COMPUTER RRB PYQ
COMPUTER RRB PYQ
1. How does the cache memory act between the David Smith, Clarence Ellis and a number of
CPU and the RAM? It acts a other researchers. This was introduced in the
a) Stack Smalltalk programming environment.
b) Queue
c) Buffer 4. Which browser is an inbuilt browser in
d) Heap windows?
e) None of the above a) Internet explorer
Answer: C b) Google chrome
Explanation: - Cache memory is a very high c) Netscape
speed semiconductor memory which can speed d) Firefox
up the processor or CPU. It acts as a buffer e) None of these
between the CPU and main memory (RAM). It is Answer: A
used to hold those parts of data and program
which are most frequently used by CPU. 5. Which one of the following is not a social
networking site?
2. How many layers are there in the TCP/IP a) Facebook
protocol suite? b) Notebook
a) 5 c) LinkedIn
b) 6 c) Twitter
c) 7 e) All of the above
d) 4 Answer: C
e) 3
Answer: D 6. What is the decimal equivalent of the binary
addition of 1010 and 0101?
3. Who developed/invented the 1st GUI? a) 15
a) Adobe b) 20
b) Xerox PARC c) 19
c) Apple d) 14
d) Microsoft e) 21
e) None of these Answer: A
Answer: B Explanation: - 1010 = 10 and 0101 = 5
Explanation: - GUI was first developed at Xerox
PARC by Alan Kay, Larry Tesler, Dan Ingalls,
7. In MS Excel 2010, the shortcut key to apply or a) Insert > Header & Footer > Design tab on the
remove bold formatting is: ribbon > Picture
a) Ctrl + 4 b) Insert > Picture
b) Ctrl + 3 c) Insert > Header & Footer > Design tab on the
c) Ctrl + 2 ribbon > Picture
d) Ctrl + 5 d) Insert > Clip Art > Design tab on the ribbon >
e) Ctrl + 1 Picture
Answer: C e) Insert > Header & Footer > Smart Art >
Picture
8. Word processing, Spreadsheet, and Google Answer: A
chrome are examples of ___
a) Application Software 11. In MS- Word you can force a page break__
b) Operating system software a) By positioning your cursor at the appropriate
c) System Software place and pressing the F1 key
d) Device drivers b) By positioning your cursor at the appropriate
e) None of these place and pressing Ctrl + Enter
Answer: A c) By using the Insert/section break
d) By changing the font size of your documents
9. A Keyboard, other than being an input device e) None of these
is a _____ Answer: B
a) Touch device
b) DAG converter 12. The Hard disk and the CD -ROM are
c) Terminal connected at the?
d) Dumb Terminal a) BT Attachment
e) None of these b) SATA Attachment
Answer: D c) AT Attachment
Explanation: - A dumb terminal is a very simple d) IDC Attachment
device with very little processing power and e) None of these
features Answer: C
Explanation: - AT Attachment stands for
10. The right procedure to add a water mark in advanced technology attachment, it is an
MS EXCEL interface that connects hard drives, CD-ROM
drives, and other drives.
14. Which among the following is NOT a search 17. In Computer Networking, devices have two
engine in the internet? kinds of addresses?
a) Archie a) IP-logical address & MAC – physical address
b) Google b) IP- physical address & MAC – logical address
c) Nexus c) Memory address & Serial port address
d) Microsoft Bing d) Device driver address & Serial Bus address
e) Yahoo! e) None of these
Answer: C Answer: A
15. In MS — Excel, Insert Function are located
on the__ 18. Which among the following are the correct
a) Vertical scroll bar LANs?
b) Horizontal scroll bar a) Hybrid LANs
c) Formula bar b) Star & Mesh LANs
d) Standard toolbar c) Client/Server LANs & peer-to-peer LANs
e) None of these d) Address specified and non-specified LANs
Answer: D e) None of these
Explanation: - The standard toolbar contains the Answer: C
Insert functions Explanation: - Types of Local Area Network
(LAN)
16. MAC address is used for
Explanation: - Sequential Access is the ability to on the data. The cloud storage is which type of
read or write each piece of information in a memory?
