0% found this document useful (0 votes)
9 views

COMPUTER RRB PYQ

The document is a Computer Awareness Bundle PDF Course containing questions and answers from the RRB PO Mains 2020 Memory Based Paper. It covers various topics including cache memory, TCP/IP layers, GUI development, and software applications. Each question is followed by an answer and explanation, providing insights into computer concepts and terminology.

Uploaded by

jenabiswajit100
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

COMPUTER RRB PYQ

The document is a Computer Awareness Bundle PDF Course containing questions and answers from the RRB PO Mains 2020 Memory Based Paper. It covers various topics including cache memory, TCP/IP layers, GUI development, and software applications. Each question is followed by an answer and explanation, providing insights into computer concepts and terminology.

Uploaded by

jenabiswajit100
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Computer Awareness Bundle PDF Course 2023

RRB PO Mains 2020 Memory Based Paper

1. How does the cache memory act between the David Smith, Clarence Ellis and a number of
CPU and the RAM? It acts a other researchers. This was introduced in the
a) Stack Smalltalk programming environment.
b) Queue
c) Buffer 4. Which browser is an inbuilt browser in
d) Heap windows?
e) None of the above a) Internet explorer
Answer: C b) Google chrome
Explanation: - Cache memory is a very high c) Netscape
speed semiconductor memory which can speed d) Firefox
up the processor or CPU. It acts as a buffer e) None of these
between the CPU and main memory (RAM). It is Answer: A
used to hold those parts of data and program
which are most frequently used by CPU. 5. Which one of the following is not a social
networking site?
2. How many layers are there in the TCP/IP a) Facebook
protocol suite? b) Notebook
a) 5 c) LinkedIn
b) 6 c) Twitter
c) 7 e) All of the above
d) 4 Answer: C
e) 3
Answer: D 6. What is the decimal equivalent of the binary
addition of 1010 and 0101?
3. Who developed/invented the 1st GUI? a) 15
a) Adobe b) 20
b) Xerox PARC c) 19
c) Apple d) 14
d) Microsoft e) 21
e) None of these Answer: A
Answer: B Explanation: - 1010 = 10 and 0101 = 5
Explanation: - GUI was first developed at Xerox
PARC by Alan Kay, Larry Tesler, Dan Ingalls,

Click Here For Bundle PDF Course | [email protected] Page 1 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

7. In MS Excel 2010, the shortcut key to apply or a) Insert > Header & Footer > Design tab on the
remove bold formatting is: ribbon > Picture
a) Ctrl + 4 b) Insert > Picture
b) Ctrl + 3 c) Insert > Header & Footer > Design tab on the
c) Ctrl + 2 ribbon > Picture
d) Ctrl + 5 d) Insert > Clip Art > Design tab on the ribbon >
e) Ctrl + 1 Picture
Answer: C e) Insert > Header & Footer > Smart Art >
Picture
8. Word processing, Spreadsheet, and Google Answer: A
chrome are examples of ___
a) Application Software 11. In MS- Word you can force a page break__
b) Operating system software a) By positioning your cursor at the appropriate
c) System Software place and pressing the F1 key
d) Device drivers b) By positioning your cursor at the appropriate
e) None of these place and pressing Ctrl + Enter
Answer: A c) By using the Insert/section break
d) By changing the font size of your documents
9. A Keyboard, other than being an input device e) None of these
is a _____ Answer: B
a) Touch device
b) DAG converter 12. The Hard disk and the CD -ROM are
c) Terminal connected at the?
d) Dumb Terminal a) BT Attachment
e) None of these b) SATA Attachment
Answer: D c) AT Attachment
Explanation: - A dumb terminal is a very simple d) IDC Attachment
device with very little processing power and e) None of these
features Answer: C
Explanation: - AT Attachment stands for
10. The right procedure to add a water mark in advanced technology attachment, it is an
MS EXCEL interface that connects hard drives, CD-ROM
drives, and other drives.

Click Here For Bundle PDF Course | [email protected] Page 2 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

a) Identifying the physical address of a device on


13. Technique/ Technology used in hiding or de - the same local network
routing the IP address is _______. b) Identifying the logical address of a device on
a) Spoofing the same local network
b) OSPF routing c) Block the access
c) Programmable Shortest Path routing d) Permit the access
d) VPN (Virtual Private Network) e) None of these
e) None of these Answer: A
Answer: D Explanation: - MAC address is used to identify
Explanation: - VPN is used to hide/change the IP the physical whereas the IP address is used to
Address identify the logical address.

14. Which among the following is NOT a search 17. In Computer Networking, devices have two
engine in the internet? kinds of addresses?
a) Archie a) IP-logical address & MAC – physical address
b) Google b) IP- physical address & MAC – logical address
c) Nexus c) Memory address & Serial port address
d) Microsoft Bing d) Device driver address & Serial Bus address
e) Yahoo! e) None of these
Answer: C Answer: A
15. In MS — Excel, Insert Function are located
on the__ 18. Which among the following are the correct
a) Vertical scroll bar LANs?
b) Horizontal scroll bar a) Hybrid LANs
c) Formula bar b) Star & Mesh LANs
d) Standard toolbar c) Client/Server LANs & peer-to-peer LANs
e) None of these d) Address specified and non-specified LANs
Answer: D e) None of these
Explanation: - The standard toolbar contains the Answer: C
Insert functions Explanation: - Types of Local Area Network
(LAN)
16. MAC address is used for

Click Here For Bundle PDF Course | [email protected] Page 3 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

In a client-server LAN environment, a single b) FOXPRO


server connects to multiple devices known as c) UNIX
clients. d) Mozilla
• Peer to Peer (P2P) LAN. e) None of these
• Token ring LAN. Answer: D
• Token bus LAN.
• Wired LAN. 22. A Discrete signal is also known as ______
• Wireless LAN. a) Digital Signal
• Cloud-managed LAN b) Analog Signal
c) Fourier Signal
19. Specialized programs that assist users in d) None of these
locating information on the Web are called e) All of the above
____________-. Answer: A
a) Information engines
b) Locator engines 23. How can the slide show be repeated
c) Web browsers continuously in MS -PPT?
d) Resource locators a) loop continuously until ‘Esc’
e) Search Engine b) repeat continuously
Answer: D c) loop more
d) One by one
20. Which of the following search engines e) None
continuously send out that starts on a homepage Answer: A
of a server and pursues all links step wise?
a) Spiders 24. The oldest version of Windows from the
b) Packets following is?
c) Cookies a) Windows Server 2003
d) Paddle b) Windows XP
e) None of these c) Windows 8
Answer: A d) Windows 7
e) Windows 10
21. Which among the following computer Answer: B
program is used to browse websites?
a) MS-Word

Click Here For Bundle PDF Course | [email protected] Page 4 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

Explanation: - Windows XP was introduced in e) None of these


the year 2001 whereas Windows server was Answer: C
introduced in 2003.
28. Which of the following is used as a surveying
25. Mobile OS is a type of? tool?
a) Real Time OS a) Google Sheets
b) Embedded OS b) Google Docs
c) Multiuser OS c) Google Meet
d) Branched OS d) Google Form
e) None of these e) None of these
Answer: B Answer: D
Explanation: - An embedded operating system is Explanation: - Google Forms is a survey
a specialized operating system (OS) designed to administration software included as part of the
perform a specific task for a device that is not a free, web-based Google Docs Editors suite
computer. The main job of an embedded OS is offered by Google
to run the code that allows the device to do its
job 29. Which of the following is NOT an
accessories tool in a window 7 system?
26. The correct steps to convert the MS Word a) Paint
doc file to PDF is _____ b) WordPad
a) Click on Save as > Type PDF c) Notepad
b) Rename file with .pdf extension d) MS SQL Server
c) Rename file with PDF words in the name e) Snipping Tool
d) All are valid Answer: D
e) None of these
Answer: A 30. The history of the website browsing details is
stored in?
27. Computers connected to a LAN can__ a) Web Cookies
a) Run faster b) URLs
b) Go on line c) Hard Disk
c) Share information and/or share peripheral d) Flash drives
equipment e) None of these
d) E-mail Answer: A

Click Here For Bundle PDF Course | [email protected] Page 5 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

Explanation: - Cookies are text files with small


pieces of data — like a username and password 33. __is a small, portable flash memory card that
— that are used to identify your computer as you plugs into a computer’s USB port and functions
use a computer network. Specific cookies known as a portable hard drive.
as HTTP cookies are used to identify specific a) CD-ROM
users and improve your web browsing b) Flash drive
experience. c) DVD-ROM
d) CD-RW
31. Which one of the following is not a property e) All of these
of a compact disc? Answer: B
a) Malleable Explanation: - Flash driveis a small, portable
b) Storing text files flash memory card that plugs into a computer’s
c) Storing video and audio files USB port and functions as a portable hard drive
d) Storing pictures (.jpg,.png files)
e) None of these 34. What kind of memory is both static and non-
Answer: A volatile?
Explanation: - Other than malleable, all other are a) BIOS
the properties of a CD. Malleable means having b) CACHE
the property to be hit or pressed without c) RAM
breaking d) ROM
e) All of the above
32. Windows explorer is a program that is used Answer: B
to:
a) Browse the internet 35. The ability to read or write each piece of
b) Navigate the files or folders in windows information in a storage device in approximately
operating system the same length of timeregardless of its location
c) Discover the number of window running in PC is__
d) Calculate how many application is running a) Sequential Access
e) All of the above b) Random Access
Answer: B c) Register scan
Explanation: - Windows explorer is used to d) Linear Search
navigate the files or folders in windows operating e) None of these
system Answer: A

