Top 50 expected questions Rrb PO Computer : Dear Aspirants, IBPS RRB Officer Scale I & Assistant Prelims Exam 2016 are going on and will be conducted till 19th November, 2016 after that RRB PO exam will also start. Apart from this IBPS PO prelims result 2016 has been declared on 5th November, 2016 too. Candidates can check their result on official IBPS website. Candidates who want to check their IBPS PO Prelims Exam Result 2016 CLICK HERE . It has been seen that the question paper of IBPS RRB PO 2016 has constituted around 25 % of computer in the question paper. So, to make it easy for our viewers today we are going to tell you Top 50 questions RRB PO Computer and Important Expected Questions PDFs for IBPS RRB PO that are expected to come in your examination.
Also check : IBPS CWE RRB V Answer Key 2016
Computer Knowledge Syllabus 2016
Computer Knowledge Syllabus in IBPS RRB PO Exam plays a crucial role as its weight-age remains around 25 % in the question paper, So it becomes quite necessary to clear all the aspects of Computer for this exam. Maximum candidates are searching for Download IBPS Computer Knowledge Syllabus.
IBPS RRB PO Computer Knowledge Top 50 expected questions
Let's check out some Important IBPS RRB Computer Knowledge Questions with Solutions. Candidates can also check their IBPS RRB Result 2016
Question 1. Which command divides the surface of the blank disk into sectors and assign a unique address to each one
5) None of these
Question 2. An electronic device, operating under the
control of information, that can accept data,
process the data, produce output & store the
results for future use is
(a) Input (b) Computer (c) Software (d) Hardware (e) None of these
Question 3. The term "host" with respect to the internet, means
(a) A computer that is a stand alone computer (b) A computer reserved for use by the host (c) A computer that is connected to the internet (d) A large collection of computers (e) None of these
Question 4. The piece of hardware that converts computer's digital signal to an analog signal that can travel over telephone lines is called a
(a) Tower (b) Red wire (c) Modem (d) Bridge (e) None of these
Question 5. CPU can directly understand this language.
(a) C (b) C++ (c) Assembly (d) Java (e) None of these
Question 6. A computer program used for business applications is
(a) LOGO (b) COBOL (c) BASIC (d) FORTRAN (e) None of these
Question 7. Which language is CPU dependent ?
(a) Assembly (b) C (c) JAVA (d) Both 1 & 2 (e) None of these
Question 8. This part of operating system manages the essential peripherals, such as the key board, Screen, disk drives and parallel and serial ports
(a) Basic input/output (b)Secondary System (c) Peripheral System (d) Marginal System (e) None of these
Question 9. Which command allows you to reduce fragments of file and optimize the performance of disk ?
(a) Scandisk (b) Diskcomp (c) Chkdsk (d) Derfrag (e) None of these
Question 10. The most recent version of the Mac OS is based on the __________ operating system
(a) Windows (b) Linux (c) Unix (d) CMOS (e) None of these
Question 11. Features of windows XP professional includes
(a) remote desktop support (b) System restore (c) advanced networking features (d) All of the above (e) None of these
Question 12. . Data can be arranged in a worksheet in an easy to understand manner using.
(a) Auto formatting (b) Applying Styles (c) Changing fonts (d) Synchronisation (e) None of these
Question 13. Which of the following should be used if all the slides in the presentation to have the same 'look'?
(a) The slide layout option (b) Add a slide option (c) Outline view (d) A Presentation design template (e) None of these
Question 14. How is it to create a uniform appearance by adding a background image to all slides ?
(a) Create a template (b) Edit the slide master (c) Use the auto correct wizard (d) All of the above (e) None of these
Question 15. An inter-company network which used to distribute information, documents, files and databases, is _____________.
(a) LAN (b) WAN (c) MAN (d) Extranet (e) None of these
Question 16. Which is the network strategy used extensively by the internet ?
(a) peer-to-peer network system (b) Stand -alone network system (c) Local Area network system (d) Client /server network system (e)None of these
Question 17. Which of the following can't spread Virus ?
(a) An e-mail with attachment (b) A plain text mail (c) Downloading files over the web (d) A per drive use (e) None of these
Question 18. Which of the following is not a virus ?
(a) Blaster (b) Creeper (c) Mellisa (d) Kaspersky (e) none of these
Question 19. Unwanted repetitious messages, such as unsolicited bulk e-mails is known as.
(a) Spam (b) Trash (c) Calibri (d) Courier (e) None of these
Question 20. Le-Hard virus is effect of a
(a) Command.com (b) Hardware (c) Software (d) Application (e) None of these
Question 21. Which of the following is not a popular Anti- Virus software ?
(a) Kaspersky (b) Symantec (c) Trend Micro (d) Blaster (e) None of these
Question 22. A result of a computer Virus can not lead to.