storage device in approximately the same length a) Primary
of time regardless of its location b) Secondary
c) Cache
36. If a disk drive fails but the computer d) Cookie generated memory
application running and using it can continue e) None of these
processing this application is said to have been Answer: B
designed with this feature. Explanation: -The cloud storage is a secondary
a) 100 percent uptime memory
b) Fault tolerance
c) High reliability 39. Dr EF Codd represented _____ rules for
d) All of the above relational database management system
e) None of these (RDBMS) in 1970
Answer: B a) 9
Explanation: -If a disk drive fails but the b) 12
computer application running and using it can c) 14
continue processing this application is said to d) 11
have been designed with fault tolerance e) None of these
Answer: B
37. Protecting data by copying it from the original Explanation: -Dr EF Codd represented 12 rules
source to a different destination is called for relational database management system
a) Formatting (RDBMS) in 1970.
b) Hacking
c) Backup 40. Which among the following software is not a
d) Data diddling product of Microsoft?
e) None of these a) Open office
Answer: C b) Outlook
c) Access
38. Cloud Storage can be defined as a virtual d) Visual studio express
memory unit that allows users to create, update, e) Windows
delete and perform all manipulative operations Answer: A
1. A computer program that records every 3. The situation of having an identical piece of
keystroke made by a computer user, especially data stored in two different locations is known as
in order to gain fraudulent access to passwords __________ and is created by databases or other
and other confidential information is called data storage technologies.
a) Screen Recorder a) Data Encapsulation
b) Keylogger b) Data Abstraction
c) Lightstroke Reader c) Data Redundancy
d) Key Capture d) Data Polymorphism
e) Malwares e) Data Duplication
Answer: B Answer: C
Explanation: - A keylogger, sometimes called a Explanation: - Data redundancy occurs when the
keystroke logger or keyboard capture, is a type same piece of data exists in multiple places,
of surveillance technology used to monitor and whereas data inconsistency is when the same
record each keystroke on a specific computer. In data exists in different formats in multiple tables.
an alternative way, Keyloggers are a particularly Unfortunately, data redundancy can cause data
insidious type of spyware that can record and inconsistency, which can provide a company
steal consecutive keystrokes (and much more) with unreliable and/or meaningless information.
that the user enters on a device
4. Which Script enabled the production of client-
2. Which of the following is not a programming side dynamic web pages executed in the client's
language? browser?
a) C a) PHP
b) C++ b) Java Script
c) FORTRAN c) Ruby
d) BASIC d) Bash
e) Solaris e) Python
Answer: E Answer: B
Explanation:-Solaris is an enterprise Operating Explanation: - JavaScript enables the production
system for Oracle Database and Java of client-side dynamic web pages, with the
applications. Rest all are programming JavaScript code executed in the client's browser.
languages. 5. Which of the following is invalid Statement
regarding generation of computer?
a) First Generation The period of first generation: are the modifier keys on a typical modern
1946-1959. Vacuum tube based. keyboard
b) Second Generation The period of second
generation: 1959-1965. Transistor based. 8. Which of the following forms of transmission
c) Third Generation The period of third occurs during walkie-talkie communication?
generation: 1965-1971. Integrated Circuit based. a) Simplex
d) Fourth Generation The period of fourth b) Full —Duplex
generation: 1971-1980. VLSI microprocessor c) Half-Duplex
based. d) Online
e) All are correct e) None of these
Answer: E Answer: C
Explanation: - In half-duplex mode, both the
6. Which OSI layer specifies how two devi ces transmitter and receiver transmit and receive,
should compress, encrypt, and encode data so it but not at the same time. When one of them is
may be successfully received on the other end? sending, the other can only receive, and vice
a) Application Layer versa. Example: Walkie-talkie in which message
b) Network Layer is sent one at a time and messages are sent in
c) Data-link Layer both directions.
d) Physical Layer
e) Presentation Layer 9. In which type of disc the data can be written
Answer: E only once and cannot be erased?
a) CD-RW/DVD-RW
7. Alt, Ctrl are __________ keys. b) BD-R
a) Stroke Keys c) DVD-ROM/CD-ROM
b) Lock Keys d) HD-DVD
c) Candidate Keys e) CD-R/DVD-R
d) Shortcut Keys Answer: E
e) Modifier Keys Explanation: - With CD-R discs, you can only
Answer: E write to them once, but you can read from them
Explanation: - A modifier key is a keyboard key repeatedly. You can write to CD-RW discs
that can only be used in conjunction with another numerous times and read content from them an
key when using a computer. Ctrl, Alt, and Shift infinite number of times.
