Railways Computer Pyq_compressed
Railways Computer Pyq_compressed
COMPUTER
1.A/An _______ is a special high-speed storage mechanism. [RRB ALP & Tech. 21.01.2019 Shift-II]
(a) board (b) cache (c) host (d) interface
2. A/An _________ is a painting and drawing device shaped like a pen. It is used on a touch screen.[ RRB ALP & Tech.
21.01.2019 Shift-II]
(a) flag (b) stylus (c) index (d) cursor
3. ......... is the most common way of connecting computers on a network with a wired connection.[ RRB ALP & Tech.
21.01.2019 Shift-I]
(a) LAN (b) Internet (c) Ethernet (d) Wi-Fi
4. The physical place where a computer stores information is called :[ RRB ALP & Tech. 21.01.2019 Shift-I]
(a) Modem (b) Wi-Fi (c) Hard disk (d) POP
5. –––––––is a technology that allows computers and other devices to communicate through wireless signals. [RRB ALP &
Tech. 22.01.2019 Shift-III]
(a) Wi-Fi (b) Wired equivalent Privacy (c) ZIP (d) Wireless
6. Which of the following acts as an interface between the Central Processing Unit (CPU) and the main memory? [RRB ALP
& Tech. 22.01.2019 Shift-III]
(a) Cache memory (b) Compact memory (c) Hard disk (d) Magnetic type
7. ––––––– is an improvement over wired equivalent privacy (WEP) used in wi-fi networks. [RRB ALP & Tech. 22.01.2019
Shift-III] (a) Software as a service (b) Post office protocol (c) Secure sockets layer (d) Wi-fi Protected Access
8. A piece of programming code inserted into another program to cause damage is called: [RRB ALP & Tech. 22.01.2019
Shift-II] (a) Viral (b) Virus(c) Malware (d) Spam
9. A file, which is used to archive and compress them into one file of smaller size using a program is called as ___. [RRB
ALP & Tech. 22.01.2019 Shift-II] (a) SSL (b) ZIP (c) SAAS (d) SEO
10. Unsolicited electronic messages sent for marketing purposes are called _______. [RRB ALP & Tech. 22.01.2019 Shift-I]
(a) spam (b) URL (c) unzip (d) virus
11. A video or photo experiencing a sudden spike in popularity in a short period of time is termed as –––––– [RRB ALP &
Tech. 22.01.2019 Shift-I]
(a) virus (b) spam (c) viral (d) Wi-Fi
12. A software program that has been developed to harm other computers is called a ___. [RRB ALP & Tech. 23.01.2019
Shift-III]
(a) Local Area Network (b) Server(c) Operating System (d) Malware
13. What will be the full form of JPEG ? [RRB ALP & Tech. 23.01.2019 Shift-III]
(a) Joint Program Executing Group (b) Joint Photographic Experts Group
(c) Joint Program Experts Group (d) Joint program Experimental Group
14. A/ An ..... is an interface on a computer to which you can connect a device. [RRB ALP & Tech. 23.01.2019 Shift-II]
(a) port (b) array(c) anime (d) dongle
15. Binary number 101110110 is equal to decimal number _______. [RRB ALP & Tech. 23.01.2019 Shift-II]
(a) 374 (b) 326 (c) 468 (d) 412
16. ______is the general term covering all the different types of threats to your computer safety such as viruses, spyware,
worms, trojans, rootkits and so on. [RRB ALP & Tech. 08.02.2019 Shift-I]
(a) Clickbait (b) Encryption (c) Spam (d) Malware
17. The_____ process loads the operating system into main memory or the random access memory (RAM) installed on your
computer. [RRB ALP & Tech. 08.02.2019 Shift-I]
(a) Index (b) format (c) boot (d) map
18. A/An ...... is software used to maintain the security of a private network. [RRB ALP & Tech. 23.01.2019 Shift-I]
(a) firewall (b) click bait (c) encryption (d) malware
19. ......... is when we cover a surface with a pattern of the shapes so that there are no overlaps or gaps. [RRB ALP & Tech.
