ls dksbZ ugha (4) Extended Binary Case Decimal Inter-
167. fdl usVodZ esa LAN vkSj MAN nksuksa ekStwn change Code
gksrs gS\ (5) None of these given as options
(1) dSu (CAN) (2) osyu (WALN) 167. In which network are both LAN and MAN
(3) lSu (SAN) (4) oSu (WAN) present.
(5) VSu (TAN) (1) CAN (2) WLAN
168. ykWfxu use vkSj ikloMZ ds lR;kiu ds :i esa (3) SAN (4) WAN
tkuk tkrk gS\ (5) TAN
(1) dkWufQxfjax (2) ,DlslfcyhVh 168. Verification of login name and password is
(3) vFkufVds'ku (4) ykWfxax known as
(5) lfVZfQds'ku (1) Configuring (2) Accessibility
169. LykbM ds inkuqØe esa 'kh"kZ LykbM tks ikWoj (3) Authentication
IokbaV esa ,d izLrqfr ds fo"k; vkSj LykbM (4) Logging (5) Certification
169. Top slide in a hierarchy of slides that stores
ysvkmV ds ckjs esa lwpuk laxzfgr djrk gS\ information about the theme and slide lay-
(1) LykbM 'ks;j (2) izstsVsa'ku LykbM outs of a presentation in Powerpoint is.
(3) LykbM ekLVj (4) ysvkmV LykbM (1) Slide Share (2) Prsentation Slide
(5) ikoj LykbM (3) Slide Master (4) Layout Slide
170. fdlh Hkh dEI;wVj flLVe dk efLr"d (Brain) (5) Power Slide
gksrk gS\ 170. The brain of any computer system is
(1) ,,y;w (AKU) (2) eseksjh (1) ALU (2) Memory
(3) lhih;w (CPU) (4) dUVªksy ;wfuV (3) CPU (4) Control Unit
(5) jSe (RAM) (5) RAM
171. pqacdh; fMLd dh laxzg.k {kerk fuHkZj djrh 171. Storage capacity of magnetic disk depends
gS\ on?
(1) lrg ds izfr bap VªSd (1) Tracks per inch of surface
(2) fiDl ds fcV~l izfr bap (2) Bits per inch of tracks
(3) fMLd lrg esa fMLd iSd (3) Disk pack in disk surface
(4) nksuksa 1 vkSj 2 (4) Both 1 and 2
(5) All of the above given as options
(5) mi;qZDr lHkh fn, x, fodYi ds :i esa gS
172. The two kinds of main memory are?
172. nks izdkj dh izeq[k eseksjh gksrh gS\ (1) Primary and secondary
(1) izkFkfed vkSj f}rh;d (2) Random and sequential
(2) ;kn`fPNd vkSj vuqØfed (3) ROM and RAM
(3) jkse vkSj jSe (4) rkfdZd vkSj vuqØfed (4) Logical and Sequential
(5) mi;qZDr lHkh (5) All of above
173. fuEufyf[kr esa ls dkSu lk vkWCtsDVvksfj,aVsM 173. Which of the following is not an object ori-
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [25]

Telegram @BankingGK
Telegram @BankingGK

Hkk"kk ugha gS\ ented language?


(1) ikLdy (2) tkok (1) PASCAL (2) Java
(3) ikbFku (4) lh ++ (C++) (3) Python (4) C++
(5) fotqvy csfld (5) Visual Basic
174. '0' vkSj '1' dks dwV ds :i esa tkuk tkrk gS\ 174. The codes in the form of '0' and '1' are known
(1) mPp Lrj ds dwV as?
(2) e'khu Hkk"kk dwV (1) High level codes
(3) ,lsacyh dwV (4) baVjizsVj dwV (2) Machine language codes
(5) buesa ls dksbZ ugha (3) Assembly codes
175. ,d LVksjt s ,fj;k dk iz;ksx MsVk dks LVksj djus (4) Interpreter codes
ds fy, fd;k tkrk gS] ftlls xfr esa varj ds (5) None of these
175. A storage area used to store data to a Com-
fy, {kfriwfrZ gks ldrh gS ftl ij vyx&vyx
pensate for the difference in speed at which
bdkbZ;kWa MsVk laHkky ldrh gSA the different units can handle data is.
(1) eseksjh (2) cQj
(1) Memory (2) Buffer
(3) ØS'k (3) ,D;weqysVj
(3) Cache
(5) ,Mªl s (4) Accumulator (5) Address
176. ekbØkslkW¶V foaMkst esa =qfV jksd (Stop Error) 176. Stop error in Microsoft Windows shown by?
fdlds }kjk iznf'kZr fd;k x;k gS\ (1) Red Screen with Green text
(1) jsM LØhu ds lkFk xzhu VsDLV (2) Blue Screen with White text
(2) Cyw LØhu ds lkFk OgkbV VsDLV (3) Red Screen with White text
(3) jsM LØhu ds lkFk OgkbV VsDLV (4) Green Screen with Red text
(4) xzhu LØhu ds lkFk jsM VsDLV (5) Blue Screen with Red text
(5) Cyw LØhu ds lkFk jsM VsDLV 177. A computer program that converts assem-
177. dEI;wVj Hkk"kk tks fd vlsacyh Hkk"kk dks e'khuh bly language to machine language is
Hkk"kk esa ifjofrZr djrk gS\ (1) Compiler (2) Interpreter
(1) ladyd (2) nqHkkf"k;k (3) Assembler (4) Comparator
(3) vlsc a yj (4) rqyukdkjh (5) Converter
(5) duoVZj 178. What does HTTP stand for?
178. ,pVhVhih (HTTP) dk 'kCn la{ksi D;k gS\ (1) Head Tail Transfer Protocol
(1) gsM Vsy VªkalQj izksVksdkWy (2) Hypertext Transfer Protocol
(2) gkbijVsDLV VªkalQj izksVksdkWy (3) Hypertext Transfer Plotter
(3) gkbijVsDLV VªkalQj IykWVj (4) Hypertext Transfer Plot
(4) gkbijVsDLV VªkalQj IykWV (5) Hypertext Transcription Porgram
(5) gkbijVsDLV Vªkl a fØI'ku izkx s zke 179. Which of the following will not be consid-
ered as a form of secondary storage?
179. fuEu esa ls dkSu lk f}rh;d laxzg.k dk ,d
(1) Seminconductor memory
:i ugha ekuk tk,xk\
(2) Magnetic disks (3) Magnetic drums
(1) lsehdaMDVj eseksjh
(4) Magnetic tapes
(2) pqca dh; fMLd (3) pqacdh; Mªe (5) None of the above
(4) pqacdh; VsIl (5) mi;qZDr esa ls dksbZ ugha 180. Which keyboard shortcut should be
180. dkSu&lk dqathiVy 'kkWVZdV ,d MkWD;weaVs ds pressed to move to the bottom of a docu-
fupys Hkkx esa tkus ds fy, nck;k tkrk gS\ ment?
(1) Insert Key (2) Home Key (1) Insert key (2) Home key
(3) Ctrl + End Key (3) Ctrl + End key
(4) Ctrl +Shift+ Alt+ page Down (4) Ctrl Shift Alt Page Down
[26] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(5) End Key (5) End key


181. ,lD;wvy (SQL) 'kCn la{ksi gksrk gS\ 181. SQL stands for?
(1) LVªDpMZ Dosjh ySaXost (1) Structured Query Language
(2) flLVe Dosjh ySaXost (2) System Query Language
(3) flLVe Dosjh ySaXost (3) System Query Language
(4) LVªDpMZ Dosjh ySaXost (4) Strucword Query Language
(5) lsdsafVvy Dosjh ySaXost (5) Sequential Query Language
182. ge ,Dlsy esa lsy Js.kh A8 ls A88 rd dSls 182. How can we specify cell range A8 to A88 in
fufnZ"V dj ldrs gS\ Excel?
(1) A8 = A88 (2) A8–A88 (1) A8=A88 (2) A8-A88
(3) A8 : A88 (4) A8 + A88 (3) A8:A88 (4) A8+A88
(5) A8, A88 (5) A8, A88
183. fuEufyf[kr esa dkSu lk dEI;wVj esa ,d NksVk 183. Which of the following is a small program
in computers that provides an addition to
lk izksxzke gS tks vkWijsfVax flLVe }kjk iznku
the capabilities provided by the operating
dh tkus okyh {kerkvksa dks tksM+rk gS\
system?
(1) iSp (2) ;wVhfyVh
(1) Patch (2) Utility
(3) ,DlVs'a ku (4) dsxu s ~ (3) Extension (4) Keygen
(5) ØSd (5) Crack
184. ,d dEI;wVj ^^cwV^^ ugha dj ldrk vxj blds 184. A computer Cannot Boot if it does not have
ikl ugha gS\ the?
(1) ladyd (2) yksMj (1) Compiler (2) Loader
(3) vkWijsfVax flLVe (3) Operating System
(4) vlsc a yj (5) dusZy (4) Assembler (5) Kernel
185. ;wih,l (UPS) dk 'kfCnd la{ksi gS 185. UPS stands for?
(1) ;wukbVsM ikoj lkWY;w'kal (1) United Power Solutions
(2) vubVjZIVsM ikoj lIykbZ (2) Uninterrupted Power Supply
(3) vubaVjZIVsM ikoj lkWY;w'kal (3) Uninterrupted Power Solution
(4) ;wuhQkeZ ikoj lIykbZ (4) Uniform Power Supply
(5) buesa ls dksbZ ugha (5) None of these
186 ,d fizaVj bl izdkj dk fMokbl gksrk gS\ 186. A printer is this kind of device?
(1) buiqV (2) oMZ izkl s fs lax (1) Input (2) Word processing
(3) izkl
s fs lax (4) vkmViqV (3) Processing (4) Output
(5) LizMs 'khV (5) Spreadsheet
187. dEI;wVj esa j[kh xbZ lwpuk dks dgk tkrk gS\ 187. The information you put into the computer
(1) QSDV~l (2) MkVk is called ______.
(3) Qkbysa (4) funsZf'kdk (1) Facts (2) Data
(5) buesa ls dksbZ ugha (3) Files (4) Directory
(5) None of these
188. Qkby fjdkWMZ dks le; le; ij tksMu+ k] cnyuk
188. Periodically adding, changing and deleting
vkSj gVkus dks ______ Qkby dgrs gSA file records is called file.
(1) viMsfVax (2) vixzfs Max
(1) Updating (2) Upgrading
(3) fjLVªDpfjax (4) 'kQfyax (3) Restruturing (4) Shuffling
(5) jsusfoax (5) Renewing
189. A(n) ______ izksxzke osc lalk/kuksa rd igqWap 189. A(n) ____ program provides access to Web
iznku djrk gSA resources.
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [27]

Telegram @BankingGK
Telegram @BankingGK

(1) osc (2) vkbZ,lih (ISP) (1) Web (2) ISP


(3) czkmtj (4) ;wvkj,y (URL) (3) Browser (4) URL
(5) ,pVh,e,y (HTML) (5) HTML
190. fdlh ekStwnk Qkby dks u, uke ds lkFk ;k 190. To save an existing file with a new name or
fdlh u, LFkku ij lgstus ds fy, _______ to a new location, you should use ______
dekaM dk dk mi;ksx djuk pkfg,A command.
(1) lso (2) ,DliksVZ (1) Save (2) Export
(3) lso vkSj fjIysl (3) Save & Replace
(4) dkWih Vw n DyhicksMZ (4) Copy to the clipboard
(5) lso ,t (5) Save as
[IBPS Bank PO/MT CWE Online Exam 2015] [IBPS Bank PO/MT CWE Online Exam 2015]

191. ckbujh ySUxq,t esa vYQkcsV dk izR;sd ysVj 191. In binary language each letter of the alpha-
vkSj izR;sd Lis'ky dSjsDVj ____ ds vlk/kkj.k bet, and each special character are made up
(;wuhd) la;kstu dk cuk gksrk gSA of a unique combination of _____.
(1) 8 djSDVlZ (2) 8 ckbV~l (1) Eight characters
(3) 8 fdyksckbV~l (4) 2 fdyksckbV~l (2) Eight bytes (3) Eight kilobytes
(5) 8 fcV~l (4) Two kilobytes (5) Eight bits
192. vkWfIVdy fMLd esa MkVk fjVªho djus vkSj fjdkWMZ 192. A beam of light used to record and retrieve
djus ds fy, iz;ksx dh tkus okyh izdk'k dh data on optical disk is known as _____.
fdj.k dgykrh gS\ (1) Polarized light (2) Coloured light
(1) iksysjkbTM ykbV (2) dyMZ ykbV (3) Unpolarized Concentric Light
(3) vuiksysjkbTM dkWUlsfUVªd ykbV (4) Laser (5) Electric light
(4) ystj (5) bysfDVªd ykbV 193. The brain of any computer system is ____.
193. ;g fdlh Hkh dEI;wVj flLVe dk czus ¼efLr"d½ (1) ALU (2) CPU
(3) Keyboard (4) Monitor
dgykrk gS\
(5) Control Unit
(1) ,,y;w (2) lhih;w
194. A file name mydocument.docx would have
(3) dhcksMZ (4) ekWfuVj
been created in.
(5) daVªksy ;wwfuV
(1) MS Word (2) MS Outlook
194. Mydocument.docx uked Qkby &&& esa
(3) MS Excel (4) Word Perfect
fØ,V gksxhA (5) MS Power Point
(1) MS Word (2) MS Outlook
195. What is the meaning of bandwidth in net-
(3) MS Excel (4) Word Perfect
work?
(5) MS Power Point
(1) Network architecture
195. cSaMfoM~Fk bu usVodZ dk D;k vFkZ gSA (2) Width of the transmission cable
(1) usVodZ vkfdZVDs pj (3) Connected computers in network
(2) VªkUlfe'ku dscy (4) Class of IP used in network
(3) dEI;wVj dks usVodZ ls dusDV djuk (5) Transmission capacity of a communica-
(4) usVodZ esa Js"B vkbZih ;wt dh tkrh gSA tion
(5) dE;wfuds'ku dh VªkUlfe'ku dSisflVh 196. The largest unit of storage among the fol-
196. fuEufyf[kr esa LVksjst dh lcls cM+h ;wfuV gSA lowing is ______.
(1) ckbV (2) fdyksckbV (1) Byte (2) Kilobyte
(3) VsjkckbV (4) xhxkckbV (3) Terabyte (4) Gigabyte
(5) esxkckbV (5) Megabyte
197. dEI;wVj usVodZ esa Qk;jokWy D;k gS\ 197. What is the firewall in computer network?
(1) usVodZ dh fQftdy ckmaMªh (1) The physical boundary of network
[28] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(2) ,d osc czkmftax lkW¶Vos;j (2) A web browsing software


(3) dEI;wVj usVodZ dk ,d vkWijsfVax flLVe (3) An operating system of computer net-
(4) ,d vfHkdfYir (fMtkbUM) flLVe work
(5) buesa ls dksbZ ugha (4) A system designed to increase the band-
198. fuEufyf[kr esa ls dkSu buiqV fMokbl ugha gS\ width
(1) VpiSM (2) dhcksMZ (5) None of these
(3) ykbV isu (4) ekml 198. Which of the following is not an input
device?
(5) ohMh;w
(1) Touchpad (2) Key board
199. VsDlV CykWd ewo djusa dh vko';drk gksusa ij (3) Light pen (4) Mouse
vki dkSu&lk dk;Z fu"ikfnr djsxsa\ (5) VDU
(1) isLV vkSj fMyhV 199. Which operation you will perform if you need
(2) isLV vkSj dV (3) dV vkSj dkWih to move a block of text?
(4) dkWih vkSj isLV (5) dV vkSj isLV (1) Paste and Delete
200. CRM 'kCn dk vFkZ gS\ (2) Paste and Cut
(1) dLVej fjdkWfXu'ku eSustesaV (3) Cut and Copy
(2) dLVelZ fjysfVo ehV (4) Copy and Paste
(3) dLVej fjys'kuf'ki eSustesaV (5) Cut and Paste
(4) pSuy :V ekdsZV 200. The term CRM means _______.
(5) dLVej fjVsU'ku eSustj (1) Customer Recognition Management
201. (2) Customers Relative Meet
baVkª usV ;k ,DlVªkusV ls tqMs+ gq, izR;sd dEI;wVj
dk ,d vyx gksuk pkfg,A (3)Customer Relationship Management
(1) Qk;jokWy (2) czkaM use (4) Channel Root Market
(3) izkWDlh loZj (4) Mksesu use (5) Customer Retention Manager
201. Every computer connected to an intranet or
(5) vkbZ ih vMªal s
extranet must have a distinct.
202. flLVe dks ^fMcx^ djus dk vFkZ gS\ (1) Firewall (2) Brand name
(1) lgh gkMZos;j dk irk yxkuk
(3) Proxy server (4) Domain name
(2) lgh flLVe dk irk yxkuk vkSj baLVkWy (5) IP address
djuk 202. To 'Debug' the system means?
(3) flLVe esa ,jlZ dk irk yxkuk vkSj mls (1) Find the correct hardware
lgh djuk (2) Find and install correct system
(4) vkWijsfVax flLVe baLVkWy djuk (3) Find and correct errors in system
(5) lgh lkW¶Vos;j dk irk yxkuk (4) To install the operating system
203. fuEufyf[kr esa ls dkSu dEI;wVj izkxs kz feax ySUxq,t
(5) Find correct software
ugha gS\ 203. Which one of the following is NOT a com-
(1) C + + (2) COBOL puter programming langauge?
(3) BASIC (4) Java (1) C + + (2) COBOL
(5) Ms-Excel (3) BASIC (4) Java
204. dEI;wVjksa esa iz;ksx dh tkus okyh IC fpi cuh (5) MS-Excel
gksrh gS\ 204. The IC chip, used in computers is made of
(1) dkWij dh (2) Øksfe;e dh _____.
(1) Copper (2) Chromium
(3) vk;ju vkWDlkbM dh
(3) Iron Oxide (4) Silicon
(4) flfydkWu dh (5) flfydk dh
(5) Silica
205. _______ ls rkRi;Z vukf/kd`r :i ls lkW¶Vos;j
205. ______ refers to the unnauthorised copy-
dh dkWih vkSj forj.k ls gSA ing and distribution of software.
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [29]

Telegram @BankingGK
Telegram @BankingGK

(1) Iysfx,fjTe (2) lkW¶Vos;j ikbjslh (1) Plagiarism (2) Software piracy
(3) ØSfdax (4) gSfdax (3) Cracking (4) Hacking
(5) lkW¶Vos;j fyVsjslh (5) Software literacy
206. ______ izkxs zke osc fjlkslZ dks ,Dlsl (access) 206. A ______ program provides access to Web
izksokbM djrk gSA resources.
(1) czkmtj (2) ISP (1) Browser (2) ISP
(3) URL (4) Web
(3) URL (4) osc
(5) Inker
(5) badj (inker)
207. In computer system, scanner is ______de-
207. dEI;wVj flLVe esa LdSuj ,d fMokbl gSA vice.
(1) dhcksMZ ds izdkj dk (1) Keyboard type
(2) ,DlVuZy eseksjh fMokbl dk (2) Extrernal memory device
(3) buiqV dk (4) fizUVj ds izdkj dk (3) Input (4) Printer type
(5) vkmViqV dk (5) Output
208. fuEufyf[kr esa ls dkSu usVofdZax fMokbl ugha 208. Which of the following is not a networking
gS device.
(1) fyuDl (2) Qk;jokWYl (1) Linux (2) Firewalls
(3) :VlZ (4) xsVost (3) Routers (4) Gateways
(5) fLoPl~ (5) Switches
209. ekWfuVlZ vkSj fizUVlZ tSls fMokbl tks dEI;wVj 209. Devices, such as monitors and printers, that
ls dusDVsM gksrs gSA are connected to the computer are called.
(1) isfjQsjy fMokbl (1) Peripheral devices
(2) Input devices (3) System devices
(2) buiqV fMokbl (3) flLVe fMokbl
(4) Attachment devices
(4) vVSpeSaV (5) izkl
s fs lax fMokbl (5) Processing devices
210. fdlh orZeku Qkby dks u;s uke ds lkFk ;k 210. To save an existing file with a new name or
u;s yksds'ku esa lso djusa ds fy, ;wtj dks to a new location, the user should
dekaM dk iz;ksx djuk pkfg,A use______command.
(1) U;w Qkby (2) lso ,t (1) New file (2) Save as
(3) dkWih (4) lso ,aM fjIysl (3) Copy (4) Save and replace
(5) lso (5) Save
[IBPS Bank PO/MT CWE Online Exam 2015] [IBPS Bank PO/MT CWE Online Exam 2015]

