ca pyq

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 1
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

S. No Topics Page No

1. RRB PO Mains 2023 Memory Based Paper 02

2. RRB PO Mains 2022 Memory Based Paper 08

3. RRB PO Mains 2021 Memory Based Paper 16

4. RRB PO Mains 2020 Memory Based Paper 25

RRB PO Mains 2023

1. Which of the following memory speed is fast? number 8 at the base, like 512 8 , 56 8 , etc.
a) RAM
b) ROM 3. Which one of the following is a Universal
c) HDD gate?
d) SDD a) AND
e) All the above b) OR
Ans: A c) NAND
d) NOT
2. What is the base of an Octal number? e) XOR
a) 8 Ans: C
b) 2 NAND and NOR gates are universal gates.
c) 10
d) 16 4. Which of the following shortcut keys is used
e) 6 to justify the text in MS Word?
Ans: A a) Ctrl+ D
A number system with base 8 is called an octal b) Ctrl+ E
number system. The position of every digit has a c) Ctrl+ H
value which is a power of 8. A number in the d) Ctrl+ J
octal number system is represented with the e) Ctrl+ Z

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 2
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Ans: D Ans: B
You can use the keyboard shortcut, Ctrl + J to Excel has a unique button called “Merge
justify your text. &Center,” which is used to merge two or more
different cells.
5. The IP address 25.6.64.68 belongs to which
class? 8. What is the shortcut key for help in MS Word?
a) Class A a) F5
b) Class B b) F10
c)Class C c) F1
d)Class D d) F2
e)Class E e) F11
Ans: A Ans: C
Shortcut key F1 to enable the Help window in
6. What is the shortcut key for the slide show MS word.
from first slide?
a)F5 9. Disk Defragmentation, also known as
b) Shift + F5 defragging or defrag, is the process of
c) Alt + F5 rearranging the data on a storage medium, such
d) F10 as a hard disk drive (HDD), for efficient storage
e) Ctrl+ F5 and access. This is an example of which type of
Ans: a software?
Keyboard Shortcut Function F5 Start a slide a) System Software
presentation from the beginning b) Application software
c) Utility software
7. What is the purpose of the Merge and Centre d) Both a and b
feature in MS- Excel? e) Both a and c
a) It joins two words from two cells Ans: C
b) It combines two cells into one cell DiskDefragmentation, also known as defragging
c) It adds numeric values from two cells or defrag, is the process of rearranging the data
d) It calculates the total of a range of cells on a storage medium, such as a hard disk drive
e) Other than the given options (HDD), for efficient storage and access.This is

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 3
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

an example of Utility software. e) None of the above


Ans: A
10. Which generation of computers uses a Real- The IP protocol identifies each computer
time operating system? connected to the network by its corresponding
a) 1st address. This address is a 32-bit number in
b) 2nd Ipv4, that has to be unique for each server or
c) 3rd computer, which we will call “host”.
d) 4th
e) 5th 13. What is the total number of alphabets in the
Ans: D hexadecimal system?
Time sharing, Real-time, Networks, and a) 6
Distributed Operating System were used in the b) 8
4th generation of computing. c) 16
d) 7
11. Which of the following is an example of non- e) 9
impact printer? Ans: A
a) Daisy Wheel Hexadecimal numbers have 16 symbols or
b)Ink-jet digital values, i.e 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B,
c) Dot matrix C, D, E, F. A, B, C, D, E, F are single bit
d) Chain printer representations of 10, 11, 12, 13, 14 and 15
e) None of the above respectively.
Ans: B
Laser printers, Inkjet printers and Thermal 14. What is the formula for adding cells A1 and
printers are some examples of Non-Impact A2 in excel?
printers. a) =SUM(A1,A2)
b)=SUMA1:A2)
12. What is the size of IPv4? c)=SUM(A1:A2)
a) 32 bits d)=SUM(A1+A2)
b) 64 bits e) None of the above
c) 48 bits Ans: C
d) 128 bits

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 4
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

