SlideShare a Scribd company logo
1 of 48
PREVIOUS YEARS QUESTIONS WITH
ANSWER AND EXPLANATION
Part - 1
vrrgroup.academy@gmail.com
https://www.facebook.com/VRRAcademy
1
Optical Character Reader(OCR)
OCR is an input device used to read a printed text. OCR scans text
optically character by character, converts them into a machine
readable code and stores the text on the system memory.
Answer: (a)
3
Answer: (a)
4
5
6
Answer: (c)
7
Block Diagram of Computer
8
Answer: (b)
9
Answer: (c)
10
A Turing machine is a mathematical model of computation that
defines an abstract machine, which manipulates symbols on a
strip of tape according to a table of rules.
Despite the model's simplicity, given any computer algorithm, a
Turing machine capable of simulating that algorithm's logic can
be constructed.
Answer: (c)
11
12
Answer: (b)
 In computer, any characters like alphabet, digit or any
special character is represented by collection of 0’ and 1’ in
a unique coded pattern.
 In computers, the code is made up of fixed size groups of
binary positions.
 The binary coding schemes that are most commonly used
are as follows:
1. Binary coded decimal (BCD).
2. American standard code for information interchange (ASCII).
3. Extended binary coded decimal interchange code (EBCDIC).
4. UNICODE.
13
 Binary coded decimal is a number system where four bits are used to
represent each decimal digits.
 BCD is a method of using binary digits to represent the decimal digits (0-9).
 In BCD system, there is no limit on size of a number.
14
48 – 0100 1000
 ASCII characters are represented by seven bits.
 These are standard character codes used to store data so that it
may be used by other software programs.
 The standard ASCII codes defines 128 character code (from 0
to 127).
 Basically, ASCII codes are of two types:
 ASCII-7 : it is a 7-bit standard ASCII code, it allows = 128
unique symbols.
 ASCII-8 : It is an extended version of ASCII-7. It is an 8-bit
code, it allows = 256 symbols or characters.
15
 In EBCDIC, characters are represented by eight bits.
 These codes store information which is readable by other
computers.
 It allows 2^8 =256 combinations of bits.
16
It uses 16-bits to represent a symbol in the data.
It represents any non-english character like Chinese,
Japanese
17
In cryptography, encryption is the process of encoding a message
or information in such a way that only authorized parties can
access it and those who are not authorized cannot.
Encryption does not itself prevent interference, but denies the
intelligible content to a would-be interceptor.
Answer: (d)
18
19
Answer: (a)
20
21
Answer: (d)
22
Answer: (d)
23
Answer: (a)
24
Answer: (c)
25
Answer: (d)
26
Answer: (a)
27
Answer: (b)
28
Answer: (b)
29
Answer: (c)
30
Answer: (a)
31
32
Transient data : Data that is created within an application
session. At the end of the session, it is discarded or reset back to
its default and not stored in a database.
Answer: (d)
33
Answer: (d)
34
Answer: (a)
35
Answer: (c)
36
37
Answer: (a)
38
Answer: (c)
39
Answer: (c)
40
• VIRUS: Vital Information Resource Under Siege.
• A piece of software that infects programs (Modify, Delete)
• Replicates itself.
• Easily spread from one software / file to another
• Viruses are copied itself and attached itself to other programs
which further spread the infection.
• The virus can affect or attack any part of the computer software
such as: Boot block Files, Operating systems, Application
program
Answer: (b)
41
EFFECTS OF VIRUS
Depending on the types of virus their effects on the computer are:
• Destroy all data on your local disk.
• Slow down your computer performance.
• Monitor what are you doing.
• Download illegal files onto your computer without being able to delete
them.
• Generates IP address randomly and sends those IP address automatically.
• Steal confidential information like password, account number, credit card
information by random e-mailing.
• May increase or decrease memory size.
• Display different types of error messages.
• Alter PC settings.
• Cause computer to make strange noises make music, clicking noises or
beeps.
42
Ctrl + C – Copy
Ctrl + E - Center text
Ctrl + F - NavPaneSearch
Ctrl + X - Cut
Answer: (b)
43
Ctrl+0 Toggles 6pts of spacing before a paragraph.
Ctrl+A Select all contents of the page.
Ctrl+B Bold highlighted selection.
Ctrl+C Copy selected text.
Ctrl+D Open the font preferences window.
Ctrl+E Aligns the line or selected text to the center of the screen.
Ctrl+F Open find box.
Ctrl+I Italic highlighted selection.
Ctrl+J Aligns the selected text or line to justify the screen.
Ctrl+K Insert a hyperlink.
Ctrl+L Aligns the line or selected text to the left of the screen.
Ctrl+M Indent the paragraph.
Ctrl+N Opens new, blank document window.
Ctrl+O Opens the dialog box or page for selecting a file to open.
Ctrl+P Open the print window.
Ctrl+R Aligns the line or selected text to the right of the screen.
Ctrl+S Save the open document. Like Shift+F12.
44
Alt, F, A Save the document under a different file name.
Ctrl+T Create a hanging indent.
Ctrl+U Underline the selected text.
Ctrl+V Paste.
Ctrl+W Close the currently open document.
Ctrl+X Cut selected text.
Ctrl+Y Redo the last action performed.
Ctrl+Z Undo last action.
45
Answer: (b)
46
47
What is inode number in Linux
• Inode number also called index number, it consists following attributes.
• File types ( executable, block special etc )
• Permissions ( read, write etc )
• UID ( Owner )
• GID ( Group )
• FileSize
• Time stamps including last access,
last modification and last inode number change.
• File deletion time
• Number of links ( soft/hard )
• Location of ile on harddisk.
• Some other metadata about file.
Answer: (d)
48
Will Continue in Part 2