10. A firewall is software or firmware that booting sequence. The CMOS is also a chip on
prevents ___________________ the motherboard but is a RAM chip with volatile
a) Access to internetwork files memory which stores information about the
b) Access to intranetwork files computer components and their settings
c) Access to files from public IP addresses
d) Access to logic bomb files 12. Simple Mail Transfer Protocol (SMTP)
e) Unauthorized access to a network Protocol is used for sending or receiving
Answer: E __________.
Explanation: - A firewall is essential software or a) Source Code
firmware in network security that is used to b) Object Files
prevent unauthorized access to a network. It c) Executable Files
inspects incoming and outgoing traffic using a d) info files
set of security rules to identify and block threats. e) e-mail between e-mail clients and servers
Answer: E
11. The BIOS settings are stored in the Explanation: - The Simple Mail Transfer Protocol
____________ chip which is kept powered up via (SMTP) is used for sending and receiving e-mail
the battery on the motherboard between e-mail clients and servers. When an
a) EPROM SMTP server receives an e-mail from a mail
b) UEFI client, the SMTP server will then check the MX
c) PMOS records for the domain in the e-mail address in
d) CMOS order to exchange the mail with the remote
e) None of these SMTP server.
Answer: D
Explanati on: - BIOS, or Basic Input/Output 13. Which of the following convert high level
System, is software stored on a small memory language to low level language?
chip, also known as firmware. BIOS is found on a) Loader
the motherboard, and it is the very first software b) Linker
to run after a computer starts. Generally, the c) Editor
terms BIOS and CMOS are used d) Assembler
interchangeably. A BIOS chip in a motherboard e)Compiler
contains the program (firmware commonly called Answer: E
BIOS) to boot the computer. A CMOS chip Explanation: - A compiler is a special program
stores the settings like date & time, fan speed, that translates a programming language's source
23. What is the term used for the time during c) Data Pointer
which a job is processed by the system? d) Instruction Pointer
a) Turnaround time e) Program Counter (PC)
b) Scheduling time Answer: E
c) Waiting time Explanation: - The program counter, PC, is a
d) Job time special-purpose register that is used by the
e) Execution Time/ CPU time processor to hold the address of the next
Answer: E instruction to be executed
Explanation: - Burst time, also referred to as
“execution time”. It is the amount of CPU time 26. What does AB8 means in Excel?
the process requires to complete its execution. It a) Row AB Column 8
is the amount of processing time required by a b) Row A Cell B Column 8
process to execute a specific task or unit of a c) All are possible rendition
job. d) None of these
e) Column AB and Row 8
24. Which of the following CD technologies is Answer: E
also WORM technology? Explanation: - AB8 in MS- Excel means Column
a) CD-RW AB and Row number 8
b) CD-Photo/Photo CD
c) CD-I (Compact Disc Interactive 27. What is the size of IPv4?
d) CD-R a) 38-bit
e) None of these b) 16-bit
Answer: D c) 32-bit
Explanation: - Compact Disc-Recordable (CD-R) d) 64-bit
technology is known as Write Once-Read Many e) None of these
(WORM) technology as data once written on Answer: C
these discs cannot be erased.
28. ________________ is the supply of computer
25. A ______________ is a CPU register in the services like data storage, servers, and
computer processor which has the address of databases through the Internet.
the next instruction to be executed from memory. a) IoT
a) Memory Pointer b) Blockchain
b) File Pointer c) ICT
36. When a user try to access a resource on a 38. Which of the following keyboard key is used
web server (usually a web page) that doesn't in a Microsoft PowerPoint presentation to select
exist, which type of Error exist that time? one hyperlink after another during a slide
a) HTTP Error 505 presentation?
b) HTTP Error 302 a) Shift+O
c) HTTP Error 405 b) Ctrl+P
d) HTTP Error 403 c) Alt+H
e) HTTP Error 404 d) F1
Answer: E e) Tab
Explanation: - The Web server returns the HTTP Answer: E
404 - File not found error message when it
cannot retrieve the page that was requested. 39. Flash memory is a non-volatile computer
The following are some common causes of this storage chip made up of __________________.
error message: The requested file has been a) DROM
b) MROM
2. A network hub is a node that __________ data 5. The first web-based email service which was
to every computer or Ethernet- based device founded in 1996 was ____
connected to it. a) Zeroth mail
a) Unicasts b) Hotmail
b) Broadcasts c) Gmail
c) Hosts d) Apple mail
d) Multicasts e) Edison mail
e) Anycasts Answer: B
Answer: B Explanation: - Founded in 1996 by Sabeer
Explanation: - A hub is a device/node that Bhatia and Jack Smith as Hotmail, is now known
broadcasts data to every computer connected to as Outlook and is now available in the Microsoft
it. office suit.
