IBPS Practice Test RRB (Computer Knowledge)


1. When you install a peripheral, you usually need to install a ________ as well.

Correct! Wrong!

Correct answer: driver

A driver is a software interface to hardware devices that allows operating systems and other computer programs to access hardware functions without knowing the exact details of the hardware being used.

2. Which part of the computer is directly invoked when the computer program's instructions are executed?

Correct! Wrong!

Correct answer: Processor

The logic circuitry that responds to and processes the basic instructions that drive a computer is known as a processor. It is directly invoked when the computer program's instructions are executed.

3. A set of rules that computers on a network use to communicate with one another are

Correct! Wrong!

Correct answer: Protocol

When computers communicate with one another, there needs to be a common set of rules and instructions. A protocol is a specific set of communication rules.There are numerous protocols due to the numerous ways in which computers can communicate with one another.

4. White Box testing is a software testing technique that is also known as ________.

Correct! Wrong!

Correct answer: Glass box testing

White Box testing focuses on the code's internal logic and structure. White Box testing is also known as structural, glass box testing, open box and clear box testing.

5. Fifth-generation computing devices that are based on _________.

Correct! Wrong!

Correct answer: artificial intelligence

Fifth-generation computing devices based on artificial intelligence are still in the works, though some applications, such as voice recognition, are already in use. The use of parallel processing and superconductors is assisting in the realization of artificial intelligence.

6. A suitable data structure for the application is discussed in _________.

Correct! Wrong!

Correct answer: Data design

The process of creating a detailed data model of a database is known as database design. This logical data model includes all of the necessary logical and physical design options.

7. What does OSI mean in terms of computers?

Correct! Wrong!

Correct answer: Open System Interconnection

The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes computing system communication functions regardless of their underlying internal structure as well as technology.

8. A program that loads programs into main memory and prepares them for execution____.

Correct! Wrong!

Correct answer: Loader

The program is loaded into memory and prepared for execution by the loader. Loading a program entails reading the contents of an executable file into memory and then performing any necessary preparatory tasks to prepare the executable for execution. When the loading is finished, the operating system begins the program by passing control to the loaded program code.

9. Login name and password verification is referred to as_____.

Correct! Wrong!

Correct answer: authentication

Authentication is the process of comparing the credentials provided to those stored in a database of authorized users' information on a local operating system or within an authentication server.

10. What is an example of an e-mail address?

Correct! Wrong!

Correct answer: [email protected]

An address is made up of two parts. The part before the @ sign (local part) identifies a mailbox's name.

11. Which of the following search engines places the greatest emphasis on the privacy and ubiquity of its results?

Correct! Wrong!

Correct answer: DuckDuckGo

DuckDuckGo is an internet search engine that prioritizes privacy and avoiding the filter bubble of personalized search results. It distinguishes itself from other search engines by not profiling its users and by displaying the same search results to all users for a given search term.

12. Which of the following protocols is a popular communication protocol used for network communication that divides any message into a series of packets?

Correct! Wrong!

Correct answer: Transmission Control Protocol

Transmission Control Protocol (TCP) is a popular communication protocol that is used for network communication. It divides any message into a series of packets that are sent from source to destination, where they are reassembled.

13. Composite Key is another name for _________.

Correct! Wrong!

Correct answer: Compound Keys

A Composite Key is a table column combination that can be used to uniquely identify each record. It is also referred to as a Compound Key.

14. CAPTCHA is a security measure that distinguishes humans from computers. What does the letter 'T' in CAPTCHA stand for?

Correct! Wrong!

Correct answer: Turing

CAPTCHA is a security measure that distinguishes humans from computers. CAPTCHA stands for Completely Automated Public Turing Test to Distinguish Between Computers and Humans. A CAPTCHA is frequently an image of text that has been distorted so that humans can read it but most automated computer vision systems cannot.

15. A blue screen of death (BSoD) is an error screen that appears on Windows computers after a fatal system error. What does the letter 'S' in BSoD stand for?

Correct! Wrong!