15. A network interface card (NIC) is a hardware sign (=).


component, typically a circuit board or chip,
installed on a computer so it can connect to a 17. What is the shortcut key for Centre
network and is also a unique address. What is Alignment?
its size of address? a) Ctrl+ D
a) 32 bits b) Ctrl+ E
b) 64 bits c) Ctrl+ H
c) 48 bits d) Ctrl+ J
d) 128 bits e) Ctrl+ Z
e) None of the above Ans: B
Ans: C You can also center-align your text with the
A network interface card (NIC) is a hardware shortcut Ctrl+E (Cmnd+E).
component, typically a circuit board or chip,
installed on a computer so it can connect to a 18. What is the first cell of an Excel?
network. It implements the physical layer a) A!
circuitry necessary for communicating with a b) A1
data link layer standard, such as Ethernet or Wi- c) A
Fi.A data link address is a unique, permanent d) 1A
48-bit number assigned by the manufacturer to e) 11
a network interface card (NIC) which connects a Ans: B
device to the network. The first cell in a Microsoft Excel spreadsheet is
named "A1". This cell is located at the
16. In Excel, always the formula starts with the intersection of column "A" and row "1".
_____________ symbol.
a) * 19. What is the shortcut key to go to the next
b) = available workbook in Microsoft Excel?
c)& a) Shift + F6
d) # b) Alt + F6
e) ~ c) F6
Ans: B d) Ctrl+ F4
A formula in Excelalways begins with an equal e) Shift +F4

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 5
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Ans: A c) Shift+F8
Shift+F6 switches between the worksheet, d) Ctrl+Shift+F4
Zoom controls, task pane, and ribbon. Ctrl+F6 e) F8
switches to the next workbook window when Ans: B
more than one workbook window is open. If the Developer tab is not added to your Excel
ribbon, press Alt + F8 to open the Macro dialog.
20. In which tab is the citation available in
Excel? 23. Which of the following software is
a) Home substituted for hardware and stored in ROM?
b) Insert a) Middleware
c) Reference b) Firmware
d) Data c) Package Software
e) Table format d) Application Software
Ans: C e) Synchronous Software
Ans: B
21. Which of the following tools is used for Firmware is a software program or set of
preventing copyright in Ms-Word? instructions programmed on a hardware device.
a) Watermark It is typically stored in the flash ROM of a
b) Tab hardware device.
c) Optimisation
d) SE 24. What is the full form of GIF?
e)None of the above a)Graphics Interchange Format
Ans: A b) Geological Information Format
Watermarks can be used to protect confidential c) Geography Information Form
information, copyrightprevention and to indicate d) Graphics Information Format
the validity of a legal document. e) Get Information Format
Ans: A
22. What is the shortcut key for Macro in MS- The full form of GIF is Graphics Interchange
Excel? Format.The Graphics Interchange Format is a
a) Ctrl+ F5 bitmap image format that was developed by a
b) Alt+ F8 team at the online services provider

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 6
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

CompuServe led by American computer e)Adware


scientist Steve Wilhite and released on June 15, Ans: A
1987 Phishing is a common type of cyber attack that
targets individuals through email, text
25. What is the main function of the Control messages, phone calls, and other forms of
Unit? communication.
a)controls data flow inside the processor
b)coordinates the sequence of data movements 27. Which of the following Operating system is
c)interprets instructions not developed by Microsoft ?
d)receives external instructions or commands a) Windows XP
which it converts to sequence of control signals. b) Windows 8
e) All the above c) Windows 9
Ans: A d) Windows 10
Functions of the Control Unit e) None of the above
• It coordinates the sequence of data Ans: C
movements into, out of, and between a Windows 9 is not developed by Microsoft which
processor's many sub-units. is not a version of Microsoft.Microsoft versions
• It interprets instructions. are Windows NT , Windows 95, Windows
• It controls data flow inside the processor. 2000,Windows XP , Windows Vista , Windows 7
• It receives external instructions or , Windows 8 and Windows 10
commands which it converts to a
sequence of control signals. 28. What is the shortcut To insert a page break
in MS-WORD ?
26. Which of the following is a common type of a) Alt + Tab
cyber-attack that targets individuals through b) Ctrl + E
email, text messages, phone calls, and other c) Ctrl + P
forms of communication? d) Ctrl + Enter
a) Phishing e) Alt + Enter
b) Malware Ans: D
c) Spamming To insert a page break, use the shortcut Ctrl +
d) Scam Enter, or go to the Insert tab and select “Page