(a) Disk Crash (b) Mother Board crash (c) Corruption (d) Deletion of files (e) None of these
Question 23. All of the following are example of real security and privacy risks except.
(a) Hackers (b) Spam (c) Viruses (d) Identify theft (e) None of these
Question 24. Which of the following is a popular Dos based spread Sheet ?
(a) Excel (b) Word (c) Smart cell (d) Lotus 1-2-3 (e) None of these
Question 25. Ethernet, LAN, Token Ring, and token Bus are types of _______________.
(a) WAN (b) Communication channels (c) LAN (d) Physical Medium (e) None of these
Question 26. An e-mail account includes a storage area, often called a ____________________.
(a) Attachment (b) Hyperlink (c) Mailbox (d) IP address (e) None of these
Question 27. What is the name of the software that allows us to browse through web pages called ?
(a) Browser (b) Mail client (c) FTP client (d) Messenger (e) None of these
Question 28. Most world wide web pages contain commands in the language ______________.
(a) NIH (b) URL (c) HTML (d) IRC (e) None of these
Question 29. Firewalls are used to protect against ?
(a) Unauthorized Attacks (b) Virus Attacks (c) Data Driver Attacks (d) Fire Attacks (e) None of these
Question 30. "Trend Micro" is a ______________?
(a) Virus program (b) Anti virus program (c) Application (d) All of the above (e) None of these
Question 31. The most important powerful computer in a typical network is ______________.
(a) Desktop (b) Network Client (c) Network Server (d) Network Station
Question 32. Invention of the integrated circuit led to the invention of _____________.
(a) INTEL 486 processor (b) Pentium -4 processor (c) Micro processor (d) Fortran language (e) None of these
Question 33. Language used in a computer that is similar to the languages of humans and is easy to understand is referred to as
(a) Source code (b) High level language (c) Machine language (d) Object code (e) None of these
Question 34. ALU works on the instructions and data held in the _______________.
(a) Note book (b) Registers (c) Copy pad (d) I/o devices (e) None of these
Question 35. The _________ Key and the ___________ key can be used in combination with other keys to perform Short Cuts and Special tasks.
(a) Control, Alt (b) Function, toggle (c) Delete, insert (d) Caps lock, Num lock (e) None of these
Question 36. . A computer tower is not ___________.
(a) A CPU (b) Hardware (c) The Heart of the computer (d) Peripheral (e) None of these
Question 37. Which of the following manages computer resources?
(a) ALU (b) BUS (c) Control Unit (d) I/O unit (e) None of these
Question 38. In addition to the basic typing keys, desktop and notebook computer key boards include a _____________.
(a) Editing (b) Navigation (c) Locked (d) docked (e) None of these
Question 39. MICR Technology used for clearance of cheques by banks refers to ____________.
(a) Magnetic Ink Character Recognition (b) Magnetic Intelligence Character Recognition (c) Magnetic information cable Recognition (d) Magnetic Insurance cases Recognition (e) None of these
Question 40. A modem that cannot be moved from its position is called ______________.
(a) Intelligent Modem (b) Acoustic Coupler (c) Direct connect (d) Fixed modem (e) None of these
Question 41. A bridge recognizes addresses of _____________.
(a) Layer 1 (b) Layer 2 (c) Layer 3 (d) Layer 4 (e) None of these
Question 42. Programming language built into user programs such as word and Excel are known as.
(a) 4 GLS (b) Macrio languages (c) Object Oriented languages (d) Visual programming languages (e) None of these
Question 43. A convolutional code that is prone to mastrophic error propagation is.
(a) Mnemonics (b) Gray code (c) Machine code (d) Catastrophic code (e) None of these
Question 44. When a language has the capability to produce new data types, it is said to be.
(a) Reprehensible (b) Encapsulated (c) Overloaded (d) Extensible (e) None of these
Question 45. .Computer language used for scientific calculations _____________.
(a) LOGO (b) FORTRAN (c) C++ (d) BASIC (e) None of these
Question 46. Which of the following is a programming language for creating special programs like applets ?
(a) JAVA (b) Cable (c) Net (d) Domain name (e) None of these
Question 47. Computer’s basic architecture was developed by _________________.
a) Blaise Pascal b) Jordan Murn c) Charles Babbage d) John Van Neumann e) None of these
Question 48. In production of I.C. chip of computer what is needed in the following ________________.
a) Platinum b) Gold c) Silicon d) Iron e) Silver
Question 49. Analog computer is
a) Communicate at low level b) A machine which works on data which is always changeable c) Communicate at high level d) All of these e) None of these
Question 50. Father of computer is
a) John Von Neumann b) Lady Ada Lovelae c) Charles Babbage d) J.P. Eckert & J.W. Mauchly e) Blaise Pascal