More Related Content

What's hot

Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulationSanjeev Patel
 
TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....
TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....
TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....Shail Nakum
 
Assembly language programming(unit 4)
Assembly language programming(unit 4)Assembly language programming(unit 4)
Assembly language programming(unit 4)Ashim Saha
 
Infix to Prefix (Conversion, Evaluation, Code)
Infix to Prefix (Conversion, Evaluation, Code)Infix to Prefix (Conversion, Evaluation, Code)
Infix to Prefix (Conversion, Evaluation, Code)Ahmed Khateeb
 
Clock and clock cycle in processor architecture
Clock and clock cycle in processor architectureClock and clock cycle in processor architecture
Clock and clock cycle in processor architecturegogii6789
 
Parsing (Automata)
Parsing (Automata)Parsing (Automata)
Parsing (Automata)ROOP SAGAR
 
Normalization Practice case study.pptx
Normalization Practice case study.pptxNormalization Practice case study.pptx
Normalization Practice case study.pptxAhmadMirzaAhmad
 
Interfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessorInterfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessorVikas Gupta
 
Linked list using Dynamic Memory Allocation
Linked list using Dynamic Memory AllocationLinked list using Dynamic Memory Allocation
Linked list using Dynamic Memory Allocationkiran Patel
 
358 33 powerpoint-slides_3-pointers_chapter-3
358 33 powerpoint-slides_3-pointers_chapter-3358 33 powerpoint-slides_3-pointers_chapter-3
358 33 powerpoint-slides_3-pointers_chapter-3sumitbardhan
 
Unit 4 memory system
Unit 4   memory systemUnit 4   memory system
Unit 4 memory systemchidabdu
 

What's hot (20)

Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
3 jump, loop and call instructions
3 jump, loop and call instructions3 jump, loop and call instructions
3 jump, loop and call instructions
 
TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....
TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....
TYPES DATA STRUCTURES( LINEAR AND NON LINEAR)....
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
 
Assembly language programming(unit 4)
Assembly language programming(unit 4)Assembly language programming(unit 4)
Assembly language programming(unit 4)
 
String C Programming
String C ProgrammingString C Programming
String C Programming
 
Recovery system
Recovery systemRecovery system
Recovery system
 
Header files in c
Header files in cHeader files in c
Header files in c
 
Infix to Prefix (Conversion, Evaluation, Code)
Infix to Prefix (Conversion, Evaluation, Code)Infix to Prefix (Conversion, Evaluation, Code)
Infix to Prefix (Conversion, Evaluation, Code)
 
Array ppt
Array pptArray ppt
Array ppt
 
Clock and clock cycle in processor architecture
Clock and clock cycle in processor architectureClock and clock cycle in processor architecture
Clock and clock cycle in processor architecture
 
Parsing (Automata)
Parsing (Automata)Parsing (Automata)
Parsing (Automata)
 
Normalization Practice case study.pptx
Normalization Practice case study.pptxNormalization Practice case study.pptx
Normalization Practice case study.pptx
 
Interfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessorInterfacing memory with 8086 microprocessor
Interfacing memory with 8086 microprocessor
 