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 7
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Break” from the Pages group. 30. Which of the following is not a computer
language?
29. Which of the following is correct ? a)Unix
a) 1 MB =1024 bits b) Java
b) 1TB = 1024 KB c) C++
c) 1 GB = 1024 MB d) COBAL
d) 1 Byte = 8 KB e) HTML
e) All the above is correct Ans: A
Ans: C UNIX is an Operating system while all others are
1 MB = 1024 KB computer languages
1TB = 1024 GB
1 GB= 1024 MB
1 KB = 1024 Bytes

RRB PO Mains 2022

1. A self-replicating program or software is a) Unicasts


which of the following? b) Broadcasts
a) VIRUS c) Hosts
b) Worm d) Multicasts
c) Trojan e) Anycasts
d) Logic bomb Ans. B
e) Spam A hub is a device/node that broadcasts data to
Ans: B every computer connected to it.
A worm is standalone software that does not
require a host program or human help to 3. The shortcut key for continuously switching
propagate. between your tabs is _____
a) Alt + Tab
2. A network hub is a node that __________ data b) Ctrl + Tab
to every computer or Ethernet- based device c) Shift + Tab
connected to it. d) Alt + Tab

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 8
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

e) None of these d) Worm


Ans. b. Ctrl + Tab e) Spam
Ans: C
4. Which among these which is not a browser? Spyware is a type of malware installed on
a) Chrome computers that collects information about users
b) Brave without their knowledge. The presence of
c) Safari spyware is typically hidden from the user and
d) Mozilla can be difficult to detect.
e) All of these
Ans: E 7. Which of the following is the interface/ port
All the above-mentioned are web browsers used to connect a printer to a computer?
a) VGA
5. The first web-based email service which was b) None of these
founded in 1996 was ____ c) Serial
a) Zeroth mail d) Parallel
b) Hotmail e) All the above
c) Gmail Ans: D
d) Apple mail Parallel ports are used to connect a printer to a
e) Edison mail computer, whereas the Serial ports are used to
Ans: B connect the Keyboard, Mouse and other
Founded in 1996 by Sabeer Bhatia and Jack peripheral devices to the computer. Currently,
Smith as Hotmail, is now known as Outlook and both these have been replaced by USB ports.
is now available in the Microsoft office suit.
8. Green Line and Red Line are used in MS-
6. The type of malware that hides on your Word to indicate which of the following errors
device and secretly records the information and respectively?
tracks your online activity and personal records a) Grammatical & Misspelling
is _________ b) Contextual & Article
a) Virus c) Misspelling & Grammatical
b) Trojan d) Grammatical & Historical
c) Spyware e) None of these

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 9
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Ans: A a) Clipboard
Grammatical & Misspelling b) Font
c) Chart
9. Spelling, Grammar and Thesaurus are found d) Alignment
under which tab in MS Word 2019? e) Workbook Views
a) Home Ans: C
b) Review The chart option is available under the Insert
c) Reference tab. The rest are available in Home and View
d) View tabs.
e) Edit
Ans: B 12. Reverse Proxy protects the Server from
______
10. A/an ______ is an electronic signal that is a) External attacks like VIRUS, WORM,
generated from an external hardware device RANSOMWARE
indicating it needs special attention from the b) Hardware failures
OS? c) Software failures
a) Trigger Signal d) External natural disasters
b) Query e) None of these
c) Short signalling Ans: A
d) Interrupt Reverse Proxy protects the server from external
e) trap threats like Virus, Worm and ransomware.
Ans: D Reverse proxies are typically implemented to
An interrupt is a signal emitted by a device help increase security, performance, and
attached to a computer or from a program within reliability.
the computer. It requires the operating system
(OS) to stop and figure out what to do next. An 13. An application of Computer science used to
interrupt temporarily stops or terminates a provide data about biological systems is called?
service or a current process. a) Biosphere
b) Biotechnology
11. The Insert tab has which of the following c) Bioinformatics
options available in MS Excel? d) Bioengineering