Click Here For Bundle PDF Course | [email protected] Page 6 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

Explanation: - Sequential Access is the ability to on the data. The cloud storage is which type of
read or write each piece of information in a memory?
storage device in approximately the same length a) Primary
of time regardless of its location b) Secondary
c) Cache
36. If a disk drive fails but the computer d) Cookie generated memory
application running and using it can continue e) None of these
processing this application is said to have been Answer: B
designed with this feature. Explanation: -The cloud storage is a secondary
a) 100 percent uptime memory
b) Fault tolerance
c) High reliability 39. Dr EF Codd represented _____ rules for
d) All of the above relational database management system
e) None of these (RDBMS) in 1970
Answer: B a) 9
Explanation: -If a disk drive fails but the b) 12
computer application running and using it can c) 14
continue processing this application is said to d) 11
have been designed with fault tolerance e) None of these
Answer: B
37. Protecting data by copying it from the original Explanation: -Dr EF Codd represented 12 rules
source to a different destination is called for relational database management system
a) Formatting (RDBMS) in 1970.
b) Hacking
c) Backup 40. Which among the following software is not a
d) Data diddling product of Microsoft?
e) None of these a) Open office
Answer: C b) Outlook
c) Access
38. Cloud Storage can be defined as a virtual d) Visual studio express
memory unit that allows users to create, update, e) Windows
delete and perform all manipulative operations Answer: A

Click Here For Bundle PDF Course | [email protected] Page 7 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2020 Memory Based Paper

Explanation: -Open office, which is now


discontinued, was a product developed by the
Sun Microsystems in the late 90’s and then by
Oracle corporation in the 2010s

Click Here For Bundle PDF Course | [email protected] Page 8 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

1. A computer program that records every 3. The situation of having an identical piece of
keystroke made by a computer user, especially data stored in two different locations is known as
in order to gain fraudulent access to passwords __________ and is created by databases or other
and other confidential information is called data storage technologies.
a) Screen Recorder a) Data Encapsulation
b) Keylogger b) Data Abstraction
c) Lightstroke Reader c) Data Redundancy
d) Key Capture d) Data Polymorphism
e) Malwares e) Data Duplication
Answer: B Answer: C
Explanation: - A keylogger, sometimes called a Explanation: - Data redundancy occurs when the
keystroke logger or keyboard capture, is a type same piece of data exists in multiple places,
of surveillance technology used to monitor and whereas data inconsistency is when the same
record each keystroke on a specific computer. In data exists in different formats in multiple tables.
an alternative way, Keyloggers are a particularly Unfortunately, data redundancy can cause data
insidious type of spyware that can record and inconsistency, which can provide a company
steal consecutive keystrokes (and much more) with unreliable and/or meaningless information.
that the user enters on a device
4. Which Script enabled the production of client-
2. Which of the following is not a programming side dynamic web pages executed in the client's
language? browser?
a) C a) PHP
b) C++ b) Java Script
c) FORTRAN c) Ruby
d) BASIC d) Bash
e) Solaris e) Python
Answer: E Answer: B
Explanation:-Solaris is an enterprise Operating Explanation: - JavaScript enables the production
system for Oracle Database and Java of client-side dynamic web pages, with the
applications. Rest all are programming JavaScript code executed in the client's browser.
languages. 5. Which of the following is invalid Statement
regarding generation of computer?

Click Here For Bundle PDF Course | [email protected] Page 1 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

a) First Generation The period of first generation: are the modifier keys on a typical modern
1946-1959. Vacuum tube based. keyboard
b) Second Generation The period of second
generation: 1959-1965. Transistor based. 8. Which of the following forms of transmission
c) Third Generation The period of third occurs during walkie-talkie communication?
generation: 1965-1971. Integrated Circuit based. a) Simplex
d) Fourth Generation The period of fourth b) Full —Duplex
generation: 1971-1980. VLSI microprocessor c) Half-Duplex
based. d) Online
e) All are correct e) None of these
Answer: E Answer: C
Explanation: - In half-duplex mode, both the
6. Which OSI layer specifies how two devi ces transmitter and receiver transmit and receive,
should compress, encrypt, and encode data so it but not at the same time. When one of them is
may be successfully received on the other end? sending, the other can only receive, and vice
a) Application Layer versa. Example: Walkie-talkie in which message
b) Network Layer is sent one at a time and messages are sent in
c) Data-link Layer both directions.
d) Physical Layer
e) Presentation Layer 9. In which type of disc the data can be written
Answer: E only once and cannot be erased?
a) CD-RW/DVD-RW
7. Alt, Ctrl are __________ keys. b) BD-R
a) Stroke Keys c) DVD-ROM/CD-ROM
b) Lock Keys d) HD-DVD
c) Candidate Keys e) CD-R/DVD-R
d) Shortcut Keys Answer: E
e) Modifier Keys Explanation: - With CD-R discs, you can only
Answer: E write to them once, but you can read from them
Explanation: - A modifier key is a keyboard key repeatedly. You can write to CD-RW discs
that can only be used in conjunction with another numerous times and read content from them an
key when using a computer. Ctrl, Alt, and Shift infinite number of times.

Click Here For Bundle PDF Course | [email protected] Page 2 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

10. A firewall is software or firmware that booting sequence. The CMOS is also a chip on
prevents ___________________ the motherboard but is a RAM chip with volatile
a) Access to internetwork files memory which stores information about the
b) Access to intranetwork files computer components and their settings
c) Access to files from public IP addresses
d) Access to logic bomb files 12. Simple Mail Transfer Protocol (SMTP)
e) Unauthorized access to a network Protocol is used for sending or receiving
Answer: E __________.
Explanation: - A firewall is essential software or a) Source Code
firmware in network security that is used to b) Object Files
prevent unauthorized access to a network. It c) Executable Files
inspects incoming and outgoing traffic using a d) info files
set of security rules to identify and block threats. e) e-mail between e-mail clients and servers
Answer: E
11. The BIOS settings are stored in the Explanation: - The Simple Mail Transfer Protocol
____________ chip which is kept powered up via (SMTP) is used for sending and receiving e-mail
the battery on the motherboard between e-mail clients and servers. When an
a) EPROM SMTP server receives an e-mail from a mail
b) UEFI client, the SMTP server will then check the MX
c) PMOS records for the domain in the e-mail address in
d) CMOS order to exchange the mail with the remote
e) None of these SMTP server.
Answer: D
Explanati on: - BIOS, or Basic Input/Output 13. Which of the following convert high level
System, is software stored on a small memory language to low level language?
chip, also known as firmware. BIOS is found on a) Loader
the motherboard, and it is the very first software b) Linker
to run after a computer starts. Generally, the c) Editor
terms BIOS and CMOS are used d) Assembler
interchangeably. A BIOS chip in a motherboard e)Compiler
contains the program (firmware commonly called Answer: E
BIOS) to boot the computer. A CMOS chip Explanation: - A compiler is a special program
stores the settings like date & time, fan speed, that translates a programming language's source

Click Here For Bundle PDF Course | [email protected] Page 3 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

code into machine code, bytecode or another a) Virus


programming language. The source code is b) Worm
typically written in a high-level, human-readable c) Zombie
language such as Java or C++. d) Logic bomb
e) Trojan horse Virus
14. ___________ refers to the gap between Ans. e
demographics and regions that have access to Explanation: - Until a user executes the Trojan it
modern information and communications can’t replicate itself.
technology, and those that don't or have
restricted access. 17. USB and Various Ports are controlled by
a) SMPS ______________.
b) Virtual Data Drive a) Serial Ports
c) Circuit Switching b) SATA
d) Analog Divide c) PATA
e) Digital Divide d) South Bridge of Motherboard
Answer: E e) None of these
Explanation: - The digital divide is a term that Answer: D
refers to the gap between demographics and Explanation: - The Southbridge is one of the two
regions that have access to modern information chips in the core logic chipset on a personal
and communications technology (ICT), and computer (PC) motherboard. The Southbridge
those that don't or have restricted access. typically implements the slower capabilities of
the motherboard in Northbridge/Southbridge
15. Which shortcut key is used to start a chipset computer architecture.
presentation from the beginning?
a) F12 18. Which of the following statements is not true
b) F1 about cache memory?
c) Shift + F9 a) Cache memory is a form of Read Only
d) Ctrl+ F2 Memory (ROM)
e) F5 b) It is directly associated with the
Answer: E microprocessor.
c) Cache memory can be accessed much faster
16. Which of the following malicious program do by a microprocessor in comparison to a RAM.
not replicate automatically?