Strings
StringsStrings
Strings
 
Number System and Boolean Algebra
Number System and Boolean AlgebraNumber System and Boolean Algebra
Number System and Boolean Algebra
 
Linked list using Dynamic Memory Allocation
Linked list using Dynamic Memory AllocationLinked list using Dynamic Memory Allocation
Linked list using Dynamic Memory Allocation
 
358 33 powerpoint-slides_3-pointers_chapter-3
358 33 powerpoint-slides_3-pointers_chapter-3358 33 powerpoint-slides_3-pointers_chapter-3
358 33 powerpoint-slides_3-pointers_chapter-3
 
Unit 4 memory system
Unit 4   memory systemUnit 4   memory system
Unit 4 memory system
 
LL(1) parsing
LL(1) parsingLL(1) parsing
LL(1) parsing
 

Similar to RRB JE Stage 2 Computer and Applications Questions Part 1

RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PEstelaJeffery653
 
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJChapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJIMPERIALXGAMING
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Laura Gálvez
 
Computer Introduction
Computer IntroductionComputer Introduction
Computer IntroductionSpy Seat
 
System concept and hardware
System concept and hardwareSystem concept and hardware
System concept and hardwarefiza1975
 
What is turbo c and how it works
What is turbo c and how it worksWhat is turbo c and how it works
What is turbo c and how it worksMark John Lado, MIT
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxBhawaniShankarSahu1
 
Whole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThWhole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThAram Mohammed
 
C5 c++ development environment
C5 c++ development environmentC5 c++ development environment
C5 c++ development environmentsnchnchl
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Buffer overflow – Smashing The Stack
Buffer overflow – Smashing The StackBuffer overflow – Smashing The Stack
Buffer overflow – Smashing The StackTomer Zait
 

Similar to RRB JE Stage 2 Computer and Applications Questions Part 1 (20)

RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
Chapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and PChapter 2Hardware2.1 The System Unit2.2 Data and P
Chapter 2Hardware2.1 The System Unit2.2 Data and P
 
C programming part2
C programming part2C programming part2
C programming part2
 
C programming part2
C programming part2C programming part2
C programming part2
 
C programming part2
C programming part2C programming part2
C programming part2
 
Ee353 chap1 1.0
Ee353 chap1 1.0Ee353 chap1 1.0
Ee353 chap1 1.0
 
Topic 2.3 (1)
Topic 2.3 (1)Topic 2.3 (1)
Topic 2.3 (1)
 
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJChapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
Chapter 01 Java Programming Basic Java IDE JAVA INTELLIEJ
 
Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)Diccionario de ingles español2 (reparado)
Diccionario de ingles español2 (reparado)
 
Computer Introduction
Computer IntroductionComputer Introduction
Computer Introduction
 
System concept and hardware
System concept and hardwareSystem concept and hardware
System concept and hardware
 
What is turbo c and how it works
What is turbo c and how it worksWhat is turbo c and how it works
What is turbo c and how it works
 
Shai 2
Shai 2Shai 2
Shai 2
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Introduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptxIntroduction to digital computers and Number systems.pptx
Introduction to digital computers and Number systems.pptx
 
Whole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThWhole c++ lectures ITM1 Th
Whole c++ lectures ITM1 Th
 
C5 c++ development environment
C5 c++ development environmentC5 c++ development environment
C5 c++ development environment
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Buffer overflow – Smashing The Stack
Buffer overflow – Smashing The StackBuffer overflow – Smashing The Stack
Buffer overflow – Smashing The Stack
 
Chap 01[1]
Chap 01[1]Chap 01[1]
Chap 01[1]
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2CAS
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 

Recently uploaded

加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdfobuhobo
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptSURYAKANTSAHDEO
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxmanas23pgdm157
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfpadillaangelina0023
 
How to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfHow to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfmayank158542
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 

Recently uploaded (20)

加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdf
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
How to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfHow to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdf
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 