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 10
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

e) Biogeotechnology
Ans: C 16. Which email protocol is used to send
Bioinformatics. Bioinformatics is defined as the /forward messages and which protocol is used
application of tools of computation and analysis for receiving messages respectively?
to the capture and interpretation of biological a) SMTP & POP3
data. b) POP3 and PING
c) POP3 and SMTP
14. What does FDISK do? d) FTP & IMAP
a) performs low-level formatting of the hard drive e) None of these
b) fixes bad sectors on the hard drive Ans: A
c) recovers lost clusters on the hard drive SMTP & POP3. POP3 is used for receiving and
d) creates partitions on the hard drive SMTP is used for transmitting or sending
e) None of these messages. MIME is used for attaching files.
Ans: D
It creates partitions on the hard drive 17. In MS- PowerPoint, by default there are how
many placeholders in the slides?
15. A computer program that automatically a) 1
searches web pages based on certain keywords b) 2
is called? c) 3
a) Web Data Store d) 4
b) Web Play Store e) 5
c) Browser Ans: B
d) Search Engine One for title and the other for text. There are
e) Web Crawler two types of placeholders that appear on slides.
Ans: E The Single object placeholder is used to insert a
A web crawler, crawler or web spider, is a specific object and the multiple object
computer program that's used to search and placeholders can be used to insert a range of
automatically index website content and other different objects.
information over the internet. These programs,
or bots, are most commonly used to create 18. The 3rd Generation computer is ____
entries for a search engine index a) UNIVAC

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 11
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

b) PASCAL
c) PDP 11 21. Which of the following are the applications of
d) Honeywell 6000 an Operating System?
e) EDBIC a) File Management
Ans: D b) Context Switching
c) Both a & b
19. Among the following identify the OS that is d) Managing network packets
the fastest e) None of these
a) Real time OS Ans: C
b) Distributed OS An OS does both Context Switching and
c) Time Sharing OS Managing the File System
d) Homogenous OS 22. Which command displays directories as well
e) None of these as subdirectories also in MSDOS?
Ans: B a) DIR/All
Distributed OS. Among these Distributed OS is b) DIR/AN
the fastest. c) DIR/DS
d) DIR/S
20. Select the correct algorithm used for paging e) None of these
in memory management Ans: D
a) Belady’s Anomaly The dir command displays a list of files and
b) Travelling Salesman subdirectories in a directory. With the /S option,
c) FCFS it recurses (execute a procedure recursively)
d) Page Replacement subdirectories and lists their contents as well.
e) Round Robin
Ans: D 23. Full form of CMOS is
Page replacement happens when a requested a) Complimentary Metal-Oxide Semiconductor
page is not in memory (page fault) and a free b) Coupling Metal-Oxide Semiconductor
page cannot be used to satisfy the allocation, c) Complimentary Metal-Oxide System
either because there are none, or because the d) Converting Metal-Oxide Semiconductor
number of free pages is lower than some e) ComplimentaryMetal-Operating
threshold. Semiconductor

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 12
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Ans: A e) Both c & d