Click Here For Bundle PDF Course | [email protected] Page 4 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

d) Cache memory is sometimes called CPU e) None of These


memory. Answer: B
e) All of these Explanation: - A Modem translates digitals
Answer: A signals from a computer into analog signals that
Explanation: - Cache Memory is a form of Read can travel along conventional telephone lines
Only Memory (ROM) is not true about cache
memory 21. What are the steps involved in animating an
element/text in power point presentation?
19. Which tool do you choose in PowerPoint to a) Text/Element > AnimationTab > animation >
apply a transition to the current slide? effect.
a) View b) Text / Element >SlideShow> animation
b) Review >effect.
c) SlideShow c) Text/ Element> Review > animation > effect.
d) Transition d) Text / Element> View >animation > effect.
e) Animation e) None of these
Answer: D Answer: A
Explanation: - On the Transitions tab, under Explanation-
Transition to This Slide, click the transition that Text/Element>AnimationTab>animation>effect.
you want to apply. To change to a different
variation of the transition, such as the direction it 22. The combination of White Hat and Black Hat
moves on the screen, click Effect Options, and hackers are _________.
then select the variation you want a) Jailbreakers
b) Hackers
20. A modem ___________________ c) Crackers
a)Translates analog signals from a computer into d) Grey Hat Hacker
digital signals that can travel along conventional e) None of these
telephone lines. Answer: D
b) Translates digitals signals from a computer Explanation: - Between white and black are grey
into analog signals that can travel along hat hackers. Grey hat hackers enact a blend of
conventional telephone lines. both black hat and white hat activities. Grey hat
c) Demodulates digital signals from a computer. hackers often look for vulnerabilities in a system
d) Modulates signals from an analog telephone without the owner's permission or knowledge.
life

Click Here For Bundle PDF Course | [email protected] Page 5 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

23. What is the term used for the time during c) Data Pointer
which a job is processed by the system? d) Instruction Pointer
a) Turnaround time e) Program Counter (PC)
b) Scheduling time Answer: E
c) Waiting time Explanation: - The program counter, PC, is a
d) Job time special-purpose register that is used by the
e) Execution Time/ CPU time processor to hold the address of the next
Answer: E instruction to be executed
Explanation: - Burst time, also referred to as
“execution time”. It is the amount of CPU time 26. What does AB8 means in Excel?
the process requires to complete its execution. It a) Row AB Column 8
is the amount of processing time required by a b) Row A Cell B Column 8
process to execute a specific task or unit of a c) All are possible rendition
job. d) None of these
e) Column AB and Row 8
24. Which of the following CD technologies is Answer: E
also WORM technology? Explanation: - AB8 in MS- Excel means Column
a) CD-RW AB and Row number 8
b) CD-Photo/Photo CD
c) CD-I (Compact Disc Interactive 27. What is the size of IPv4?
d) CD-R a) 38-bit
e) None of these b) 16-bit
Answer: D c) 32-bit
Explanation: - Compact Disc-Recordable (CD-R) d) 64-bit
technology is known as Write Once-Read Many e) None of these
(WORM) technology as data once written on Answer: C
these discs cannot be erased.
28. ________________ is the supply of computer
25. A ______________ is a CPU register in the services like data storage, servers, and
computer processor which has the address of databases through the Internet.
the next instruction to be executed from memory. a) IoT
a) Memory Pointer b) Blockchain
b) File Pointer c) ICT

Click Here For Bundle PDF Course | [email protected] Page 6 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

d) ISA up the CPU. Cache memory acts as a buffer


e) Cloud computing is the supply of computer between the main memory and the CPU. It holds
services like data storage, servers, and the most frequently used part of the program and
databases through the Internet. data.
Answer: E
Explanation: - Cloud computing is on-demand 31. Which of the following is not a vali d form of
access, via the internet, to computing Memory?
resources—applications, servers (physical a) ROM
servers and virtual servers), data storage, b) FORM
development tools, networking capabilities, and c) PROM
more—hosted at a remote data center managed d) EPROM
by a cloud services provider (or CSP). e) None of these
29. What is the other name of URL? Answer: B
a) Subset Web address
b) Superset Web address 32. Which shortcut key is used to go to Home in
c) Archive site MS-Excel ?
d) Index page address a) Alt+A
e) Web Address b) Ctrl+F
Answer: E c) Ctrl+T
Explanation: - URL or the uniform resource d) Alt+F2
locator is the other name of the Website Address e) Alt+H
Answer: E
30. Which of the following is a very high -speed
semiconductor memory which can speed up the 33. Ctrl + B Shortcut key is used to _______
CPU? a) Add a hyperlink
a) Primary Memory b) Make selection italic
b) Optical Disk c) Make selection Superscript
c) SSD d) Make selection Subscript
d) Secondary Memory e) Make Selection Bold
e) Cache Memory Answer: D
Answer: E
Explanation: - Cache memory is a very high- 34. Convert (10101110)2 into Hexa decimal.
speed semiconductor memory which can speed a) AC

Click Here For Bundle PDF Course | [email protected] Page 7 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

b) FD renamed. The requested file has been moved to


c) AE another location and/or deleted.
d) CD
e) AB 37. Inkjet printers and laser printers are
Answer: C examples of ____ printers.
Explanation: - 10101110 to decimal equals to a) Impact Printers
174. Then convert (174)10 to Hexadecimal, i.e b) Semi-impact Printers
AE c) Hashed out Printers
35. Convert (010111010)2 into Octal d) Priority Printers
a) 287 e) Non-Impact
b) 256 Answer: E
c) 254 Explanation: - Non-impact printers create
d) 298 pictures, characters, and figures without any
e) 272 uninterrupted contact between the printing
Answer: E device and the paper. Laser printers, Inkjet
Explanation: - 010 111 010. Grouping them into printers and Thermal printers are some
three’s. 2 7 2 examples of Non-Impact printers.

36. When a user try to access a resource on a 38. Which of the following keyboard key is used
web server (usually a web page) that doesn't in a Microsoft PowerPoint presentation to select
exist, which type of Error exist that time? one hyperlink after another during a slide
a) HTTP Error 505 presentation?
b) HTTP Error 302 a) Shift+O
c) HTTP Error 405 b) Ctrl+P
d) HTTP Error 403 c) Alt+H
e) HTTP Error 404 d) F1
Answer: E e) Tab
Explanation: - The Web server returns the HTTP Answer: E
404 - File not found error message when it
cannot retrieve the page that was requested. 39. Flash memory is a non-volatile computer
The following are some common causes of this storage chip made up of __________________.
error message: The requested file has been a) DROM
b) MROM

Click Here For Bundle PDF Course | [email protected] Page 8 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2021 Memory Based Paper

c) PROM a) Bus topology


d) EPROM b) Mesh topology
e) EEPROM c) Ring topology
Answer: E d) Hybrid topology
Explanation: - EEPROM is the acronym of e) Star topology
electrically erasable programmable read-only Answer: E
memory, EEPROM is a Programmable ROM Explanation: - In this network, topology nodes
that can be erased and reprogrammed using an are connected to a central hub. Nodes
electrical charge. It was first was developed by communicate across the network by passing
George Perlegos. It allows the user to update data through the hub. Failure in one of the
the computer BIOS without having to open the terminals does not affect any other terminal. This
computer or remove any chips. network topology is used to connect terminals to
a large time-sharing host computer.
40. In which network every host is connected to
a central hub?

Click Here For Bundle PDF Course | [email protected] Page 9 of 9


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

1. A self-replicating program or software is which Ctrl + Tab


of the following?
a) VIRUS 4. Which among these which is not a browser?
b) Worm a) Chrome
c) Trojan b) Brave
e) Logic bomb c) Safari
e) Spam d) Mozilla
Answer: B e) All of these
Explanation:- A worm is standalone software that Answer: E
does not require a host program or human help Explanation: - All the above-mentioned are web
to propagate. browsers

2. A network hub is a node that __________ data 5. The first web-based email service which was
to every computer or Ethernet- based device founded in 1996 was ____
connected to it. a) Zeroth mail
a) Unicasts b) Hotmail
b) Broadcasts c) Gmail
c) Hosts d) Apple mail
d) Multicasts e) Edison mail
e) Anycasts Answer: B
Answer: B Explanation: - Founded in 1996 by Sabeer
Explanation: - A hub is a device/node that Bhatia and Jack Smith as Hotmail, is now known
broadcasts data to every computer connected to as Outlook and is now available in the Microsoft
it. office suit.

3. The shortcut key for continuously switching 6. The type of malware that hides on your device
between your tabs is _____ and secretly records the information and tracks
a) Alt + Tab your online activity and personal records is
b) Ctrl + Tab _________
c) Shift + Tab a) Virus
d) Alt + Tab b) Trojan
e) None of these c) Spyware
Answer: B d) Worm

Click Here For Bundle PDF Course | [email protected] Page 1 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

e) Spam 9. Spelling, Grammar and Thesaurus are found


Answer: C under which tab in MS Word 2019?
Explanation: - Spyware is a type of malware a) Home
installed on computers that collects information b) Review
about users without their knowledge. The c) Reference
presence of spyware is typically hidden from the d) View
user and can be difficult to detect. e) Edit
Answer: B
7. Which of the following is the interface/ port
used to connect a printer to a computer? 10. A/an ______ is an electronic signal that is
a) VGA generated from an external hardware device
b) None of these indicating it needs special attention from the
c) Serial OS?
d) Parallel a) Trigger Signal
e) All the above b) Query
Answer: D c) Short signalling
Explanation: - Parallel ports are used to connect d) Interrupt
a printer to a computer, whereas the Serial ports e) trap
are used to connect the Keyboard, Mouse and Answer: D
other peripheral devices to the computer. Explanation: - An interrupt is a signal emitted by
Currently, both these have been replaced by a device attached to a computer or from a
USB ports. program within the computer. It requires the
8. Green Line and Red Line are used in MS- operating system (OS) to stop and figure out
Word to indicate which of the following errors what to do next. An interrupt temporarily stops or
respectively? terminates a service or a current process.
a) Grammatical & Misspelling
b) Contextual & Article 11. The Insert tab has which of the following
c) Misspelling & Grammatical options available in MS Excel?
d) Grammatical & Historical a) Clipboard
e) None of these b) Font
Answer: A c) Chart
Grammatical & Misspelling d) Alignment
e) Workbook Views

Click Here For Bundle PDF Course | [email protected] Page 2 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

Answer: C 14. What does FDISK do?