RRB JE Stage 2 Computer and Applications Questions Part 1

  • 1. PREVIOUS YEARS QUESTIONS WITH ANSWER AND EXPLANATION Part - 1 vrrgroup.academy@gmail.com https://www.facebook.com/VRRAcademy 1
  • 2. Optical Character Reader(OCR) OCR is an input device used to read a printed text. OCR scans text optically character by character, converts them into a machine readable code and stores the text on the system memory. Answer: (a)
  • 4. 4
  • 5. 5
  • 10. 10 A Turing machine is a mathematical model of computation that defines an abstract machine, which manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, given any computer algorithm, a Turing machine capable of simulating that algorithm's logic can be constructed. Answer: (c)
  • 11. 11
  • 13.  In computer, any characters like alphabet, digit or any special character is represented by collection of 0’ and 1’ in a unique coded pattern.  In computers, the code is made up of fixed size groups of binary positions.  The binary coding schemes that are most commonly used are as follows: 1. Binary coded decimal (BCD). 2. American standard code for information interchange (ASCII). 3. Extended binary coded decimal interchange code (EBCDIC). 4. UNICODE. 13
  • 14.  Binary coded decimal is a number system where four bits are used to represent each decimal digits.  BCD is a method of using binary digits to represent the decimal digits (0-9).  In BCD system, there is no limit on size of a number. 14 48 – 0100 1000
  • 15.  ASCII characters are represented by seven bits.  These are standard character codes used to store data so that it may be used by other software programs.  The standard ASCII codes defines 128 character code (from 0 to 127).  Basically, ASCII codes are of two types:  ASCII-7 : it is a 7-bit standard ASCII code, it allows = 128 unique symbols.  ASCII-8 : It is an extended version of ASCII-7. It is an 8-bit code, it allows = 256 symbols or characters. 15
  • 16.  In EBCDIC, characters are represented by eight bits.  These codes store information which is readable by other computers.  It allows 2^8 =256 combinations of bits. 16 It uses 16-bits to represent a symbol in the data. It represents any non-english character like Chinese, Japanese
  • 17. 17 In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. Answer: (d)
  • 18. 18
  • 20. 20
  • 31. 31
  • 32. 32 Transient data : Data that is created within an application session. At the end of the session, it is discarded or reset back to its default and not stored in a database. Answer: (d)
  • 36. 36
  • 40. 40 • VIRUS: Vital Information Resource Under Siege. • A piece of software that infects programs (Modify, Delete) • Replicates itself. • Easily spread from one software / file to another • Viruses are copied itself and attached itself to other programs which further spread the infection. • The virus can affect or attack any part of the computer software such as: Boot block Files, Operating systems, Application program Answer: (b)
  • 41. 41 EFFECTS OF VIRUS Depending on the types of virus their effects on the computer are: • Destroy all data on your local disk. • Slow down your computer performance. • Monitor what are you doing. • Download illegal files onto your computer without being able to delete them. • Generates IP address randomly and sends those IP address automatically. • Steal confidential information like password, account number, credit card information by random e-mailing. • May increase or decrease memory size. • Display different types of error messages. • Alter PC settings. • Cause computer to make strange noises make music, clicking noises or beeps.
  • 42. 42 Ctrl + C – Copy Ctrl + E - Center text Ctrl + F - NavPaneSearch Ctrl + X - Cut Answer: (b)
  • 43. 43 Ctrl+0 Toggles 6pts of spacing before a paragraph. Ctrl+A Select all contents of the page. Ctrl+B Bold highlighted selection. Ctrl+C Copy selected text. Ctrl+D Open the font preferences window. Ctrl+E Aligns the line or selected text to the center of the screen. Ctrl+F Open find box. Ctrl+I Italic highlighted selection. Ctrl+J Aligns the selected text or line to justify the screen. Ctrl+K Insert a hyperlink. Ctrl+L Aligns the line or selected text to the left of the screen. Ctrl+M Indent the paragraph. Ctrl+N Opens new, blank document window. Ctrl+O Opens the dialog box or page for selecting a file to open. Ctrl+P Open the print window. Ctrl+R Aligns the line or selected text to the right of the screen. Ctrl+S Save the open document. Like Shift+F12.
  • 44. 44 Alt, F, A Save the document under a different file name. Ctrl+T Create a hanging indent. Ctrl+U Underline the selected text. Ctrl+V Paste. Ctrl+W Close the currently open document. Ctrl+X Cut selected text. Ctrl+Y Redo the last action performed. Ctrl+Z Undo last action.
  • 46. 46
  • 47. 47 What is inode number in Linux • Inode number also called index number, it consists following attributes. • File types ( executable, block special etc ) • Permissions ( read, write etc ) • UID ( Owner ) • GID ( Group ) • FileSize • Time stamps including last access, last modification and last inode number change. • File deletion time • Number of links ( soft/hard ) • Location of ile on harddisk. • Some other metadata about file. Answer: (d)