Complimentary Metal-Oxide Semiconductor Ans: B

24. The very first high-level language introduced 27. A software which is freely available to
in computer was ______________. download but the source code in it can’t be
a) C modified or changed is called __?
b) PASCAL a) Open Source
c) JAVA b) Closed Source
d) COBOL c) GITHUB
e) None of these d) Freeware
Ans: E e) Malware
The first HLL introduced was FORTRAN Ans: D
(Formula Translation) Unlike with free and open-source software,
which are also often distributed free of charge,
25. In a super type/subtype hierarchy, each the source code for freeware is typically not
subtype has? made available.
a) Only one super type
b) Many super types 28. Category 6 or CAT6 Ethernet cable colour
c) At most two super types standards are Red, Blue, Yellow, White, Grey
d) At least one subtype and Black. What does the Bluecolour identify?
e) Not at all a) VOIP connection
Ans: A b) Network Connectivity
In a super type/sub-type hierarchy, each sub- c) Equipment in workstation
type has only one super type d) Jumpers
e) Receivers
26. Consider the URL given“www.XYZ.com” Ans: B
What does the “.com” represent. Network Connectivity. The Blue coloured cable
a) Communication denotes Network Connectivity.
b) Commercial
c) Committee 29. TCP port number 443 is used by __
d) Company a) TELNET

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 13
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

b) HTTP the computer networking industry, a token is a


c) HTTPS data frame that is transmitted between network
d) DHCP points on a token ring network.
e) SQL SERVER 32. In MS-Excel, to insert the sum formula,
Ans: C which function do we implement?
HTTPS uses port 443, DHCP uses 67 and 68. a) =sum(cell range)
Whereas HTTP uses 80 and SQL Server uses b) =sum(add the values)
1433 port number. TELNET- 23 c) =add(cell range)
d) =sum(add integers only)
30. The shortcut key to apply date formatting in e) None of these
day, month and year in MS Excel is? Ans: A
a) Ctrl + Shift + # =sum(cell range) Example =sum(A1:A10).
b) Ctrl + Shift + Spacebar Keyboard shortcut- Alt +=
c) Ctrl + Down arrow
d) All are possible 33. The technology used in Bitcoin is ___
e) None of these a) Blockchain
Ans: A b) Artificial Intelligence
c) Machine Learning
31. Which of the following is not a number d) UPI
system? e) RFID
a) Buffer Ans: A
b) Token Blockchain is the technology that enables the
c) Binary existence of cryptocurrency (among other
d) Octal things). Bitcoin is the name of the best-known
e) Both a & b cryptocurrency, the one for which blockchain
Ans: E technology, as we currently know it, was
Both Buffer and Token do not represent a created.
number system. A buffer is a storage device
used to compensate for a difference in rate of 34. Pokémon GO, the infamous game uses
data flow, or time of occurrence of events, when __________________.
transmitting data from one device to another. In a) Core 3

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 14
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

b) Dual Core the ____ menu in MS Excel 2019


c) Octal Core a) Home
d) Augmented Reality b) View
e) Console c) Insert
Ans: D d) Format
Pokémon Go (stylized as Pokémon GO) is a e) None of these
2016 augmented reality (AR) mobile game, part Ans: E
of the Pokémon franchise, developed and The Show/hide gridlines are available in Page
published by Niantic in collaboration with Layout
Nintendo and The Pokémon Company for iOS
and Android devices 38. Which of the following is a software program
that is written to a hardware device?
35. The full form of ISA is? a) Ransomware
a) Information System Architecture b) Middleware
b) Instruction Set Architecture c) Firmware
c) Image System Augmentation d) All of these
d) International Study of Computer Architecture e) None of these
e) None of these Ans: C
Ans: B Firmware is a software program that is written to
a hardware device. It allows the hardware to be
36. In an MS-Excel Worksheet. How many updated. The contents are saved when a
possible hyperlinks are possible? hardware device is turned off or loses its
a) 65529 external power source.
b) 65531
c) 65530 39. Which one is a set of layered protocols used
d) 65535 for communication over the Internet?
e) 75530 a) Point to Point Protocol
Ans: C b) File Transfer Protocol
65530. The shortcut to add a hyperlink is Ctrl + c) Transmission Control Protocol
K d) All of these
37. Show/hide Gridlines option is available in e) None of these

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 15
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Ans: C d) Command box