23.01.2019 Shift-I]
(a) Gradient (b) Kerning (c) Tessellation (d) Tracking
20. A––––map converts color intensity or grayscale information to heights to give the appearance that features are raised
above the surface, like embossed letters. [RRB ALP & Tech. 23.01.2019 Shift-I]
(a) Tint (b) tone (c) bump (d) Shade
21. To––––– is to prepare a storage medium, usually a disk, for reading and writing. [RRB ALP & Tech. 23.01.2019 Shift-I]
(a) defrag (b) boot (c) map (d) format
22. Which of the following statement is wrong with respect to computer. []
(a) It is a logical machine and processed information (b) It can access whatever information it has stored
(c) It has no impulse and no feeling or desire of its own (d) It accesses its information in an unrestricted Manner
23. All the components of your computer are either. [RRB Allahabad ALP, 2006]
(a) Software or CPU/RAM (b) Application software or system software (c) Input device or output device
(d) Hardware or software (e) Input or output
24. Which of the following term is not related to the computer. [R.R.B Kolkata (L.P.)-2012)]
(a) CPU (b) Mother board (c) Hard disk (d) Erythrocytes
25. A person is called computer literate if he/she is just able to : [RRB NTPC, (Shift -2) Online, 19.03.2016]
(a) Run need–based applications (b) Create anti–virus software (c) Write programs (d) Hack other computers
26. What is being converted into information by computer process? [RRB Ajmer ALP, 2005]
(a) Number (b) Data(c) Input (d) Processor
27. What is called data in computer? [RRB Gorakhpur ALP & Tech., 2006]
(a) Number (b) Mark (c) given information (d) Symbol and numerical
28. In which form the data is stored in the computer? [RRB Secundrabad ALP, 2010]
(a) Octal (b) Hexa-decimal (c) Decimal (d) Binary
29. ............ states the raw facts while the data becomes meaningful in......... [RRB Secundrabad ALP, 2010]
(a) information, reporting (b) information, bits (c) Data, information (d) record, bytes (e) Bits, bytes
30. What form of alpha-numeric data does generally take in information system? [RRB Secundrabad ALP, 2009]
(a) Sentence and paragraph (b) Number and alphabetic characters (c) Graphic and figure (d) Human voice and other sounds (e)
None of these
31. Which is the example of non-numeric data- [RRB Kolkata ALP & Tech., 2007]
(a) Address of the employee (b) Marks in the examination (c) Bank remainder (d) All of the above (e) None of these
32. ………stored as information on a computer. [RRB Gorakhpur ALP & Tech., 2006](a) analog data (b) digital data(c)
modem data (d) watts data (e) none of these
33. Processed data is known as [RRB Gorakhpur ALP & Tech., 2007](a) Data (b) Information (c) Knowledge (d) Analysis
34. The basic goal of computer process is to convert data into .......... [RRB Kolkata ALP JE, 2008]
(a) graph (b) tables (c) files (d) information (e) diagrams
35. All the machinery and equipment of computer are called [R.R.B. Chennai (T.C./C.C.) 2001, 2002]
(a) hardware (b) software (c) chips (d) electronic equipment
36. Which of the following is hardware and not software? [RRB Kolkata ALP & Tech., 2006]
(a) Excel (b) Printer driver (c) Operating system (d) Power point (e) Control unit
37. What are the devices that make up a computer system and which you can see or touch? [RRB Ajmer ALP, 2006]
(a) Menu (b) Print (c) Software (d) Hardware (e) None of these
38. Which of the following is not a part of hardware?
(a) Monitor(b) Semi-conductor memory(c) LAN(d) Keyboard
39. Computer hardware consists of -
(a) Control unit (b) Both main memory and control unit (c) None of these (d) Main memory
40. Which part of the computer can be touched and felt?
(a) Program (b) Software (c) Hardware (d) Output (e) None of these
41. Which of the following is not hardware?
(a) Keyboard (b) Mouse (c) Windows-XP (d) ROM
42. Which of the following is not hardware [RRB Allahabad ALP, 2011]
(a) Magnetic tape (b) Printer (c) Assembler (d) C.R.T.
43. Which of the following is not a computer hardware? [RRB Allahabad ALP, 2009]
(a) Mouse (b) Printer (c) Monitor (d) Excel
44. What is hardware in computer? [RRB Ajmer ALP, 2008]
(a) C+++ (b) Window 7 (c) CD ROM (d) None of above
45. Which of the following is not hardware?
(a) Processor Chip (b) Printer (c) Mouse (d) Java
46. Computer is made up of which hardware equipment?
(a) Monitor, central processing unit (CPU) keyboard, mouse, software and network.