211. CPU esa 'P' fdldk izrhd gSA 211. What does P stand for in CPU?
(1) izkl
s fs lax (2) izkx
s kz e (1) Processing (2) Program
(3) ikWVyZ (4) ikWoj (3) Portal (4) Power
(5) izkbejh (5) Primary
212. VIRUS ls D;k rkRi;Z gS\ 212. What does VIRUS stand for?
(1) okbVy bUQkWesZ'ku fjlkslsZt vaMj lht (1) Vital Information Resources Under Seize
(2) fofM;ks bUQkWeZ's ku fjtksY;w'ku vaMj lht (2) Video Information Resolution Under
Siege
(3) fotqvy buiqV fjLVksj's ku vaMj LiSe
(3) Visual Input Restoration Under Spam
(4) okbVy buiqV fjlkslsZt vaMj lht
(4) Vital Input Resources Under Siege
(5) buesa ls dksbZ ughaa
(5) None of these
213. fuEufyf[kr esa dkSu ,e,l vkWfQl dk otZu 213. Which of the following is not a version of
ugha gS\ MS Office?
[30] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) MS–2000 (2) MS–2003 (1) MS–2000 (2) MS–2003


(3) MS–Vista (4) MS–2007 (3) MS–Vista (4) MS–2007
(5) MS–2010 (5) MS–2010
214. lkW¶Vos;j dksM esa ,jlZ dk irk yxkus dh 214. ____ is the process to find errors in soft-
izfØ;k _____ dgykrh gSA ware code.
(1) fMcfxax (2) dEikbfyax (1) Debugging (2) Compiling
(3) VsfLVax (4) izkx
s zkfeax (3) Testing (4) Programming
(5) baVjizfs Vax (5) Interpreting
215. og usVodZ ftldk iz;ksx fdlh fcfYMax esa 215. In a building the network through which
LAN dEI;wVjksa dks ,d&nwljs ls dusDV djus computers are connected to each other
ds fy, fd;k tkrk gS] ____ dgykrk gSA through LAN is called
(1) baVjusV (2) baVªkusV (1) Internet (2) Intranet
(3) ,DlVªkusV (4) lSVsykbV usV (3) Extranet (4) Satellite net
(5) buesa ls dksbZ ugha (5) None of these
216. og lkW¶Vos;j ,fIyds'ku ftldk iz;ksx oYMZ 216. A software application for retrieving present-
okbM osc ij lwpuk izLrqr djus] izkIr djus ing and traversing information resources on
vkSj ns[kus ds fy, fd;k tkrk gS] dgk tkrk gSA the World Wide Web is known as
(1) lpZ batu (2) czkmtj (1) Search Engine (2) Browser
(3) bZ&esy (4) osclkbV (3) Email (4) Website
(5) gkbijfyad (5) Hyperlink
217. ______ ,d izkx s kz e gS tks dEI;wVj ds iz;ksx dks 217. A(n) ____ is a program that makes the com-
vklku cukrk gSA puter easier to use.
(1) ,fIyds'ku (2) ;wfVfyVh (1) Application (2) Utility
(3) usVodZ (4) vkWijsfVax flLVe (3) Network (4) Operating system
(5) izkx
s zkfeax (5) Programming
218. How many generations of computers are
218. dEI;wVjksa dh fdruh ihf<+;kWa (tujs'kal) gS\
there?
(1) 2 (2) 3
(1) 2 (2) 3
(3) 4 (4) 5
(3) 4 (4) 5
(5) 6
(5) 6
219. ASCII ls rkRi;Z gSA
219. ASCII stands for?
(1) American Standard Code for Information
(1) American Standard Code for Information
Interchange
Interchange
(2) American Stable Code for International
(2) American Stable Code for International
Interchange
Interchange
(3) American Standard Code for Institutional
(3) American Standard Code for Institutional
Interchange Interchange
(4) American Standard Code for Interchange (4) American Standard Code for Interchange
Information Information
(5) None of these (5) None of these
220. gkbZ ysoy ySX;q,t esa fy[kk x;k izkx s kz e dgykrk 220. A program written in high level language is
gS\ referred to as?
(1) lkslZ dksM (2) vkWCtsDV dksM (1) Source Code (2) Object Code
(3) e'khu dksM (4) vlsEcyh dksM (3) Machine Code(4) Assembly Code
(5) buesa ls dksbZ ugha (5) None of these
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [31]

Telegram @BankingGK
Telegram @BankingGK

221. lkWQVos;j dk izkFkfed mns'; MkVk dks _____ 221. The primary purpose of software is to turn
esa ifjofrZr djuk gSA data into_____.
(1) osclkbVl (2) bUQkesZ'ku (1) Websites (2) Information
(3) izkx
s kEl (4) vkWCtsDV~l (3) Programs (4) Objects
(5) buesa ls dksbZ ugha (5) None of these
222. Qykih fMLd ,d ______ gSA 222. Floppy Disk is ______.
(1) ,d Mªkbo (2) LFkk;h eseksjh (1) A drive (2) Permanent memory
(3) vLFkk;h esekjh (4) dSp eseksjh (3) Temporary memory
(5) buesa ls dksbZ ugha (4) Cache memory
223. dEI;wVj esa dlZj fdl LFkku ij ^gkFk^ (gSaM) ds (5) None of these
:i esa fn[kkbZ nsrk gS\ 223. At which place is cursor seen as a 'hand' in
(1) VkLdckj ij a computer?
(2) tgkWa u;k 'kCn bUlVZ fd;k tkuk gS (1) On Taskbar
(3) gkbijfyad (4) LØhu ij (2) Where a new letter is to be inserted
(5) buesa ls dksbZ ugha (3) Hyperlink (4) On screen
224. oMZ MkWD;qeVsa ds varxZr xyfr;ksa dks vius vki (5) None of these
Bhd djus okyk QaD'ku dgykrk gS\ 224. In Word documents, the automatic correc-
(1) thvkjbZih (GREP)
tion of errors is known as?
(2) Lisy psd (3) vkWVksdjsDV
(1) GREP (2) Spell Check
(4) lpZ ,aM QkbaM
(3) Autocorrect (4) Search and Find
(5) fjIysl
(5) Replace
225. lkekU;r% dEI;wVj izksxzke fdl dksM ySaX;q,t
225. A computer program is generally written in
esa fy[kk tkrk gS\
which code language?
(1) ckbujh (2) Mslhey
(3) vkWDVy (4) gsDlkxksuy (1) Binary (2) Decimal
(5) buesa ls dksbZ ugha (3) Octal (4) Hexagonal
226. dEI;wVj esa izkslsflax odZ fd;k tkrk gS\ (5) None of these
(1) ,,y;w ds }kjk 226. In a computer, processing work is done by?
(2) jftLVj ds }kjk (1) ALU (2) Register
(3) dkWEikbylZ ds }kjk (3) Compilers
(4) lhih;w ds }kjk (4) CPU
(5) buesa ls dksbZ ugha (5) None of these
227. VSc dh (Tab Key) dk iz;ksx fd;k tkrk gS\ 227. Tab key is used for?
(1) ykbu esa Åij tkus ds fy, (1) To go upward in a line
(2) ykbu esa uhps tkus ds fy, (2) To go downward in a line
(3) ykbu ds ck;ha vksj tkus ds fy, (3) To go leftward of the line
(4) ykbu ds nk;ha vksj tkus ds fy, (4) To go rightward of the line
(5) gkf'k;s ls gV dj ykbu vkjaHk djus ds fy, (5) To indent a line
228. tc ,d u, MkWD;weVSa dk fuekZ.k fd;k tkrk gS] 228. When a new document is created, it is kept
rks bls j[kk tkrk gS\ as/in
(1) QksYMj (2) Vscy (1) Folder (2) Table
(3) Qkby (4) fjdkWMZ (3) File (4) Record
(5) Mk;jsDVªh (5) Directory
229. fuEufyf[kr esa ls fdl ok;jl dks fjewo ugha 229. In which of the following VIRUS cannot be
fd;k tk ldrk\ removed?
[32] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) baVjusV (2) baVªkusV (1) Internet (2) Interanet


(3) ilZuy dEI;wVj (3) Personal Computer
(4) lhMh (5) mi;qDr lHkh (4) CD (5) All of the above
230. th;wvkbZ (GUI) ls D;k rkRi;Z gS\ 230. What does GUI stand for?
(1) xzkfQDl ;wtj baVj,D'ku (1) Graphis User Interaction
(2) xzkfQdy ;wtj baVjQsl (2) Graphical User Interface
(3) xzkfQDl ;qtqvy baVjQsl (3) Graphics Usual Interface
(4) xzkfQdy ;wfVfyVh baVjQsl (4) Graphical Utility Interface
(5) buesa ls dksbZ ugha (5) None of these
[IBPS Bank PO/MT CWE Online Exam 2015] [IBPS Bank PO/MT CWE Online Exam 2015]

231. _____ ds fy, usVodZ esa fLop dk iz;ksx fd;k 231. A switch in a network is used to
tkrk gSA (1) connect systems on network
(1) usVodZ ij flLVe dks dusDV djus ds fy, (2) stop hacking
(2) gSfdax jksdus ds fy, (3) stop viruses
(3) ok;jl jksdus ds fy, (4) boot systems remotely
(4) nwjorhZ flLVe dks cwV djus ds fy, (5) connect to multiple computers
(5) vusd dEI;wVjksa dks dusDV djus ds fy, 232. MAC in computer stands for?
232. dEI;wVj ds {ks= esa ^,e,lh^ ls rkRi;Z gS\ (1) Media Access Control
(1) ehfM;k ,Dlsl daVªksy (2) Media Available Control
(2) ehfM;k vosyscy daVªksy (3) Maximum Access Control
(3) eSfDlee ,Dlsl daVªksy (4) Maximum Available Control
(4) eSfDlee vosyscy daVªksy (5) Minimum Access Control
(5) fefuee ,Dlsl daVªksy 233. What do you mean by motherboard?
233. enjcksMZ ls vkidk D;k rkRi;Z gS\ (1) Scanner and other things are part of
(1) LdSuj vkSj vU; oLrq,Wa enjcksMZ ds varxZr motherboard
vkrh gS (2) Keyboard otherwise known as
(2) dhcksMZ dks enjcksMZ ds :i esa Hkh tkuk tkrk motherboard
gS (3) A circuit board which connects all the
(3) ;g ,d lfdZV cksMZ gS ftlesa lHkh byseV as ~l elements
dusDV gksrs gS (4) It is a type of file server
(4) ;g ,d izdkj dk Qkby loZj gS (5) It is a software
(5) ;g ,d lkW¶Vos;j gS 234. LSI in chip technology stands for
234. fpi VsDuksykWth esa ,y,lvkbZ dk iw.kZ :i gS\ (1) Large–scale integration
(1) yktZ&Ldsy bafVxzs'ku (2) Low–scale integration
(2) yks&Ldsy bafVxzs'ku (3) Local–scale integration
(3) yksdy&Ldsy bafVxzs'ku (4) Low–scale Internet
(4) yks&Ldsy baVjusV (5) Large–Scale Internet
(5) yktZ&Ldsy baVjusV 235. HTTP stands for?
235. ,pVhVhih ls rkRi;Z gS\ (1) Hyper Text Transmission Protocol
(1) gkbij VsDLV Vªkalfe'ku izksVksdkWy (2) Hyper Text Transfer Protocol
(2) gkbij VsDLV VªkalQj izksVksdkWy (3) Hyper Text Transfer Program
(3) gkbij VsDLV VªkalQj izksxzke (4) Hyper Text Transmission Program
(4) gkbij VsDLV Vªkalfe'ku izksxzke (5) High Text Transfer Protocol
(5) gkbZ VsDLV VªkalQj izksVksdkWy 236. Files that are included with an email mes-
236. bZey
s eSlts okyh Qkbyksa dks izk;% ____ ds :i
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [33]

Telegram @BankingGK
Telegram @BankingGK

esa fufnZ"V fd;k tkrk gSA sage are often referred to as.
(1) loZj lkbM (2) vVSpesaV~l (1) Server side includes
(3) dwdht (4) tkok fLØIV (2) Attachments (3) Cookies
(5) LiSe (4) Javascript (5) Spam
237. djsVa izt
s Us Vs'ku esa fdl 'kkWVZdV dh ds }kjk U;w 237. In current presentation which short cut key
LykbM bUlVZ gksxh\ inserts a new slide.
(1) Ctrl + N (2) Ctrl + M (1) Ctrl + N
(3) Ctrl + V (4) Ctrl + Y (2) Ctrl + M
(5) Ctrl + Z (3) Ctrl + V
238. lksi (SOAP) ,d eSlsftax izksVksdkWy gS tks (4) Ctrl + Y
dE;wfudsV djus ds fy, gkbij VsDLV Vªkl a Qj (5) Ctrl + Z
izksVksdkWy (,pVhVhih) vkSj blds ,DlVsfUlcy 238. SOAP is a messaging protocol that allows
ekdZvi ySUxq,t (,Dl,e,y) dk iz;ksx djrs programs that run on disparate operating
gq, izkxs zkeksa dks fMLisjsV vkWijsfVax flLVe (tSls systems (such as Windows and Linux) to
foaMkst vkSj ykbuDl) ij ju djus dh vuqefr communicate using Hypertext Transfer Pro-
nsrk gSA SOAP dk foLrkfjr :i D;k gS\ tocol (HTTP) and its Extensible Markup Lan-
(1) flEiy vksfj,aV's ku ,Dlsl izkV s ksdkWy guage (XML). What does SOAP stands for?
(2) flEiy vksfj,aVs'ku ,fIyds'ku izksVksdkWy
(1) Simple Orientation Access Protocol
(3) flEiy vkWCtsDV ,Dlsl izksVksdkWy
(2) Simple Orientation Application Protocol
(4) flEiy vkWCtsDV ,fIyds'ku izksVksdkWy
(3) Simple Object Access Protocol
(5) flEiy vkWijsfVax ,Dlsl izksVksdkWy
(4) Simple Object Application Protocol
239. fuEufyf[kr esa ls dkSu lk lkW¶Vos;j gkMZos;j
(5) Simple Operating Access Protocol
ds lkFk baVj,DV djrk gS\
239. Which of the following software interfacts
(1) ,fIyds'ku lkW¶Vos;j
(2) ;wfVfyVh izkx s zke with the hardware?
(3) flLVe lkW¶Vos;j (4) baVjizsVj (1) Application software
(5) dEikbyj (2) Utility program
240. bysDVªkWfud esy@eSlst flLVe (bZ,e,e,l) (3) System software
______ ds leku gS ;k JS"B :i esa buds (4) Interpreter (5) Complier
vuqdwy gSA 240. Electronic Mail/Message System (EMMS)
(1) iksLVy lfoZl (2) VsyhQksu lfoZl is similar or best suits to
(3) VsyhxzkQ lfoZl (1) Postal Service (2) Telephone service
(4) eksckby Qksu lfoZl (3) Telegraph Service
(5) fn, x, fodYiks ds vykok (4) Mobile Phone Service
241. ekbØkslkW¶V ,Dlsy ,d _______ (5) Other than those given as options
(1) Qkbusf'k;y Iykfuax iSdst gS 241. Microsoft Excel is a
(2) bysDVªkWfud LizsM'khV gS (1) Financial planning package
(3) xzkfQDl iSdst gS (2) Electronic spreadsheet
(4) MkVkcsl eSustesaV iSdst gS (3) Graphics package
(5) ,e,l vkWfQl iSdst gS (4) Database management package
242. ______ og usVodZ gS tks fMLVªhC;wVsM MkVk (5) MS Office package
izkslsflax dfUQX;qj's ku izLrqr djrk gs ftlds 242. Distributed data processing configuration
varxZr lHkh xfrfof/k;kWa dsUnzh; dEI;wVj ls where all activities passes through a cen-
gksdj xqtjrh gSA trally located computer is
(1) fjax usVodZ (2) LikbMj usVodZ (1) ring network
[34] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(3) gk;fjaZdy usVodZ (4) MkVk daVªksy usVodZ


(2) spider network
(5) cl usVodZ (3) hierarchical network
243. (4) data control network
MkVk dE;wfuds'kal] ftlesa VsyhxzkQ ykbusa
lfEefyr gS] ______ dk iz;ksx djrk gSA (5) bus network
243.
(1) flEIysDl ykbuksa (2) okbMcSaM pSuy Data communications involveing telegraph
(3) uSjkscSaM pSuYl (4) Mk;YM lfoZl lines uses.
(1) simplex lines (2) wideband channels
(5) fn, x, fodYiksa ds vykok
(3) narrowband channels
244. ,DlVsaMsM ,,llhvkbZvkbZ ______ (4) Dialled service
(1) dksfMax ds fy, 8 fcV~l dk iz;ksx djrk gS
(5) Other than those given as options
(2) dksfMax ds fy, 9 fcV~l dk iz;ksx djrk gS
244. Extended ASCII uses?
(3) dksfMax ds fy, 10 fcV~l dk iz;ksx djrk gS
(1) 8 bits for coding
(4) dksfMax ds fy, 7 fcV~l dk iz;ksx djrk gS
(2) 9 bits for coding
(5) dksfMax ds fy, 5 fcV~l dk iz;ksx djrk gS
(3) 10 bits for coding
245. ______ dkWap ;k IykfLVd ds NksVs /kkxksa ls
(4) 7 bits for coding
fufeZr MkVk Vªkl a fe'ku dk og ek/;e tks izdk'k
245. A data transmission medium made of tiny
threads of glass or plastic that can transmit
dh xfr ls dk;Z djrs gq, bUQkWeZ's ku dh vf/kd
ek=k dks VªkalfeV dj ldrk gSA huge amount of information at the speed of
(1) Qkbcj vkWfIVd dsfcy (2) dkWij dsfcy light is known as.
(3) V~foLVsM ok;j dsfcy (4) vuV~foLVsM (1) Fibre Optic Cable
ok;j dsfcy (2) Copper Cable
(3) Twisted Wire Cable
(5) dks&,fDlvy dsfcy
(4) Untwisted Wire Cable
246. og lkW¶Vos;j tks osc istkas ds }kjk gesa czkmt
(5) Co-axial Cable
dh vuqefr nsrk gS] _______ dgykrk gSA
246. The software that allows us to browse
(1) czkmtj (2) ,QVhih DykbaV through web pages is known as.
(3) vkWijsfVax flLVe (1) Browser (2) FTP Client
(4) esy DykbaV (5) eSlat s j (3) Operating System
247. fuEufyf[kr esa ls dkSu dEI;wVj fjlkslZ dks
(4) Mail Client
eSust djrk gS\ (5) Messenger
(1) ,,y;w (2) ch;w,l 247. Which one of the following manages the
(3) daVªksy ;wfuV (4) vkbZ@vks ;wfuV computer resources?
(5) vkWijsfVax flLVe (1) ALU (2) BUS
248. fuEufyf[kr esa ls dkSu vkidks izkx (3) Control
s zke ;k LØhu Unit (4) I/O Unit
dks NksM+us dh vuqefr nsrk gS\ (5) Operating System
(1) cwV (2) izkx 248.
s zke Which one of the following lets you leave a
(3) ,fDtV (4) VsDLV screen or a program?
(1) Boot (2) Programs
(5) yho
(3) Exit (4) Text
249. flEiy esy Vªkl a Qj izkVs ksdkWy (,l,eVhih) ____
(5) Leave
ds fy, mrjnk;h gSA 249. Simple Mail Transfer Protocol (SMTP) is
(1) bZ&esy lsaM djus responsible for.
(2) fdlh Hkh bZ&esy dks ,Dlsl djus (1) sending e mail (2) accessing any e-mail
(3) bZ&esy dks lsaV djus ds fy, rS;kj jgus
(3) where e-mails are ready to be sent
(4) bZ&esyksa ds vkus ds fy, (4) where e mails come
(5) fn, x, fodYiksa ds vykok (5) Other than those given as options
250. eSXusfVd fMLd ds VªSd ij MkVk dks ____ :i
250. The data on the tracks of a magnetic disk is
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [35]

Telegram @BankingGK
Telegram @BankingGK

esa fy[kk tkrk gSA written as.