Explanation: - The chart option is available under a) performs low-level formatting of the hard drive
the Insert tab. The rest are available in Home b) fixes bad sectors on the hard drive
and View tabs. c) recovers lost clusters on the hard drive
d) creates partitions on the hard drive
12. Reverse Proxy protects the Server from e) None of these
______ Answer: D
a) External attacks like VIRUS, WORM, Explanation: - It creates partitions on the hard
RANSOMWARE drive
b) Hardware failures
c) Software failures 15. A computer program that automatically
d) External natural disasters searches web pages based on certain keywords
e) None of these is called?
Answer: A a) Web Data Store
Explanation: - Reverse Proxy protects the server b) Web Play Store
from external threats like Virus, Worm and c) Browser
ransomware. Reverse proxies are typically d) Search Engine
implemented to help increase security, e) Web Crawler
performance, and reliability. Answer: E
Explanation: - A web crawler, crawler or web
13. An application of Computer science used to spider, is a computer program that's used to
provide data about biological systems is called? search and automatically index website content
a) Biosphere and other information over the internet. These
b) Biotechnology programs, or bots, are most commonly used to
c) Bioinformatics create entries for a search engine index
d) Bioengineering
e) Biogeotechnology 16. Which email protocol is used to send
Answer: C /forward messages and which protocol is used
Explanation: -Bioinformatics. Bioinformatics is for receiving messages respectively?
defined as the application of tools of computation a) SMTP & POP3
and analysis to the capture and interpretation of b) POP3 and PING
biological data. c) POP3 and SMTP
d) FTP & IMAP

Click Here For Bundle PDF Course | [email protected] Page 3 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

e) None of these b) Distributed OS


Answer: A c) Time Sharing OS
Explanation: - SMTP & POP3. POP3 is used for d) Homogenous OS
receiving and SMTP is used for transmitting or e) None of these
sending messages. MIME is used for attaching Answer: B
files. Explanation: - Distributed OS. Among these
Distributed OS is the fastest.
17. In MS- PowerPoint, by default there are how
many placeholders in the slides? 20. Select the correct algorithm used for paging
a) 1 in memory management
b) 2 a) Belady’s Anomaly
c) 3 b) Travelling Salesman
d) 4 c) FCFS
e) 5 d) Page Replacement
Answer: B e) Round Robin
Explanation: - One for title and the other for text. Answer: D
There are two types of placeholders that appear Explanation: - Page replacement happens when
on slides. The Single object placeholder is used a requested page is not in memory (page fault)
to insert a specific object and the multiple object and a free page cannot be used to satisfy the
placeholders can be used to insert a range of allocation, either because there are none, or
different objects. because the number of free pages is lower than
some threshold.
18. The 3rd Generation computer is ____
a) UNIVAC 21. Which of the following are the applications of
b) PASCAL an Operating System?
c) PDP 11 a) File Management
d) Honeywell 6000 b) Context Switching
e) EDBIC c) Both a & b
Answer: D d) Managing network packets
e) None of these
19. Among the following identify the OS that is Answer: C
the fastest Explanation: - An OS does both Context
a) Real time OS Switching and Managing the File System

Click Here For Bundle PDF Course | [email protected] Page 4 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

Answer: E
22. Which command displays directories as well Explanation: - The first HLL introduced was
as subdirectories also in MSDOS? FORTRAN (Formula Translation)
a) DIR/All
b) DIR/AN 25. In a super type/subtype hierarchy, each
c) DIR/DS subtype has?
d) DIR/S a) Only one super type
e) None of these b) Many super types
Answer: D c) At most two super types
Explanation: - The dir command displays a list of d) At least one subtype
files and subdirectories in a directory. With the /S e) Not at all
option, it recurses (execute a procedure Answer: A
recursively) subdirectories and lists their Explanation: - In a super type/sub-type
contents as well. hierarchy, each sub-type has only one super
type
23. Full form of CMOS is
a) Complimentary Metal-Oxide Semiconductor 26. Consider the URL given“www.XYZ.com”
b) Coupling Metal-Oxide Semiconductor What does the “.com” represent.
c) Complimentary Metal-Oxide System a) Communication
d) Converting Metal-Oxide Semiconductor b) Commercial
e) Complimentary Metal-Operating c) Committee
Semiconductor d) Company
Answer: A e) Both c & d
Explanation:- Complimentary Metal-Oxide Answer: B
Semiconductor
27. A software which is freely available to
24. The very first high-level language introduced download but the source code in it can’t be
in computer was ______________. modified or changed is called __?
a) C a) Open Source
b) PASCAL b) Closed Source
c) JAVA c) GITHUB
d) COBOL d) Freeware
e) None of these e) Malware

Click Here For Bundle PDF Course | [email protected] Page 5 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

Answer: D b) Ctrl + Shift + Spacebar


Explanation: - Unlike with free and open-source c) Ctrl + Down arrow
software, which are also often distributed free of d) All are possible
charge, the source code for freeware is typically e) None of these
not made available. Answer: A

28. Category 6 or CAT6 Ethernet cable colour 31. Which of the following is not a number
standards are Red, Blue, Yellow, White, Grey system?
and Black. What does the Blue colour identify? a) Buffer
a) VOIP connection b) Token
b) Network Connectivity c) Binary
c) Equipment in workstation d) Octal
d) Jumpers e) Both a & b
e) Receivers Answer: E
Answer: B Explanation: - Both Buffer and Token do not
Explanation: - Network Connectivity. The Blue represent a number system. A buffer is a storage
coloured cable denotes Network Connectivity. device used to compensate for a difference in
rate of data flow, or time of occurrence of events,
29. TCP port number 443 is used by __ when transmitting data from one device to
a) TELNET another. In the computer networking industry, a
b) HTTP token is a data frame that is transmitted between
c) HTTPS network points on a token ring network.
d) DHCP 32. In MS-Excel, to insert the sum formula,
e) SQL SERVER which function do we implement?
Answer: C a) =sum(cell range)
Explanation: - HTTPS uses port 443, DHCP b) =sum(add the values)
uses 67 and 68. Whereas HTTP uses 80 and c) =add(cell range)
SQL Server uses 1433 port number. TELNET- d) =sum(add integers only)
23 e) None of these
Answer: A
30. The shortcut key to apply date formatting in Explanation:- =sum(cell range) Example
day, month and year in MS Excel is? =sum(A1:A10). Keyboard shortcut- Alt +=
a) Ctrl + Shift + #

Click Here For Bundle PDF Course | [email protected] Page 6 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

33. The technology used in Bitcoin is ___ d) International Study of Computer Architecture
a) Blockchain e) None of these
b) Artificial Intelligence Answer: B
c) Machine Learning
d) UPI 36. In an MS-Excel Worksheet. How many
e) RFID possible hyperlinks are possible?
Answer: A a) 65529
Explanation: - Blockchain is the technology that b) 65531
enables the existence of cryptocurrency (among c) 65530
other things). Bitcoin is the name of the best- d) 65535
known cryptocurrency, the one for which e) 75530
blockchain technology, as we currently know it, Answer: C
was created. Explanation: - 65530. The shortcut to add a
hyperlink is Ctrl + K
34. Pokémon GO, the infamous game uses
__________________. 37. Show/hide Gridlines option is available in the
a) Core 3 ____ menu in MS Excel 2019
b) Dual Core a) Home
c) Octal Core b) View
d) Augmented Reality c) Insert
e) Console d) Format
Answer: D e) None of these
Explanation: - Pokémon Go (stylized as Answer: E
Pokémon GO) is a 2016 augmented reality (AR) Explanation: - The Show/hide gridlines are
mobile game, part of the Pokémon franchise, available in Page Layout
developed and published by Niantic in
collaboration with Nintendo and The Pokémon 38. Which of the following is a software program
Company for iOS and Android devices that is written to a hardware device?
a) Ransomware
35. The full form of ISA is? b) Middleware
a) Information System Architecture c) Firmware
b) Instruction Set Architecture d) All of these
c) Image System Augmentation e) None of these

Click Here For Bundle PDF Course | [email protected] Page 7 of 8


Computer Awareness Bundle PDF Course 2023
RRB PO Mains 2022 Memory Based Paper

Answer: C
Explanation: - Firmware is a software program 40. When we perform certain operations on our
that is written to a hardware device. It allows the document and click the close button without
hardware to be updated. The contents are saved saving it, then____ appears on the screen.
when a hardware device is turned off or loses its a) Alert box
external power source. b) Prompt box
c) Dialog box
39. Which one is a set of layered protocols used d) Command box
for communication over the Internet? e) None of these
a) Point to Point Protocol Answer: C
b) File Transfer Protocol Explanation: - A dialog box is a temporary
c) Transmission Control Protocol window an application creates to retrieve user
d) All of these input. An application typically uses dialog boxes
e) None of these to prompt the user for additional information for
Answer: C menu items.
Explanation: - The Transmission Control
Protocol i.e. TCP/IP is a set of layered protocols
used for communication over the Internet.