(b) Monitor, central processing unit (CPU) Keyboard, mouse, program and network
(c) Monitor central processing unit (CPU),keyboard, mouse, printer and modem
(d) Monitor central processing unit (CPU), keyboard, mouse, application and network
(e) None of these
47. The written program due to which the computer works in the desired way is called-
(a) Codes (b) Instruction (c) Software (d) None of these
48. Software means ........ [RRB Kolkata ALP & Tech., 2007]
(a) The physical components that make up a computer (b) Firmware (c) Programs (d) Peopleware (e) None of these
49. The program used to work on a computer is called- [RRB Kolkata ALP & Tech., 2009]
(a) Software (b) Mouse (c) Keyword (d) Hardware
50. The main purpose of software is to convert data into [RRB Ajmer ALP, 2006]
(a) Website (b) Information (c) Program (d) Object
51. What is meant by software in the context of computers? [RRB Ajmer ALP, 2008]
(a) Floppy disk (b) Computer programs (c) Computer circuit (d) Human brain
52. An example of computer software is- [RRB Allahabad ALP, 2006](a) C.P.U. (b) Compact disc(c) Monitor (d) Microsoft-
office
53. The data or information used to run the computer is called .........? [RRB Ajmer ALP, 20011](a) Software (b) Hardware(c)
Peripheral (d) CPU(e) None of the these
54.In computers the central processing unit comes under- [RRB Secundrabad ALP, 2009]
(a) Input devices, output devices and memory (b) Software, hardware and power supply units
(c) Memory, Visual, display unit and printer (d) Store, Arithmetic and logical unit and control unit.
55. Which part of the computer is responsible for processing data? [RRB Secundrabad JE, 2010]
(a) CPU (b) Memory (c) Keyboard (d) Display
56. If you want to improve the performance of your PC, you need to upgrade [RRB Gorakhpur ALP & Tech., 2009]
(a) CPU (b) Monitor (c) Keyboard (d) None of these
57. The four basic tasks performed by CPU are Fetch ,............, Manipulate and Output: [RRB Gorakhpur SSE, 2006]
(a) Design (b) Decode (c) Display (d) Regulate
58. In which of the following language, the CPU can execute program? [(R.R.B Bhuvaneshwar (L.P.)-2012)]
(a) In assembly language (b) In sign language (c) Octane (d) In binary
59. The conversion of input to output is done by ........... [RRB Allahabad ALP, 2008]
(a) Peripheral (b) Memory (c) Storage (d) Input- Output unit (e) CPU
60. A hardware device that coverts data into meaningful information. [RRB Gorakhpur ALP & Tech., 2007]
(a) Protector (b) Output device (c) Input device (d) Program (e) Processor
TAPOBAN STUDY CENTRE
Nazrul Park,Bhadreswar,Dist : Hooghly,W.B
Cont. : 9681026768/ 8820022385 ( Whats app) ( 9.00 am to 6.00 Pm)
Speed,Accuracy & Target
YouTube /FB Page /Telegram/Whats app channel Name : “Tapoban Study Centre”
194. Which signals inform the operating system that some activity has been performed ?
(a) Informer (b) Interrupts (c) Events (d) Handlers
195. Which of the following statements is used to make a selection from more than two choices?
(a) if-else (b) switch (c) else-if (d) None of these
196. The IMAGE tag uses which of the following attributes to specify the URL of the image to be
displayed? (a) SCR (b) SRC (c) Source (d) Alt
197. Which of the following operators is used for making comparison between different operands?
(a) Logical operator (b) Relational operator (c) Arithmetic operator (d) Assignment operator
198. Which of the following is a network security system that monitors and controls the incoming
and outgoing network traffic based on predetermined security rules?
(a) Anti-virus (b) Spyware (c) Firwall (d) Search engine
199. The conditional operator (? :) is also known as
(a) loop operator (b) control operator (c) case operator (d) ternary operator
200. To which port of the computer do you plug your keyboard cable ?
(a) V.G.A. port (b) Ethernet port (c) U.S.B. port (d) Sanpidro port
201. To whom is IRQ 6 generally given ?
(a) Sound card (b) Com 1 (c) Floppy drive controller (d) LPT. 1
202. How many minimum NAND gates are required to achieve Ex-OR function ?
(a) 4 (b) 3 (c) 2 (d) 5
203. Centre for Development of Advanced computing" has developed a new software to avoid the fear of cyber attacks
and data theft, which is called- (a) Avrodh (b) Nayan (c) Trikal (d) None of these
204. .............. is a type of computing that performs computation, storage and even applications act as a service network.