3. The shortcut key for continuously switching 6. The type of malware that hides on your device
between your tabs is _____ and secretly records the information and tracks
a) Alt + Tab your online activity and personal records is
b) Ctrl + Tab _________
c) Shift + Tab a) Virus
d) Alt + Tab b) Trojan
e) None of these c) Spyware
Answer: B d) Worm
Answer: E
22. Which command displays directories as well Explanation: - The first HLL introduced was
as subdirectories also in MSDOS? FORTRAN (Formula Translation)
a) DIR/All
b) DIR/AN 25. In a super type/subtype hierarchy, each
c) DIR/DS subtype has?
d) DIR/S a) Only one super type
e) None of these b) Many super types
Answer: D c) At most two super types
Explanation: - The dir command displays a list of d) At least one subtype
files and subdirectories in a directory. With the /S e) Not at all
option, it recurses (execute a procedure Answer: A
recursively) subdirectories and lists their Explanation: - In a super type/sub-type
contents as well. hierarchy, each sub-type has only one super
type
23. Full form of CMOS is
a) Complimentary Metal-Oxide Semiconductor 26. Consider the URL given“www.XYZ.com”
b) Coupling Metal-Oxide Semiconductor What does the “.com” represent.
c) Complimentary Metal-Oxide System a) Communication
d) Converting Metal-Oxide Semiconductor b) Commercial
e) Complimentary Metal-Operating c) Committee
Semiconductor d) Company
Answer: A e) Both c & d
Explanation:- Complimentary Metal-Oxide Answer: B
Semiconductor
27. A software which is freely available to
24. The very first high-level language introduced download but the source code in it can’t be
in computer was ______________. modified or changed is called __?
a) C a) Open Source
b) PASCAL b) Closed Source
c) JAVA c) GITHUB
d) COBOL d) Freeware
e) None of these e) Malware
28. Category 6 or CAT6 Ethernet cable colour 31. Which of the following is not a number
standards are Red, Blue, Yellow, White, Grey system?
and Black. What does the Blue colour identify? a) Buffer
a) VOIP connection b) Token
b) Network Connectivity c) Binary
c) Equipment in workstation d) Octal
d) Jumpers e) Both a & b
e) Receivers Answer: E
Answer: B Explanation: - Both Buffer and Token do not
Explanation: - Network Connectivity. The Blue represent a number system. A buffer is a storage
coloured cable denotes Network Connectivity. device used to compensate for a difference in
rate of data flow, or time of occurrence of events,
29. TCP port number 443 is used by __ when transmitting data from one device to
a) TELNET another. In the computer networking industry, a
b) HTTP token is a data frame that is transmitted between
c) HTTPS network points on a token ring network.
d) DHCP 32. In MS-Excel, to insert the sum formula,
e) SQL SERVER which function do we implement?
Answer: C a) =sum(cell range)
Explanation: - HTTPS uses port 443, DHCP b) =sum(add the values)
uses 67 and 68. Whereas HTTP uses 80 and c) =add(cell range)
SQL Server uses 1433 port number. TELNET- d) =sum(add integers only)
23 e) None of these
Answer: A
30. The shortcut key to apply date formatting in Explanation:- =sum(cell range) Example
day, month and year in MS Excel is? =sum(A1:A10). Keyboard shortcut- Alt +=
a) Ctrl + Shift + #
33. The technology used in Bitcoin is ___ d) International Study of Computer Architecture
a) Blockchain e) None of these
b) Artificial Intelligence Answer: B
c) Machine Learning
d) UPI 36. In an MS-Excel Worksheet. How many
e) RFID possible hyperlinks are possible?