Click Here For Bundle PDF Course | [email protected] Page 8 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

1. Which one of the following is the default word 4. Which folder would you generally associate
processor for Microsoft Windows? your mails going in after they are deleted in
a) MS WORD GMAIL?
b) MS PAINT a) Primary
c) WordPad b) Spam
d) Notepad c) Draft
e)None of these d) Starred
Answer: C e) Trash
Explanation: - Wordpad is the default Microsoft Answer: E
Word Processor. Explanation: - The deleted email goes in the
trash folder and stays there till 30 days if not
2. First Web browser was created by _________ cleared.
a) Tim Berners Lee
b)James Gosling 5. The term that defines the intention of a person
c) Rosen Hall to extort money from another person (preferably
d) Charles Babbage the owner) is?
e) Alan Turing a) Ransomware
Answer: A b) Malware
Explanation: - Tim Berners Lee also invented the c) Spyware
HTML and HTTP protocol d) Adware
e) None of these
3. Which of the following is an input device? Answer: A
a) Screen/Monitor Explanation: - Hackers use this technique to
b) Speakers charge money for unlocking the files and folders
c) LCD and all relevant data of the owner to give it back.
d) Scanner The money is transferred through bitcoin
e) All of the above (cryptography).
Answer: D 6. In MS Excel, which command is not a valid
Explanation: - Scanner is an input device and cell reference?
the rest are output devices a) AB20
b) A21
c) AB#20
d) AB$45

Click Here For Bundle PDF Course | [email protected] Page 1 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

e) None of these 9. The keyboard shortcut CTRL + Z is for which


Answer: C of the following function?
Explanation: - AB#20. We do not use # for cell a) Redo
referencing in MS Excel. b) Undo
c) Cut
7. When you connect to the _________ the d) Paste
computer connects to a server. Fill in the blanks e) None of the above
a) Protocol driven messaging Answer: B
b) Internet
c) Intranet 10. The shortcut Windows Logo Key + Up Arrow
d) Client key is used to carry out which of the following
e) None of these function?
Answer: C a) Close the active window
Explanation: - When our compute connects to b) Switch between the windows opened
the internet it starts communicating with a server c) Minimize the active window
at the ISPs disposal. d) Copy the address of the active window
e) None of these
8. What is the output, when a folder is opened in Answer: C
a Windows computer and CTRL +A keys are
pressed simultaneously? 11. In MS- Excel the shortcut key combination to
a) All files and sub-folders in the current folder apply/remove strikethrough is?
are selected. a) CTRL +5
b) The window switches between the apps b) CTRL +3
opened. c) CTRL +2
c) The Files other than those present inside the d) CTRL +4
concerned folders are selected. e) CTRL +1
d) Only the first 5 files are selected. Answer: A
e) None of these
Answer: A 12. The __________ feature helps to align all the
Explanation: - All files and sub-folders in the text to fit within the defined margins in a word
current folder are selected. processor.
a) Font
b) Word wrap

Click Here For Bundle PDF Course | [email protected] Page 2 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

c) Auto text known as trap or exception handling. Whereas


d) font size the hardware interrupts are called polling and
e) None of these vectored.
Answer: B
16. The Themes section of MS PowerPoint is
13. The correct full form of VGA is? found under?
a) Volatile Geographic Access a) Home tab
b) Video Graphics Array b) Design tab
c) Video Graphics Adapter c) Insert tab
d) Video Geographic Array d) Animation tab
e) None of these e) None of these
Answer: B

14. Among the following which one of them is a


permanent storage device? Answer: B
a) Cache
b) Optical Disk 17. When an operating system enables a person
c) SSD to interact with the computer through the use of
d) Hard Disk symbols, icons, visualmetaphors and pointing
e) Both c & d devices, it is classified as _______?
Answer: E a) Command line interface
Explanation: - Hard Disk and SSD, both are b) Graphical user interface
permanent storage devices c) Touch user interface
d) Voice user interface
15. A software interrupt is also called _______ e) None of these
a) Trap Answer: B
b) Exception Handling Explanation: - In a GUI, the user interacts with
c) Query the computer system through symbols, icons,
d) Interrupt Handler pointing devices.
e) Both a & b
Answer: E 18. MAC address is a ____________
Explanation: - After we install a software in a a) 48 bit physical address
computer, the update messages that we see are b) 48 bit logical address
c) 32 bit device address

Click Here For Bundle PDF Course | [email protected] Page 3 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

d) 32 bit physical address Explanation: - The merging feature helps bring


e) None of these together different copies of workbooks that other
Answer: A users have worked on independently.
Explanation: - The Media Access Control
address is a hardware address/Ethernet 21. Other than the <b> tag in HTML, which of the
address. It is 48 bit physical address. It is following options can be used to make the text
mentioned/imprinted on the NIC bold?
a) <table>
19. The device that converts a decimal number b) <strong>
to a binary is called? c) <thick>
a) encoder d) <bold>
b) decoder e) None of these
c) Accumulator Answer: B
d) Assembler
e) None of these 22. Windows 7 was launched in?
Answer: A a) 20 October, 2009
Explanation: - An encoder converts information b) 15 August. 2008
from one format or code to another. An encoder c) 22 October, 2009
can be used to encode the decimal number to d) 22 October, 2010
binary number. e) None of these
Answer: C
20. The feature that allows multiple users in MS
Excel to bring together different copies of 23. What is the binary equivalent of (471)8
workbooks that other users have worked on a) 100111111
independently is called? b) 100000001
a) Copying c) 100111001
b) Appending d) 100111011
c) Merging e) None of these
d) Compiling Answer: C
e) Pasting Explanation: - 100111001. Make groups of three
Answer: C → 4 = 100, 7= 111, 1 = 001

24. 1 Petabyte (PB) = 1024 __?

Click Here For Bundle PDF Course | [email protected] Page 4 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

a) KB span.That is if a row spans two rows, it means it


b) MB will take up the space of two rows in that table.
c) TB
d) GB 27. The shortcut key used for aligning the text
e) EB centrally in MS Office is ____
Answer: C a) CTRL + R
Explanation: - TB. 1024 Terabytes = 1 Petabyte b) CTRL + H
c) CTRL + T
25. The Caps Lock key is also called a toggle d) CTRL + E
key because ____ e) CTRL + C
a) It cannot be used to input data Answer: D
b) It changes its status while pressed.
c) It can be used to insert numbers. 28. Windows 95 is an example of which of the
d) It can be used to insert function keys following type of OS?
e) None of these a) Single-User Single-Input OS
Answer: B b) Multi-processing OS
Explanation: - It changes its status while c) Multi-threading OS
pressed. Toggle Keys are On-OFF in nature. d) Single-User OS
Examples:- Num Lock, Caps Lock and Scroll e) Real-Time OS
lock Answer: D
Explanation: - A single-user operating system is
26. Which one of the following attribute is used a type of operating system developed and
to combine two or more rows into a single cell in intended for use on a computer or similar
HTML? machine that will only have a single user at any
a) Rownum given time. This type of OS is typically used on
b) Rowid devices like wireless phones and two-way
c) Rowspan messaging devices.
d) All of these
e) None of these 29. The maximum limit of worksheet functions in
Answer: C MS-Excel is?
Explanation: - Rowspan attribute in HTML a) 255
specifies the number of rows a cell should b) 64
c) 347

Click Here For Bundle PDF Course | [email protected] Page 5 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

d) 341 32. For a fixed internet in home or office, which


e) None of these of the following method can be a mode of
Answer: D accessing the internet efficiently?
Explanation: - The maximum number of a) Mobile hotspot
available worksheet functions is 341, whereas b) Mobile Broadband
the maximum sheets that can be added is 255. c) DSL (Digital Subscriber Line)
d) Home Wi-Fi
e) Public Wi-Fi
30. All formulas in MS Excel start with Answer: C
a) + Explanation: - DSL (Digital Subscribers Line). A
b) – Digital Subscriber Line is used in home and
c) * office spaces to provide high speed internet
d) = broadband facility.
e) ()
Answer: D 33. ICs (Integrated Circuits) were used in which
Explanation: - All the functions in MS Excel start generation?
with “ =”. Example =SUM(cell range) a) First
b) Second
31. Which of the following is not the main c) Third
function of the OS? d) Fourth
a) Network traffic management e) None of these
b) Pixel evaluation Answer: C
c) Malware Protection Explanation: - In Third Generation Computers,
d) Windows defending ICs were used.
e) All of the above
Answer: E 34. The tasks performed by Modem is ____
Explanation: - The primary task of the OS is to a) Checks and reports cases of Virus infection
manage the Process. Memory, Device and b) Modulates Wavelength
Network & not Network traffic. Hence all the c) Manages traffic over a metered network
above mentioned are not the main function. d) Converts analog signals to digital signals and
vice-versa
e) None of these
Answer: D

