RBI assistant computer set-1

#Everydayquiz #computer #rbi #ibpsclerk  #35 Questions
In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these

A

What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
B

SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
D

 In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
B

A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
D

A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
4

A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
A

The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
4


Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
2

The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
2

OCR stands for _____
(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these
1

 If a new device is attached to a computer, such as a printer or scanner, its ______ must be installed before
the device can be used.
1) buffer  
2) driver      
 3) pager
4) server
5) None of these
2

The software that allows users to surf the Internet is called a/an
(1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these
4

 A tuple is a
1) column of a table        
2) two-dimensional table
3) row of a table  
4) key of a table
5) None of these
3

The method of file organization in which data records in a file are arranged in a specified order according to a key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these
4

 In Excel,_____ contains one or more worksheets.
1) Template          
2) Workbook        
3) Active cell
4) Label    
5) None of these
2


Which of the following is a popular programming language for developing multimedia web pages,
 websites, and web-based applications?
1) COBOL            
2) Java    
3) BASIC
4) Assembler        
5) None of these
2


Compiling creates a(n) _____ .
1) program specification  
2) algorithm
3) executable program    
4) subroutine
5) None of these
3

A CD-RW disk
(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten
(5) None of these
4

The first page of a Web site is called the
1) Home page      
2) Index
3) Java Script      
4) Book mark
5) None of these
1


Full form of TCP is:
(1) Transmission Control Protocol
(2) Total Control Protocol
(3) Transmission Control Program
(4) Totaling Control Program
(5) None of these
1


__ provides a common address space and routes the packets of data across the entire internet?
(1) IP                              
(2) TCP
(3) UDP                        
(4) ALU
(5) None of these
1

Cyberspace is being governed by a system of law and regulation called?
(1) Civil Law                  
(2) Criminal Law
(3) Electronic Law                    
(4) Cyber Law
(5) Cyber Authority
4
cyberspace is being governed by a system of law and regulation called Cyberlaw.
 ... Simply speaking, Cyberlaw is a generic term which refers to all the legal
and regulatory aspects of Internet and the World Wide Web.


  To move to the beginning of a line of text, press __key?
(1) Home                        
(2) Ctrl
(3) Space                        
(4) Enter
(5) None of these
1


 What menu is selected to change the font and style?
(1) Tools                          
(2) File
(3) Format                      
(4) Edit
(5) None of these
3


The process of starting the computer and loading of operating system programs for execution is known as
(1) initialization              
(2) retrieving
(3) loading                                  
(4) searching
(5) booting
5

>Primary memory is used by the:
(1) user                          
(2) input device
(3) CPU                        
(4) all of these
(5) None of these
3


In a disk, each block of data is written into -
(1) one sector                
(2) three sector
(3) Two sectors            
(4) Two or more sectors
(5) either two or three sectors
4


The Pentium processor contains-
(1) tens of thousands of transistors
(2) hundred thousands of transistors
(3) thousands of transistors
(4) several millions of transistors
(5) hundred transistors
4


__ was the precursor to internet as we know it today?
(1) ARPANET              
(2) USENET
(3) TELNET                              
(4) DBMS
(5) None of these
1

Which of the following is not an operating system?
(1) DOS                        
(2) Oracle
(3) Linux                        
(4) Windows
(5) None of these
2


 In word, what combination of keys do you press to delete an entire word?
(1) Ctrl + del                  
(2) Alt + del
(3) Shift + Backspace  
(4) Shift + Alt + del
(5) None of these
5
CTRL+A+DELETE


Hardware that adds two numbers is:
(1) the control unit        
(2) an internal CPU register
(3) arithmetic Logic Unit
(4) Browser
(5) None of these
3


A small amount of memory included in the processor for high speed access id called-
(1) Register                    
(2) Cache
(3) RAM                        
(4) ROM
(5) None of these
2

  A byte represents a group of:
(1) 10 bits                         (2) 40 bits
(3) 16 bits                         (4) 18 bits
(5) 8 bits
5


2 comments:

  1. Join North India's #1 institute for RBI coaching in Chandigarh. We provide RBI Grade B coaching In Chandigarh, RBI Assistant coaching in Chandigarh and other bank exams coaching in Chandigarh. Kindly Visit to know more RBI Assistant Coaching in Chandigarh

    ReplyDelete