IBPS RRB Officer Model Question Paper with answer | Computer Awareness Part-III

    IBPS RRB Officer Model Question Paper with answer | Computer Awareness Part-III:
    Model Computer Awareness Questions for IBPS RRB Officer Exam-2014 with answers. Candidates those who are preparing for IBPS RRB Officer Examination can use these questions.

    Are You preparing for IBPS PO 2019? Start your preparation with Free IBPS PO Mock Test 2019 – Take Test Now
    1).The right click option of the mouse is NOT used in which of the following?
    a)   To copy selected text into the clipboard
    b)   To rename the file
    c)   To cut the selected text
    d)    To access properties of an object
    e)   None of these
    2)._________is the process of dividing the disk into tracks and sectors?
    a)   Tracking
    b)   Formatting
    c)   Crashing
    d)   Allotting
    e)   None of these
    3).A place in the computer system where data and programs are temporarily stored is called?
    a)   Paste
    b)   open
    c)   Memory
    d)   pocket
    e)   None of these
     4).Correcting errors in a program is referred to as?
    a)   Debugging
    b)   Bugging
    c)   Rectifying
    d)   Modifying
    e)   None of these
    5).Graphical Diagrams are used to represent multiple perspectives of a system which include
    a)   Use-case, class and state diagrams.
    b)   State, interaction and derivation diagrams
    c)   Interaction, relationship and class diagrams
    d)   Deployment, relationship and use-case diagrams
    e)   None of these
    6).Which of the following is the best view for representing your thoughts as a presentation on a computer?
    a)   Outline view
    b)   Notes page view
    c)   Slider sorter view
    d)   Slider view
    e)   None of these
    7).SMPS stands for?
    a)   Switch Mode Power Supply
    b)   Single Mode Power Supply
    c)   Simple Mode Power Supply
    d)   Synchronous Mode Power Supply
    e)   None of these
    8).RSA is a?
    a)   Symmetric Cryptosystem
    b)   Digital Signature
    c)   Asymmetric Cryptosystem
    d)   Block Cypher
    e)   None of These
    9).________ hardware technology was used by fifth-generation computers.
    a)   Transistors
    b)   Valves
    c)   ICS
    d)   ULSI
    e)   VLSI
    10).For each instruction in program memory the CPU goes through a___?
    a)   Decode-fetch-execute sequence
    b)   Fetch-decode-execute sequence
    c)   Fetch-execute-decode sequence
    d)   Execute-store-decode sequence
    e)   Fetch-store-decode sequence

    1). e)   2). b)   3). c)   4). a)   5). a)   6). a)   7). a)   8). b)   9). d)   10). b)

    / 5. Reviews