Click Here For Bundle PDF Course | [email protected] Page 6 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

Explanation: - Converts analog signals to digital Packet Internet Grouper


signals and vice-versa. A modulator-
demodulator or modem is a computer hardware 37. The system of 32 bit numbers in IP
device that converts data from a digital format addressing is known as?
into a format suitable for an analog transmission a) IPv1
medium such as telephone or radio. A modem b) IPv4
transmits data by modulating one or more carrier c) IPv6
wave signals to encode digital information, while d) IPv5
the receiver demodulates the signal to recreate e)IPv9
the original digital information Answer: B
Explanation: - Internet Protocol version 4 (IPv4)
35. The server acting as a mediator between a is the fourth version of the Internet Protocol (IP).
workstation and internet for the sole purpose of It is one of the core protocols of standards-based
maintaining security is ___? internetworking methods in the Internet and
a) Bridge other packet-switched networks. IPv4 was the
b) Hub first version deployed for production on SATNET
c) Repeater in 1982 and on the ARPANET in January 1983.
d) Switch
e) None of these 38. The protocol used for transmitting files from
Answer: E one computer to another via the internet is called
Explanation: - The correct answer is Proxy ____
server. It is a server that acts as an intermediary a) ARPANET
device between a workstation user and the b) FTP
internet so that the enterprise concerned with it c) IP
can receive maximum security. d) POP
e) None of these
36. Full form of PING is __ Answer: B
a) Packet Intranet Group Explanation: - File Transfer Protocol is the
b) Packet Internet Groper protocol used for transmitting files from one
c) Packet Internet Grouper computer to the other over the internet
d) Packet Infrastructure Group 39. In the Email header there are two fields that
e) None of these are mentioned, “CC” and “BCC”. What is the full
Answer: C form of BCC?

Click Here For Bundle PDF Course | [email protected] Page 7 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2022 Memory Based Paper

a) Blind Common Copy a) ISDN


b) Blind Computer Copy b) Modem
c) Basic Common Copy c) Dial Up
d) Blind Carbon Copy d) DSL
e) None of these e) None of the above
Answer: Answer: E
D Explanation: - One type of internet service
devoid of cables is Satellite internet. Satellite
internet is wireless internet beamed down from
satellites orbiting the Earth. It’s a lot different
from land-based internet services like cable or

40. Which type of Internet Service does not DSL, which transmit data through wires running

require cable or phone lines? underground.

Click Here For Bundle PDF Course | [email protected] Page 8 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

1. ________________ is the process of Answer: B


segmenting the disc into tracks and sectors Explanation: - Pressing the F5 key begins the
a) Tracking slideshow from the first slide
b) Threading
c) Thrashing 4. Which PowerPoint view works best for adding
d) Crashing slide transitions?
e) Formatting a) Reading View
Answer: E b) Notes View
Explanation: - The process of dividing the disk c) Reading View
into tracks and sectors is called formatting. In d) Notes View
computer disk storage, a sector is a subdivision e) Slide Sorter View
of a track on a magnetic disk or optical disc. Answer: E
When a disk undergoes a low-level format, it is
divided into tracks and sectors. 5. Vacuum Tubes were replaced by___
a) Integrated Circuits
2. What is the Shortcut key to insert a page b) Printed Circuit Boards
break? c) VLSI Chips
a) Ctrl + A d) ULSI Chips
b) Shitf + Ctr l+ Alt + O e) Transistors
c) Ctrl + P Answer: E
d) Ctrl + I Explanation: - Vacuum Tubes were replaced by
e) Ctrl + Enter Transistors. The second-generation computers
Answer: E emerged with the development of Transistors.
Explanation: - To insert a page break, press The transistor was invented in 1947 by three
Ctrl+Enter scientists J. Bardeen, W.H Brattain and W.
Shockley.
3. Which of the following Function key is used for 6. Which Function is used to calculate
slide show? Remainder in MS Excel.?
a) F4 a) DIV()
b) F5 b) REM()
c) Ctrl + P c) REMAINDER()
d) F12 d) MUL()
e) Ctrl + Alt + Del e) MOD ( )

Click Here For Bundle PDF Course | [email protected] Page 1 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

Answer: E Explanation: - The Application Software is a


Explanation: - Returns the remainder after computer program designed to perform a group
number is divided by divisor. The result has the of coordinated functions, tasks, or activities for
same sign as divisor. the benefit of the user. Word processing,
Spreadsheet, and Google Chrome are examples
7. Magnetic Disk is cheaper than Magnetic of application software.
Tape?
a) True 10. An operating system component called
b) False ____________ is in charge of loading libraries
Answer: B and programs.
a) Linker
8. Which browser is an inbuilt browser in b) Assembler
windows? c) Editor
a) Chrome d) Compiler
b) Solaris e) Loader
c) Firefox Answer: E
d) Safari Explanation: - In computer systems a loader is
e) Internet Explorer the part of an operating system that is
Answer: E responsible for loading programs and libraries. It
Explanation: - It really depends on the options is one of the essential stages in the process of
available. If Microsoft Edge is available then, starting a program, as it places programs into
Edge is the correct and appropriate option. memory and prepares them for execution
Otherwise Internet Explorer is the apt option.
11. ___________ is the amount of time that
9. Word processing, Spreadsheet, and Google passes between when a data request or call for
chrome are examples of ___ storage is made by an instruction control unit
a) Utility Software and when the data is delivered or when the
b) OS software storage process begins.
c) Device Drivers a) Burst Time
d) Middleware b) Switching Time
e) Application Software c) Format Specifier Time
Answer: E d) Data process Time
e) Access Time

Click Here For Bundle PDF Course | [email protected] Page 2 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

Answer: E 1950s that's used to verify the legitimacy or


Explanation: - Access time is total time it takes a originality of checks and other paper documents
computer to request data, and then that request
to be met. 14. Arogya Setu app uses which technology?
a) Only GPS
12. The TCP protocol used in which of the b) Only Bluetooth
following layer? c) GPRS
a) Network Layer d) Xender
b) Physical Layer e) Bluetooth and GPS
c) Session Layer Answer: E
d) Application Layer Explanation: - It is a tracking app which uses the
e) Transport Layer smartphone's GPS and Bluetooth features to
Answer: E track COVID-19 cases
Explanation: - Transmission Control Protocol
(TCP) is a communications standard that 15. In order to delete any number of rows and
enables application programs and computing columns in MS Excel, shortcut key is _______
devices to exchange messages over a network. a) Ctrl + Z
It is designed to send packets across the internet b) Ctrl + B
and ensure the successful delivery of data and c) Ctrl + P
messages over networks. d) Ctrl + Shift + *
e) Ctrl+ -
13. Character recognition technology called Answer: E
____________ code is primarily utilized by the
banking sector to speed up the processing and 16. MAC Address is also known as
clearance of checks and other documents . ____________with 48-bits hardware number of a
a) Magnetic Information Character Recognition computer.
b) Magnetic Information Cable Recognition a) Memory Address
c) Magnetic Intelligence Character Recognition b) Physical Address
d) Magnetic Ink Character Recognition c) Subset Address
e) None of these d) Set mapping Address
Answer: D e) Logical Address
Explanation: - MICR (magnetic ink character Answer: B
recognition) is a technology invented in the

Click Here For Bundle PDF Course | [email protected] Page 3 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

Explanation: - MAC addresses are also known refers to the input resolution of a photograph or
as hardware addresses or physical addresses. image. DPI refers to the physical dot density of
They uniquely identify an adapter on a LAN. an image when it is reproduced as a real
physical entity, for example printed onto paper.
17. _______________ is a protocol for transferring 19. What malware is associated with Bitcoin?
data securely from one network to another. a) Etherium Jacking
a) POP b) Byteware
b) SMTP c) Crypto jacking
c) SFTP d) Ransomware
d) IP e) Datajacking
e) UDP Answer: C
Answer: C Explanation: -Cryptojacking (also called
Explanation: - Secure File Transfer Protocol malicious cryptomining) is an online threat that
(SFTP) is a network protocol for securely hides on a computer or mobile device and uses
accessing, transferring and managing large files the machine’s resources to “mine” forms of
and sensitive data. Designed by the Internet online currency known as cryptocurrencies,
Engineering Task Force as an extension of mainly Bitcoin.
Secure Shell (SSH), SFTP enables access,
transfer and management of files over a 20. The_________ is a conceptual framework
network. used to describe the functions of a networking
system.
18. What is unit of measuring printing quality of a) TCP Model
printer? b) OSI Model
a) Dots Per Unit Time c) IP Model
b) Dots Per Line d) C
c) Dots Per Character e) D
d) Dots per Centimeter Answer: B
e) Dots Per Inch Explanation: - The OSI Model (Open Systems
Answer: E Interconnection Model) is a conceptual
Explanation: - The output quality of a printer is framework used to describe the functions of a
measured by Dots per inch. In printing, DPI (dots networking system. The OSI model
per inch) refers to the output resolution of a characterizes computing functions into a
printer or image setter, and PPI (pixels per inch) universal set of rules and requirements in order