(1) 'kwU; ;k ,d (2) vi ;k Mkmu (1) zero or one (2) up or down
(3) gkbZ ;k yks oksYVst (3) high or low voltage
(4) gkbZ ;k yks MkVk jsV (4) high or low data rate
(5) NksVs eSXusfVd LikWV~l (5) tiny magnetic spots
[IBPS Bank PO/MT CWE Online Exam 2015] [IBPS Bank PO/MT CWE Online Exam 2015]
251. fuEufyf[kr esa ls dkSu lk dFku lR; gS\ 251. Which of the following statements is cor-
(1) www.google.com ,d yksdfiz; lpZ batu rect?
osclkbV ,Mªsl gSA (1) www.google.com is the web site address
(2) www.google.com ,d dEI;wVj ok;jl gS to a popular search engine
(3) www.google.com ,d dEI;wVj daiuh dk (2) www.google.com is a computer virus
bZ esy ,Mªsl gSA (3) www.google.com is an email address to a
(4) www.google.com ml O;fDr dk uke gS
computer company
ftlus baVjusV dk vkfo"dkj fd;k Fkk
(4) www.google.com is the name of the per-
(5) fn, x, fodYiksa ds vykok
son who invented the internet
252. fuEufyf[kr esa ls dkSu&lk dFku lR; gS
(1) [email protected] ,d osclkbV (Url) (5) Other than those given as options
gS 252. Which of the following statements is cor-
(2) [email protected] ,d bZesy vMªsl gS rect?
(3) [email protected] ,d dEI;wVj use gS (1) [email protected] is a web site (url)
(4) [email protected] ,d jkscksV gS (2) [email protected] is an email address
(5) [email protected] ,d osc fcYMj gS (3) [email protected] is a computer
253. Qkbyksa dks VªS'k fcu esa LFkkukarfjr fd;k x;k name
vkSj ckn esa mu Qkbyksa dks VªS'k fcu ls fMyhV (4) [email protected] is a robot
dj [kkyh dj fn;k x;kA fMyhV Qkbyksa ds (5) [email protected] is a web builder
lanHkZ esa fuEufyf[kr esa ls dkSu lk dFku lR; 253. Files have been moved to the Trash Bin,
gS\ and the trash bin has been emptied. Which
(1) mUgsa izkIr ugha fd;k tk ldrk of the following is true of the deleted files?
(2) mUgsa lsysDV fd;k tk ldrk gS vkSj psat (1) They are no longer accessible
fd;k tk ldrk gS (2) They can be selected and changed
(3) os Qkbysa ykbV xzs 'ksM esa fn[kkbZ nsrh gS (3) They appear in light grey shade
(4) mu Qkbyksa dks fjVªho fd;k tk ldrk gS] (4) They can be retrieved, edited, and saved
,fMV fd;k tk ldrk gS vkSj ubZ yksds'ku esa in a new location
lso fd;k tk ldrk gS (5) They cannot be selected but can be
(5) mUgsa lsysDV ugha fd;k tk ldrk ysfdu
changed
psat fd;k tk ldrk gS
254. You have a spreadsheet under the name
254. vkids ikl ^^eSFkfjtYV~l^^ uke dh ,d LizM s 'khV
gSA vkius blesa dqN ifjorZu fd;k] vc vki "MathResults", You made changes to it and
vksfjftuy LizM s 'khV dh dkWih esuVsu djrs gq, want to save it while maintaining a copy of
bls lso djuk pkgrs gS vki D;k djsaxs\ the original spreadhseet, what do you do?
(1) vkbdu ij fDyd djsaxsA (1) Click the icon
(2) Qkby esuw esa ^^lso^^ ij fDyd djsaxAs (2) Click "Save" in the file menu
(3) Qkby esuw esa ^^lso ,t^^ ij fDyd djsaxs (3) Click "Save As" in the file menu
(4) 'kkWVZdV CTRL/S dk iz;ksx djsx a s (4) Used the shorcut CTRL/S
(5) 'kkWVZdV CTRL/V dk iz;ksx djsaxs (5) Use the shortcut CTRL/V
[36] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

255. ihMh,Q (PDF) dk iw.kZ :i D;k gS\ 255.


What is the full form of PDF?
(1) iksVsZcy MkWD;wesaV QkWesZV (1) Portable Document Format
(2) ijQkWeZc s y MkWD;wesaV QkWesZV (2) Performable Document Format
(3) iksVsZcy fMQkWeZM~ QkWesZV (3) Portable Deformed Format
(4) ijQkWeZc s y fMQkWeZM~ QkWeZVs (4) Performable Deformed Format
(5) iksVsZcy fMLVªhC;wVsM QkWesZV
(5) Portable Distributed Format
256. _____ dEI;wVj dks bl izdkj fu;af=r djrk gS
256.
ftlls dEI;wVj flLVe lqpk: :i ls dk;Z ____ controls the way in which the com-
djrk gS vkSj ,d fjlkslZ izksokbM djrk gSputer system functions and provides a
ftlds }kjk ;wtlZ dEI;wVj ds lkFk baVj,DVmeans by which users can interact with the
dj ldrs gSA computer.
(1) vkWijsfVax flLVe (1) Operating system
(2) enjcksMZ (3) IysVQkWeZ (2) Motherboard (3) Platform
(4) ,fIyds'ku lkW¶Vos;j (4) Application software
(5) dwdht (5) Cookies
257. loZlZ ,sls dEI;wVlZ gS tks ____ ls tqM+s vU;
257. Servers are computers that provide access
dEI;wVjksa dks ,Dlsl izksokbM djrs gSA to other computers connected to a.
(1) esuÝse (2) lqij dEI;wVj (1) Mainframe (2) Supercomputer
(3) usVodZ (4) DykbaV (3) Network (4) Client
(5) odZLVs'ku
(5) Workstation
258. ,d _____ yxHkx ,d fcfy;u ckbV~l ds258. A ______ is approximately one billion bytes.
leku gSA
(1) fcV (2) fdyksckbV (1) bit (2) kilobyte
(3) xhxkckbV (4) esxkckbV (3) gigabyte (4) megabyte
(5) ckbV (5) byte
259. 259. URL
laf{kIr 'kCn ^;wvkj,y^ dk foLrkfjr :i gS\ is an acronym for ___________.
(1) ;wfuQkWeZ fjlkslZ yksdsVj (1) Uniform Resource Locator
(2) ;wfuQkWeZ fjlkslZ fyad (2) Uniform Resource Link
(3) ;wfud fjlkslZ fyad (3) Unique Resource Link
(4) ;wfud fjlkslZ yksdsVj (4) Unique Resource Locator
(5) ;wfuolZy fjlkslZ yksd's ku (5) Universal Resource Location
260. _______ ds flok; fuEufyf[kr lHkh fj;y
260. All of the following are examples of real se-
flD;qfjVh vkSj izkboslh fjLd~l ds mnkgj.k gSA
curity and privacy risks except.
(1) gSdlZ (2) LiSe (1) Hackers (2) Spam
(3) ok;jl (4) vkbMsfa VVh Fks¶V
(3) Viruses (4) Identify theft
(5) fQf'kax
(5) Phishing
261. _____ funsZ'kks dk og lewg gS tks dEI;wVj dks
261. The set of instructions that tells the com-
crkrk gS fd mls D;k djuk pkfg,A
(1) lkW¶VdkWih (2) lkW¶Vos;j puter what to do is.
(3) gkMZo; s j (4) gkMZdkWih (1) Softcopy (2) Software
(5) fn, x, fodYiksa ds vykok (3) Hardware (4) Hardcopy
262. Doslpuksa ds fjLikWUl ;k vkbdu ij fDyd (5) Softcopy
262. The steps and tasks needed to process data,
djus ds ifj.kkeLo:i MkVk dks izkslsl djkus
ds fy, LVsIl vkSj VkLDl dh vko';drk gksrh
such as responses to questions or clicking
gS ftls ____ ds :i esa tkuk tkrk gSA an icon are called.
(1) baLVªD'kal (2) vkWijsfVax flLVe
(1) instructions (2) operating system
(3) ,fIyds'ku lkW¶Vos;j (3) application software
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [37]

Telegram @BankingGK
Telegram @BankingGK

(4) flLVe ;wfuV (5) ikVZ izksxzkfeax (4) system unit


263. fMyhV ;k MSeTs M Qkbyksa dks fØfeuy ds dEI;wVj (5) part programming
ls iqu% izkIr djus vkSj mls jhM djus dh {kerk 263. The ability to recover and read deleted or
yks buQkslZeVas Lisf'k,yVh dk ,d mnkgj.k gS damaged files from a criminals computer is
ftls ____ dgrs gSA an example of a law enforcement specialty
called.
(1) fleqy's ku (2) ,fues'ku
(1) simulation (2) animation
(3) jkscksfVDl (4) dEI;wVj Qksjfs UlDl
(3) robotics
(5) fØIVksxzkQh (4) computer forensics
264. MkVk dks lewg esa lfpr vkSj lalk/kfr djus dh (5) cryptography
izfØ;k ____ dgykrh gSA 264. Data that are accumulated and processed in
(1) xzqi izkls sflax (2) cSp izkls fs lax group are called ____.
(3) Vkbe 'ks;fjax (1) Group Processing
(4) izkl s l
s Iykfuax (2) Batch Processing
(5) fn, x, fodyiks ds vykok (3) Time Sharing
265. baVjusV ij Qkbyksa dks dEI;wVj ls vius dEI;wVj (4) Process Planning
esa VªkalQj djus dh izfØ;k ____ dgykrh gSA (5) Other than those given as options
(1) viyksfMax (2) QkWjokfMZx
a 265. The process of transferring files from a com-
(3) ,QVhih (4) MkmuyksfMax puter on the internet to your computer is
called.
(5) czkmftax
(1) Uploading (2) Forwarding
266. ^CyqVFw k^ VsDuksykWth ____ (3) FTP (4) Downloading
(1) lSVsykbV dE;wfuds'ku dh vuqefr nsrh gS (5) Browsing
(2) midj.kksa ds e/; ok;jysl dE;wfuds'ku 266. 'Bluetooth' technology allows.
dh vuqefr nsrh gS (1) satellite communication
(3) dsoy eksckby Qksuksa ij flaXuy Vªkl a fe'ku (2) wireless transmission on mobile phones
dh vuqefr nsrh gS only
(4) ySMykbu Qksu ls eksckby Qksu ij (3) signal transmission on mobile phones
dE;wfuds'ku dh vuqefr nsrh gS only
(5) eksckby Qksuksa ij MkVk ekSfMfQds'ku dh (4) landline phone to mobile phone commu-
vuqefr nsrh gS nication
267. ykWxbu use vkSj ikloMZ ds lR;kiu dh izfØ;k (5) data modification on mobile phones only
dgykrh gS\ 267. Verification of a login name and password is
known as.
(1) dfUQX;qj's ku (2) ,DlsflfcfyVh
(1) Configuration (2) Accessibility
(3) vkWFksZfVds'ku (4) ykWfxax bu
(3) Authentication
(5) buesa ls dksbZ ugha (4) Logging in
268. fuEufyf[kr esa ls dkSu ,d oSfyM vkbZih vMªl s (5) Other than those given as options
gS\ 268. Which of the following is a valid IP address?
(1) 192.168.111.1111 (1) 192.168.111.1111
(2) 192.168.1.1 (2) 192.168.1.1
(3) 192.168.900.1 (3) 192.168.900.1
(4) 192.900.168.1 (4) 192.900.168.1
(5) 192.111.111.900 (5) 192.111.111.900
269. _______ odZ'khV dh ekSfyd bdkbZ gS ftlds 269. The basic unit of a worksheet into which
}kjk ge ,Dlsy esa MkVk ,aVj djrs gSA you enter data in Excel is called a.
[38] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) lsy (2) Vscy (1) cell (2) table


(3) ckWDl (4) dkWye (3) box (4) column
(5) jkW (5) row
270. fMLd vkWijsfVax flLVe (DOS) ds lkFk dke
djus ds fy, fuEufyf[kr esa ls fdl buiqV 270. Disk operating system (DOS) was designed
fMokbl dks fMtkbu fd;k x;k Fkk\ to work with which of the following input
(1) ekml (2) dhcksMZ device?
(3) tkW;fLVd (4) ,DlckWDl (1) Mouse (2) Keyboard
(5) fizVa j (3) Jyostick (4) Xbox
[NABARD Assistant Manager Online Exam 15.05.2016]
(5) Printer
271. lsysDVsM VsDLV dks ,d LFkku ls nwljs LFkku [NABARD Assistant Manager Online Exam 15.05.2016]
ij ewo djus ds fy, vki fuEufyf[kr esa ls
fdl dekaM dk iz;ksx djsax\s 271. Which of the following commands would
(1) dV vkSj isLV (2) MªSx vkSj isLV you choose to move selected text from one
(3) fMyhV vkSj isLV place to another?
(4) dkWih vkSj isLV (1) Cut and paste (2) Drag and paste
(5) ewo vkSj isLV (3) Delete and paste
272. dEI;wVj ds {ks= esa MkVk eSustesaV esa MkVk (4) Copy and paste
vuqØe dk lgh vojksgh Øe gS\
(1) MkVkcsl & fjdkWMZ~l & QkbYl & ckbV~l (5) Move and paste
& QhYM~l & fcV 272. Descending order of data hierarchy in data
(2) MkVkcsl & Qkby & fjdkWMZ & QhYM~l management in computing is
& ckbVl & fcV (1) Database-records- files- bytes- fileds- bit
(3) MkVkcsl & fjdkWMZ & QhYM~l & Qkby & (2) Database- file- record- fields- byte- bit
ckbVl & fcV (3) Database- record- fields- file- bytes- bit
(4) MkVkcsl & QhYM~l & Qkby & fjdkWMZ &
(4) Database- fields- file- record- bit- bytes
fcV & ckbV~l
(5) MkVkcsl & Qkby & fjdkWMZ & QhYM~l & (5) Database- file- record- fileds- bit- bytes
fcV & ckbV~l 273. How to specify cell range from A9 to A99 in
273. ,Dlsy esa A9 ls A99 rd dh jsat esa fLFkr lsy Excel?
dks fdl izdkj fufnZ"V fd;k tkrk gS\ (1) (A9 to A99) (2) (A9 : A99)
(1) (A9 ls A99) (2) (A9 : A99) (3) (A9 - A99) (4) (A9 ; A99)
(3) (A9 - A99) (4) (A9 ; A99) (5) (A9, A99)
(5) (A9, A99)
274. s kz e tks vkWijsfVax 274.
dEI;wVj ds {ks= esa ,d NksVk izkx In computers, a small program that provides
flLVe }kjk miyC/k djkbZ xbZ dSifs cfyVht esa an addition to the capabilities provided by
o`f) djrk gS] _____ dgykrk gS\ the operating system is known as?
(1) ,DlVs'a ku (2) ;wfVfyVh (1) Extension (2) Utility
(3) fMokbl Mªkboj (4) usVodZ (3) Device driver (4) Network
(5) viMsV (5) Update
275. dEI;wVj ekbØksizkslslj ds :i esa jSe dk dkSu 275. What is the position of RAM that a com-
lk Hkkx jsxqyj jSe dh dh rqyuk esa vf/kd rsth puter in microprocessor can access more
ls MkVk ,Dlsl dj ldrk gS\ quickly than ti can access regular RAM?
(1) dSp (Cache) (2) izkl s l
s j (1) Cache (2) Processor
(3) eseksjh iwy (4) MkVk iwy (3) Memory Pool (4) Data Pool
(5) Processor Pool
(5) izkslslj iwy
276. The ability to perform 'what if?' analysis is
276. ^OgkV bQ^ ,ukfyfll dks fu"ikfnr djus dh
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [39]

Telegram @BankingGK
Telegram @BankingGK

;ksX;rk fdl lkW¶Vos;j dh eq[; fo'ks"krk gS\ key feature of which type of software?
(1) MsLdVkWi ifCyf'kax izksxkz e (1) Desktop publishing program
(2) LizM
s 'khV (3) izt
s Us Vs'ku (2) Spreadsheet
(4) oMZ izkls slj (5) bZ&esy izksxzke (3) Presentation
(4) Word processor
277. ,lD;w,y (SQL) dk foLrkfjr :i gS\
(5) E-mail program
(1) lseh Dos'pfuax ySUxq,t
277. SQL stands for ____.
(2) LVªDoMZ Dosjh ySUxq,t
(1) Semi quetioning language
(3) LVªDpMZ Dos'pu ySUxq,t (2) Structured query language
(4) flDosaf'k;y Dos'pu ySUxq,t (3) Structured question language
(5) flDosaf'k;y Dosjh ySUxq,t (4) Sequential question language
278. ok;jl (VIRUS) dk foLrkfjr :i gS\ (5) Sequential query language
(1) okbVy bUQkWesZ'ku fjlkslZ vaMj lhtj 278. VIRUS stands for _____
(2) okbVy bUQkWesZ'ku fjlkslZ vaMj lht (1) Vital Information Resource Under Seizure
(3) okbVy bUQkWesZ'ku jhtu vaMj lht (2) Vital Information Resource Under Seize
(4) okbVy bUQkWesZ'ku fjlkslZ vaMj flLVe (3) Vital Information Reason Under Siege
(5) ok;jl bUQkWesZ'ku fjlkslZ vaMj lht (4) Vital Information Resource Under Sys-
279. MkWD;qeVas ds ckWVe dks ewo djus ds fy, izsl dh tem
(5) Vital Information Recourse Under Siege
tkrh gS\
279. To move to the bottom of a document; press
(1) Home key (2) End key
_____.
(3) Ctrl + End (4) Insert key
(1) Home key (2) End key
(5) Shift key (3) Ctrl + End (4) Insert key
280. ok;jl] okWewlZ bR;kfn dks fufnZ"V djus okyk (5) Shift key
,d 'kCn gS\ 280. Single–word reference to viruses, worms etc
(1) fdyjos;j (2) gkeZos;j is _____.
(3) fQ'k (4) eyos;j (1) killeware (2) harrnware
(5) ok;jl (3) phish (4) malware
281. dEI;wVj baLVªD'kal dks izksxzkfeax ySUxq,t esa (5) virus
fy[kus dh izfØ;k dgykrh gS\ 281. The process of writing computer instruc-
(1) Qkby (2) izkl
s fs lax tions in a programming language is known
(3) dksfMax (4) QksYMj as?
(1) File (2) Processing
(5) VsfLVax
(3) Coding (4) Folder
282. ;fn vki fdlh Qkby dks dkWih vkSj isLV djrs
(5) Testing
gS rks ________ 282. If you copy and paste a file _____.
(1) vksfjftuy Qkby vifjofrZr jgrh gS vkSj (1) The original fiel remains unchanged and
ubZ Qkby fØ,V gks tkrh gS a new file is created
(2) Qkby LdSu gks tkrh gS (2) The file gets scanned
(3) vksfjftuy Qkby fjewo gks tkrh vkSj ubZ (3) The original file is removed and a new
Qkby fØ,V ugha gksrh file is not created
(4) vksfjftuy Qkby vifjofrZr jgrh gS vkSj (4) The originali file remains unchanged and
[40] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

ubZ Qkby fØ,V ugha gksrh a new file is not created


(5) vksfjftuy Qkby fMyhV gks tkrh gS vkSj (5) The original file is deleted and a enw file
ubZ Qkby fØ,V gks tkrh gSA is created
283. oh,y,lvkbZ VsDuksykWth vkSj ekbØksikz l
s l
s j ds 283. What is the generation of the computers
lkFk fufeZr dEI;wVj fdl ih<+h ds varxZr vkrs which are built with VLSI technology and
gS\ microprocessor?
(1) igyh (2) pkSFkh (1) First (2) Fourth
(3) Third (4) Second
(3) rhljh (4) nwljh
(5) Other than those given as options
(5) fn, x, fodYiks ds vykok
284. A function inside another function in excel
284. ,Dlsy esa nwljs QaD'ku esa lekfgr QaD'ku
is called _____.
dgykrk gS\ (1) Round function
(1) jkmaM QaD'ku (2) le QaD'ku
(2) Sum function
(3) usLVsM QaD'ku (4) Mcy QaD'ku
(3) Nested function
(5) VsLV QaD'ku (4) Double function
285. fuEufyf[kr esa ls dkSu izkbosV] daiuh okbM (5) Test function
usVodZ DyksTM Vw ifCyd ,Dlsl dk lgh o.kZu 285. Which of the following best describes a pri-
djrk gS\ vate, company wide network, closed to pub-
(1) baVªkusV (2) baVjusV lic access?
(3) opqZvy izkbosV usVodZ (1) Intranet (2) Internet
(4) DykmM dEI;wfVax (3) Virtual Private Network
(5) ,DlVªkusV (4) Cloud Computing
286. fuEufyf[kr esa fdls lsdaMjh LVksjst dk :i (5) Extranet
ugha ekuk tk,xk\ 286. Which one of the following would not be
(1) gkMZ fMLd (2) jSe considered as a form of secondary storage?
(3) vkWfIVdy fMLd (1) hard disk (2) RAM
(4) ¶ykWih fMLd (5) ¶yS'k Mªkbo (3) optical disk (4) floppy disk
287. dEI;wVj vkSj bysDVªkWfud flLVe ds {ks= esa (5) flash drive
laf{kIr 'kCn chlhMh dk vFkZ gS\ 287. In computing and electronic system, BCD is
(1) ckbujh dksMsM Msfley abbreviation of?
(2) fcV dksMsM fMftV (1) Binary Coded Decimal
(3) ckbV dksMM s fMftV (2) Bit Coded Digit
(4) fcV dksMsM Msfley (3) Byte Coded Digit
(5) ckbujh dksMsM fMftV (4) Bit Coded Decimal
288. ,pVhVhih (HTTP) dk iw.kZ :i gS\ (5) Binary Coded Digit
(1) gkse VsDLV VªkatsD'ku izksVksdkWy 288. HTTP refers to _____.
(2) gkbij VsDL:V VkbZ izksVksdkWy (1) Home Text Transaction Protocol
(3) gkbij VsDLV Vªkalfe'ku izksVksdkWy (2) Hyper Text Tie Protocol
(3) Hypter Text Transmission Protocol
(4) gkbij VsDLV VªkalQj izksVksdkWy
(4) Hyper Text Transfer Protocol
(5) gkse VsDLV Vªkalfe'ku izksVksdkWy
(5) Home Text Trnasmission Protocol
289. ________ ml fufnZ"V midj.k dk mYys[k
289. The term ____ designates equipment that
djrk gS ftls bldh vfHkyk{kf.kdrk esa o`f) might be added to a computer to enhance,
djus ds fy, dEI;wVj ls tksM+k tk ldrk gSA its functionality.
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [41]

