IBPS RRB CLERK - OFFICE ASSISTANT - SPLessons

IBPS RRB Group B Clerk Main Computer Knowledge

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS RRB Group B Clerk Main Computer Knowledge

shape Introduction

IBPS RRB Group B 2019 – Main Examination, conducted in online Mode, has: a duration of 2 Hours, a total of 200 questions, a maximum score of 200 marks, and consists of 5 sections, namely – Reasoning, Numerical Ability, General Awareness, English Language and Computer Knowledge. The 5 sections are not separately timed and the questions can be attempted in any order. There is a Negative marking in IBPS RRB Group B Main Exam and 0.25 marks are deducted for each wrong answer. Candidates must clear the cut-off in all the sections to qualify for the Provisional allotment. The below sections gives the detailed information about IBPS RRB Group B Main Computer Knowledge.

shape Pattern

S.No. (Objective) Test Name Medium of Exam Questions Marks Duration
1 Reasoning Ability Hindi/English 40 50 2 hours
2 Numerical Ability Hindi/English 40 50
3 General Awareness Hindi/English 40 40
4 a* English Language English 40 40
4 b* Hindi Language(हिंदी) Hindi 40 40
5 Computer Knowledge Hindi/English 40 20
Total 200 200
* Candidates can opt either 4 a or 4 b
The IBPS RRB Group B Clerk Computer Knowledge section in the Main Exam, has a total of 40 questions. Below mentioned are the different categories of expected questions in the Main Exam of IBPS RRB Group B Computer Knowledge.

shape Syllabus

S.No. Topics
1 History and Generation of Computers
2 Introduction to Computer Organisation
3 Computer Memory
4 Computer Hardware and I/O Devices
5 Computer Software
6 Computer Languages
7 Operating System
8 Computer Network
9 Internet
10 MS Office Suit and Short cut keys
11 Basics of DBMS
12 Number System and Conversions
13 Computer and Network Security