Click Here For Bundle PDF Course | [email protected] Page 4 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

to support interoperability between different Explanation: - Steganography is the technique of


products and software. hiding secret data within an ordinary, non-secret
file or message in order to avoid detection; the
21. FTP stands for secret data is then extracted at its destination.
a) File Text Process
b) Format Text Protocol 24. Which is the spreadsheet software provided
c) File Threading Process by Google?
d) File Transfer Protocol a) iWords
e) File Transmit Protocol b) Google Docs
Answer: D c) Google Preview
d) Google Drive
22. ______________ is a term used to describe e) Google Sheet
the act of illegally using, copying or distributing Answer: E
software without ownershi p or legal rights.
a) Free Software 25. Which of the following function is used for
b) Software piracy the addition in MS Excel?
c) Donationware a) ADD
d) Freeware b) PLUS
e) Shareware c) None of these
Answer: B d) SUM
Explanation: - Software piracy is the illegal e) AMOUNT
copying, distributing, sharing, selling or use of Answer: D
software, whether intentional or not. Explanation: -Syntax- =SUM(cell ranges)

23. ___________ is the practice of concealing a 26. Which of the following is the professional
message within another message or a physical social networking site that allows Access for job
object. opportunities and to connects the industries?
a) Calligraphy a) Naukri
b) Cryptography b) Scaler
c) Steganography c) Docker
d) Tomography d) Facebook
e) Chorography e) Linkedin
Answer: C Answer: E

Click Here For Bundle PDF Course | [email protected] Page 5 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

b) Podcast
27. The 'S' at the end of "HTTPS" stands for c) Vlog
__________________. d) Broadcast
a) Stealth e) Unicast
b) Safe Answer: B
c) Software Explanation: Podcast is a program, either talk
d) Secure numeric that is made available in digital format
e) None of these for automatic download over the internet
Answer: D
Explanation: - Hypertext Transfer Protocol 30. A/A(n) _________________ is a private
Secure corporate network, used exclusively by company
employees.
28. What is the name of the list that stores the a) Peer to Peer Network
URLs of web pages and links visited in past few b) Internet
days? c) LAN
a) Linked List d) WAN
b) Page List e) Intranet
c) Double Paging List Answer: E
d) None of these Explanation: - An intranet is a private, network
e) History List that is contained that is contained within
Answer: E enterprise.
Explanation: - The history list will enable us to
see the internet history that we have been 31. In MS — PPT, you can show the shortcut
visited. It has a list that stores the URLs of web menu during the slideshow by
pages and links that we have visited in the past. ________________.
Internet history can have security implications as a) Clicking the shortcut button on the formatting
it allows anyone to see just what you've been toolbar
looking at. b) Right clicking the previous slide
c) Left clicking on the present slide
29. A program, either talk numeric that is made d) Right clicking the current slide
available in digital format for automatic download e) None of these
over the internet is called _______________. Answer: D
a) Blog

Click Here For Bundle PDF Course | [email protected] Page 6 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

32. Memory which forgets everything when you designed by John Mauchly and J. Presper
switch off the power is known as Eckert
______________.
a) Non-Volatile 35. A __________ is a common set of guide lines
b) Dynamic Memory that permits communication between
c) C technological devices.
d) D a) Port
e) Volatile b) Serial Bus
Answer: E c) Synchronization
d) System Software
33. The maximum Zoom percentage in Microsoft e) Protocols
PowerPoint is__________. Answer: E
a) 100% Explanation: - A protocol is a set of rules that
b) 200% governs the communications between
c) 400% computers on a network. These rules include
d) 250% guidelines that regulate the following
e) 500% characteristics of a network: access method,
Answer: C allowed physical topologies, types of cabling,
speed of data transfer.
34. The first digital computer and what most
people think of as a computer was called the 36. _________ is a type of cybercrime where a
__________________. person impersonates a brand or contact that you
a) COMPATE trust in order to gain critical personal information.
b) Digital Calculator a) Spooling
c) ENIAC b) Phishing
d) Analog Computer c) Identity theft
e) None of these d) Spoofing
Answer: C e) None of these
Explanation: - The first digital computer and what Answer: D
most people think of as a computer was called Explanation: - Spoofing involves faking one's
the ENIAC. ENIAC stands for Electronic identity, and can be used for various attacks
Numerical Integrator and Computer. ENIAC was such as identity theft. Phishing is one such use
of spoofing that attempts to steal somebody's

Click Here For Bundle PDF Course | [email protected] Page 7 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2021 Memory Based Paper

personal information or credentials by having


them volunteer that information from a nefarious 39. In which year was Internet Explorer first
source that looks legit. released?
a) 1990
37. Which of the following committees guides the b) 1988
progression of the TCP/IP suite and the c) 1996
Internet? d) 1993
a) Internet Engineering Task Force e) 1995
b) Internet Technology Chaining Answer: E
c) Internet Architecture Board (IAB) Explanation: - In July 1995 Microsoft released
d) Internet Assigned Architecture Internet Explorer 1.0 as an add-on to the
e) Internet Assigning Protocol Committee Windows 95 operating system
Answer: D
Explanation: - The Internet Architecture Board 40. Which of the following uses a unique ei ght-
(IAB) is a board of researchers and bit binary code for each number and alphabetic
professionals that manages the engineering and character as well as punctuation marks and
technical development related to the Internet. accented letters and non-alphabetic characters?
a) ASCII
38. ____________ is the process of copying data b) UNICODE
from one area to another in order to secure it in c) Extended binary-coded decimal interchange
the event of a disaster, accident, or criminal act. code (EBCDIC)
a) None of these d) ANSI C
b) Both 3 & 4 e) DAG
c) Disk Cleanup Answer: C
d) Data Backup Explanation: - EBCDIC, in full extended binary-
e) Data Checkup coded decimal interchange code, data-encoding
Answer: D system, developed by IBM and used mostly on
Explanation: - Data Backup refers to the copying its computers, that uses a unique eight-bit binary
of physical or virtual files or databases to a code for each number and alphabetic character
secondary location for preservation in case of as well as punctuation marks and accented
equipment failure or catastrophe. The process of letters and non-alphabetic characters
backing up data is pivotal to a successful
disaster recovery plan

Click Here For Bundle PDF Course | [email protected] Page 8 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

1. Which program is /software is made to create 4. Which one is a high speed memory used to
a job queue during scheduling of jobs in an hold instructions temporarily during Processing?
operating system? a) Secondary Memory
a) Spooling b) Main Memory
b) Spoofing c) Cache Memory
c) Drive d) Primary Memory
d) Compiler e) None of These
e) None of these Answer: C
Answer: A Explanation: - It is high speed memory used to
Explanation: - A Spooling is a software that hold instructions temporarily during processing.
controls putting jobs on a queue and taking them When CPU requires a data it first search it in
off one at a time from the queue. cache memory. If it is present there it uses it and
is called cache hit, but if it is not present it goes
2. Microsoft is an example of? to the main memory and fetches data from main
a) Open Source memory to the cache memory.
b) Closed source
c) Open ended market software 5. Which key is used for closing a opened
d) Vertical Market software window or program?
e) None of these a) Alt + F4
Answer: B b) Ctri+F1
Explanation: - Closed source means those c) Alt +F2
computer programs or software whose source d) Alt + F3
codes have not been published e) None of these
Ans. a
3. Which is the spreadsheet software provided Explanation: - Alt + F4 is used for closing a
by Google? opened window or program
a) Google Doc
b) Google Page 6. In which processing user does not have
c) Google Sheet access to its operation?
d) Google Drive a) quick processing
e) None of these b) batch processing
Answer: C c) real time
d) remote processing

Click Here For Bundle PDF Course | [email protected] Page 1 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

e) None of the above


Answer: B 9. Single party disk relying on the disk controller
Explanation: - This operating system keeps the for finding out which disk has fail ed is used by
number of jobs in memory and performs them a) RAID level 5
one at a time. Jobs are processed in a first- b) RAID level 2
come, first-served manner. Each job set is c) RAID level 4
defined as a batch. When a task is finished, its d) RAID level 3
memory is freed, and the work's output is e) RAID level 1
transferred into an output spool for later printing Answer: D
or processing. User interaction is limited in the Explanation: - RAID 3 is a RAID configuration
batch operating system that uses a parity disk to store the information
generated by a RAID controller instead of
7. For which of the MS Office products, it striping it with the data.
requires renewal and for which product only one-
time purchase is required? 10. Which command divides the surface of the
a) MS Office 2019 blank disk into sectors and assign a unique
b) MS Office 365 address to each one?
c) MS Office 2016 a) Ver
d) MS Office 2010 b) Format
e) None of these c) Fat
Answer: A d) Chkdsk
e) None of these
8. What is the reason behind computer Answer: B
maloperation? Explanation: - Format command divides the
a) Phishing surface of theblank disk into sectors and assign
b) Pharming a unique address to each one. Disk formatting is
c) Virus the process of preparing a data storage device
d) Ransom ware such as a hard disk drive, solid-state drive,
e) None of these floppy disk or USB flash drive for initial use. In
Answer: C some cases, the formatting operation may also
Explanation: - Computer viruses aim to disrupt create one or more new file systems
systems, cause major operational issues, and
result in data loss and leakage