Telegram @BankingGK
Telegram @BankingGK

(1) flLVe fMokbl (1) System device


(2) fMLd iSd (3) vkWijsfVax fMOkbl (2) Disk pack
(4) fMftVy fMokbl (3) Operating device
(5) isfjQsjy fMokbl (4) Digital divice
290. og dEI;wVj izksxzke tks vlsEcyh ySUxq,t dks (5) Peripheral device
e'khuh ySUxq,t esa ifjofrZr djrk gS _____ 290. A computer program that converts assem-
dgykrk gSA bly language to machine language is.
(1) vlsEcyj (2) baVjlsD'ku (1) Assembler (2) Intersection
(3) dEiSjsVj (4) dEiyhdsV (3) Comparator (4) Complicate
(5) dUoVZj (5) Convertor
[IBPS BANK PO/MT CWE Main Exam 2016] [IBPS BANK PO/MT CWE Main Exam 2016]
291. ,d ckbV _______ ds leku gSA 291. One Byte is equal to _____.
(1) 4 fcV~l (2) 8 fcV~l (1) 4 bits (2) 8 bits
(3) 12 fcV~l (4) 16 fcV~l (3) 12 bits (4) 16 bits
(5) 32 fcV~l (5) 32 bits
292. fcV ls rkRi;Z ______ ls gSA 292. Bit stands for?
(1) ckbujh fMftV (1) Binary digit
(2) cwfy;u ,Dlizs'ku (2) Boolean expression
(3) cwVLVªSi (3) Bootstrap
(4) ckbuksfe;y uksesudyspj (4) Bionomial nomenclature
(5) buesa ls dksbZ ugha (5) None of these
293. lhvkjVh (CRT) dk iw.kZ :i gS\ 293. CRT stands for?
(1) lsaVªy jhM VsDuhd (1) Central Read Technique
(2) dkWeu jhfMax VsDuhd (2) Common Reading Technique
(3) dSFkksM jst V~;c
w (3) Cathode Rays Technique
(4) dSFkksM jst VsDuhd (4) Cathode Rays Tube
(5) buesa ls dksbZ ugha (5) None of these
294. fuEufyf[kr esa ls dkSu ,d flLVe izkx s zke ugha 294. Which of the following is not a system pro-
gS\ gram?
(1) vkWijsfVax flLVe (1) Operating system
(2) usVofdZx flLVe (2) Networking system
(3) osclkbV loZj (3) Website server
(4) ,DlSy LizsM'khV (4) Excel spreadsheet
(5) buesa ls dksbZ ugha (5) None of these
295. fuEufyf[kr esa ls dkSu ,d gkMZos;j gS\ 295. Which of the following is a Hardware?
(1) osc czkmtj (2) dhcksMZ (1) Web browser (2) Keyboard
(3) ,e,l oMZ (4) foaMkst vks,l (3) MS Word (4) Windows OS
(5) mi;qZDr lHkh (5) All of these
296. fuEufyf[kr esa ls dkSu dEI;wVj dks buiqV nsrk 296. Which of the following gives input to the
gS\ computer?
(1) fizV
a j (2) dhcksMZ (1) Printer (2) Keyboard
(3) ekWuhVj (4) Lihdj (3) Monitor (4) Speaker
(5) IykWVj (5) Plotter
297. fuEufyf[kr esa ls dkSu ckbujh uEcj ugha gS\ 297. Which of the following is not a binary num-
[42] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) 1011 (2) 11001 ber?


(3) 10011 (4) 1101 (1) 1011 (2) 11001
(5) 3124 (3) 10011 (4) 1101
298. dksM dks Iysu VsDLV ;k fdlh vU; QkWesZV] tks (5) 3124
mrjorhZ izfØ;kvksa ds fy, mi;ksxh gS] esa ifjofrZr 298. The process of converting code into plain
djus dh izfØ;k dgykrh gS\ text or any format that is useful for subse-
(1) dksfMax (2) vlsEcfyax quent processes is known as.
(3) dEikbfyax (4) fMdksfMax (1) Coding (2) Assembling
(5) ØSfdax (3) Compiling (4) Decoding
299. fuEufyf[kr esa ls dkSu ,d osc czkmtj gS\ (5) Cracking
(1) foaMkst 10 (2) vkmVyqd 299. Which of the following is a web broswer?
(3) xwxy (4) ekWftyk Qk;jQkWDl (1) Windows 10 (2) Outlook
(5) Ldkbih (3) Google (4) Mozilla Firefox
300. _______ ls osclkbV dk fuekZ.k gksrk gSA (5) Skype
(1) osc istksa (2) lpZ batu 300. Website consists of
(3) dksVkZuk (1) Webpages (2) Search engine
(4) ,pVh,e,y ,fMVj (3) Cortana (4) HTML editor
(5) mi;qZDr lHkh (5) All of these
301. fuEufyf[kr esa ls dkSu ,d vkWijsfVax flLVe 301. Which of the following is an Operating Sys-
gS\ tem?
(1) foaMkst (2) fcUx (1) Windows (2) Bing
(3) C+ (4) oMZ (3) C+ (4) Word
(5) tkok (5) Java
302. ,e,l oMZ esa ^vuMw dekaM^ ds fy, fuEufyf[kr 302. In MS Word, which of the following is com-
esa ls fdl dekaM dk iz;ksx fd;k tkrk gS\ mand for "undo command"?
(1) Ctrl + C (2) Ctrl + X
(1) Ctrl C (2) Ctrl X
(3) Ctrl + Z (4) Ctrl + Y
(3) Ctrl Z (4) Ctrl Y
(5) Ctrl + V
(5) Ctrl V
303. dEI;wVj ds {ks= esa] laf{kIr 'kCn ,QVhih ls 303. In computing the abbreviation FTP stands
rkRi;Z gS\ for
(1) Qkby VªkalysV izksVksdkWy
(1) File Translate Protocol
(2) Qkby VªkftV izksVksdkWy
(2) File Transit Protocol
(3) Qkby Vkbfiax izksVksdkWy
(3) File Typing Protocol
(4) Qkby VªkalQj izksVksdkWy
(4) File Transfer Protocol
(5) buesa ls dksbZ ugha
(5) None of these
304. dEI;wVj usVodZ ij dbZ fMokblksa dks ,d lkFk
dusDV djus okys usVodZ gkMZos;j ds fy, 304. What is the term of network hardware that
connects large number of devices together
fdl 'kCn dk iz;ksx fd;k tkrk gS\
(1) gc (2) fLop on a computer network?
(3) fczt (4) fjfiVj (1) Hub (2) Switch
(5) eksMse (3) Bridge (4) Repeater
305. de nwfj;ksa ds vUrxZr fuf'pr eksckby fMokblksa (5) Modern
ls MkVk ,Dlpsat djus ds fy, iz;qDr gksus 305. A wireless technology standard for exchang-
okyk ok;jysl VsDuksykWth LVSaMMZ dgykrk gS\ ing data over short distances from fixed and
mobile devices is?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [43]

Telegram @BankingGK
Telegram @BankingGK

(1) okbZ QkbZ (2) CyqVFw k (3) ySu (1) Wi-Fi (2) Bluetooth
(4) Mk;y vi dusD'ku (3) LAN (4) Dial up connection
(5) buesa ls dksbZ ugha (5) None of these
306. usVodZ esa vU; dEI;wVjksa dks fjlkslZ izksokbM 306. ____ are the computers that provides re-
djus okys dEI;wVj _____ dgykrs gSA sources to other computers in a network.
(1) VpLØhu (2) isfjQsjy (1) Touchscreen (2) Periperal
(3) ekWuhVj (4) loZlZ (3) Monitor (4) Servers
(5) IysVQkWe~Zl (5) Platforms
307. fuEufyf[kr esa ls fdls dEI;wVj dh lsdaMjh 307. Which one of the following is not consid-
LVksjt
s dk ,d :i ugha ekuk tkrk gS\ ered as a form of a secondary storage of a
(1) vkWfIVdy fMLd computer?
(2) ¶yS'k Mªkbo (3) ¶ykWih fMLd (1) Optical disk (2) Flash drive
(4) jSe (5) gkMZ fMLd (3) Floppy disk (4) RAM
308. og lcflLVe ftldk iz;ksx dEI;wVj ?kVdks (5) Hard Disk
dks dusDV djus vkSj muds e/; MkVk Vªkl a Qj 308. A subsystem that is used to connect com-
djus ds fy, fd;k tkrk gS] _____ dgykrk puter components and transfer data be-
gSA tween them is known as.
(1) cl (2) gc (1) Bus (2) Hub
(3) iksVZ (4) xsVos (3) Port (4) Gateway
(5) dSp (5) Cache
309. ekbØksfpi ds fuekZ.k esa fuEufyf[kr esa ls fdl 309. Which of the following semiconductors is
v/kZpkyd dk iz;ksx fd;k tkrk gS\ used in manufacturing microchips?
(1) flfydkWu (2) dkWij (1) Silicon (2) Copper
(3) Tungsten (4) Mica
(3) VaXLVu (4) vHkzd
(5) Silver
(5) flYoj
310. What does CDMA stand for?
310. lhMh,e, dk foLrkfjr :i D;k gS\
(1) Common Division Medium Allotment
(1) dkWeu fMfotu ehfM;e vykWVesaV
(2) Clear Disc Multiple Access
(2) Dyh;j fMLd eYVhiy ,Dlsl
(3) Code Division Multiple Access
(3) dksM fMfotu eYVhiy ,Dlsl
(4) Code Division Medium Allotment
(4) dksM fMfotu ehfM;e vykWVesaV
(5) Compact Disk Media Access
(5) dkWEisDV fMLd ehfM;k ,Dlsl
[SBI PO Phase-II Main Exam 26.07.2015]
[SBI PO Phase-II Main Exam 26.07.2015]
311. Which one of the following is not the op-
311. fuEufyf[kr esa ls dkSu vkWijsfVax flLVe dk eration of operating system?
dk;Z ugha gS\ (1) Networking (2) Process management
(1) usVofdZxa (2) izkslsl eSustesaV (3) Booting
(3) cwfVax (4) fjlkslZ eSustesaV (4) Resource management
(5) Qkby eSustesaV (5) File management
312. og fMokbl tks u dsoy ltZ izksVDs 'ku iznku 312. A device that not only provides surge pro-
djrk gS] cfYd ikWoj vkmVSt ds nkSjku dEI;wVj tection, but also furnishes the computer with
dks cSVjh cSdvi ikWoj Hkh iznku djrk gS ____ battery backup power during a power out-
dgykrk gS age is.
(1) cSVjh fLVªi (2) ;wih,l (1) Battery strip (2) UPS
(3) ltZ fLVªi (4) ;w,lch (3) Surge strip (4) USB
(5) eseksjh
(5) Memory
[44] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

313. jkse ck;ksl esa laf{kIr 'kCn ^ck;ksl^ ls D;k 313. In ROM BIOS, the acronym BIOS stands
rkRi;Z gS for?
(1) csfld buiqV vkmViqV flLVe (1) Basic Input Output System
(2) csfld buiqV vkxsZukbts'ku flLVe (2) Basic Input Organizational System
(3) csfld baMLVªh vkWijsfVax flLVe (3) Basic Industry Operating System
(4) csfld buiqV vkWijsfVax lsV (4) Base Input Operating Set
(5) csfld bfuf'k,fVo vkmViqV lsV
(5) Basic Initiative Output Set
314. ekdsZV lsXesaVs'ku dk vFkZ gS\
314. Market Segmentation means?
(1) fcØh ls lacf/kr O;oLFkk (lsfyax vjsatesaV)
djuk (1) Making selling arrangement
(2) lsYl Vhe dk lewghdj.k (2) Grouping sales team
(3) miHkksDrkvksa dks mudh vko';drkvksa ds (3) Grouping the customers as per their
vuqlkj lewgks esa foHkkftr djuk needs
(4) cSad ds vkWfQl LVkQ dk lewghdj.k (4) Grouping bank office staff
(5) dkmaVj LVkQ dk lewghdj.k (5) Grouping the counter staff
315. fuEufyf[kr esa ls dkSu ekdsZfVax feDl ds pkj 315. Which of the following is not a part of four
ih esa ls ,d ugha gS\ P's of marketing mix?
(1) Iysl (2) izkbl (1) Place (2) Price
(3) izke
s ks'ku (4) izkMs DV (3) Promotion (4) Product
(5) ilZu (5) Person
316. og fMokbl ftls budksMsM bUQkWesZ'ku jhM 316. A device designed to read information en-
djus ds fy, ,d NksVs IykfLVd dkMZ esa fufnZ"V coded into a small plastic card is
fd;k tkrk gS\ (1) Card puncher (2) ID puncher
(1) dkMZ uacj (2) vkbZMh iapj
(3) Vsi iapj (4) cSt jhMj (3) Tape puncher (4) Badge reader
(5) eSXusfVd Vsi (5) Magnetic tape
317. baVjusV esa laf{kIr 'kCn www dk vFkZ gS\ 317. The acronym www in internet stands for
(1) oYMZ ok;jysl osc (1) World Wireless Web
(2) ok;jysl oYMZ osc (2) Wireless World Web
(3) oYMZ okbM osc (3) World Wide Web
(4) ok;jysl okbM osc (4) Wireless Wide Web
(5) buesa ls dksbZ ugha (5) None of these
318. _______ lkW¶Vos;j dksM esa ,jlZ dk irk 318. _____ is the process to find errors in soft-
yxkus dh izfØ;k gSA ware code
(1) fMcfxax (2) dEikbfyax (1) Debugging (2) Compiling
(3) VsfLVax (4) izkx
s zkfeax (3) Testing (4) Programming
(5) baVjizfs Vax (5) Interpreting
319. fuEufyf[kr esa ls dkSu lsokvksa (lfoZlst) dk 319. Which of the following is not the true na-
lgh izd`fr vkSj fof'k"V fo'ks"krk ugha gS\
ture and distinct characterstic of services?
(1) isfj'ksfcfyVh (2) gsVjs kstsfuVh
(1) Perishbility (2) Heterogeneity
(3) Vªkla iSjl
a h (4) bUlsijs fs cfyVh (3) Transparency (4) Inseparability
(5) bUVSfUtfcfyVh (5) Intangibility
[IBPS Bank Clerk Online Exam 2015] [IBPS Bank Clerk Online Exam 2015]
320. ykbuDl ,d ____ vkWijsfVax flLVe (OS) gSA 320. Linus is a(n) ____ OS.
(1) foaMkst (2) DyksTM lkslZ (1) Windows (2) Closed source
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [45]

Telegram @BankingGK
Telegram @BankingGK

(3) eSd (4) vksiu lkslZ (3) Mac (4) Open source
(5) buesa ls dksbZ ugha (5) None of these
321. fuEufyf[kr esa ls dkSu lk dFku Vf'kZ;jh eseksjh 321. Which of the following statements does not
dks lgh ifjHkkf"kr ugha djrk gSA correctly define tertiary memory?
(1) ;g vlk/kkj.k :i ls vf/kd ls vf/kd MkVk
(1) It is useful for extraordinarly large data
dks LVksj djus ds fy, mi;ksxh gS
stores
(2) bls gkze
w us vkWijsVlZ }kjk ,Dlsl fd;k tkrk
gS (2) It is accessed with human operators
(3) bls fu;jykbu LVksjt s ds :i esa Hkh tkuk (3) It is also known as nearline storage
tkrk gS (4) It involves a robotic mechanism
(4) blesa jkscksfVd eSdfs uTe dh izfØ;k 'kkfey (5) All of these given as options
gS 322. What is the full form of CD-RW?
(5) fodYi ds :i esa fn, x, mi;qZDr lHkh (1) Compact Disc ReWritable
322. CD-RAW dk foLrkfjr :i D;k gS\ (2) Concise Disc ReWritable
(1) dkWEiSDV fMLd&fjjkbVscy (3) Compact Disc Readable Writable
(2) dkWUlkbt fMLd fjjkbVscy
(4) Concise Disk Readable Writable
(3) dkWEiSDV fMLd jhMscy jkbVscy
(5) None of these
(4) dkWUlkby fMLd jhMscy jkbVscy
(5) buesa ls dksbZ ugha 323. Which of the following is used to create Web
323. osc ist fØ,V djus ds fy, fuEufyf[kr esa ls Page?
fdldk iz;ksx fd;k tkrk gS\ (1) Tags (2) HTML
(1) VSXl (2) ,pVh,e,y (3) Syntax (4) URL
(3) flUVSDl (4) ;wvkj,y (5) HTTP
(5) ,pVhVhih 324. In Ms word the misspelt word is underline
324. ,e,l oMZ esa v'kq) 'kCn dks ____ jax ls in ____ color.
js[kkfdar fd;k tkrk gSA (1) Red (2) Green
(1) yky (2) gjs
(3) Blue (4) Yellow
(3) uhys (4) ihys
(5) Black
(5) dkys
325. ,d lkFk dbZ fMokblksa dks dEI;wVj usVodZ ls 325. What is the term of network hardware that
dusDV djus okys usVodZ gkMZos;j ds fy, connects large number of devices together
fdl 'kCn dk iz;ksx fd;k tkrk gS\ on a computer network?
(1) gc (2) fLop (1) Hub (2) Switch
(3) fczt (4) fjihVj (3) Bridge (4) Repeater
(5) eksMse (5) Modem
326. dEI;wVj ds {ks= esa ;w,lch (USB) dk iw.kZ :i 326. In computing USB stands for?
gS\ (1) Unicoded Smart Bus
(1) ;wfudksMM s LekVZ cl (2) Universal Smart Bus
(2) ;wfuolZy LekVZ cl
(3) Unicoded Serial Bus
(3) ;wfudksMM s lhfj;y cl
(4) ;wfuolZy lhfj;y cl (4) Universal Serial Bus
(5) buesa ls dksbZ ugha (5) None of these
327. dE;qfuds'ku flD;ksj djus ds fy, FkMZ ikfVZ;ks]a 327. Which term is used for the practice and
ftls ,Mojljht dgrs gS] dh mifLFkfr esa study of techniques for secure communica-
rduhdksa dk v/;;u djus vkSj mls O;ogkj esa tion in the presence of third parties called
[46] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

ykus ds fy, fuEufyf[kr esa ls fdldk iz;ksx adversaries?


