Important Computer Questions for IBPS RRB Exams, IBPS Clerk, India Post

Dear Readers, we are presenting Important Computer Questions for IBPS RRB Exams, IBPS Clerk, India Post. Computer section play important role in scoring.

Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.

1. What is Direct X?
(a) Operating system
(b) Software that drives graphics hardware
(c) Web browser
(d) Word processing software
(e) None of these

2. The barcode which is used on all types of items, is read by a scanning device directly into the computer. What is the name of this scanning device?
(a) Laser scanner
(b) Wand
(c) OCR
(d) MICR
(e) Dot Matrix

3. A key that will erase information from the computer’s memory and characters on the screen.
(a) Edit
(b) Delete key
(c) Dummy out
(d) Trust key
(e) None of these

4. Hybrid computer used the combined feature of _________ and _________ machine.
(a) analogue, digital
(b) super, sub
(c) client, server
(d) warehouse, mining
(e) RAM, ROM

5. Which program, installed on the user’s computer help him to communicate or send request on the network?
(a) Paint
(b) File Manager
(c) Browser
(d) Word
(e) None of the above

6. Which of the following is software?
(a) Motherboard
(b) CPU
(c) Microsoft Windows
(d) RAM
(e) All of these

7. PC in computers stands for:
(a) Personnel Computer
(b) Personalised Computer
(c) Personal Computer
(d) Personnel Computing
(e) Personalised Computing

8. Software for particularly organizing, storage, updating and retrieving information is a(n)—
(a) Data warehouse
(b) Database management system
(c) Data mining
(d) Operating system
(e) None of the above

9. Which bar is usually located below the Title Bar that provides categorised options?
(a) Menu Bar
(c) Toolbar
(b) Status bar
(d) Scroll Bar
(e) None of the above

10. Which among the following term is used for: Unauthorised copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting


No comments:

Post a Comment