Correct answer: Screen

BSoD is an abbreviation for Blue Screen of Death.It is also referred to as Bluescreen or Bug Check. BSoD is an error screen that appears on Windows computers after a fatal system error. It denotes a system crash, which occurs when the operating system has reached a point where it can no longer operate safely. This can be caused by a variety of issues, such as a general hardware failure or a critical process terminating unexpectedly.

16. Which of the following refers to the set of rules in a programming language that defines the combinations of symbols that are considered to be correctly structured statements in that language?

Correct! Wrong!

Correct answer: Syntax

When referring to a programming language, syntax is a set of grammar and spelling rules. In other words, it refers to the use of character structures that a computer can understand. For example, if a user attempts to execute a command without the proper syntax, a syntax error is generated, causing the program to fail.

17. Choose one of the following as an example of Hardware:
I. Mouse
III. Keyboard
IV. Printer

Correct! Wrong!

Correct answer: I, II, III and IV

Computer hardware refers to the mechanical and electronic components of a computer. Without hardware, a computer cannot function properly. Monitor, case, keyboard, mouse, printer, CPU, RAM, and persistent storage, for example.

18. Who is considered as the Founder of the Modern Digital Computer?

Correct! Wrong!

Correct answer: Charles Babbage

The first analytical engine, or difference engine, was invented by Charles Babbage, a British mathematician at Cambridge University. This machine could be programmed using punch card instructions and had mechanical memory to store the results. Charles Babbage is known as the "Father of the Modern Digital Computer" for his contributions in this field.

19. Permanently installed software in electronic devices that controls the basic functions of hardware is referred to as _________.

Correct! Wrong!

Correct answer: Firmware

Firmware is software that is permanently installed in electronic devices and controls the basic hardware functions. A firmware example is BIOS.

20. Choose the input device that copies from paper into a computer from the list below.

Correct! Wrong!

Correct answer: Scanner

A scanner is a type of input device that scans documents such as photographs and text pages. When you scan a document, it is converted into a digital format.This results in the creation of an electronic version of the document that can be viewed and edited on a computer.

21. DNS is a hierarchical and decentralized naming system for computers, services, and other internet-connected resources. What does the letter 'D' in DNS stand for?

Correct! Wrong!

Correct answer: Domain

The Domain Name System (DNS) is a naming system that is both hierarchical and decentralized for computers, services, and other resources that are connected to the Internet or a private network. It connects various pieces of information to the domain names assigned to each of the participating entities.

22. Which of the following refers to Apple's Spreadsheet Processor?

Correct! Wrong!

Correct answer: Numbers

Apple Inc.'s Numbers spreadsheet application is part of the iWork productivity suite.

23. The LAN transmission rate can be increased to ________.

Correct! Wrong!

Correct answer: 100 Mbps

Local Area Networks (LAN) are designed for small geographical areas of 1-5 km in size, such as offices, schools, colleges, small industries, or a group of buildings. It is widely used in design and troubleshooting. LAN transmission rates range from 4Mbps to 16Mbps and can reach 100Mbps (Mbps stands for megabits per second).

24. In the case of a computer, we always use the term bandwidth to refer to something related to data. Which of the following is it referring to?

Correct! Wrong!

Correct answer: Amount of data transferred

In computing, bandwidth is defined as the bit rate of available or consumed information capacity, typically expressed in metric multiples of bits per second. Bandwidth is variously referred to as network bandwidth, data bandwidth, or digital bandwidth. In the field of signal processing, wireless communications, modern data transmission, digital communications, and electronics, bandwidth is used to refer to analog signal bandwidth measured in hertz, which means the frequency range between the lowest and highest attainable frequency while meeting a well-defined impairment level in signal power. The actual bit rate that can be achieved, however, is determined not only by the signal bandwidth, but also by the noise on the channel.

25. Which of the following describes a person who creates a false online profile in order to deceive someone else?

Correct! Wrong!

Correct answer: Catfish

A Catfish is someone who creates a fake online profile in order to deceive someone else. The practice may be used for financial gain, to compromise a victim in some way, to deliberately upset a victim, or to fulfill a wish.