Answer: A a) 65529
Explanation: - Blockchain is the technology that b) 65531
enables the existence of cryptocurrency (among c) 65530
other things). Bitcoin is the name of the best- d) 65535
known cryptocurrency, the one for which e) 75530
blockchain technology, as we currently know it, Answer: C
was created. Explanation: - 65530. The shortcut to add a
hyperlink is Ctrl + K
34. Pokémon GO, the infamous game uses
__________________. 37. Show/hide Gridlines option is available in the
a) Core 3 ____ menu in MS Excel 2019
b) Dual Core a) Home
c) Octal Core b) View
d) Augmented Reality c) Insert
e) Console d) Format
Answer: D e) None of these
Explanation: - Pokémon Go (stylized as Answer: E
Pokémon GO) is a 2016 augmented reality (AR) Explanation: - The Show/hide gridlines are
mobile game, part of the Pokémon franchise, available in Page Layout
developed and published by Niantic in
collaboration with Nintendo and The Pokémon 38. Which of the following is a software program
Company for iOS and Android devices that is written to a hardware device?
a) Ransomware
35. The full form of ISA is? b) Middleware
a) Information System Architecture c) Firmware
b) Instruction Set Architecture d) All of these
c) Image System Augmentation e) None of these
Answer: C
Explanation: - Firmware is a software program 40. When we perform certain operations on our
that is written to a hardware device. It allows the document and click the close button without
hardware to be updated. The contents are saved saving it, then____ appears on the screen.
when a hardware device is turned off or loses its a) Alert box
external power source. b) Prompt box
c) Dialog box
39. Which one is a set of layered protocols used d) Command box
for communication over the Internet? e) None of these
a) Point to Point Protocol Answer: C
b) File Transfer Protocol Explanation: - A dialog box is a temporary
c) Transmission Control Protocol window an application creates to retrieve user
d) All of these input. An application typically uses dialog boxes
e) None of these to prompt the user for additional information for
Answer: C menu items.
Explanation: - The Transmission Control
Protocol i.e. TCP/IP is a set of layered protocols
used for communication over the Internet.
1. Which one of the following is the default word 4. Which folder would you generally associate
processor for Microsoft Windows? your mails going in after they are deleted in
a) MS WORD GMAIL?
b) MS PAINT a) Primary
c) WordPad b) Spam
d) Notepad c) Draft
e)None of these d) Starred
Answer: C e) Trash
Explanation: - Wordpad is the default Microsoft Answer: E
Word Processor. Explanation: - The deleted email goes in the
trash folder and stays there till 30 days if not
2. First Web browser was created by _________ cleared.
a) Tim Berners Lee
b)James Gosling 5. The term that defines the intention of a person
c) Rosen Hall to extort money from another person (preferably
d) Charles Babbage the owner) is?
e) Alan Turing a) Ransomware
Answer: A b) Malware
Explanation: - Tim Berners Lee also invented the c) Spyware
HTML and HTTP protocol d) Adware
e) None of these
3. Which of the following is an input device? Answer: A
a) Screen/Monitor Explanation: - Hackers use this technique to
b) Speakers charge money for unlocking the files and folders
c) LCD and all relevant data of the owner to give it back.
d) Scanner The money is transferred through bitcoin
e) All of the above (cryptography).
Answer: D 6. In MS Excel, which command is not a valid
Explanation: - Scanner is an input device and cell reference?
the rest are output devices a) AB20
b) A21
c) AB#20
d) AB$45
40. Which type of Internet Service does not DSL, which transmit data through wires running
Explanation: - MAC addresses are also known refers to the input resolution of a photograph or
as hardware addresses or physical addresses. image. DPI refers to the physical dot density of
They uniquely identify an adapter on a LAN. an image when it is reproduced as a real
physical entity, for example printed onto paper.
17. _______________ is a protocol for transferring 19. What malware is associated with Bitcoin?
data securely from one network to another. a) Etherium Jacking
a) POP b) Byteware
b) SMTP c) Crypto jacking
c) SFTP d) Ransomware
d) IP e) Datajacking
e) UDP Answer: C
Answer: C Explanation: -Cryptojacking (also called
Explanation: - Secure File Transfer Protocol malicious cryptomining) is an online threat that
(SFTP) is a network protocol for securely hides on a computer or mobile device and uses
accessing, transferring and managing large files the machine’s resources to “mine” forms of
and sensitive data. Designed by the Internet online currency known as cryptocurrencies,
Engineering Task Force as an extension of mainly Bitcoin.
Secure Shell (SSH), SFTP enables access,
transfer and management of files over a 20. The_________ is a conceptual framework
network. used to describe the functions of a networking
system.
