RRB JE Stage 2 Computer and Applications Questions Part 1
1. PREVIOUS YEARS QUESTIONS WITH
ANSWER AND EXPLANATION
Part - 1
vrrgroup.academy@gmail.com
https://www.facebook.com/VRRAcademy
1
2. Optical Character Reader(OCR)
OCR is an input device used to read a printed text. OCR scans text
optically character by character, converts them into a machine
readable code and stores the text on the system memory.
Answer: (a)
10. 10
A Turing machine is a mathematical model of computation that
defines an abstract machine, which manipulates symbols on a
strip of tape according to a table of rules.
Despite the model's simplicity, given any computer algorithm, a
Turing machine capable of simulating that algorithm's logic can
be constructed.
Answer: (c)
13. In computer, any characters like alphabet, digit or any
special character is represented by collection of 0’ and 1’ in
a unique coded pattern.
In computers, the code is made up of fixed size groups of
binary positions.
The binary coding schemes that are most commonly used
are as follows:
1. Binary coded decimal (BCD).
2. American standard code for information interchange (ASCII).
3. Extended binary coded decimal interchange code (EBCDIC).
4. UNICODE.
13
14. Binary coded decimal is a number system where four bits are used to
represent each decimal digits.
BCD is a method of using binary digits to represent the decimal digits (0-9).
In BCD system, there is no limit on size of a number.
14
48 – 0100 1000
15. ASCII characters are represented by seven bits.
These are standard character codes used to store data so that it
may be used by other software programs.
The standard ASCII codes defines 128 character code (from 0
to 127).
Basically, ASCII codes are of two types:
ASCII-7 : it is a 7-bit standard ASCII code, it allows = 128
unique symbols.
ASCII-8 : It is an extended version of ASCII-7. It is an 8-bit
code, it allows = 256 symbols or characters.
15
16. In EBCDIC, characters are represented by eight bits.
These codes store information which is readable by other
computers.
It allows 2^8 =256 combinations of bits.
16
It uses 16-bits to represent a symbol in the data.
It represents any non-english character like Chinese,
Japanese
17. 17
In cryptography, encryption is the process of encoding a message
or information in such a way that only authorized parties can
access it and those who are not authorized cannot.
Encryption does not itself prevent interference, but denies the
intelligible content to a would-be interceptor.
Answer: (d)
32. 32
Transient data : Data that is created within an application
session. At the end of the session, it is discarded or reset back to
its default and not stored in a database.
Answer: (d)
40. 40
• VIRUS: Vital Information Resource Under Siege.
• A piece of software that infects programs (Modify, Delete)
• Replicates itself.
• Easily spread from one software / file to another
• Viruses are copied itself and attached itself to other programs
which further spread the infection.
• The virus can affect or attack any part of the computer software
such as: Boot block Files, Operating systems, Application
program
Answer: (b)
41. 41
EFFECTS OF VIRUS
Depending on the types of virus their effects on the computer are:
• Destroy all data on your local disk.
• Slow down your computer performance.
• Monitor what are you doing.
• Download illegal files onto your computer without being able to delete
them.
• Generates IP address randomly and sends those IP address automatically.
• Steal confidential information like password, account number, credit card
information by random e-mailing.
• May increase or decrease memory size.
• Display different types of error messages.
• Alter PC settings.
• Cause computer to make strange noises make music, clicking noises or
beeps.
42. 42
Ctrl + C – Copy
Ctrl + E - Center text
Ctrl + F - NavPaneSearch
Ctrl + X - Cut
Answer: (b)
43. 43
Ctrl+0 Toggles 6pts of spacing before a paragraph.
Ctrl+A Select all contents of the page.
Ctrl+B Bold highlighted selection.
Ctrl+C Copy selected text.
Ctrl+D Open the font preferences window.
Ctrl+E Aligns the line or selected text to the center of the screen.
Ctrl+F Open find box.
Ctrl+I Italic highlighted selection.
Ctrl+J Aligns the selected text or line to justify the screen.
Ctrl+K Insert a hyperlink.
Ctrl+L Aligns the line or selected text to the left of the screen.
Ctrl+M Indent the paragraph.
Ctrl+N Opens new, blank document window.
Ctrl+O Opens the dialog box or page for selecting a file to open.
Ctrl+P Open the print window.
Ctrl+R Aligns the line or selected text to the right of the screen.
Ctrl+S Save the open document. Like Shift+F12.
44. 44
Alt, F, A Save the document under a different file name.
Ctrl+T Create a hanging indent.
Ctrl+U Underline the selected text.
Ctrl+V Paste.
Ctrl+W Close the currently open document.
Ctrl+X Cut selected text.
Ctrl+Y Redo the last action performed.
Ctrl+Z Undo last action.
47. 47
What is inode number in Linux
• Inode number also called index number, it consists following attributes.
• File types ( executable, block special etc )
• Permissions ( read, write etc )
• UID ( Owner )
• GID ( Group )
• FileSize
• Time stamps including last access,
last modification and last inode number change.
• File deletion time
• Number of links ( soft/hard )
• Location of ile on harddisk.
• Some other metadata about file.
Answer: (d)