Click Here For Bundle PDF Course | [email protected] Page 2 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

11. In Excel, which of the following conditional d) Format


formatting styles shows bars in a cell range e) None of these
along with values? Answer: A
a) Data bars Explanation: - The first step after inserting flash
b) Top/bottom rules drives is to Scan and Open. This comes
c) Highlight cell rules automatically as a dialog box opens, with
d) Colour scales another option of “Continue without scanning”.
e) Range bars
Answer: A 14. Which is the Digital currency with no
Explanation: - Data bars in Excel make it very Regulation and is transferred from one user to
easy to visualize values in a range of cells another directly?
a) Bitcoin
12. What is the purpose of pulse code b) Tron
modulation in computing technology? c) Doge
a) Converting Analog Signal to Digital Signal d) Cryptocurrency
b) Converting Digital Signal into Analog Signal e) None of these
c) Amplifying the frequency of Analog Signal Answer: D
d) D. Amplifying the frequency of Digital Signal Explanation: - Cryptocurrencies are digital
e) E. None of the above tokens. They are a type of digital currency that
Answer: A allows people to make payments directly to each
Explanation: - Pulse code modulation is a other through an online system.
method used to convert an analog signal into a Cryptocurrencies have no legislated or intrinsic
digital signal. So that it can be transmitted value; they are simply worth what people are
through a digital communication network, and willing to pay for them in the market.
then converted back into the original analog
signal. The PCM process includes three steps: 15. The basic function of the server is to assign
Sampling, Quantization, and Coding. IP addresses to various devices and hosts?
a) DHCP
13. Question on situation; what will be first step b) DNS
after inserting a pen dri ve in the computer? c) IP
a) Scan and open d) SMTP
b) Only Scan e) None of these
c) Only Open Answer: A

Click Here For Bundle PDF Course | [email protected] Page 3 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

Explanation: - DHCP Server is basically a server 18. Which of the following is alphanumeric
that holds IP Addresses and other information combination of password?
related to configuration. DHCP Client: It is a) Abcd1234
basically a device that receives configuration b) Abcdefghi
information from the server. It can be a mobile, c) 1234567
laptop, computer, or any other electronic device d) Abc@123
that requires a connection e) None of these
16. IP address shows the Answer: D
a) Physical address of the device Explanation: - An alphanumeric password
b) Logical address of the device contains numbers, letters, and special
c) Source address of the device characters (like an ampersand or hashtag). In
d) Destination address of the device theory, alphanumeric passwords are harder to
e) None of these crack than those containing just letters
Answer: B
Explanation: - An Internet Protocol (IP) address 19. Which one is used in a program to execute a
is a unique numerical identifier for every device particular set of statements repeatedly?
or network that connects to the internet. a) Visual basic
Typically assigned by an internet service b) Pseudocode
provider (ISP), an IP address is an online device c) Condition
address used for communicating across the d) Looping
internet. e) None of these
Answer: D
17. Website is a collection of___ options ? Explanation: - Looping is control structure which
a) HTML documents is used in a program to execute a particular set
b) Graphic files of statements repeatedly.
c) Audio and video files
d) All of the above 20. Which is the open source Browser?
e) None of these a) Mozilla Firefox
Answer: D b) UC browser
Explanation: - A website can contain all of the c) Chrome
above. d) All of these
e) None of these
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 4 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

Explanation: - Chrome is not an open source Answer: C


browser unlike chromium. Explanation: - CCleaner, developed by Piriform
Software, is a utility used to clean potentially
21. ROM is__ memory and comes under___ unwanted files and invalid Windows Registry
memory category? entries from a computer
a) Volatile and secondary
b) Volatile and primary 24. Which shortcut key is used to bring pointer to
c) Non Volatile and secondary first slide in PowerPoint?
d) Non Volatile and primary a) Ctrl+Tab
e) None of these b) Ctrl+Home
Answer: D c) Ctrl+Capslock
Explanation: - As the name suggests Read Only d) Ctrl+Shift
Memory is Non Volatile, as the contents in it e) All of these
remain even when the power is off. Answer: B

22. Which of the following is a rigid magnetic 25. To make a notebook act as a desktop model,
disc used to store data permanently? the notebook can be connected to a
a) Hard Disk ________which is connected to a monitor and
b) SSD other devices.
c) SD Card a) A.bay
d) All the three b) B.docking station
e) None of these c) C.port
Answer: A d) D.network
Explanation: - Hard disk is a rigid magnetic disk e) E.None of these
used to store data permanently. Answer: B
Explanation: - To make a notebook act as
23. For cleaning up the fragmentation saturated desktop as a desktop model, the notebook can
on hard disk drives which software will you use? be connected to a docking station, it can be
a) MS word connected to a monitor and other devices
b) Recuva
c) CCleaner 26. In UNIX, which command is used to display
d) All of these the message or value of any variable on the
e) None of these screen

Click Here For Bundle PDF Course | [email protected] Page 5 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

a) !chg 29. Which is the word processor software used


b) ECHO by apple?
c) PING a) Word star
d) INFO b) MS word
e) None of these c) Pages
Answer: B d) Open Office
Explanation: - ECHO is a command typically e) None of these
used in shell scripts and batch files to output Answer: C
status text on the screen. Explanation: - Pages is a powerful word
processor that lets you create stunning
27. In MS Excel, when does the #N/A error documents, and comes included with most Apple
occur? devices.
a) Excel does not recognize the text specified in
a formula 30. Memory which forgets everything when you
b) A value is not available to a function or switch off the power is known as__
formula a) Corrupted
c) An invalid cell is referenced b) Volatile
d) A formula includes an argument or operand of c) Non-Volatile
the wrong type d) Non-Corrupted
e) None of these e) None of these
Answer: B Answer: B
Explanation: - Volatile memory is a type of
28. Bing is a/an__? memory that maintains its data only while the
a) Portal device is powered. If the power is interrupted for
b) Internet any reason, the data is lost
c) Search engine
d) Browser 31. Which of the following is considered as the
e) None of these unsolicited commercial email?
Answer: C a) Virus
Explanation: - Microsoft owned search engine- b) Malware
Bing c) Spam
d) Both A & B
e) All of the above

Click Here For Bundle PDF Course | [email protected] Page 6 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

Answer: C 34. In database ______ is procedural code that is


Explanation: -: It is a type of unsolicited email automatically executed in response to certain
which is generally sent in bulk to an events on a particular table in a database?
indiscriminate recipient list for commercial a) Constraints
purpose. Generally, these types of mail are b) Literals
considered unwanted because most users don't c) Trigger
want these emails at all. d) Schema
e) None of These
32. In FTP, there are three types of ______ Answer: C
stream block and compressed. Explanation: - A database trigger is procedural
a) File type code that is automatically executed in response
b) Data type to certain events on a particular table in a
c) Transmission mode database
d) Object File
e) None of these 35. System software is the set of programs that
Answer: C enables your computer’s hardware devices and
Explanation: - The three transmission modes ________ software to work together
that can be used are stream mode, block mode, a) management
and compressed mode. b) processing
33. In Microsoft Excel, which of the following c) utility
functions is used for finding the total of a d) application
sequence of cells? e) None of these
a) A.TOTAL Answer: D
b) B.SUM Explanation: - System software is the set of
c) C.ADD programs that enables your computer’s
d) D.MERGE hardware devices and application software to
e. None of the above work together
Answer: B
Explanation: - SUM is the formula used for 36. Where does a computer add and compare
finding the total of a sequence of cells in Excel data?
a) Hard Disk
b) Floppy Disk
c) CPU chip

Click Here For Bundle PDF Course | [email protected] Page 7 of 8


Computer Awareness Bundle PDF Course 2023
RRB Clerk Mains 2020 Memory Based Paper

d) Memory Chip
e) None of The Above 39. Which of the following is example for
Answer: C embedded system?
Explanation: - The CPU or the Central a) ROM
Processing unit also known as the brain of the b) RAM
computer, is the unit where a computer adds and c) ATM
eventually compares the data d) Machine
e) None of these
37. Extensible Mark-up Language (XML) is a Answer: C
simple, very flexible text format, which is derived Explanation: - ATM (Automatic Teller Machine)
from ______________? is example for embedded system
a) HTML
b) ETML 40. Which of the following is a part of session
c) STML layer?
d) SGML a) Transports data across the physical link
e) None of these b) Determines network topology.
Answer: D c) Terminates a session
Explanation: - ExtensibleMark-up Language d) Performs flow control
(XML) is a simple, very flexible text format e) Transmission between machines to its above
derived from SGML (Standard Generalized layer
Mark-up Language). Answer: C
Explanation: - The session layer performs the
38. What type of technology scrambles the termination and creation of session
contents of files sent via the Internet?
a) Encryption
b) Encoding
c) Cryptography
d) Security code
e)None of these
Answer: A
Explanation: - The contents of files will be sent
via internet after the files are encrypted by the
process encryption

Click Here For Bundle PDF Course | [email protected] Page 8 of 8

You might also like