18. What is unit of measuring printing quality of a) TCP Model
printer? b) OSI Model
a) Dots Per Unit Time c) IP Model
b) Dots Per Line d) C
c) Dots Per Character e) D
d) Dots per Centimeter Answer: B
e) Dots Per Inch Explanation: - The OSI Model (Open Systems
Answer: E Interconnection Model) is a conceptual
Explanation: - The output quality of a printer is framework used to describe the functions of a
measured by Dots per inch. In printing, DPI (dots networking system. The OSI model
per inch) refers to the output resolution of a characterizes computing functions into a
printer or image setter, and PPI (pixels per inch) universal set of rules and requirements in order
23. ___________ is the practice of concealing a 26. Which of the following is the professional
message within another message or a physical social networking site that allows Access for job
object. opportunities and to connects the industries?
a) Calligraphy a) Naukri
b) Cryptography b) Scaler
c) Steganography c) Docker
d) Tomography d) Facebook
e) Chorography e) Linkedin
Answer: C Answer: E
b) Podcast
27. The 'S' at the end of "HTTPS" stands for c) Vlog
__________________. d) Broadcast
a) Stealth e) Unicast
b) Safe Answer: B
c) Software Explanation: Podcast is a program, either talk
d) Secure numeric that is made available in digital format
e) None of these for automatic download over the internet
Answer: D
Explanation: - Hypertext Transfer Protocol 30. A/A(n) _________________ is a private
Secure corporate network, used exclusively by company
employees.
28. What is the name of the list that stores the a) Peer to Peer Network
URLs of web pages and links visited in past few b) Internet
days? c) LAN
a) Linked List d) WAN
b) Page List e) Intranet
c) Double Paging List Answer: E
d) None of these Explanation: - An intranet is a private, network
e) History List that is contained that is contained within
Answer: E enterprise.
Explanation: - The history list will enable us to
see the internet history that we have been 31. In MS — PPT, you can show the shortcut
visited. It has a list that stores the URLs of web menu during the slideshow by
pages and links that we have visited in the past. ________________.
Internet history can have security implications as a) Clicking the shortcut button on the formatting
it allows anyone to see just what you've been toolbar
looking at. b) Right clicking the previous slide
c) Left clicking on the present slide
29. A program, either talk numeric that is made d) Right clicking the current slide
available in digital format for automatic download e) None of these
over the internet is called _______________. Answer: D
a) Blog
32. Memory which forgets everything when you designed by John Mauchly and J. Presper
switch off the power is known as Eckert
______________.
a) Non-Volatile 35. A __________ is a common set of guide lines
b) Dynamic Memory that permits communication between
c) C technological devices.
d) D a) Port
e) Volatile b) Serial Bus
Answer: E c) Synchronization
d) System Software
33. The maximum Zoom percentage in Microsoft e) Protocols
PowerPoint is__________. Answer: E
a) 100% Explanation: - A protocol is a set of rules that
b) 200% governs the communications between
c) 400% computers on a network. These rules include
d) 250% guidelines that regulate the following
e) 500% characteristics of a network: access method,
Answer: C allowed physical topologies, types of cabling,
speed of data transfer.
34. The first digital computer and what most
people think of as a computer was called the 36. _________ is a type of cybercrime where a
__________________. person impersonates a brand or contact that you
a) COMPATE trust in order to gain critical personal information.
b) Digital Calculator a) Spooling
c) ENIAC b) Phishing
d) Analog Computer c) Identity theft
e) None of these d) Spoofing
Answer: C e) None of these
Explanation: - The first digital computer and what Answer: D
most people think of as a computer was called Explanation: - Spoofing involves faking one's
the ENIAC. ENIAC stands for Electronic identity, and can be used for various attacks
Numerical Integrator and Computer. ENIAC was such as identity theft. Phishing is one such use
of spoofing that attempts to steal somebody's
1. Which program is /software is made to create 4. Which one is a high speed memory used to
a job queue during scheduling of jobs in an hold instructions temporarily during Processing?
operating system? a) Secondary Memory
a) Spooling b) Main Memory
b) Spoofing c) Cache Memory
c) Drive d) Primary Memory
d) Compiler e) None of These
e) None of these Answer: C
Answer: A Explanation: - It is high speed memory used to
Explanation: - A Spooling is a software that hold instructions temporarily during processing.