The Transmission Control Protocol i.e. TCP/IP is e) None of these
a set of layered protocols used for Ans: C
communication over the Internet. A dialog box is a temporary window an
application creates to retrieve user input. An
40. When we perform certain operations on our application typically uses dialog boxes to prompt
document and click the close button without the user for additional information for menu
saving it, then____ appears on the screen. items.
a) Alert box
b) Prompt box
c) Dialog box

RRB PO Mains 2021

1. A computer program that records every


keystroke made by a computer user, especially 2. Which of the following is not a programming
in order to gain fraudulent access to passwords language?
and other confidential information is called a) C
a) Screen Recorder b) C++
b) Keylogger c) FORTRAN
c) Lightstroke Reader c) BASIC
d) Key Capture e) Solaris
e) Malwares Ans: E
Ans: B Solaris is an enterprise Operating system for
A keylogger, sometimes called a keystroke Oracle Database and Java applications. Rest all
logger or keyboard capture, is a type of are programming languages.
surveillance technology used to monitor and
record each keystroke on a specific computer. In 3. The situation of having an identical piece of
an alternative way, Keyloggers are a particularly data stored in two different locations is known
insidious type of spyware that can record and as __________ and is created by databases or
steal consecutive keystrokes (and much more) other data storage technologies.
that the user enters on a device a) Data Encapsulation

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 16
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

b) Data Abstraction generation: 1959-1965. Transistor based.


c) Data Redundancy c) Third Generation The period of third
d) Data Polymorphism generation: 1965-1971. Integrated Circuit based.
e) Data Duplication d) Fourth Generation The period of fourth
Ans: C generation: 1971-1980. VLSI microprocessor
Data redundancy occurs when the same piece based.
of data exists in multiple places, whereas data e) All are correct
inconsistency is when the same data exists in Ans: E
different formats in multiple tables.
Unfortunately, data redundancy can cause data 6. Which OSI layer specifies how two devices
inconsistency, which can provide a company should compress, encrypt, and encode data so
with unreliable and/or meaningless information. it may be successfully received on the other
end?
4. Which Script enabled the production of client- a) Application Layer
side dynamic web pages executed in the client's b) Network Layer
browser? c) Data-link Layer
a) PHP d) Physical Layer
b) Java Script e) Presentation Layer
c) Ruby Ans: E
d) Bash
e) Python 7. Alt, Ctrl are __________ keys.
Ans: B a) Stroke Keys
JavaScript enables the production of client-side b) Lock Keys
dynamic web pages, with the JavaScript code c) Candidate Keys
executed in the client's browser. d) Shortcut Keys
e) Modifier Keys
5. Which of the following is invalid Statement Ans: E
regarding generation of computer? A modifier key is a keyboard key that can only
a) First Generation The period of first be used in conjunction with another key when
generation: 1946-1959. Vacuum tube based. using a computer. Ctrl, Alt, and Shift are the
b) Second Generation The period of second modifier keys on a typical modern keyboard

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 17
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

prevents ___________________
8. Which of the following forms of transmission a) Access to internetwork files
occurs during walkie-talkie communication? b) Access to intranetwork files
a) Simplex c) Access to files from public IP addresses
b) Full —Duplex d) Access to logic bomb files
c) Half-Duplex e) Unauthorized access to a network
d) Online Ans: E
e) None of these A firewall is essential software or firmware in
Ans: C network security that is used to prevent
In half-duplex mode, both the transmitter and unauthorized access to a network. It inspects
receiver transmit and receive, but not at the incoming and outgoing traffic using a set of
same time. When one of them is sending, the security rules to identify and block threats.
other can only receive, and vice versa. Example:
Walkie-talkie in which message is sent one at a 11. The BIOS settings are stored in the
time and messages are sent in both directions. ____________ chip which is kept powered up via
the battery on the motherboard
9. In which type of disc the data can be written a) EPROM
only once and cannot be erased? b) UEFI
a) CD-RW/DVD-RW c) PMOS
b) BD-R d) CMOS
c) DVD-ROM/CD-ROM e) None of these
d) HD-DVD Ans: D
e) CD-R/DVD-R BIOS, or Basic Input/Output System, is software
Ans: E stored on a small memory chip, also known as
With CD-R discs, you can only write to them firmware. BIOS is found on the motherboard,
once, but you can read from them repeatedly. and it is the very first software to run after a
You can write to CD-RW discs numerous times computer starts. Generally, the terms BIOS and
and read content from them an infinite number CMOS are used interchangeably. A BIOS chip
of times. in a motherboard contains the program
(firmware commonly called BIOS) to boot the
10. A firewall is software or firmware that computer. A CMOS chip stores the settings like