fd;k tkrk gS\ (1) Metagraphy (2) Cartography
(1) esVkxzkQh (2) dkVksZxkz Qh (3) Holography (4) Cryptography
(3) gksyksxzkQh (4) fØIVksxzkQh (5) None of these
(5) buesa ls dksbZ ugha
328. What does ALU stand for?
328. ,,y;w (ALU) ls D;k rkRi;Z gS\ (1) Arithmetic Logic Unit
(1) ,fjFkesfVd ykWftd ;wfuV
(2) Array Logic Unit
(2) ,sjs ykWftd ;wfuV
(3) Application Logic Unit
(3) ,fIyds'ku ykWftd ;wfuV
(4) ,Dlsl ykWftd ;wfuV (4) Access Logic Unit
(5) vlsEcyh ykWftd ;wfuV (5) Assembly Logic Unit
329. dEI;wVj ds {ks= esa vkj,QvkbZMh (RFID) ls 329. In computing, RFID stands for?
rkRi;Z gS\ (1) Radio Frequency Identification
(1) jsfM;ks ÝhDosalh vkbMsfa VfQds'ku (2) Readable File Index
(2) jhMscy Qkby baMsDl (3) Rewritable Flash input
(3) fjjkbVscy ¶yS'k buiqV (4) Remote Frequency input
(4) fjeksV ÝhDosalh buiqV (5) None of these
(5) buesa ls dksbZ ugha 330. FAT, NTFS are examples of?
330. FAT, NTFS _____ ds mnkgj.k gSA (1) Database organization
(1) MkVkcsl vkxsZukbts'ku (2) File system (3) Indexing
(2) Qkby flLVe (3) baMfs Dlax (4) Extension
(4) ,DlVs'a ku (5) dksfMax izkxs kz El (5) Coding programs
331. fuEufyf[kr esa ls dkSu ,d vkWDVy uEcj ugha 331. Which of the following is not an octal num-
gS\ ber?
(1) 131 (2) 112 (1) 131 (2) 112
(3) 138 (4) 121 (3) 138 (4) 121
(5) 2222 (5) 2222
332. fuEufyf[kr esa ls dkSu ,d buiqV ;wfuV ugha 332. Which of the following is not an input unit?
gS\ (1) Keyboard (2) Mouse
(1) dhcksMZ (2) ekml
(3) Joystick (4) Floppy
(3) tkW;fLVd (4) ¶ykWih
(5) Trackball
(5) VªSdckWy
333. CPU stands
333. lhih;w (CPU) ls rkRi;Z gS\
(1) Central Processing Unit
(1) lsaVªy izkslsflax ;wfuV
(2) Control Processing Unit
(2) daVs ªksy izkslfs lax ;wfuV
(3) daVªksy izkx s zkfeax ;wfuV (3) Control Programmming Unit
(4) lsaVªy izksxzkfeax ;wfuV (4) Central Programming Unit
(5) dEI;wVj izkslsflax ;wfuV (5) Computer Processing Unit
334. fLVd ls fufeZr og buiqV fMokbl tks csl 334. What is the term for an input device con-
(vk/kkj) ij ?kwerk gS vkSj fMokbl dks fu;af=r sisting of a stick that pivots on a base and
djrs gq, blds dks.k ;k fn'kk dk fooj.k nsrk reports its angle or direction to the device it
gS] _____ dgykrk gSA is controlling?
(1) VªSdckWy (2) IykWVj (1) Trackball (2) Plotter
(3) ekml (4) tkW;fLVd (3) Mouse (4) Joystick
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [47]

Telegram @BankingGK
Telegram @BankingGK

(5) ikbokWV (5) Pivot


335. MkVk ds iw.kZ thou pØ ds nkSku bldh lVhdrk 335. Maintaining and assuring the accuracy and
,oa fujUrjrk lqfuf'pr djus vkSj lEiksf"kr consistency of data over its entire life cycle
djus dh izfØ;k dgykrh gS\ is called?
(1) MkVk dksgjs l
sa (2) MkVk bafVfxzVh (1) Data coherence
(3) MkVk ,flfeys'ku (4) MkVk vkWxZus kbts'ku (2) Data integrity
(3) Data assimilation
(5) MkVk eSustesaV
(4) Data organization
336. VkLd eSustj dks bUokWd djus ds fy, fdl (5) Data management
'kkWVZdV dh (dqath) dk iz;ksx fd;k tkrk gS\ 336. Which shortcut key is used to invoke Task
(1) Ctrl + Shift + Esc Manager?
(2) Ctrl + Alt + Esc (1) Ctrl + Shift + Esc
(3) Ctrl + Esc (4) Alt + Esc (2) Ctrl + Alt + Esc
(5) Ctrl + Shift + Alt + Esc (3) Ctrl + Esc
337. fdlh fuf'pr eksckby midj.k ls ,d lhfer (4) Alt + Esc
nwjh esa MkVk ,Dlpsat djus ds fy, iz;qDr gksus (5) Ctrl + Shift + Alt + Esc
okyk ok;jysl VsDuksykWth LVSM a MZ dgykrk gSA 337. A wireless technology standard for exchang-
(1) okbZ QkbZ (2) CyqVFw k (3) ySu ing data over short distances from fixed and
(4) Mk;y vi dusD'ku mobile devices is?
(5) bueas ls dksbZ ugha (1) Wi-Fi (2) Bluetooth
338. U;wejs y flLVe tks nks fofHkUu izrhdksa : fof'k"V (3) LAN (4) Dial up connection
(5) None of these
:i ls 0 ('kwU;) vkSj I (,d) dk iz;ksx djrk gS]
338. The numeral system that uses two different
_____ ds :i esa tkuk tkrk gSA
symbols : typically 0 (zero) and 1 (one) is
(1) gsDlkMsfley flLVe known as?
(2) vkWDVy flLVe (1) Hexadecimal system
(3) ckbujh flLVe (2) Octal system
(4) Msfley flLVe (3) Binary system
(5) ,Yxksfjnfed flLVe (4) Decimal system
339. lcflLVe ftldk iz;ksx dEI;wVj ?kVdksa dks (5) Algorithmic system
dusDV djus vkSj muds e/; MkVk VªkalQj 339. A subsystem that is used to connect com-
djus ds fy, fd;k tkrk gSA puter components and transfer data be-
(1) cl (2) gc tween them is known as?
(3) iksVZ (4) xsVos (1) Bus (2) Hub
(5) lS'ks (Cache) (3) Port (4) Gateway
340. ,e,l oMZ esa lcdks lsyDs V djus ds fy, fdl (5) Cache
340. Which shorcut key is used to Select All in
'kkWVZdV dh dk iz;ksx fd;k tkrk gS\
MS Word?
(1) Ctrl + A (2) Ctrl + Shift + S
(1) Ctrl + A (2) Ctrl + Shift + S
(3) Ctrl + Alt + A (4) Ctrl + S (3) Ctrl + Alt + A (4) Ctrl + S
(5) Ctrl + X (5) Ctrl + X
341. lkW¶Vos;j] cx@fMQsDV fjewo djus ds fy, 341. Which among the following is used for re-
fuEufyf[kr esa ls fdldk iz;ksx fd;k tkrk gS] moving a software bug/defect which is avail-
ftls lkW¶Vos;j izksokbMj dh vksj ls fu%'kqYd able for free of cost from the software pro-
miyC/k djk;k tkrk gSA vider?
(1) iSp (2) dh (1) Patch (2) Key
(3) viMsV (4) gsYi (3) Update (4) Help
[48] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(5) fjcwV (5) Reboot


342. og izkx s zke] tks ,fXtD;wVcs y izkxs zke fØ,V djus 342.
A program that translates an other program
ds fy, gkbZ ysoy ySUxq,t esa fy[ks nwljswritten in a high level language into machine
izkx
s zke dks e'khuh ySUxq,t esa ifjofrZr djrk gS]
language so that it can be executed is known
_____ ds :i esa tkuk tkrk gSA as.
(1) dEikbyj (2) fjdksMj (1) Compiler (2) Decoder
(3) VkLd eSustj (4) vlsEcyj (3) Task manager (4) Assembler
(5) dUoVZj (5) Converter
343. funs'Z kks dk og leqPp; tks dEI;wVj }kjk ,fXtD;wV
343. A collection of instructions that performs a
gksus ij ,d fof'k"V dk;Z fu"ikfnr djrk gS]
specific task when executed by a compute
_____ dgykrk gSA is known as.
(1) lkW¶Vos;j (2) izkx
s zke (1) Software (2) Program
(3) MkVk (4) dekaM (3) Data (4) Command
(5) dksM (5) Code
344. fuEufyf[kr esa ls dkSu ,d fefy;u ckbV~l ds
344. Which of the following is equal to 1 million
leku gS\ bytes?
(1) fdyksckbV (2) esxkckbV (1) Kilobyte (2) Megabyte
(3) xhxkckbV (4) VsjkckbV (3) Gigabyte (4) Terabyte
(5) ,DlkckbV (5) Exabyte
345. dEI;wVj dks vkWu djus ds ckn ilZuy dEI;wVj
345. What is the program a personal computer's
dk ekbØksizkslslj dEI;wVj flLVe dks LVkVZ
microprocessor uses to get the computer
djus ds fy, fdl izksxzke dk iz;ksx djrk gS\
system started after you turn it ON?
(1) jSe (RAM) (1) RAM (2) BIOS
(2) ck;ksl (BIOS) (3) jkWe (ROM) (3) ROM (4) Boot manager
(4) cwV eSustj (5) buesa ls dksbZ ugha
(5) None of these
346. fuEufyf[kr esa ls fdl v/kZpkyd (lsehdaMDVj)
346. Which of the following semiconductors is
dk iz;ksx ekbØksfpiksa ds fuekZ.k esa fd;k tkrk
used in manufacutring microchips?
gSA (1) Silicon (2) Copper
(1) flfydkWu (2) dkWij (3) Tungsten (4) Mica
(3) VaxLVu (4) vHkzd (5) Silver
(5) flYoj 347. In MS Word, Ctrl + Z is used for?
347. ,e,l oMZ esa] ________ ds fy, Ctrl + Z dk
(1) Do command
iz;ksx fd;k tkrk gS (2) Step and repeat command
(1) Mw dekaM (2) LVsi vkSj fjihV dekaM
(3) Paste command
(3) isLV dekaM (4) vuMw dekaM (4) Undo command
(5) lso vkWy dekaM (5) Save all command
348. ,e,l oMZ esa Ctrl + K dk iz;ksx fd;k tkrk gS
348. Ctrl + K is used in MS Word to?
(1) gkbijfyad bUlVZ djusa ds fy, (1) Insert a hyperlink
(2) CySad ist bUlVZ djusa ds fy, (2) Insert a blank page
(3) ist uEcj bUlVZ djusa ds fy, (3) Insert page number
(4) flEcy bUlVZ djusa ds fy, (4) Insert symbol
(5) fiDpj bUlVZ djusa ds fy, (5) Insert picture
349. fuEufyf[kr esa ls dkSu ,d MkVkcsl eSustesaV
349. Which of the following is a database man-
flLVe gS\ agement system?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [49]

Telegram @BankingGK
Telegram @BankingGK

(1) vksjsdy (2) ikbFku (1) Oracle (2) Python


(3) ykbuDl (4) tkok (3) Linux (4) Java
(5) lQkjh (5) Safari
350. vkbZ,lMh,u dk foLrkfjr :i gS\ 350. ISDN stands for?
(1) bafVxzsVM s lfoZlst fMftVy usVodZ (1) Integrated Services Digital Network
(2) bafVxzsVsM lfoZlst Mcy usVodZ (2) Integrated Services Double Network
(3) baVj lfoZlst fMftVy usVodZ (3) Inter Services Digital Network
(4) bafVxzsVsM loZj fMftVy usVodZ (4) Integrated Server Digital Network
(5) buesa ls dksbZ ugha (5) None of these
351. ;wMhih (UDP) ls D;k rkRi;Z gS\ 351. What does UDP stand for?
(1) ;wtj MkVkxzke izkl s sl (1) User datagram Process
(2) ;wtj MkVkxzke iSdsV (2) User Datagram Packet
(3) ;wtj MkVkxzke izkV s ksdkWy (3) User Datagram Protocol
(4) ;wtj MkVkxzke izksxzke (4) User Datagram Program
(5) ;wtj MkVkxzke iSjkehVj (5) User Datagram Parameter
352. dkSu&lh dh (Key) dlZj ds ck;ha vksj fLFkr 352. Which key deletes the character to the left
dSjsDVj dks fMyhV djrh gS\ of the cursor?
(1) ESC (2) fMyhV (1) Esc (2) Delete
(3) cSdLisl (4) bUM (3) Backspace (4) End
(5) jkbV ,sjks (5) Right arrow
353. bZMhih (EDP) ls D;k rkRi;Z gSA 353. EDP stands for?
(1) bysDVªkfud MkVk izkl s fs lax (1) Electronic Data Processing
(2) bufØIVsM MsLdVkWi ifCyf'kax (2) Encrypted Desktop publishing
(3) bejtsl sa h Mk;y&vi izksVksdkWy (3) Emergency Dail up Protocol
(4) bufØIVsM MkVk izkl s fs lax (4) Encrypted Dial up Protocol
(5) buesa ls dksbZ ugha (5) None of these
354. dEI;wVj ds {ks= esa thvkbZ;w dk iw.kZ :i gSA 354. In computing GUI stands for?
(1) xzkfQDl ;wtj baVj,D'ku (1) Graphics User Interaction
(2) xzkfQdy ;wtj baVjQsl (2) Graphical User Interface
(3) xzkfQDl ;qtwvy baVjQsl (3) Graphics Usual Interface
(4) xzkfQDl ;wtj baMDs l (4) Graphics User Index
(5) xzkfQdy ;wtj bafVxzs'ku (5) Graphical User Integration
355. AND, OR, NOT ______ vkWijsVj gSA 355. AND, OR, NOT are?
(1) vkWDVy vkWijsVj (1) Octal operator
(2) ;wujs h vkWijsVj (2) Unary operator
(3) cwfy;u vkWijsVj (3) Boolean operator
(4) ykWxksfjne vkWijsVj (4) Logarithmic operator
(5) ckbujh vkWijsVj (5) Binary operator
356. fuEufyf[kr esa ls dkSu lcls lkekU; flLVe 356. Which of the following is the most common
lkWQVos;j gSA system software?
(1) xsfeax batal (2) vkWijsfVax flLVe (1) Gaming engines (2) OS
(3) dEikbyj (4) MATLAB (3) Compiler (4) MATLAB
(5) mi;qZDr lHkh (5) All of the above
357. dEI;wVj fuEufyf[kr esa fdl ySUxq,t dks fcuk 357. Which language is directly understood by
[50] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

VªkUlys'ku ds izR;{k :i ls vklkuh ls le> the computer without translation?


ysrk gSA (1) BASIC language
(1) csfld ySUxq,t (2) vlsEcyh ySUxq,t (2) Assembly language
(3) gkbZ ysoy ySUxq,t (3) High level language
(4) lh ySUxq,t (5) e'khu ySUxq,t (4) C language
358. dkSu&lk gkf'k;k ¼baMsV½ izR;sd iafDr ds fy, (5) Machine language
vko';d gSA 358. Which indent is necessary for every line?
(1) First Line Indent
(1) igyh iafDr dk gkf'k;k
(2) Left Indent
(2) ck;ka gkf'k;k (3) yVdrk gkf'k;k
(3) Hanging Indent
(4) nk;ka gkf'k;k (5) MªkWi dSi
(4) Right Indent
359. vks,yVhih (OLTP) ls D;k rkRi;Z gSA (5) Drop Cap
(1) vkWuykbu VªkatsD'ku izkl s sflax 359. What does OLTP stand for?
(2) vkWuykbu VªkatsD'ku iSdsV (1) On Line Transaction Processing
(3) vkWuykbu VªkatsD'ku ist (2) On Line Transaction Packet
(4) vkWuykbu Vªkta Ds 'ku izkVs ksdkWy (3) On Line Transaction Page
(5) vkWuykbu VªkatsD'ku ikloMZ (4) On Line Transaction Protocol
[LIC AAO Online Exam 06.03.2016] (5) On Line Transaction Password
360. ,d NksVk lk fp= tks dEI;wVj LØhu ij fdlh [LIC AAO Online Exam 06.03.2016]

izksxzke ;k 'kkWVZdV dk izfrfuf/kRo djrk gS] 360. A small picture that represents either a pro-
_____ dgykrk gS\ gram or a shortcut on a computer screen is
(1) IokabVj (2) yksxks (1) a pointer (2) a logo
(3) xzkfQDl (4) vkbdu (3) a graphics (4) an icon
(5) 'kkWVZdV (5) a shortcut
361. ilZuy dEI;wVj dh LihM _____ esa ekih tkrh 361. The speed of a PC is measured in
gSA (1) Megabytes
(2) Nanoseconds
(1) esxkckbV (2) uSukslds M
a
(3) Megahertz
(3) esxkgV~Zt (4) fefylsdM a
(4) Milliseconds
(5) fdyks lsdM a (5) Kilo seconds
362. ______ gkWfjtksUVy vkSj ofVZdy fiDlYl dh
362. _____ is the maximum number of horizontal
U;wure la[;k gS] ftls LØhu ij fMLIys fd;k and vertical pixels that are displayed on the
tkrk gSA screen
(1) fiDly (2) jsLiksUl jsV (1) Pixel (2) Response Rate
(3) fjtksY;w'ku (4) LØhu lkbt (3) Resolution (4) Screen size
(5) fj¶ysD'ku (5) Reflection
363. dEI;wVj flLVe dk dkSu lk ?kVd xf.krh; 363. Which component of a computer system
x.kukvksa dk fu"ikfnr djrk gS\ perform artihemtic calculations?
(1) lh;w (2) ,,y;w (1) CU (2) ALU
(3) ;w,l (4) lhMh jkse (3) US (4) CD-ROM
(5) eseksjh (5) Memory
364. dEI;wVj dh esu okWySVkby eseksjh dk nwljk 364. What is another name for a compuer's main
uke D;k gS\ volatile memory?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [51]

Telegram @BankingGK
Telegram @BankingGK

(1) jSe (2) izkWe (1) RAM


(3) jkse (4) ,pMhMh (2) PROM
(5) lhMh jkse (3) ROM
365. vksjsdy ,d _____ gSA (4) HDD
(1) vkjMhch,e,l (2) gkMZo; s j (5) CD-ROM
(3) flLVe lkW¶Vos;j 365. Oracle is a?
(4) gkbZ ysoy ySUxq,t (1) RDBMS
(5) vkWijsfVax flLVe (2) Hardware
366. fuEufyf[kr esa ls dkSu ,d lkW¶Vos;j gS\ (3) System software
(1) ekml (2) IokabVj (4) High level language
(3) ,e,l oMZ (4) dhcksMZ (5) Operating system
(5) IykWVj 366. Which is a software?
367. fuEufyf[kr esa ls dkSu buiqV fMokbl gS\ (1) Mouse (2) Pointer
(i) dhcksMZ (ii) IokWb
a Vj (3) MS Word (4) Keyboard
(iii) Lihdj (iv) LdSuj (5) Plotter
(iv) IykWVj 367. Which of the following are input devices?
(1) (i), (ii), (iii) (2) (i), (iv), (v) (i) Keyboard (ii) Pointer
(3) (i), (v), (iii) (4) (i), (iii), (iv) (iii) Speaker (iv) Scanner
(5) (i), (ii), (iv) (v) Plotter (vi) Webcam
368. foaMkst ,DlIyksjj ______ dk uke gSA (1) (i), (ii), (iii) (2) (i), (iv), (v)
(1) usVodZ (2) osc czkmtj (3) (i), (v), (iii) (4) (i), (iii), (iv)
(3) Qkby eSustj (4) baVjusV czkmtj (5) (i), (ii), (iv)
(5) Mªkbo 368. Windows Explorer is the name of?
369. dEI;wVj ds lanHkZ esa fuEufyf[kr esa ls dkSu ,d (1) a network (2) a web browser
isfjQsjy ugha gS\ (3) a file manager (4) an internet browser
(1) dhcksMZ (2) ekml (5) a drive
(3) ekWuhVj (4) fizV
a j 369. Which of these is not a peripheral in com-
(5) enjcksMZ puter terms?
370. izR;sd osc ist dk fof'k"V ,Mªl s _____ dgykrk (1) Keyboard (2) Mouse
gSA (3) Monitor (4) Printer
(1) vkj;w,y (2) ,vkj,y (5) Motherboard
(3) ,,y;wvkj (4) ;wvkj,y 370. Every web page has a unique address called
(5) gkbijfyad a(n)?
371. ikWoj IokWbaV ______ (1) RUL (2) ARL
(1) MkWD;weVas izhijs'kal ds fy, iz;Dq r gksus okyk (3) LUR (4) URL
,d ,fIyds'ku izksxzke gSA (5) Hyperlink
(2) xzkfQDl ds fy, iz;qDr gksus okyk ,d 371. Power Point is _____.
,fIyds'ku izksxzke gS (1) an application program for document
(3) LizsM'khV ds fy, iz;qDr gksus okyk ,d preparations
,fIyds'ku izksxzke gSA (2) an application program for graphics
(4) izstsUVs'ku ds fy, iz;qDr gksus okyk ,d (3) an application program for spredsheet
,fIyds'ku izksxzke gSA (4) an application program for presentation
[52] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(5) ikWojQqy ,fIyds'kal ds fy, iz;qDr gksus


