0% found this document useful (0 votes)
81 views5 pages

Important Computer Questions For RSMSSB Informatics Assistant Exam Set 2 1

Uploaded by

Sanju Sarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views5 pages

Important Computer Questions For RSMSSB Informatics Assistant Exam Set 2 1

Uploaded by

Sanju Sarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Important Computer Questions For RSMSSB Informatics Assistant Exam

Set 2
Q1. Which of the following terms is associated with Q6. __________ operation is not performed by a
network? general computer.
(a) MS Excel (a) Processing
(b) Mouse (b) Controlling
(c) Word (c) Sorting
(d) Connectivity
(d) Thoughtful
Q2. __________________ is a Windows utility program
that located and eliminates unnecessary fragments Q7. Bridge is a _________ device.
and rearranges filed and unused to disk space to (a) layer 4
optimize operations. (b) layer 2
(a) Backup (c) layer 5
(b) Disk cleanup (d) layer 7
(c) Disk defragmenter
(d) Restore Q8. A high quality CAD system uses which of the
following for printing drawing and graphs.
Q3. If a word is typed that is not in MS Word's (a) Dot matrix printer
dictionary, a wavy underline appears below the
(b) Digital plotter
word. What is the color of the underline that
(c) Line printer
appears in this situation?
(d) All of the above
(a) Blue
(b) Red
(c) Green Q9. The CPU, also called the _____ when talking
(d) Black about PCs does the vast majority of the processing
for a computer.
Q4. What is decorative text called, that you can add (a) Micro-processor
to a document? (b) RAM
(a) Table (c) Memory System
(b) Symbol (d) Microprocessor
(c) WordArt
(d) Image
Q10. The original ASCII code used ______________ bits
of each byte, reserving that last bit for error
Q5. What is a named area on a disk that is used to
store related subfolders and files called? checking.
(a) Desktop (a) 5
(b) Folder (b) 6
(c) Menu (c) 7
(d) Safari (d) 8

1 Rajasthan Adda247 YouTube Channel | Adda247 App | Rajasthan Adda247 Telegram Channel
Q11. Which of the following techniques can be used Q15. A commonly used graphic format for the Web
to store a large number of files in a small amount of is ___________________.
storage space? (a) GIF
(a) File adjustment (b) BMP
(b) File copying (c) TXT
(c) File compatibility (d) LMP
(d) File compression
Q16. What does RDBMS stands for?
(a) Relational Database Management System
Q12. Which among the following is software
(b) Relational Data Management System
application commonly used to prepare a
(c) Relational Database Management Software
presentation/slide show?
(d) Relational Data Management Software
(a) Adobe
(b) Power Point Q17. Which organization developed MS DOS?
(c) Outlook Express (a) Apple
(d) Internet Explorer (b) Microsoft
(c) Google
Q13. Which among the following is a language (d) IBM
directly understood by CPU?
(a) Machine Q18. Which among the following term is used for
(b) C those hardware devices that are not part of the
(c) C++ main computer system and are often added later to
(d) Java the system?
(a) clip art
(b) highlight
Q14. Which of the following cable technologies
(c) execute
covert electrical signals into optical signals?
(d) peripheral
(a) Coaxial
(b) STP
Q19. What is the technology used to read pencil or
(c) UTP pen marks on a multiple-choice answer sheet
(d) Fiber optic called?
(a) OMR
(b) MICR
(c) OCR
(d) CPU

Q20. What are different views to display a table in


MS Access?
(a) Pivot Table & Pivot Chart View
(b) Design View
(c) Datasheet View
(d) All of the above

2 Rajasthan Adda247 YouTube Channel | Adda247 App | Rajasthan Adda247 Telegram Channel
Q21. SMTP, FTP and DNS are applications/ Q26. What does a Bug mean?
protocols of the _______________ layer. (a) Logical error in a program
(a) Data link (b) Syntax error in a program
(b) Network (c) Run time error
(c) Transport (d) Both (a) and (b)
(d) Application
Q27. Codes consisting of varying widths and
Q22. Two or more computers connected to each spacing of parallel lines, which may be optically
other for sharing information form a read, is known as _____.
___________________. (a) mnemonic
(a) Router (b) Bar code
(b) Server (c) Decoder
(c) Network (d) All of the above
(d) Tunnel
Q28. Which of the following is a server that saves
Q23. What is the sequence of events that occurs in Web pages that users have requested so that
the computer when it is interpreting and executing successive requests for these pages do not require
an instruction known as? the use of the Internet?
(a) Execution cycle (a) Dedicated server
(b) Instruction cycle (b) Virtual server
(c) Working cycle (c) Off-Line Services
(d) Cache server
(d) Machine cycle

Q29. Which of the following is often used in


Q24. What is the base or radix of the Hexadecimal
conjunction with phishing in an attempt to steal
number system?
your information?
(a) 2
(a) Zombie
(b) 8
(b) Computer Worm
(c) 10
(c) Spoofing
(d) 16
(d) Rootkit

Q25. Which of the following is a term for the


Q30. which of the following device translates sound
process of trading goods over the Internet?
vibrations in the air into electronic signals?
(a) e-selling-n-buying
(a) Hub
(b) e-trading (b) Switch
(c) e-finance (c) Microphone
(d) e-commerce (d) All of these

SOLUTION-2
S1. Ans.(d) S2. Ans.(c)
Sol. Network connectivity is also a kind of metric to Sol. Disk defragmenter is a Windows utility
discuss how well parts of the network connect to program that located and eliminates unnecessary
fragments and rearranges filed and unused to disk
one another. space to optimise operations.