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 18
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

date & time, fan speed, booting sequence. The Ans: E


CMOS is also a chip on the motherboard but is A compiler is a special program that translates a
a RAM chip with volatile memory which stores programming language's source code into
information about the computer components and machine code, bytecode or another
their settings programming language. The source code is
typically written in a high-level, human-readable
12. Simple Mail Transfer Protocol (SMTP) language such as Java or C++.
Protocol is used for sending or receiving
__________. 14. ___________ refers to the gap between
a) Source Code demographics and regions that have access to
b) Object Files modern information and communications
c) Executable Files technology, and those that don't or have
d) .info files restricted access.
e) e-mail between e-mail clients and servers a) SMPS
Ans: E b) Virtual Data Drive
The Simple Mail Transfer Protocol (SMTP) is c) Circuit Switching
used for sending and receiving e-mail between d) Analog Divide
e-mail clients and servers. When an SMTP e) Digital Divide
server receives an e-mail from a mail client, the Ans: E
SMTP server will then check the MX records for The digital divide is a term that refers to the gap
the domain in the e-mail address in order to between demographics and regions that have
exchange the mail with the remote SMTP access to modern information and
server. communications technology (ICT), and those
that don't or have restricted access.
13. Which of the following convert high level
language to low level language? 15. Which shortcut key is used to start a
a) Loader presentation from the beginning?
b) Linker a) F12
c) Editor b) F1
d) Assembler c) Shift + F9
e) Compiler d) Ctrl+ F2

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 19
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

e) F5 a) Cache memory is a form of Read Only


Ans: E Memory (ROM)
b) It is directly associated with the
16. Which of the following malicious program do microprocessor.
not replicate automatically? c) Cache memory can be accessed much faster
a) Virus by a microprocessor in comparison to a RAM.
b) Worm d) Cache memory is sometimes called CPU
c) Zombie memory.
d) Logic bomb e) All of these
e) Trojan horse Virus Ans: A
Ans: E Cache Memory is a form of Read Only Memory
Until a user executes the Trojan it can’t replicate (ROM) is not true about cache memory
itself.
19. Which tool do you choose in PowerPoint to
17. USB and Various Ports are controlled by apply a transition to the current slide?
______________. a) View
a) Serial Ports b) Review
b) SATA c) SlideShow
c) PATA d) Transition
d) South Bridge of Motherboard e) Animation
e) None of these Ans: D
Ans: D On the Transitions tab, under Transition to This
The Southbridge is one of the two chips in the Slide, click the transition that you want to apply.
core logic chipset on a personal computer (PC) To change to a different variation of the
motherboard. The Southbridge typically transition, such as the direction it moves on the
implements the slower capabilities of the screen, click Effect Options, and then select the
motherboard in Northbridge/Southbridge chipset variation you want
computer architecture.
20. A modem ___________________
18. Which of the following statements is not true a) Translates analog signals from a computer
about cache memory? into digital signals that can travel along