(a) Cloud Computing (b) Distributed Computing (c) Parallel Computing (d) Virtual Computing
205. "Sky Drive" is the name of the cloud computing service of which of the following companies ?
(a) Vodafone (b) B.S.N.L (c) Microsoft (d) None of the above
206. The place where accessories are connected to a computer is called- (a) Port (b) Ring (c) Bus (d) Zip
207. The use of firewall in communication network/system protects against which of the following ?
(a) Unauthorized attack (b) Data driven attack (c) Fire attack (d) Virus attack
208. The expansion of 'SMPS' is-(a) Switched mode power supply (b) Start mode power supply (c) Signal mode power
supply (d) Store mode power supply
209. The process of carrying 'commands' is- (a) Fetching (b) Storing (c) Decoding (d) Executing
210. Latest android mobile phone operating system- 6.0 is the name of (a) Kitkat (b) Marshmallow (c) Lollipop (d) Jelly
Bean
211. Which of the following is antivirus software ? (a) Java (b) Tally (c) Norton (d) None of these
212. Data in database at a particular point of time is called as? (a) Intension (b) Extension (c) Back up (d) Application
213. The strategy for maximum use of information technology for development is-
(a) Government of West Bengal (b) Government of Tamil Nadu (c) Haryana Government (d) Government of Andhra
Pradesh
214. Which is the first Indian state whose all districts are connected to the state capital by fiber optical network ?
(a) Uttar Pradesh (b) Bihar (c) Andhra Pradesh (d) Uttarakhand
215. What is the name of the parent company of Google formed on 2 October 2015 ? (a) Nest Labs Inc. (b) Alphabet
Inc. (c) Calico (d) Alpha Inc.
216. Trojan is type of (a) Computer language (b) Malware (c) Operating System (d) Computer peripheral
217. Actual telephone calls between people on the Internet are- (a) E–Telephony (b) Internet Telephony
(c) Chatting (d) E–Calling
218. Match the following
(a) Input device (p) ROM
(b) Processingdevice (q) Touch screen
(c) Storage device (r) Printer
(d) Output device (s) Flash memory
(a) a-q, b-s, c-r, d-p (b) a-q, b-p, c-s, d-r (c) a-r, b-p, c-s, d-q (d) a-p, b-q, c-r, d-s
219. Who invented the mobile phone ?
(a) Joseph Wilson (b) Edwin Land (c) Martin Cooper (d) John Lloyd Right
220. In which generation of computers was mechanical language used for programming ?
(a) First (b) Second (c) Third (d) Fourth
221. Extension of MMU
(a) Machine Memory Unit (b) Memory Management Unit (c) Main Memory Unit (d) Machine Management Unit
222. In which year was Facebook started ?
(a) 2002 (b) 2004 (c) 2008 (d) 2009
223. Any online 'demo' is-
(a) An interactive presentation (b) An non-interactive presentation (c) Not a sequential presentation (d) An active user
interface
224. What is not true with data conversion?
(a) Upgrading from one version to another version (b) Receiving data from a legacy system
(c) Receiving data from another module (d) It may use standard import program
225. Which of the following companies India born sundar pichai is the chief executive officer (CEO) ?
(a) Facebook (b) Google(c) Flipkart (d) Amazon
226. Who among the following invented laser ?
(a) Theodar Mayman (b) Denis Pepin (c) William courten (d) Francis crick
227. Does not use in LASER technology
(a) Barcode reading (b) Cutting and drilling (c) Microwave oven (d) Physiotherapy
228. A type of Internet account in which the computer is not directly connected to the Internet
(a) Shell account (b) Kernel account (c) Server account (d) TCP/IP account
229. The property of identifying the rows of a table in a wonderful way is called which key ?
(a) Primary (b) Candidates (c) Mixed (d) Foreigner
230. Who introduced the concept of 'stored programme'?
(a) John Von Neumann (b) Charles Babbage (c) Blaise Pascal (d) John Matchley
231. What is clickjacking ?
(a) A malicious technique designed to trick web users into revealing confidential information