shape Samples

1. What did first generation computers use for circuitry?
    A. Transistors B. Vacuum tubes C. Integrated circuits D. Microprocessors
Answer: B
2. What did second generation computers use for circuitry?
    A. Transistors B. Vacuum tubes C. Integrated circuits D. Microprocessors
Answer: A
3. What was the main technology used in third generation computers?
    A. Vacuum tubes B. Integrated circuits C. Microprocessors D. Artificial intelligence
Answer: C
4. What was the main technology used in fourth generation computers?
    A. Vacuum tubes B. Integrated circuits C. Microprocessors D. Artificial intelligence
Answer: C
5. Fifth generation computers are based on which of the following?
    A. Vacuum tubes B. Integrated circuits C. Microprocessors D. Artificial intelligence
Answer: D
6. What were some disadvantages of first generation computers? You may choose more than one answer. Discuss
    A. They were enormous. B. They were expensive. C. They used a great deal of electricity. D. They generated a lot of heat. E. All the Above
Answer: E
7. The of the generation of computers started using keyboards and monitors?
    A. First B. Second C. Third D. Fourth E. Fifth
Answer: C
8. This is called a __________. Answer: integrated circuit, microchip
1. Which registers can interact with the secondary storage?
    A. MAR B. PC C. IR D. R0
Answer: A
2. Which of the register/s of the processor is/are connected to Memory Bus?
    A. PC B. MAR C. IR D. Both a and b
Answer: B
3. The internal Components of the processor are connected by _______.
    A. Processor intra-connectivity circuitry B. Processor bus C. Memory bus D. Rambus
Answer: B
4. The registers, ALU and the interconnection between them are collectively called as _____.
    A. Process route B. Information trail C. information path D. data path
Answer: D
5. _______ is used to store data in registers.
    a) D flip flop b) JK flip flop c) RS flip flop d) none of these
Answer: A
1. The duration between the read and the mfc signal is ______.
    A. Access time B. Latency C. Delay D. Cycle time
Answer: A
2. The Reason for the disregarding of the SRAM’s is
    A. Low Efficiency. B. High power consumption. C. High Cost. D All of the above.
Answer: C
3. To organise large memory chips we make use of ______.
    A. Integrated chips B. Upgraded hardware C. Memory modules D. None of the above
Answer: C
4. The spatial aspect of the locality of reference means
    A. That the recently executed instruction is executed again next B. That the recently executed wont be executed again C. That the instruction executed will be executed at a later time D. That the instruction in close proximity of the instruction executed will be executed in future
Answer: D
5. The correspondence between the main memory blocks and those in the cache is given by _________.
    A. Hash function B. Mapping function C. Locale function D. Assign function
Answer:B
1. In memory-mapped I/O…
    A. The I/O devices and the memory share the same address space B. The I/O devices have a seperate address space C. The memory and I/O devices have an associated address space D. A part of the memory is specifically set aside for the I/O operation
Answer: A
2. The return address from the interrupt-service routine is stored on the
    A. System heap B. Processor register C. Processor stack D. Memory
Answer: C
3. The program used to find out errors is called
    A. Debugger B. Compiler C. Assembler D. Scanner
Answer: A
4. The conversion from parallel to serial data transmission and vice versa takes place inside the interface circuits.
    A. True B. False
Answer: A
5. The Centralised BUS arbitration is similar to ______ interrupt circuit
    A. Priority B. Parallel C. Single D. Daisy chain
Answer: D
1. When referring to instruction words, a mnemonic is:
    A. a short abbreviation for the operand address B. a short abbreviation for the operation to be performed C. a short abbreviation for the data word stored at the operand address D. shorthand for machine language
Answer: B
2. What is the difference between mnemonic codes and machine codes?
    A. There is no difference. B. Machine codes are in binary, mnemonic codes are in shorthand English. C. Machine codes are in shorthand English, mnemonic codes are in binary. D. Machine codes are in shorthand English, mnemonic codes are a high-level language.
Answer: B
3. Which bus is bidirectional?
    A. data bus B. control bus C. address bus D. multiplexed bus
Answer: Option A
4. The software used to drive microprocessor-based systems is called:
    A. assembly language programs B. firmware C. BASIC interpreter instructions D. flowchart instructions
Answer: A
5. A microprocessor unit, a memory unit, and an input/output unit form a:
    A. CPU B. compiler C. microcomputer D. ALU
Answer: C
1. Which one of the following statement is true for Assembly language?
    A. This language need not be translated into machine language. B. It is the easiest language to write programs C. It uses alphabetic codes. D. All of the above
Answer: C
2. The statement which is not the characteristic of COBOL is
    A. It is readable B. It is very efficient in coding and execution 3. It is standardized language 4. It has limited facilities for mathematical calculations
Answer: B
3. The high level language program before ready to be executed must go through various process except
    A. Linking B. Loading C. Controlling D. Translation
Answer: D
4. Which one of the following language reflects the way people think mathematically?
    A. Functional B. Event driven programming language C. Cross platform programming language D. All of the above
Answer: A
5. Which language can be directly understood by the CPU?
    A. Assembly language B. Java C. C D. All of the above
Answer: A
1. The part of machine level instruction, which tells the central processor what has to be done, is
    A. Operation code B. Address C. Locator D. Flip-Flop E. None of the above
Answer: A
2. Which of the following refers to the associative memory?
    A. the address of the data is generated by the CPU B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address D. the data are accessed sequentially E. None of the above
Answer: C
3. To avoid the race condition, the number of processes that may be simultaneously inside their critical section is
    A. 8 B. 1 C. 16 D. 0 E. None of the above
Answer: B
4. A system program that combines the separately compiled modules of a program into a form suitable for execution
    A. assembler B. linking loader C. cross compiler D. load and go E. None of the above
Answer: B
5. Process is
    A. program in High-level language kept on disk B. contents of main memory C. a program in execution D. a job in secondary memory E. None of the above
Answer: C
How many digits of the DNIC (Data Network Identification Code) identify the country?
    A. first three B. first four C. first five D. first six E. None of the above
Answer: A
_______________ is not a web browser.
    A. FOXPRO B. Mozilla C. Netscape navigator D. Internet explorer
Answer: A
What happens if you press Ctrl + Shift + F8?
    A. It activates extended selection B. It activates the rectangular selection C. It selects the paragraph on which the insertion line is. D. None of These
Answer: B
1. What is database? A database is a collection of information that is organized. So that it can easily be accessed, managed, and updated.
2. What is DBMS? DBMS stands for Database Management System. It is a collection of programs that enables user to create and maintain a database.
3. What is a Database system? The database and DBMS software together is called as Database system.
4. What are the advantages of DBMS? I. Redundancy is controlled. II. Providing multiple user interfaces. III. Providing backup and recovery IV. Unauthorized access is restricted. V. Enforcing integrity constraints.
5. What is normalization? It is a process of analyzing the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the properties (1).Minimizing redundancy, (2). Minimizing insertion, deletion and update anomalies.
Base 10 refers to which number system?
    A. binary coded decimal B. decimal C. octal D. hexadecimal
Answer: B
1. IPSec is designed to provide the security at the
    A. transport layer B. network layer C. application layer D. session layer
Answer: B
2. WPA2 is used for security in
    A. ethernet B. Bluetooth C. wi-fi D. none of the mentioned
Answer: C
IBPS RRB Group B Computer Knowledge - Study Guide - Click Here

IBPS RRB Group B – Related Information
IBPS RRB Group B Clerk – Reasoning Ability - Study Guide
IBPS RRB Group B Clerk - Numerical Ability - Study Guide
IBPS RRB Group B Clerk – General Awareness - Study Guide
IBPS RRB Group B Clerk – English Language - Study Guide