3 Rajasthan Adda247 YouTube Channel | Adda247 App | Rajasthan Adda247 Telegram Channel
S3. Ans.(b) S12. Ans.(b)
Sol. This indicates either a possible spelling error Sol. PowerPoint is used to make
or that Word doesn't recognize a word, such as a presentations/slide shows.
proper name or place. Green underline- Word
thinks that grammar should be revised. Blue S13. Ans.(a)
underline- A word is spelled correctly but does not Sol. CPU doesn’t understand the C++ language (or
seem to be the correct word for the sentence. any high level programming language). All the
High-level language statements must be translated
S4. Ans.(c) into machine code before they can be executed.
Sol. WordArt is decorative text that you can add to
a document. You can make changes to WordArt, S14. Ans.(d)
such as the font size and the text color, by using the Sol. Fiber optic cables transmit signals in the form
drawing tools options available automatically after of optical signals over a narrow glass fiber stand.
you insert or select the WordArt in a document.
S15. Ans.(a)
S5. Ans.(b) Sol. The Graphics Interchange Format (GIF) is used
Sol. A folder is a virtual location where programs,
to save simple Web graphics having limited colors.
files, and other folders can be located.
This image format is usually used for Web buttons,
charts and text headings.
S6. Ans.(d)
Sol. Except thoughtful all other operations are
S16. Ans.(a)
performed by general computers.
Sol. RDBMS stands for Relational Database
Management System.
S7. Ans.(b)
Sol. A bridge is a network device used at the data
S17. Ans.(b)
link layer to connect two dissimilar networks as
well as similar networks. Sol. MS DOS stands for Microsoft Disk Operating
System it is a discontinued operating system for
S8. Ans.(b) x86-based personal computers mostly developed
Sol. Digital plotter used in CAD systems. by Microsoft.

S9. Ans.(d) S18. Ans.(d)


Sol. The CPU, also called the Micro-processor when Sol. A peripheral device is generally defined as any
talking about PCs does the vast majority of the auxiliary device such as a computer mouse or
processing for a computer keyboard that connects to and works with the
computer in some way.
S10. Ans.(d)
Sol. ASCII code used 8 bits. S19. Ans.(a)
Sol. Optical Mark Recognition What is the
S11. Ans.(d) technology used to read pencil or pen marks on a
Sol. File compression is the technique used to store multiple-choice answer sheet.
the large file in a small storage space. It compresses
to content of the file in such a way that there is no S20. Ans.(d)
harm done on the file content and quality. Sol. All are views to display a table in MS Access.

4 Rajasthan Adda247 YouTube Channel | Adda247 App | Rajasthan Adda247 Telegram Channel
S21. Ans.(d) S27. Ans.(b)
Sol. SMTP, FTP and DNS are protocols of the Sol. A barcode is a machine-readable
Application layer. SMTP-Simple Mail Transfer representation of data relating to the object to
Protocol, DNS-Domain Name System, FTP-File which it is attached.
Transfer Protocol.
S28. Ans.(d)
S22. Ans.(c) Sol. A cache server is a dedicated network server or
Sol. A network is interconnection of two or more service acting as a server that saves Web pages or
computers. other Internet content locally.

S23. Ans.(b) S29. Ans.(c)


Sol. An instruction cycle is the basic operational Sol. Spoofing is a type of scam where an intruder
process of a computer. It is the process by which a attempts to gain unauthorized access to a user's
computer retrieves a program instruction from its system or information by pretending to be the user.
memory, determines what actions the instruction The main purpose is to trick the user into releasing
dictates, and carries out those actions. sensitive information in order to gain access to
one's bank account, computer system or to steal
S24. Ans.(d) personal information, such as passwords.
Sol. Base of hexadecimal number system is 16.
S30. Ans.(c)
S25. Ans.(d) Sol. A microphone is a device that translates sound
Sol. Electronic commerce, commonly written as e-
vibrations in the air into electronic signals.
commerce or e-commerce, is the trading or
facilitation of trading in products or services using
computer networks, such as the Internet or online
social networks.

S26. Ans.(a)
Sol. In computer programming, a logic error is a
bug in a program that causes it to operate
incorrectly, but not to terminate abnormally (or
crash). A logic error produces unintended or
undesired output or other behavior, although it
may not immediately be recognized as such.

5 Rajasthan Adda247 YouTube Channel | Adda247 App | Rajasthan Adda247 Telegram Channel

You might also like