(5) a program for powerful applications
okyk ,d ,fIyds'ku izksxzke gSA 372.
The operating system is the most common
372. vkWijsfVax flLVe ______ lkW¶Vos;j dk lcls
type of _____ software?
lkekU; izdkj gSA (1) application (2) presentation software
(1) ,fIyds'ku (2) izt
s sUVs'ku lkW¶Vos;j
(3) System
(3) flLVe (4) oMZ izkl (4) word processing software
s fs lax lkW¶Vos;j
(5) dEI;wfuds'ku (5) comunication
373. 373. Which
fuEufyf[kr esa ls dkSu dEI;wVj usVodZ dk ,d of the following is not a type of com-
izdkj ugh gS\ puter network.
(1) isu (PAN) (2) ySu (LAN) (1) PAN (2) LAN
(3) oSu (WAN) (4) eSu (MAN) (3) WAN (4) MAN
(5) jSu (RAN) (5) RAN
374. Connections to other documents or to other
374. ,d osclkbV ds varxZr vU; MkWD;wesaV~l ;k
locations within a Web site are.
vU; yksd's kal ls dusDV gksus dh izfØ;k dgykrh
(1) hyperlinks
gSA (2) bots
(1) gkbijfyaDl (2) ckWV~l (3) hyperconnects
(3) gkbijdusDV~l (4) Iyx&bu~l (4) plug–ins
(5) fQYVlZ (5) filters
375. fMftVy bUQkWesZ'ku dh lcls cM+h bdkbZ gS\
375. The largest unit of digital information is?
(1) fdyksckbV (2) ckbV (1) Kilobyte (2) Byte
(3) VsjkckbV (4) esxkckbV (3) Terabyte (4) Megabyte
(5) xhxkckbV (5) Gigabyte
376. dqN fo'ks"k izksxzke] tSls ekWftyk Qk;jQkWDl]
376. Programs such as Mozilla Firefox that serve
tks osc ds varxZr usfoxscy foaMkst ds :i esa
as navigable windows into web are called?
dk;Z djrs gS] _____ dgykrs gSA (1) a networks
(1) usVodZ~l (2) gkbijfyaDl (2) Hyperlinks
(3) osc czkmtlZ (4) baVjusV (3) Web browsers
(5) ;wvkj,y (4) Internet
377. (5) URLs
fuEufyf[kr esa ls dkSu dEI;wVj Qkby use ds
377. Which of the following is contained at the
var esa varfoZ"V gksrk gS vkSj Qkby ds izdkj dk
fu/kkZj.k djus esa lgk;rk djrk gSA end of the computer file name and helps to
(1) Qkby lc use (2) Qkby izkWiVhZ determine the type of file?
(1) File sub–name
(3) Qkby ,DlVsa'ku
(2) File property
(4) Qkby use
(3) File extension
(5) Qkby ukseu s Dyspj (4) File name
378. fuEufyf[kr esa ls dkSu VsDLV ij vk/kkfjr(5) File nomenclature
vkWijsfVax flLVe gS\ 378. Which of the following is a text–based
(1) ,e,l MkWl (2) foaMkst 95 operating system?
(3) foaMkst 2000 (4) foaMkst XP (1) MS-DOS (2) Windows 95
(5) foaMkst CE (3) Windows 2000 (4) Windows XP
379. fdlh lkbV ds ,Mªsl ds vkjaHk esa vki izk;%
(5) Windows CE
'http' Vkbi djrs gS 'HTTP' dk foLrkfjr :i
379. The 'http' you type at the beginning of any
D;k gS\ site's address stands for?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [53]

Telegram @BankingGK
Telegram @BankingGK

(1) fgMsu VsDLV VªkalQj izksVksdkWy (1) Hidden Text Transfer Protocol
(2) gkbijLisl VsDuhDl ,aM VsDuksykWth izkx s l
zs (2) Hyperspace Techniques and 'Technol-
(3) gkbijLisl Ve~Zl ,aM VsDuksykWth izkVs ksdkWy ogy Progress'
(4) gkbij VsDLV VªkalQj izksVksdkWy (3) Hyperspace Terms and Technology Pro-
(5) ,pVh,e,y VªkalQj VsDuksykWth izkslsl tocol
380. dEI;wVj ds {ks= esa 'GUI' ls vfHkizk; gS\ (4) Hyper Text Transfer Protocol
(1) tujy ;wtj baVj,D'ku (5) HTML Transfer Technology process
(2) xzkfQdy ;wtj baVjQsl 380. GUI in computing stands for?
(3) xzkfQdy ;wfVfyVh baVjQsl (1) General User Interaction
(4) xqM ;wtj baVjQsl (2) Graphical User Interface
(5) xzkfQdy ;wtj baVjY;qM (3) Graphical Utility Interface
381. 'VoIP' ls rkRi;Z gS\ (4) Good User Interface
(1) oksV vksoj vkbZih (5) Graphical User Interlude
(2) okWbl vksoj vkbZih 381. VoIP stands for?
(3) osaMj vksoj vkbZih (1) Vote over IP
(4) okWbl vkWu vkbZih (2) Voice over IP
(3) Vendor over IP
(5) otZu vksoj vkbZih
(4) Voice on IP
382. _____ dEI;wVj dk ,d egRoiw.kZ {ks= gS tks
(5) Version over IP
MkVk ds izkslsLM] LVksMZ ;k vkmViqV gksus dh
382. _____ is an area of a computer that tempo-
izrh{kk djrs gq, MkVk dks vLFkk;h :i ls gksYM
rarily holds data waiting to be processed,
djrk gSA
stored or output.
(1) LVksjt s (2) enjcksMZ
(1) Storage (2) Motherboard
(3) lhih;w (4) eseksjh
(3) CPU (4) Memory
(5) ,,y;w
(5) ALU
383. fuEufyf[kr esa ls dkSu ,d dEI;wVj IokbfVax 383. What is the name of a computer pointing
buiqV fMokbl gS\ input device?
(1) ekWfuVj (2) lkmaM dkMZ
(1) monitor (2) sound card
(3) ekml (4) ekWMse (3) mouse (4) modem
(5) dhcksMZ (5) keyboard
384. dEI;wVj baLVªD'kal dks izksxzkfeax ySUxq,t esa 384. The process of writing computer instruc-
fy[kus dh izfØ;k dgykrh gS\ tions in a programming language is known
(1) baLVª'kfuax (2) dksfMax as.
(3) Qkby (4) ,Yxksfjnfeax (1) instructoning (2) Coding
(5) izkl
s fs lax (3) File (4) Algorithming
385. ^,Mh,l,y^ dk ,d MkVk dE;wfuds'ku VsDuksykWth (5) Processing
gS tks VsyhQksu ykbuksa ds ek/;e ls vf/kd rsth 385. ADSL is a data communication technology
ls MkVk Vªkalfe'ku dh vuqefr iznku djrk gS that enables faster data transmissions over
'ASDL' dk foLrkfjr :i gSA telephone lines. ADSL stands for?
(1) ,sDlhysjsVsM fMftVy lClØkbcj ykbu (1) Accelerated Digital Sub scriber line
(2) ,sDlhysjV s M
s fMftVkbTM lClØkbcj ykbu (2) Acelerated Digitized Subscriber line
[54] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(3) ,ukykWx~l fMftVy lfoZl ykbu (3) Analogous Digital Service Line
(4) ,flesfVªd fMftVy lClØkbcj ykbu (4) Asymmetric Digital Subscriber Line
(5) ,fluØkWul MkVk lClØkbcj ykbu (5) Asynchronous Data Subscriber Line
386. fuEufyf[kr esa ls dkSu MsLdVkWi ilZuy dEI;wVj 386. Which of the following is not one of the
basic components of a desktop personal
flLVe ds ewy ?kVdks esa ls ,d ugha gS\
computer system?
(1) buiqV fMokbl (1) Input Device (2) Storage Devices
(2) LVksjts fMokbl (3) System Unit (4) Internet
(3) flLVe ;wfuV (5) Display Device
(4) baVjusV 387. Which of the following is not an output de-
vice in a computer system?
(5) fMLIys fMokbl
(1) Printer (2) Keboard
387. dEI;wVj flLVe ds varxZr fuEufyf[kr esa ls (3) Monitor (4) Speaker
dkSu ,d vkmViqV fMokbl ugha gS\ (5) Plotter
(1) fizV
a j (2) dhcksMZ 388. What do we use to change the apperance
(3) ekWuhVj (4) Lihdj and positioning of text document in MS
Word?
(5) IykWVj (1) Scaling (2) Editing
388. ge ,e,l oMZ esa VsDLV MkWD;weVsa dh ,fi;jsUl (3) Re-appearance
vkSj ikWft'kfuax psat djus ds fy, fdldk (4) Indenting (5) Formatting
iz;ksx djrs gS\ 389. The term BASIC is an acronym for?
(1) LdSfyax (2) ,fMfVax (1) Balanced Assembly System Integrated
(3) fj&,fi;jsUl (4) bUMsfVax Code
(5) QkWefs Vax (2) Basic All System Internal Code
389. 'BASIC' 'kCn _____ dk laf{kIr :i gSA (3) Beginner's Assembly Syntax Instruction
(1) cSysaLM vlsEcyh flLVe bafVxzsVM s dksM Code
(4) Beginner's All purpose Symbolic Instruc-
(2) csfld vkWy flLVe baVjuy dksM
tion Code
(3) fcfxulZ vlsEcyh flUVSDl baLVªD'ku dksM (5) Basic All purpose Syntax Integrated
(4) fcfxulZ vkWy ijit flEcksfyd baLVªD'ku Code
dksM [IBPS RRB Officer CWE-V]

(5) csfld vkWy ijit flUVSDl bafVxzV s M


s dksM 390. Pathways that support communication
among the various electronic components
[IBPS RRB Officer CWE-V]
on the system board are called?
390. ikFkost tks flLVe cksMZ ij dE;wfuds'ku ds (1) Bus lines
lkFk fofHkUu bysDVªkfW ud dEiksuUs V~l dks liksVZ (2) Network lines
djrs gS] _____ dgykrs gSA (3) Logic paths
(1) cl ykbal (2) usVodZ ykbal (4) Gate ways
(3) ykWftd ikFk~l (4) xsV ost (5) Ports
(5) iksV~l
Z 391. All of the following are included in the file
391. fuEufyf[kr esa ls _____ ds flok; lHkh Qkby path except?
ikFk esa lfEefyr gksrs gSA (1) The drive
(1) Mªkbo (2) All folders and subfolders
(2) lHkh QksYMlZ vkSj lc QksYMlZ (3) The file name
(3) Qkby use (4) Qkby O;w (4) The file view
(5) fodYi ds :i esa fn, x, mi;qZDr lHkh (5) All of the above given as options
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [55]

Telegram @BankingGK
Telegram @BankingGK

392. gkMZ fMLd dk ,lsl Vkbe fdu nks dkjdksa ds 392. The hard disk's access time is determined
;ksx }kjk fuèkkZfjr fd;k tkrk gSA by the sum of which two factors?
(1) ySVsUlh vkSj jksVs'kuy Mhys (1) Latency and rotational delay
(2) lhd Vkbe vkSj vkjih,e (2) Seek time and rpm
(3) MkVk VªkalQj Vkbe vkSj IySVj fLiu jsV
(3) Data transfer time and platter spin rate
(4) lhd Vkbe vkSj ySVsUlh
(4) Seek time and latency
(5) buesa ls dksbZ ugha
(5) None of these
393. ekbØkslkW¶V ikWoj IokbaV vkSj dksjy izstUs Vs'kal
______ lkW¶Vos;j ds mnkgj.k gSA 393. Microsoft PowerPoint and Corel Presenta-
(1) LizM
s 'khV (2) izt
s Us Vs'ku tions are examples of _____ software.
(3) fMtkbu (4) MkVkcsl (1) Spreadsheet (2) Presentation
(5) oMZ izkl
s fs lax (2) Design (4) Database
394. 1 esxkckbV _____ ds leku gS\ (5) Word processing
(1) 1000 ckbV~l (2) 10000 ckbV~l 394. 1 Megabyte is equal to?
(3) 100000 ckbV~l (1) 1000 bytes (2) 10000 bytes
(4) 1000000 ckbV~l (3) 100000 bytes (4) 1000000 bytes
(5) 10000000 ckbV~l (5) 10000000 bytes
395. lhMh,e, ls D;k rkRi;Z gS\ 395. What does CDMA stand for?
(1) dksM fMfotu eYVhiy ,lsl
(1) Code Division Multiple Access
(2) dEI;wVj Mk;fyax eYVhiy ,lsl
(2) Computer Dialing Multiple Access
(3) dksM Mk;fyax eYVhiy ,lsl
(4) dEI;wVj fMfotu eYVhiy ,lsl (3) Code Dialing Multiple Access
(5) dkWy Mk;fyax eYVhiy ,lsl (4) Computer Division Multiple Access
396. dEI;wVj baLVªD'kal dks izksxzkfeax ySUxq,t esa (5) Call Dialling Multiple Access
fy[kus dh izfØ;k dgykrh gSA 396. The process of writing computer instruc-
(1) Mhcfxax (2) dEikbfyax tions in a programing language is known as.
(3) ,fXtD;wfVax (4) dksfMax (1) Debugging (2) Compiling
(5) cwfVax (3) Executing (4) Coding
397. FAT, NTFS _____ ds mnkgj.k gS\ (5) Booting
(1) Qkby flLVe (2) Mk;jsDVjh 397. FAT, NTFS are examples of.
(3) dSp (4) fLØfIVax ySUxq,t (1) File System (2) Directory
(5) vlsEcyj
(3) Cache (4) Scripting language
398. Qkbyksa dks ,d e'khu ls nwljh e'khu esa
(5) Assembler
LFkkukarfjr djus ds fy, fuEufyf[kr esa ls
398. Which of the following TCP/IP protocols is
fdl TCP/IP izksVksdkWy dk iz;ksx fd;k tkrk
gSA the used for transferring files from one ma-
(1) ,QVhih (2) ,l,u,eih chine to another?
(3) ,l,eVhih (4) vkjihbZ (1) FTP (2) SNMP
(5) ,pVh,e,y (3) SMTP (4) RPE
399. oYMZ okbM osc dks ,lsl djus ds fy, gesa (5) HTML
_____ dh vko';drk gksrh gSA 399. To access the world wide web, we need?
(1) czkmtlZ (1) Browsers
(2) baLVsV
a eSlsftax ,fIyds'kal (2) Instant messaging applications
[56] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(3) gkbZ cSM


a foM~Fk (4) lpZ batu (3) High bandwidth
(5) eksMse (4) Search engine
400. flLVe dks ^Mhcx^ djus dk vFkZ gS\ (5) Modem
(1) lgh lkW¶Vos;j dk irk yxkuk 400. To 'Debug' the system means?
(2) lgh gkMZos;j dk irk yxkuk
(1) Find the Correct Software
(3) lgh flLVe dk irk yxuk vkSj mls baLVkWy
(2) Find the Correct Hardware
djuk
(3) Find and install correct System
(4) flLVe esa ,jlZ dk irk yxkuk vkSj mls
lgh djuk (4) Find and Correct Errors on System
(5) ok;jl dk irk yxkuk vkSj mls flLVe sa (5) Find and fix the virus on System
fQDl djuk 401. Which of the following is the correct defini-
401. fuEufyf[kr esa ls izkl s fs lax dh lgh ifjHkk"kk gS\ tion of processing?
(1) vFkZi.w kZ lwpuk izLrqr djus ds fy, MkVk dks (1) Manipulating data to produce meaning-
eSfuiqyVs djuk ful information
(2) dEI;wVj flLVe dks iz;ksx djus ds ;ksX; (2) Initialization of a computerized system
cukuk (3) Locating and fixing anomalies
(3) vukWesfyt dk irk yxkuk vkSj fQDl (4) Converting assembly language into ex-
djuk ecutable machine code
(4) vlsEcyh ySUxq,t dks ,fXtD;wVc s y e'khu
(5) None of these
dksM esa ifjofrZr djuk
(5) buesa ls dksbZ ugha 402. What does the abbreviation DBMS stand
402. laf{kIr 'kCn 'Mhch,e,l' ls D;k rkRi;Z gS\ for?
(1) MkVkcsl eSfiax flLVe (1) Database Mapping System
(2) MkVk ckWjksfoax ,aM ewoesaV lkW¶Vos;j (2) Data Borrowing and Movement Software
(3) MkVkcsl eSfuiqys'ku lkW¶Vos;j (3) Database Manipulation Software
(4) fMftVy csl eSfiax flLVe (4) Digital Base Mapping System
(5) MkVkcsl eSustesaV flLVe (5) Database Management System
403. ekWuhVj ds jhtksY;w'ku dks buØht djus dh 403. Increasing the resolution of a monitor is
izfØ;k dgykrh gSA known as?
(1) baVjikWy's ku (2) MkmulSEifyax
(1) Interpolation (2) Downsampling
(3) vilSEifyax (4) cwfLVax
(3) Upsampling
(5) jkLVsjkbftax
404. og LVksjt s ,fj;k ftldk iz;ksx LihM esa fMQjsl a (4) Boosting
ds dkj.k dkWeiulsV gsrq MkVk dks LVksj djus (5) Rasterizing
ds fy, fd;k tkrk gS] bl LihM ij fofHkUu 404. A storage area used to store data to a com-
bdkbZ;kWa MkVk dks gSaMy dj ldrh gS\ pensate for the difference in speed at which
(1) eseksjh (2) cQj the different units can handle data is?
(3) ,D;wE;qysVj (4) vMªl s (1) Memory (2) Buffer
(5) dSp (Cache) (3) Accumulator (4) Address
405. og izksVksdkWy] tks Qkbyksa dks osc loZj ds ek/ (5) Cache
;e ls gLrkafjr djus dh vuqefr nsrk gS 405. The protocol that allows files to be trans-
ftlds ifj.kkeLo:i vki czkmtj dk iz;ksx ferred from a Web server so that you can
djrs gq, Qkbyks dks vius dEI;wVj ij ns[k see them on your computer by using a
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [57]

Telegram @BankingGK
Telegram @BankingGK

ldrs gS] ____ dgykrk gSA browser is.


