Monday, September 30, 2013

RBI Assistant Previous Years Solved Computer Knowledge Question Paper 2012



RBI Assistant Previous Years Solved Computer Knowledge Question Paper 2012
The Reserve Bank of India conducted the RBI Assistant Exam on 29 April 2012.

This Paper includes 5 different types of Questions.

Reasoning, English, Quantitative Aptitude ,General Awareness & Computer Aptitude.

This may be useful for all other Competitive Exams also

Computer Knowledge

161.What is backup ?
1) Adding more components to your network.
2) Protecting data by copying it from the original source to a different destination. (Ans)
3) Filtering old data from the new data.
4) Accessing data on tape
5) Using earlier data.

162.The legal right to use software based on specific restrictions is granted via a
1)software privacy policy
2) software license (Ans)
3) software password manager
4) software log
5) None of these

163.What is an e-mail attachment ?
1) A receipt sent by the recipient.
2) A separate document from another program sent along with an e-mail. (Ans)
3) A malicious parasite that feeds on your messages and destroys and contents.
4) A list of CC or BCC recipients.
5) A friend to whom e-mail is sent regularly.

164.Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts ?
1) Shareware
2) Public domain software
3) Application software
4) Operating system software (Ans)
5) None of these.

165.When data changes in multiple lists and all lists are not updated, this causes.
1) data redundancy
2) information overload
3) duplicate data
4) data consistency
5) data inconsistency (Ans)

166.What is the main folder on a storage device called ?
1) Root directory (Ans)
2) interface
3) Device driver
4) Platform
5) Main directory

167.To view information on the Web you must have a
1) cable modem
2) Web browser (Ans)
3) domain name server
4) hypertext viewer
5) None of these

168. A file is often referred to as a
1) Wizard
2) document (Ans)
3) pane
4) device
5) documentation

169.To protect yourself from computer hacker intrusions you should install a
1) firewall (Ans)
2) mailer
3) macro
4) script
5) None of these

170.What type of computers are client computers (most of the time) in a clientserver system ?
1) Mainframe (Ans)
2) Mini-computer
3) Microcomputer
4) PDA
5) None of these

171.What happens when you boot up a PC ?
1) Portions of the operating system are copied from disk into memory. (Ans)
2) Portions of the operating system are copied from memory onto disk.
3) Portions of the operating system are compiled.
4) Portions of the operating system are emulated.
5) The PC gets switched off.

172. Linux is an example of
1) freeware
2) open source software  (Ans)
3) shareware
4) complimentary
5) None of these

173.Which of the following software applications would be the most appropriate for performing numerical and statistical calculations ?
1) Database
2) Document processor
3) Graphics package
4) Spreadsheet (Ans)
5) Power Point

174.A .......... is used to read hand written or printed text to make a digital image that is stored in memory.
1) printer
2) laser beam
3) scanner (Ans)
4) touchpad
5) None of these


175.You organise files by storing them in
1) archives
2) lists
3) indexes
4) folders (Ans)
5) None of these


176.A................. is pre-designed document that already has coordinating fonts, a layout, and a background.
1) guide
2) model
3) ruler
4) template (Ans)
5) design-plate


177.What is the default file extension for all Word documents ?
1) WRD
2) TXT
3) DOC (Ans)
4) FIL
5) WD

178.Removing and replacing devices without turning off your computer is referred to as
1) Hot swapping
2) Plug-n-Play (Ans)
3) Bay swap
4) USB swapping
5) None of these.

179.Specialised programs that assist users in locating information on the Web are called.
1) information engines
2) locator engines
3) web browsers
4) resource locators
5) search engines (Ans)

180.Compiling creates a(n)
1) error-free program
2) program specification
3) subroutine
4) algorithm
5) executable program (Ans)

181.Expansion cards are inserted into
1) slots (Ans)
2) peripheral devices
3) the CPU
4) the back of the computer
5) None of these

182.A device that connects to a network without the use of cable is said to be
1) distributed
2) non-wired
3) centralised
4) open source
5) wireless (Ans)

183.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)
1) workstation
2) CPU
3) magnetic disk
4) integrated circuit (Ans)
5) complex circuit

184. Junk e-mail is also called
1) crap
2) spoof
3) sniffer script
4) spool
5) spam (Ans)

185.A program designed to destroy data on your computer which can travel to "infect" other computers is called a
1) disease
2) torpedo
3) hurricane
4) virus (Ans)
5) infector

186. ............... shows the files, folders, and drives on your computer, making it easy to navigate from one location to another within the file hierarchy.
1) Microsoft Internet Explorer.
2) Windows Explorer (Ans)
3) My Computer
4) Folders Manager
5) Windows Locator

187.The ...................... manual tells you how to use a software program.
1) Documentation
2) programming
3) user (Ans)
4) Technical
5) designer

188. A collection of interrelated records is called a
1) utility file
2) management information system
3) database  (Ans)
4) spreadsheet
5) datasheet


No comments:

Post a Comment