Computer Questions for RBI ASSISTANT MAINS 2016

January 9, 2017    

Q1. In a word processor application, the user might want to cut text from one part of a document and paste it in another part of the document or somewhere else. When the user copies the selected content, it's stored in the________
(a) Cache Memory
(c) Virtual Memory
(d) Clipboard
(e) EEPROM 
Q2. _____are often used to stop bots and other automated programs from using blogs to affect search engine rankings, signing up for e-mail accounts to send out spam or take part in on-line polls.
(a) Malware
(b) Firewall
(C) CAPTCHA
(d) biometrics
(e) Automation
Q3. A_____ application interface directly with users and forward requests to a remotely-located program in another computer to get requested data or perform a requested service.
(a) Front-end
(b) Warehouse
(c) Back-end
(d) Terminal
(e) None of these
Q4.  4-D includes the three spatial dimensions plus time , which allows researchers to simulate the progression of a disease or the effects of a treatment over a period of time. The first such model ever developed, _____is known as a 4-D human atlas.
(c) CAVEman
(d) NeuroMAN
(e) None of these
Q5._____is an example of businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
(e) None of these
Q6. What term is used to identify people coming together from various geographical locations to complete some task online ?
(a) I-team
(b) Virtual team
(c) Online work group
(d) Distributed team
(e) None of these
Q7. Which of the following is Open Source Software?
(a) Windows
(d) Adobe Photoshop
(e) None of these
Q8. Which of the following is an OLTP program from IBM?
(e) None of the above
Q9. A ___________________________ handles an organization's day-to-day accounting needs; keeping a verifiable record of every transaction involving money, including purchases, sales, and payroll payments.
(a) Online transaction processing system (OLTP)
(b) Financial support system (FSS)
(c) Decision support system (DSS)
(d) Business processing system (BPS)
(e) None of these
Q10.  _______ is a security process that relies on the unique biological characteristics of an individual to verify.
(a) CAPTCHA
(b) AADHAR
(c) PAN CARD
(d) BIOMETRICS
Q11. KPO is the allocation of relatively high-level tasks to an outside organization or a different group (possibly in a different geographic location) within the same organization. What is the full form of KPO?
(a) Knowledge Process Outsourcing
(b) Knowledge Procedure Organization
(c) know process outcomes
(d) Know processing outcomes
(e) Knowledge Process Outcomes
Q12. Which of the following character set supports Japanese and Chinese font?
(a) EBCDIC
(e) Unicode
Q13. Which of the following is the combination of numbers, alphabets along with username used to get access to a user account? 
(a) Password
(b) Username
(c) Title name
(d) Host-id
(e) Screen name
Q14. A database, called the _________________, stores configuration information about installed peripherals and software.
(b) Profile
(c) Registry
(d) Boot sector
(e) None of these
Q15.Networks that use different technologies can be connected by using:
(a) Packets
(b) Switches
(c) Bridges
(d) Routers
(e) None of these 

Let's block ads! (Why?)


- http://www.bankersadda.com/2017/01/computer-questions-for-rbi-assistant9.html
Computer Questions for RBI ASSISTANT MAINS 2016 4.5 5 Yateendra sahu January 9, 2017 Q1. In a word processor application, the user might want to cut text from one part of a document and paste it in another part of the docum...


Load comments

No comments:

Post a Comment