(1) HTTPS (2) NAK (1) HTTPS (2) NAK
(3) HTTP (4) XHTML (3) HTTP (4) XHTML
(5) IXP (5) IXP
406. ,d ckbV fdrus fcV~l ds leku gksrk gS\ 406. One byte is equal to how many bits?
(1) 4 fcV~l (2) 8 fcV~l (1) 4 bits (2) 8 bits
(3) 16 fcV~l (4) 32 fcV~l (3) 16 bits (4) 32 bits
(5) 64 fcV~l (5) 64 bits
407. laf{kIr 'kCn .com dk vFkZ gS\ 407. The abbreviation .com stands for?
(1) dkWef'kZ;y (2) dEI;wVj (1) Commercial (2) Computer
(3) dEIyhV (4) dEiksTM (3) Complete (4) Composed
(5) dEiksuUs V (5) Component
408. MS-DOS _____ vkWijsfVax flLVe gSA 408. MS-DOS is ____ operating system.
(1) ;wfuDl (2) ekbØkslkW¶V (1) Unix (2) Microsoft
(3) ykbuDl (4) eSd (3) Linux (4) Mac
(5) ikbFku (5) Python
409. yks ysoy QkWesZfVax }kjk gkMZ fMLd Mªkbo ij 409. The gridlike pattern, created on a hard disk
fufeZr fxzM ds leku izrhr gksus okyk iSVuZ drive by low level formating a composed of.
____ dk cuk gksrk gSA (1) read heds and write heads
(1) jhM gsM~l vkSj jkbV gsM~l (2) tracks and sectors
(2) VªSDl vkSj lsDVlZ (3) platters and segments
(3) IySVlZ vkSj lsXesVa ~l (4) megabits and megabytes
(4) esxkfcV~l vkSj esxkckbV~l (5) None of these
(5) buesa ls dksbZ ugha 410. DSL is an example of a(an) _____ connec-
410. ^Mh,l,y^ ____ dusD'ku dk ,d mnkgj.k tion.
gS\ (1) Network (2) Wireless
(1) usVodZ (2) ok;jysl (3) Slow (4) Broadband
(3) Lyks (4) czkM
W cSM
a (5) Satellite
(5) lSVy s kbV 411. Which of the following statements correctly
411. fuEufyf[kr esa ls dkSu&lk dFku FkzSflax dks define thrashing?
iw.kZr% lgh :i esa ifjHkkf"kr djrk gS (1) Swapping data between virtual memory
(1) opqZvy eseksjh vkSj jSe ds e/; yxkrkj gksus and RAM too frequently
okyh MkVk LoSfiax (2) Insufficient hard disk space
(2) vi;kZIr gkMZ fMLd Lisl (3) Too many processors being managed by
(3) vkWijsfVax flLVe }kjk lapkfyr gksus okys the operating system
izkslsllZ dh vfèkd la[;k (4) Inaccurate information stored in the reg-
(4) jftLVªh esa LVksMZ xyr bUQkWesZ'ku istry
(5) buesa ls dksbZ ugha (5) None of these
412. vkidk dEI;wVj fdl izdkj dh csfld eseksjh 412. What is the basic type of memory that your
dk iz;ksx djrk gS\ computer uses?
(1) RAM (2) RW/RAM (1) RAM (2) RW/RAM
(3) PROM (4) ERAM (3) PROM (4) ERAM
(5) POST (5) POST

[58] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

413. laf{kIr 'kCn ASCII ls D;k rkRi;Z gS\ 413. What does ASCII stand for?
(1) vesfjdu Lis'ky dEI;wVj QkWj bUQkWesZ'ku (1) American Special Computer for Informa-
baVjpsat tion Interchange
(2) vesfjdu LVSaMMZ dEI;wVj QkWj bUQkWesZ'ku (2) American Standard Computer for Infor-
mation Interchange
baVjpsat
(3) American Standard Code for Information
(3) vesfjdu LVSaMMZ dksM QkWj bUQkWesZ'ku
Interchange
baVjpsat (4) American Special Code for Information
(4) vesfjdu Lis'ky dksM QkWj bUQkWesZ'ku Interchange
baVjpsat (5) None of these
(5) buesa ls dksbZ ugha 414. A file name with extension as VXD repre-
414. VXD Qkby ,DlVsa'ku Qkbyuse ds :i esa sents a?
____ dk izfrfufèkRo djrk gSA (1) Text file (2) Normal application file
(1) VsDLV Qkby (2) ukWey Z ,fIyds'ku Qkby (3) Device drivers (4) Picture file
(3) fMokbl MªkbolZ
(5) System file
(4) fiDpj Qkby (5) flLVe Qkby
415. The Binary language is of ____ bits.
415. ckbujh fLVªx a esa _____ fcV~l gksrs gS\ (1) 2 bits (2) 4 bits
(1) 2 fcV~l (2) 4 fcV~l (3) 6 bits (4) 8 bits
(3) 6 fcV~l (4) 8 fcV~l (5) 10 bits
(5) 10 fcV~l 416. Which of the following is not an operating
416. fuEufyf[kr esa ls dkSu ,d vkWijsfVax flLVe system?
ugha gS\ (1) Linux (2) Windows
(1) ykbuDl (2) foaMkst (3) Android (4) Unix
(3) ,aMkª ;
W M (4) ;wfuDl (5) C
(5) lh 417. Which of the following is the correct de-
417. fuEufyf[kr esa ls fcV~] ckbV] QhYM] fjdkWMZ] scending order of bit, byte, filed, record, file?
Qkby dk lgh vojksgh Øe dkSu lk gSA (1) Byte, bit, record, file, field
(1) ckbV] fcV] fjdkWMZ] Qkby] QhYM (2) Bit, byte, file, filed, record
(2) fcV] ckbV] Qkby] QhYM] fjdkWMZ (3) Byte, bit, field, file, record
(3) ckbV] fcV] QhYM] Qkby] fjdkWMZ (4) Bit, byte, field, record, file
(4) fcV] ckbV] QhYM] fjdkWMZ] Qkby (5) Byte, bit, file, field, record
(5) ckbV] fcV] Qkby] QhYM] fjdkWMZ 418. Which of the following is a utility program
418. fuEufyf[kr esa ls dkSu ,d ;wfVfyVh izksxzke gS that locates and eliminates unncessary frag-
tks vkWfIVekbt vkWijs'kal ds fy, vuko';d ments and rearranges files and unused disk
ÝsxesaV~l dk irk yxkrk gS mls fu"dkflr space to optimize operations?
djrk gS vkSj Qkbyksa ,oa viz;qDr fMLd Lisl
(1) Rebooting (2) Uninstall
dks jhvjSat djrk gSA
(3) Backup
(1) jhcwfVax (2) vubaLVkWy
(3) cSdvi (4) fMLd fMÝsXesaVs'ku (4) Disk defragmentation
(5) Qkby dEizs'ku (5) File Compression
419. dkSu lh dqaft;kWa (dht) uEcj dks 'kh?kzrk ls 419. Which keys enable the input of numbers
buiqV djus dh vuqefr nsrh gS\ quickly?
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [59]

Telegram @BankingGK
Telegram @BankingGK

(1) Ctrl, Shift vkSj Alt (1) ctrl, shift and alt
(2) QaD'ku dht (3) U;wesfjd dhiSM (2) function keys
(4) ,sjks dht (5) buesa ls dksbZ ugha (3) numeric keypad
420. fuEufyf[kr esa ls dkSu lsaVªy izkslsflax ;wfuV (4) arrow keys (5) None of these
(lhih;w) ds ?kVd gS\ 420. Which of the following are components of
(1) vfjFkesfVd ykWftd ;wfuV ekml Central Processing Unit (CPU)?
(2) vlsEcyj daVªksy ;wfuV (1) Arithmetic logic unit Mouse
(3) vfjFkesfVd ykWftd ;wfuV bafVxzV s Ms lfdZVl
~ (2) Assembler, Control Unit
(4) daVªksy ;wfuV ekWuhVj (3) Arithmetic logic unit, integrated Circuits
(5) vfjFkesfVd ykWftd ;wfuV daVªksy ;wfuV (4) Control Unit, Monitor
421. oh,l,Vh (VSAT) dk foLrkfjr :i D;k gS\ (5) Arithmetic logic unit, control unit
(1) osjh LekWy vipZj VfeZuy 421. What does VSAT stand for?
(2) oSfjbax lkbt vipZj VfeZuy (1) Very Small Aparture Terminal
(3) osjh LekWy ,ukykWx VfeZuy (2) Varying Size Aperture Terminal
(4) oSfjbax LekWy ,ukykWx VfeZuy (3) Very Small Analog Terminal
(5) buesa ls dksbZ ugha (4) Veryang Small Analog Terminal
422. ^vkbZih^ vMªls D;k gS\ (5) None of these
(1) baVjusV izkVs ksdkWy vMªsl 422. What is an IP address?
(2) baVjuy izkWDlh vMªsl
(1) Internet Protocol address
(3) baVjusV izkWDlh vMªsl
(2) Internal Proxy address
(4) baVjuy izksVksdkWy vMªsl
(3) Internet Proxy address
(5) buesa ls dksbZ ugha
(4) Internal Protocol address
423. _________ dEI;wVj gkMZo; s j dk ,d ?kVd gS
(5) None of these
tks dEI;wVj dks dEI;wVj usVodZ ls dusDV
423. _____ is a computer hardware component
djrk gSA
that connects a computer to computer net-
(1) usVofdZx baVjusV dusD'ku
work.
(2) U;wvj baMfLVª;y dEI;wVj
(1) Networking Internet Connection
(3) usVodZ bafVxzs'ku dkMZ
(2) Newer Industrial Computer
(4) usVodZ baVjuy dkMZ
(5) usVodZ baVjQsl dkMZ (3) Network Integration Card
424. usVck;kst (Net BIOS) lfoZlt s ds }kjk _____ (4) Network Internal Card
dh lqfo/kk iznku dh tk ldrh gSA (5) Network Interface Card
(1) ,QVhih lfoZl (2) VsyusV lfoZl 424. Net BIOS services can be enabled to permit.
(3) VsyusV lfoZlt s esa fjlkslZt s dks 'ks;j djus (1) FTP service (2) Telnet service
dh vuqefr (3) Sharing resources in telnet services
(4) foaMkst bUok;jesaV esa fjlkslsZt dks 'ks;j (4) Sharing resources in windows environ-
djus dh vuqefr ment
(5) VsyusV lfoZlst 'ks;j djus dh vuqefr (5) Telnet services does not permit any shar-
iznku ugha djrh ing
425. oh,y,,u dk iw.kZ :i D;k gS\ 425. What does VLAN stand for?
(1) opqZvy yksdy ,fj;k usVodZ (1) Virtual Local Area Network

[60] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(2) osfj,cy yksdy ,fj;k usVodZ (2) Variable Local Area Network
(3) ohfM;ks yksdy ,fj;k usVodZ (3) Video Local Area Network
(4) fotqvy yksdy ,fj;k usVodZ (4) Visual Local Area Network
(5) buesa ls dksbZ ugha (5) None of these
426. fuEufyf[kr esa ls dkSu ,d osc fLØfIVax ySUxq,t 426. Which of the following is not a web script-
ugha gS\ ing language?
(1) ,,lih (2) Mh,lih (1) ASP (2) DSP
(3) ts,lih (4) ih,pih (3) JSP (4) PHP
(5) ,pVh,e,y (5) HTML
427. ^vks,yVhih^ (OLTP) dk foLrkfjr :i D;k gS\ 427. What does OLTP stand for?
(1) vkWuykbu Vªkt a sD'ku izkslsflax (1) Online Transaction Processing
(2) vkWfIVdy ykbu VsDuksykWth izkslsl (2) Optical Line Technology Process
(3) vkWuykbu VfeZuy iksVZ (3) Online Terminal Port
(4) vkmViqV ykbu VsDuksykWth izkslsl (4) Output Line Technology Process
(5) vkWuykbu VsDuksykWth izkl s sl (5) Online Technology Process
428. bufVVht dk dysD'ku dgykrk gS\ 428. A collection of entities is called on?
(1) bufVVh ,fi;jsal (1) Entity appearance
(2) bufVVh lsV (2) Entity set
(3) bufVVh baLVsl (3) Entity instance
(4) bufVVh vkWCtsDV (4) Entity object
(5) bufVVh iksVZ (5) Entity instance
429. What does ATM stand for?
429. ,Vh,e ls D;k rkRi;Z gS\
(1) Access Time Mode
(1) ,lsl Vkbe eksM
(2) Automated Teller Machine
(2) vkWVksesVsM Vsyj e'khu
(3) Asynchronous Transfer Modulation
(3) vfluØkWul VªaklQj eksM;wy's ku
(4) Automatic Transaction Machine
(4) vkWVksesfVd VªkatsD'ku e'khu
(5) Adaptive Transfer Mode
(5) vMSfIVo VªkalQj eksM [LIC AAO Online Exam 05.03.2016]
[LIC AAO Online Exam 05.03.2016]
430. Single word reference to viruses, worms etc
430. ok;jl] okWe~l bR;kfn ds fy, iz;qDr gksus okyk is?
,dy 'kCn gS\ (1) harmware (2) virus
(1) gkeZo;s j (2) ok;jl
(3) eyos;j (3) malware (4) phish
(4) fQ'k (5) fdyjos;j (5) killerware
431. eseksjh ls izksxzke baLVªD'ku ;k MkVk vkbVe 431. Choosing a program instruction or data item
p;u djus dh izfØ;k dgykrh gSA from memory is called?
(1) fMdksfMax (2) LVksfjax (1) decoding (2) storing
(3) Qsfpax (4) fMVsfpax (3) fetching (4) detaching
(5) budksfMax (5) encoding
432. ekml] VªdS ckWy vkSj tkW;fLVd ____ ds mnkgj.k 432. Mouse, trackball and joystick are the ex-
gS\ amples of.
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [61]

Telegram @BankingGK
Telegram @BankingGK

(1) IokWbfVax fMokblst (1) Pointing devices


(2) LdSfuax fMokblst (2) Scanning devices
(3) LVksfjax fMokbl (3) Storing device
(4) eYVhehfM;k fMokbl (4) Multimedia device
(5) ck;ksefs Vªd fMokbl (5) Biometric device
433. oh,y,lvkbZ baVhxzsVsM lfdZV~l fuekZ.k djus 433. VLSI is a process in creating Integrated Cir-
dh ,d izfØ;k gS ^oh,y,lvkbZ^ dk foLrkfjr cuits, VLSI stands for
:i gS (1) Very– Large Scale Integration
(1) osjh&yktZ Ldsy baVhxzs'ku
(2) Visual –Large Scale Integration
(2) fotqvy&yktZ Ldsy baVhxzs'ku
(3) opqZvy&yktZ Ldsy baVhxzs'ku (3) Virtual– Large Scale Integration
(4) osjh&yktZ Ldsy baVjusV (4) Very– Large Scale Internet
(5) fotqvy&yktZ Ldsy baVjusV (5) Visual– Large Scale Internet
434. dEI;wVj izksxzke D;k gS\ 434. What is a computer program?
(1) dEI;wVj lkW¶Vos;j (1) Computer software
(2) ,d baLVªD'ku (2) an instruction
(3) iz;ksx gksus okyh ,d dEI;wVj ,fDVfoVh (3) a computer activity to use
(4) dksMksa dk ,d lewg (4) a set of codes
(5) baLVªD'kal dk ,d lewg tks dEI;wVj dks (5) a set of instructions that tells the com-
crkrk gS fd D;k djuk pkfg, puter what to do
435. fdlh oscist dk ykWftdy ,Mªsl D;k gS\ 435. What is the logical address of a Webpage?
(1) ,DlVs'a ku (2) izkV
s ksdkWy
(3) Mk;jsDVjh (4) Mkseus (1) Extension (2) Protocol
(5) ;wvkj,y (3) Directory (4) Domain
436. fuEufyf[kr esa ls dkSu ,d LVksjst fMokbl (5) URL
ugha gS\ 436. Which is not a strong device?
(1) gkMZ fMLd (2) MhohMh (1) A Hard Disk (2) A DVD
(3) LdSuj (4) lhMh (3) A Scanner (4) A CD
(5) ¶ykWih fMLd (5) A Floppy Disk
437. lso dh xbZ dEI;wVj Qkby LFkk;h :i ls 437. A computer file that is saved is permanently
_____ ij lso jgrh gS\ saved on the.
(1) jSe (2) gkMZ fMLd (1) RAM (2) Hard Disk
(3) ekWuhVj (4) jkse
(3) Monitor (4) ROM
(5) LdSuj
438. _____ ls rkRi;Z lkW¶Vos;j dh vukf/kd`r dkWih (5) Scanner
vkSj forj.k ls gSA 438. ____ refers to the unauthorised copying and
(1) lkW¶Vos;j ikbjslh distribution of software.
(2) gSfdax (3) ØSfdax (1) Software piracy
(4) IysfxfuTe (5) lkW¶Vos;j fyVjslh (2) Hacking (3) Cracking
439. dEI;wVj 'kCnkoyh ds varxZr ^;w,lch^ dk (4) Plagarism (5) Software literacy
foLrkfjr :i D;k gS 439. USB in computer parlance stands for
(1) ;wfuolZy lhfj;y cl (1) Universal Serial Bus
(2) ;wfuolZy flLVe cl (2) Universal System Bus
(3) vudkmaVsM flLVe cl
(3) Uncounted System Bus
(4) ;wfuolZy lhfj;y cSdvi
(4) Universal Serial Backup
(5) ;wfuolZy flLVe cSdvi
(5) Universal System Backup
440. osc ij bUQkWesZ'ku QkbaM djus ds fy,] _____ 440. To find information on the Web, it is best to
batu dk iz;ksx ,d loZJs"B fodYi gSA use a ____ engine.
[62] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) osc (2) izkx


s zke (1) Web (2) Program
(3) lpZ (4) LizMS 'khV (3) Search (4) Spreadsheet
(5) gkse ist (5) Home page
441. ekbØkslkW¶V foaMkst ,d _____ gSA 441. Microsoft Windows is a (an)?
(1) vkWijsfVax flLVe (1) Operating System
(2) izstsaV's ku izksxzke (2) Presentation Program
(3) Database Program
(3) MkVkcsl izkx s zke
(4) Graphics Program
(4) xzkfQDl izkx s z ke (5) Word processing Program
(5) oMZ izkslfs lax izkx s z ke 442. Converting the computer language of 1's and
442. dEI;wVj ySUxq,t ds 1's vkSj 2's dks O;fDr }kjk 2's to characters that a person can under-
le> ldus ;ksX; dSjsDVjksa esa ifjofrZr djus stand is called?
dh izfØ;k _____ dgykrh gSA (1) decoding (2) selecting
(1) fMdksfMax (2) lsysfDVax (3) generating (4) emailing clip art
(3) tsujs fs Vax (4) bZ&esfyax fDyi&vkVZ (5) highlighting
(5) gkbZykbfVax 443. Which type of operating system allows si-
443. fuEufyf[kr esa ls fdl izdkj dk vkWijsfVax multaneous access to a computer system
flLVe nks ;k mlls vf/kd VfeZuyksa ds }kjk through two or more terminals?
dEI;wVj flLVe dks ,d lkFk ,Dlsl djus dh (1) Batch processing
vuqefr iznku djrk gSA
(2) Multi user
(1) cSp izkl s fs lax (2) eYVh&;wtj
(3) Multi tasking
(3) eYVh&VkfLdax (4) eYVh&izkl s fs lax
(4) Multi processing
(5) Vkbe 'ks;fjax
(5) Time sharing
444. dEI;wVj dk fjlkbfdy fcu LVksj djrk gS\ 444. The Recycle Bin in a computer stores?
(1) Nqih gqbZ Qkbyksa vkSj QksYMjksa dks (1) Hidden files and folders
(2) Nqis vkSj fMyhV gks pqds QksYMjksa dks (2) Hidden and Deleted folders
(3) fMyhV fd, x, Qkbyksa vkSj QksYMjksa dks (3) Deleted files and folders
(4) ¶ykWih fMokbl esa lso dh xbZ Qkbyksa vkSj (4) Files and folders in floppy device
QksYMjksa dks (5) Hidden and Deleted files
(5) Nqih vkSj fMyhV dj nh xbZ Qkbyksa dks 445. Which of the following is smallest unit of
data storage?
445. fuEufyf[kr esa ls dkSu MkVk LVksjt s dh lcls
(1) TB (2) KB
NksVh bdkbZ gS\ (3) MB (4) GB
(1) VsjkckbV (2) fdyksckbV (5) Petabyte
(3) esxkckbV (4) xhxkckbV 446. UNIX is a(n) ___ OS.
(5) isVkckbV (1) Windows
446. ;wfuDl ,d _____ vkWijsfVax flLVe gSA (2) Mac
(1) foaMkst (2) eSd (3) Expensive
(3) ,DlisfUlo (4) ekbØkslkW¶V (4) Microsoft
(5) vksiu lkslZ (5) Open source
447. czkmtj ______ 447. A browser is.
(1) osc istkas dks lpZ djsu okyk ,d lkW¶Vos;j (1) software tool for looking at web pages
Vwy gS
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [63]