controls putting jobs on a queue and taking them When CPU requires a data it first search it in
off one at a time from the queue. cache memory. If it is present there it uses it and
is called cache hit, but if it is not present it goes
2. Microsoft is an example of? to the main memory and fetches data from main
a) Open Source memory to the cache memory.
b) Closed source
c) Open ended market software 5. Which key is used for closing a opened
d) Vertical Market software window or program?
e) None of these a) Alt + F4
Answer: B b) Ctri+F1
Explanation: - Closed source means those c) Alt +F2
computer programs or software whose source d) Alt + F3
codes have not been published e) None of these
Ans. a
3. Which is the spreadsheet software provided Explanation: - Alt + F4 is used for closing a
by Google? opened window or program
a) Google Doc
b) Google Page 6. In which processing user does not have
c) Google Sheet access to its operation?
d) Google Drive a) quick processing
e) None of these b) batch processing
Answer: C c) real time
d) remote processing
Explanation: - DHCP Server is basically a server 18. Which of the following is alphanumeric
that holds IP Addresses and other information combination of password?
related to configuration. DHCP Client: It is a) Abcd1234
basically a device that receives configuration b) Abcdefghi
information from the server. It can be a mobile, c) 1234567
laptop, computer, or any other electronic device d) Abc@123
that requires a connection e) None of these
16. IP address shows the Answer: D
a) Physical address of the device Explanation: - An alphanumeric password
b) Logical address of the device contains numbers, letters, and special
c) Source address of the device characters (like an ampersand or hashtag). In
d) Destination address of the device theory, alphanumeric passwords are harder to
e) None of these crack than those containing just letters
Answer: B
Explanation: - An Internet Protocol (IP) address 19. Which one is used in a program to execute a
is a unique numerical identifier for every device particular set of statements repeatedly?
or network that connects to the internet. a) Visual basic
Typically assigned by an internet service b) Pseudocode
provider (ISP), an IP address is an online device c) Condition
address used for communicating across the d) Looping
internet. e) None of these
Answer: D
17. Website is a collection of___ options ? Explanation: - Looping is control structure which
a) HTML documents is used in a program to execute a particular set
b) Graphic files of statements repeatedly.
c) Audio and video files
d) All of the above 20. Which is the open source Browser?
e) None of these a) Mozilla Firefox
Answer: D b) UC browser
Explanation: - A website can contain all of the c) Chrome
above. d) All of these
e) None of these
Answer: A
22. Which of the following is a rigid magnetic 25. To make a notebook act as a desktop model,
disc used to store data permanently? the notebook can be connected to a
a) Hard Disk ________which is connected to a monitor and
b) SSD other devices.
c) SD Card a) A.bay
d) All the three b) B.docking station
e) None of these c) C.port
Answer: A d) D.network
Explanation: - Hard disk is a rigid magnetic disk e) E.None of these
used to store data permanently. Answer: B
Explanation: - To make a notebook act as
23. For cleaning up the fragmentation saturated desktop as a desktop model, the notebook can
on hard disk drives which software will you use? be connected to a docking station, it can be
a) MS word connected to a monitor and other devices
b) Recuva
c) CCleaner 26. In UNIX, which command is used to display
d) All of these the message or value of any variable on the
e) None of these screen
d) Memory Chip
e) None of The Above 39. Which of the following is example for
Answer: C embedded system?
Explanation: - The CPU or the Central a) ROM
Processing unit also known as the brain of the b) RAM
computer, is the unit where a computer adds and c) ATM
eventually compares the data d) Machine
e) None of these
37. Extensible Mark-up Language (XML) is a Answer: C
simple, very flexible text format, which is derived Explanation: - ATM (Automatic Teller Machine)
from ______________? is example for embedded system
a) HTML
b) ETML 40. Which of the following is a part of session
c) STML layer?
d) SGML a) Transports data across the physical link
e) None of these b) Determines network topology.
Answer: D c) Terminates a session
Explanation: - ExtensibleMark-up Language d) Performs flow control
(XML) is a simple, very flexible text format e) Transmission between machines to its above
derived from SGML (Standard Generalized layer
Mark-up Language). Answer: C
Explanation: - The session layer performs the
38. What type of technology scrambles the termination and creation of session
contents of files sent via the Internet?
a) Encryption
b) Encoding
c) Cryptography
d) Security code
e)None of these
Answer: A
Explanation: - The contents of files will be sent
via internet after the files are encrypted by the
process encryption