(b) A means of sending and receiving data in one bit second
(c) A form of computer engineering
(d) A digital process used to display an image on a monitor
232. A group of wires through which data is transmitted from one part of the computer to another is called-
(a) Bus (b) Add on card (c) Port (d) Channel
233. What does C.R.M mean in the context of software applications ?
(a) Customer Relatives Meet (b) Channel Route Market (c) Customer Relationship Management
(d) Customer Retention Manger
234. What is the new technology called, which provides the ability to create an artificial world and people start
interacting in it ? (a) Remote reality (b) Virtual reality (c) Alternate reality (d) 3-D reality
235. If you use a font that is not supported by a browser, then the original text-
(a) Displayed using 'Arial font only (b) Will be displayed with a specific background
(c) Will be displayed in the default font (d) Will not be displayed
236. The full form of API is-
(a) Applied Program Intersection (b) Application Process Interface
(c) Application Program Interface (d) Application Program Interaction
237. Identify sequential access media
(a) Magnetic tape (b) Digital video disc (c) Floppy disk (d) Optical disc
238. Simulation is a process in which-
(a) Computer is used to control the process (b) The computer collects data for later processing
(c) Computer systems and programs are used to produce action similar to the real physical system
(d) Actual computer models are prepared at cheap rates
239. What is the instrument for recording spoken words in type called ?
(a) Dictaphone (b) Gramophone (c) Audiophone (d) Microphone
240. The full form of 'CAS' is ?
(a) Conditional Audio System (b) Conditional Access System
(c) Complete Audio System (d) Complete Access System
241. In the context of computer parts the term 'chip jewellery' means
(a) A power fire virus (b) Old junk computers of no use
(c) A processor with high capacity (d) None of these
242. A computer that is old and probably not satisfactory, it is called that
(a) Ancient system (b) Historical system (c) Age-old system (d) Legacy system (e) Legal system
243. S.M.S means-
(a) Swift mail system (b) Short messaging service (c) Short hand manual script (d) Speed mail service
244. On which network was the first S.M.S sent ?
(a) Airtel (b) Vodafone (c) Verizone (d) Digicel
245. Who is considered the father of SMS.
(a) Jan Koum (b) Matti Makkonen (c) Richard Jarvis (d) Steve Jobs
246. In IT, associative memory is called as
(a) Virtual memory (b) Cache memory (c) Content addressable memory (d) main memory
247. Which of the following is used to protect in computer system, in the absence of more complete protection schemes?
(a) digital certificate (b) digital signature (c) passwords (d) tokens
248. Which technology is used in sunlab java car to keep your car network connected to the outside world ?
(a) Embedded (b) Spam (c) Smart screen (d) Access point
249. What is the waste generated when the functionality of personal computers ends ?
(a) PC-waste (b) Physical waste (c) Computer waste (d) E-waste
250. The tag line “Do no Evil” is owned by
(a) Yahoo (b) Bing (c) Google (d) Start page
251. What is Cc ?
(a) Computer language (b) Business language (c) Code of Agriculture (d) Sending a copy of the e-mail to more than
one person
252. The process of mixing AF signal and RF wave is known as–
(a) modulation (b) demodulation (c) oscillation (d) amplification
253. In television broadcasting picture messages are transmitted by-
(a) Amplitude modulation (b) Frequency modulation (c) Phase modulation (d) Angle modulation
254. An electronic device that can accept data, process data and produce output and store the results for future use is
called- (a) Input (b) Computer (c) Software (d) Hardware
255. The main parts of computer are- (a) 6 (b) 7 (c) 8 (d) 9[1. CPU (Central Processing Unit) 2. Input devices (e.g. keyboard, mouse,
scanner etc) 3. Output devices (e.g. printer, monitor, speaker) 4. Memory unit (e.g- RAM) 5. Secondary storage 6. Communication device]
256. Who among the following brought the world's first laptop computer to the market ?
(a) Hewlett Packard (b) Epson (c) Laplink Traveling Software Inc. (d) Microsoft
257. A portable personal computer small enough to be held on your lap is called ?
(a) Notebook computer (b) P.D.A (c) Mainframe computer (d) Workstation
258. Which of the following is correct in order from largest to smallest ?
(a) TB-MB-GB-KB (b) GB-TB-MB-KB (c) TB-GB-KB-MB (d) TB-GB-MB-KB (e) None of these
259. Which of the following expressions represents logical AND gate?
(a) A+B (b) A/B (c) A>B (d) A.B
260. (431)10 is the hexadecimal form of 10
(a) ABF (b) 2CB (c) 1AF (d) 5BD
261. In OSI network architecture, the routing is performed by
(a) Network layer (b) Data link layer (c) Transport layer (d) None of these
262. Which graphical objects that represent commonly used application?
(a) GUI (b) Driver (c) Windows (d) Application (e) Icon