Telegram @BankingGK
Telegram @BankingGK

(2) osc istksa dks fØ,V djus okyk ,d lkW¶Vos;j (2) software for creating web pages
Vwy gS (3) tool for defining web pages
(3) osc istksa dks ifjHkkf"kr djus okyk ,d Vwy (4) software tool for describing web pages
gS (5) software tool for looking at pages
(4) osc istksa dk o.kZu djus okyk ,d lkW¶Vos;j
448. Which one of the following should not con-
Vwy gS
(5) istksa dks lpZ djus okyk ,d lkW¶Vos;j Vwy sidered as a form of secondary storage?
gS (1) floppy disk (2) optical disk
448. fuEufyf[kr esa ls fdls lsdM a jh LVksjt
s dk :i (3) hard disk (4) pen drive
ugha ekuk tkuk pkfg,\ (5) RAM
(1) ¶ykWih fMLd (2) vkWfIVdy fMLd
449. Which of the following is the correct order
(3) gkMZ fMLd (4) isu Mªkbo
(5) jSe of the four major functions of a computer?
449. fuEufyf[kr esa ls dkSu lk ,d dEI;wVj ds pkj (1) Input, Output, Process, Storage
izeq[k dk;ksZ dk lgh Øe gS\ (2) Process, Output, Input, Storage
(1) buiqV] vkmViqV] izkslsl] LVksjt s (3) Process, Storage, Input, Output
(2) izkslsl] vkmViqV] buiqV] LVksjst
(4) Storage, Output, Process, Input
(3) izkslsl] LVksjst] buiqV] vkmViqV
(4) LVksjt s ] vkmViqV] izkslsl] buiqV (5) Input, Process, Output, Storage
(5) buiqV] izkslsl] vkmViqV] LVksjt s 450. A _____ and monitor are the two main out-
450. ______ vkSj ekWuhVj dEI;wVj flLVe ds nks put devices for a computer system.
izeq[k vkmViqV fMokbl gS\ (1) Plotter (2) Storage Device
(1) IykWVj (2) LVksjts fMokbl
(3) Printer (4) Keyboard
(3) fizVa j (4) dhcksMZ
(5) ekml (5) Mouse
451. tc vki dEI;wVj ij fdlh MkWD;weVsa dks Vkbi 451. When you type a document on a computer,
djrs gS rks vkids }kjk Vkbi fd;k x;k izR;sd every letter you type is saved to the
v{kj dEI;wVj ds ______ ;k VsEiksjsjh LVksjt s computer's ___ or temporary storage area.
,fj;k esa lso gks tkrk gS\
(1) CPU (2) CD-ROM
(1) lhih;w (2) lhMh&jkse
(3) jkse (4) jSe (3) ROM (4) RAM
(5) gkMZ fMLd (5) Hard Disk
452. esxkgV~Zt ;k 'MHz' 'kCn dk vFkZ gS\ 452. The term megahertz or MHZ means?
(1) lkS lkbfdYl izfr feuV (1) hundreds of cycles per minute
(2) ,d gtkj lkbfdYl izfr lsdaM
(2) thousands of cycles per second
(3) fcfy;al lkbfdYl izfr lsdaM
(4) fefy;al lkbfdYl izfr feuV (3) billions of cycles per second
(5) fefy;al lkbfdYl izfr lsdaM (4) millions of cycles per minute
453. ,pVhVhih dk foLrkfjr :i gS\ (5) millions of cycles per second
(1) gkbijVSDLV VªkalQj izksVksdkWy 453. HTTP stands for?
(2) gkbijVsDLV VªkalQj izSfDVdy (1) Hypertext Transfer Protocol
(3) gkbijVsDLV Vªkalfe'ku izksVksdkWy (2) Hyptertext Transfer Practical
(4) gkbijVsDLV VªkalQj izSfDVl (3) Hypertext Transmission Protocol
(5) fn, x, fodYiks ds vykok (4) Hypertext Transfer Practice
454. fuEufyf[kr esa ls dkSu lk ,d buiqV fMokbl (5) None of those given as options
gS\ 454. Which of the following is an input device?
[64] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(1) IykWVj (2) LdSuj (1) Plotter (2) Scanner


(3) ykmMLihdj (4) fizVa j (3) Loudspeaker (4) Printer
(5) ,,y;w (5) ALU
455. fuEufyf[kr esa ls dkSu DOS ij vk/kkfjr ,d 455. Which of the following is a popular DOS
yksdfiz; LizsM'khV gS\ based spreadsheet?
(1) oMZ (2) ,Dlsl (1) Word (2) Access
(3) ,Dlsy (4) LekVZ lsy (3) Excel (4) Smart Cell
(5) yksVl 1-2-3 (5) Lotus 1-2-3
456. vki dEI;wVj esa MkVk ,aVj djus ds fy, 456. What do you use to enter data into the com-
fuEufyf[kr esa ls fdldk iz;ksx djrs gS\ puter from the following?
(1) LØhu (2) dhcksMZ
(1) screen (2) keyboard
(3) IykWVj (4) fiazVj
(3) plotter (4) printer
(5) Lihdj
(5) speaker
457. ______ czkmtj lkW¶Vos;j dk ,d mnkgj.k
457. _____ is an example of browser software
gS\
(1) Microsoft Power Point
(1) ekbØkslkW¶V ikWoj IokbUV
(2) Microsoft Publisher
(2) ekbØkslkW¶V ifCy'kj
(3) foaMkst ,DlIyksjj (3) Windows Explorer
(4) ekbØkslkW¶V ,DlIyksjj (4) Microsft Explorer
(5) baVjusV ,DlIyksjj (5) Internet Explorer
458. fuEufyf[kr esa ls dkSu lk ,d izkx
s kz feax ySUxq,t 458. Which of the following is a programming
gS\ language?
(1) ,e,l&vkmVyqd (1) MS-Outlook (2) MS-Word
(2) ,e,l&oMZ (3) usVLdsi (3) Netscape (4) Lotus
(4) yksVl (5) ikLdy (5) Pascal
459. dEI;wVj ds {ks= esa .TXT, .DOC, .SMP ____ 459. .TXT, .DOC, .SMP in computing are.
gSA (1) Complex Commands
(1) dkWEIysDl dekaM~l (2) file names
(2) Qkby usEl (3) file extensions
(3) Qkby ,DlVsa'kl (4) file titles
(4) Qkby VkbVYl (5) keywords
(5) dhoM~l Z [SIDBI Online Exam 24.02.2016]
[SIDBI Online Exam 24.02.2016] 460. Which of the following is not an output de-
460. dEI;wVj laxBu esa fuEufyf[kr esa ls dkSu ,d vice in a computer organization?
vkmViqV fMokbl ugha gS\ (1) Printer (2) Monitor
(1) fizVa j (2) ekWuhVj (3) Scanner (4) Plotter
(3) LdSuj (4) IykWV~j (5) Speaker
(5) Lihdj 461. In word processing, the efficient way to
461. oMZ izkl
s fs lax es]a rhljs iSjkxzkQ dks ikWp
a osa iSjkxzkQ move the 3rd paragraph to place it after 5th
ds ckn Iysl djus dk loZJs"B fodYi gS\ paragraph is.
(1) dV ,aM isLV (2) dkWih ,aM isLV (1) Cut and paste (2) Copy and paste
(3) fMyhV ,aM dkWih (3) Delete and copy
(4) ,fMV ,aM isLV (4) Edit and paste
(5) fMyhV ,aM isLV (5) Delete and paste
462. baVjusV esa ^vkbZ,lih^ ls rkRi;Z gS\ 462. ISP in internet term stands?

JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [65]

Telegram @BankingGK
Telegram @BankingGK

(1) bafVfytsaV loZj izkM


s D'ku (1) Intelligent Server Provider
(2) baLVsUV lfoZl izksMD'ku (2) Instant Service Production
(3) bUQkWesZ'ku lfoZl izkos kbMj (3) Information Service Provider
(4) bUQkWesZ'ku lfoZl izkos kbMj (4) Information Service Production
(5) baVjusV lfoZl izksokbMj (5) Internet Service Provider
463. fuEufyf[kr esa ls dkSu&lk vkWijsfVax flLVe 463. Which of the following operating systems
dekaM ykbu baVjQsl dk iz;ksx djrk gS\ use command line interface?
(1) Mac OS X (2) LINUX (1) Mac OS X (2) LINUX
(3) Windows 7 (4) Windows Xp (3) Windows 7 (4) Windows XP
(5) MS DOS (5) MS DOS
464. fuEufyf[kr esa ls dkSu dEizLs M vkfpZo ls Qkby 464. Which of the following refers to the pro-
fjewo djus dh izfØ;k ls lacf/kr gSA cess of removing a file from a compressed
(1) baLVkWfyax (2) iqfyax archive?
(3) ,DlVªSfDVax (4) vu~bLa Vkfyax (1) installing (2) pulling
(5) fj;ykbftax (3) extracting (4) uninstalling
465. dqN fMokbl] tSls ekWuhVlZ vkSj fizaVlZ] tks (5) realizing
dEI;wVj ls dusDV jgrs gS] _____ dgykrs gSA 465. Devices such as monitors and printers that
(1) izkl
s fs lax fMokblst are connected to the computer are called?
(2) isfjQsjy fMokblst (1) Processing devices
(3) buiqV fMokblst (2) Peripheral devices
(4) vkmViqV fMokblst (3) Input devices
(5) fn, x, fodYiks ds vykok (4) Output devices
466. laf{kIr 'kCn 'DVD' dk foLrkfjr :i D;k gS (5) None of these
(1) fMftVy olsZVkby fMLdsVh
466. What does the acronym DVD stand for?
(2) fMftVy fotqvy fMLdsVh
(1) Digital Versatile Diskette
(3) fMftVy olsZVkby fMLd
(2) Digital Visual Diskette
(4) fMftVy fotqvy fMLd
(3) Digital Versatile Disc
(5) fMftVy oSY;w fMLdsVh
(4) Digital Visual Disc
467. vokafNr vkSj v;kfpr (vu~lkWfyflVsM) bZ&esYl
(5) Digital Value Diskette
dgykrs gS\
467. Unwanted and unsolicited e-mails are called
(1) LI;wfjvl esy
(1) Spurious mail (2) Trash
(2) VªS'k (3) LiSe
(3) Spam (4) Outlook
(4) vkmVyqd (5) xksQj
(5) Gopher
468. osc istksa dks fØ,V djus ds fy, ^,pVh,e,y^
468. HTML used to create web pages, stands
dk iz;ksx fd;k tkrk gSA ,pVh,e,y dk vFkZ
for?
gS\
(1) gkbij VsDLV ekdZvi ySUxq,t (1) Hyper Text Markup Language
(2) gkbij VsDLV e'khu ySUxq,t (2) Hyper Text Machine Language
(3) gkbij Vkbi ekdZvi ySUxq,t (3) Hyper Type Markup Language
(4) gkbij Vkbi ekfdZax ySUxq,t (4) Hyper Type Marking Language
[66] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

(5) gkbij Vkbi e'khu ySUxq,t (5) Hyper Type Machine Language
469. ^oh,y,lvkbZ^ baVhxzsVM 469. In VLSI integrated circuit technology, VLSI
s lfdZV VsDuksykWth esa
^oh,y,lvkbZ^ dk D;k vFkZ gS\ stands for?
(1) osjh yks flD;qfjVh bUQkWeZ's ku (1) Very Low Security Information
(2) osjh yktZ Ldsy baVhxzs'ku (2) Very Large Scale Integration
(3) osjh yks flD;qfjVh baVhxzs'ku (3) Very Low Scale Integration
(4) osjh yktZ Ldsy bUQkWesZ'ku (4) Very Large Scale Information
(5) osjh yks Ldsy bUQkWeZ's ku (5) Very Low Scale Information
470. 470.
fuEufyf[kr esa ls lcls cM+h eseksjh gS\ The biggest memory size in the following
(1) fdyksckbV (2) VsjkckbV is?
(3) esxkckbV (4) xhxkckbV (1) Kilobyte (2) Terabyte
(5) isVkckbV (3) Megabyte (4) Gigabyte
471. ^,pVhih,l^ ls rkRi;Z gS\ (5) Petabyte
(1) gkbij Vªkl 471.
a Qj izksVksdkWy lfoZl HTPS stands for?
(1) Hyper Transfer Protocol Service
(2) gkbijVsDLV VªkalQj ijfe'ku flD;qfjVh
(2) Hypertext Transfer Permission Security
(3) gkbZ VªSfQd VªkalQj izkV s kdkWy lfoZl
(3) High Traffic Transfer Protocol Service
(4) gkbijVsDLV VªkalQj izksVksdkWy lfoZl
(4) Hypertext Transfer Protocol Service
(5) gkbijVsDLV VªfS Qd ijfe'ku izkV s ksdkWy lfoZl
(5) Hyptertext Traffic Permission Protocol
472. jkse chvkbZvks,l esa lf{kIr 'kCn 'BIOS' dk D;k
Service
vFkZ gS\ 472. In ROM BIOS, the acronym BIOS stands
(1) csfld buiqV vkWxsZukbts'ku flLVe
for?
(2) csfld bUQkWesZ'ku vkmViqV flLVe
(1) Basic Input Organization System
(3) csfld buiqV vkmViqV flLVe
(2) Basic Information Output System
(4) csfld baMLVªh vkmViqV flLVe (3) Basic Input Output System
(5) csfld bfuf'k,fVo vkmViqV flLVe (4) Basic Industry Output System
473. flLVe ds igys ls gh ikWoMZ vkWu gksus ij(5) Basic Intutive Output System
fuEufyf[kr esa ls dkSu flLVe dks fjLVkVZ
473. Which of the followng refers to restarting
djus ls lacf/kr gS\ the system when it is already powered on?
(1) ,d LVªkWUx cwV (2) gkbcjus'ku (1) A strong boot (2) Hibernation
(3) ,d okeZ cwV (4) LVSaMckb eksM (3) A warm boot (4) Standby mode
(5) ,d lkWfyM cwV (5) A solid boot
474. fuEufyf[kr esa ls dkSu ,d fcfy;u ckbV~l dk
474. Which of the following represents one bil-
izfrfuf/kRo djrk gS\ lion bytes?
(1) ,d fdyksckbV (2) ,d xhxkckbV (1) One kilobyte (2) One gigabyte
(3) ,d VsjkckbV (4) ,d esxkckbV (3) One terabyte (4) One megabyte
(5) ,d ckbV (5) One byte
475. osc fjlksltZs dks ,Dlsl djus ds fy, fuEufyf[kr
475. Which of the following forms the first part
esa ls dkSu dEI;wVj ;wvkj,y ds igys Hkkx dk
of a computer URL to access the web re-
fuekZ.k djrk gS\ sources?
(1) yksd's ku (2) ;wtj use (1) location (2) user name
(3) use (4) izkV
s ksdkWy (3) name (4) protocol
(5) vMªl s (5) address
JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [67]

Telegram @BankingGK
Telegram @BankingGK

476. fuEufyf[kr esa ls dkSu ,d vkWijsfVax flLVe 476. Which one of the following is OS software?
(OS) lkW¶Vos;j gS\ (1) Access 2000 (2) Word 2000
(3) Windows 2000
(1) ,Dlsl 2000 (2) oMZ 2000
(4) Excel 2000
(3) foUMkst 2000 (4) ,Dlsy 2000
(5) Publisher 2500
(5) ifCy'kj 2500 477. In computer network types, MAN refers to?
477. dEI;wVj usVodZ ds izdkjks esa 'MAN' dk iw.kZ (1) Metropolitan Area Network
:i D;k gS\ (2) Medium Area Network
(1) esVªksikWfyVu ,fj;k usVodZ (3) Merge Area Network
(2) ehfM;e ,fj;k usVodZ (4) Major Area Network
(5) Main Area Network
(3) etZ ,fj;k usVodZ
478. A trackball, mouse, Joystick are examples of
(4) estj ,fj;k usVodZ ____ in computer parlance.
(5) esu ,fj;k usVodZ (1) Scanners (2) Pointing devices
478. dEI;wVj ds {ks= esa Vªd
S ckWy ekml vkSj tkW;fLVd (3) Types of keyboards
_____ ds mnkgj.k gS\ (4) Storing devices
(1) LdSulZ (2) IokWbfVax fMokblst (5) Multimedia devices
479. Usually the e-mail address is in?
(3) VkbIl vkWQ dhcksMZ~l
(1) Upper case (2) Italics
(4) LVksfjax fMokblst
(3) Bold (4) Middle case
(5) eYVhehfM;k fMokblst (5) Lower case
479. lkekU;r% bZ esy vMªsl ____ esa gksrk gSA
(1) vij dsl (2) bVsfyDl
(3) cksYM (4) fefMy dsl
(5) yksvj dsl

[68] JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01

Telegram @BankingGK
Telegram @BankingGK

Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans. Q.No Ans.
1 1 51 3 101 3 151 2 201 3 251 1 301 1 351 3 401 1 451 4
2 3 52 1 102 3 152 3 202 3 252 2 302 3 352 3 402 5 452 5
3 1 53 3 103 3 153 4 203 5 253 1 303 4 353 1 403 3 453 1
4 2 54 2 104 4 154 2 204 4 254 3 304 2 354 2 404 2 454 2
5 3 55 5 105 3 155 1 205 2 255 1 305 2 355 3 405 3 455 5
6 5 56 1 106 2 156 1 206 1 256 1 306 4 356 2 406 2 456 2
7 4 57 1 107 4 157 3 207 3 257 3 307 4 357 5 407 1 457 5
8 2 58 3 108 1 158 4 208 1 258 3 308 1 358 2 408 2 458 5
9 2 59 1 109 3 159 4 209 1 259 1 309 1 359 1 409 2 459 3
10 2 60 3 110 1 160 1 210 2 260 2 310 3 360 4 410 4 460 3
11 1 61 1 111 1 161 2 211 1 261 2 311 3 361 3 411 1 461 1
12 4 62 2 112 4 162 2 212 1 262 1 312 2 362 3 412 1 462 5
13 2 63 1 113 3 163 2 213 3 263 4 313 1 363 2 413 3 463 5
14 1 64 1 114 5 164 4 214 1 264 2 314 3 364 1 414 3 464 3
15 4 65 5 115 3 165 3 215 2 265 4 315 5 365 1 415 1 465 2
16 4 66 3 116 1 166 1 216 2 266 2 316 4 366 3 416 5 466 3
17 2 67 1 117 1 167 4 217 2 267 3 317 3 367 5 417 4 467 3
18 3 68 1 118 1 168 3 218 4 268 2 318 1 368 3 418 4 468 1
19 1 69 1 119 4 169 3 219 1 269 1 319 3 369 5 419 3 469 2
20 1 70 2 120 1 170 3 220 1 270 2 320 4 370 4 420 5 470 5
21 3 71 2 121 4 171 5 221 2 271 1 321 2 371 4 421 1 471 4
22 1 72 4 122 2 172 3 222 2 272 2 322 1 372 3 422 1 472 3
23 1 73 5 123 5 173 1 223 3 273 3 323 2 373 5 423 5 473 3
24 1 74 2 124 1 174 2 224 3 274 2 324 1 374 1 424 4 474 2
25 1 75 2 125 4 175 2 225 1 275 1 325 2 375 3 425 1 475 4
26 5 76 1 126 2 176 2 226 4 276 2 326 4 376 3 426 2 476 3
27 4 77 1 127 5 177 3 227 5 277 2 327 4 377 3 427 1 477 1
28 4 78 1 128 1 178 2 228 3 278 2 328 1 378 1 428 2 478 2
29 3 79 1 129 2 179 1 229 1 279 3 329 1 379 4 429 2 479 5
30 1 80 1 130 3 180 3 230 2 280 4 330 2 380 2 430 3 480
31 2 81 4 131 1 181 1 231 1 281 3 331 2 381 2 431 3 481
32 1 82 1 132 2 182 3 232 1 282 1 332 4 382 4 432 1 482
33 3 83 1 133 4 183 2 233 3 283 2 333 1 383 3 433 1 483
34 2 84 2 134 2 184 3 234 1 284 3 334 4 384 2 434 5 484
35 2 85 4 135 5 185 2 235 2 285 1 335 2 385 4 435 5 485
36 5 86 1 136 4 186 4 236 2 286 2 336 1 386 4 436 3 486
37 3 87 1 137 5 187 2 237 2 287 1 337 2 387 2 437 2 487
38 2 88 3 138 2 188 1 238 3 288 4 338 5 388 5 438 1 488
39 3 89 1 139 3 189 3 239 3 289 5 339 1 389 4 439 1 489
40 1 90 2 140 5 190 5 240 1 290 1 340 1 390 1 440 3 490
41 2 91 3 141 3 191 5 241 2 291 2 341 1 391 4 441 1 491
42 1 92 1 142 2 192 4 242 2 292 1 342 1 392 4 442 1 492
43 5 93 1 143 5 193 2 243 3 293 4 343 2 393 2 443 2 493
44 3 94 3 144 2 194 1 244 1 294 4 344 2 394 4 444 3 494
45 2 95 4 145 3 195 5 245 1 295 2 345 2 395 1 445 2 495
46 4 96 3 146 5 196 3 246 1 296 2 346 1 396 4 446 3 496
47 2 97 1 147 5 197 3 247 5 297 5 347 4 397 1 447 1 497
48 4 98 1 148 1 198 5 248 3 298 4 348 1 398 1 448 5 498
49 4 99 1 149 4 199 5 249 1 299 4 349 1 399 1 449 5 499
50 2 100 1 150 2 200 3 250 5 300 1 350 1 400 4 450 3 500

JB Classes 66-H-Block, Near Nehru Park, Sri Ganganagar M : 83-85-87-01-01 [69]

Telegram @BankingGK

You might also like