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 20
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

conventional telephone lines. Ans: D


b) Translates digitals signals from a computer Between white and black are grey hat hackers.
into analog signals that can travel along Grey hat hackers enact a blend of both black hat
conventional telephone lines. and white hat activities. Grey hat hackers often
c) Demodulates digital signals from a computer. look for vulnerabilities in a system without the
d) Modulates signals from an analog telephone owner's permission or knowledge.
life
e) None of These 23. What is the term used for the time during
Ans: B which a job is processed by the system?
A Modem translates digitals signals from a a) Turnaround time
computer into analog signals that can travel b) Scheduling time
along conventional telephone lines c) Waiting time
d) Job time
21. What are the steps involved in animating an e) Execution Time/ CPU time
element/text in power point presentation? Ans: E
a)Text/Element>AnimationTab>animation>effect Burst time, also referred to as “execution time”.
. It is the amount of CPU time the process
b)Text/Element>SlideShow>animation>effect. requires to complete its execution. It is the
c)Text/Element>Review>animation>effect. amount of processing time required by a
d)Text/Element>View>animation>effecte) None process to execute a specific task or unit of a
of these job.
Ans: A
Text/Element>AnimationTab>animation>effect. 24. Which of the following CD technologies is
also WORM technology?
22. The combination of White Hat and Black Hat a) CD-RW
hackers are _________. b) CD-Photo/Photo CD
a) Jailbreakers c) CD-I (Compact Disc Interactive
b) Hackers d) CD-R
c) Crackers e) None of these
d) Grey Hat Hacker Ans: D
e) None of these Compact Disc-Recordable (CD-R) technology is

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 21
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

known as Write Once-Read Many (WORM) c) 32-bit


technology as data once written on these discs d) 64-bit
cannot be erased. e) None of these
Ans: C
25. A ______________ is a CPU register in the
computer processor which has the address of 28. ________________ is the supply of computer
the next instruction to be executed from services like data storage, servers, and
memory. databases through the Internet.
a) Memory Pointer a) IoT
b) File Pointer b) Blockchain
c) Data Pointer c) ICT
d) Instruction Pointer d) ISA
e) Program Counter (PC) e) Cloud computing is the supply of computer
Ans: E services like data storage, servers, and
The program counter, PC, is a special-purpose databases through the Internet.
register that is used by the processor to hold the Ans: E
address of the next instruction to be executed Cloud computing is on-demand access, via the
internet, to computing resources—applications,
26. What does AB8 means in Excel? servers (physical servers and virtual servers),
a) Row AB Column 8 data storage, development tools, networking
b) Row A Cell B Column 8 capabilities, and more—hosted at a remote data
c) All are possible rendition center managed by a cloud services provider (or
d) None of these CSP).
e) Column AB and Row 8
Ans: E 29. What is the other name of URL?
AB8 in MS- Excel means Column AB and Row a) Subset Web address
number 8 b) Superset Web address
c) Archive site
27. What is the size of IPv4? d) Index page address
a) 38-bit e) Web Address
b) 16-bit Ans: E

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 22
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

URL or the uniform resource locator is the other b) Ctrl+F


name of the Website Address c) Ctrl+T
d) Alt+F2
30. Which of the following is a very high-speed e) Alt+H
semiconductor memory which can speed up the Ans: E
CPU?
a) Primary Memory 33. Ctrl + B Shortcut key is used to _______
b) Optical Disk a) Add a hyperlink
c) SSD b) Make selection italic
d) Secondary Memory c) Make selection Superscript
e) Cache Memory d) Make selection Subscript
Ans: E e) Make Selection Bold
Cache memory is a very high-speed Ans: D
semiconductor memory which can speed up the
CPU. Cache memory acts as a buffer between 34. Convert (10101110)2 into Hexadecimal.
the main memory and the CPU. It holds the a) AC
most frequently used part of the program and b) FD
data. c) AE
d) CD
31. Which of the following is not a valid form of e) AB
Memory? Ans: C
a) ROM 10101110 to decimal equals to 174. Then
b) FORM convert (174)10 to Hexadecimal, i.eAE
c) PROM
d) EPROM 35. Convert (010111010)2 into Octal
e) None of these a) 287
Ans: B b) 256
c) 254
32. Which shortcut key is used to go to Home in d) 298
MS-Excel ? e) 272
a) Alt+A Ans: E

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 23
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

010 111 010. Grouping them into three’s. 2 7 Laser printers, Inkjet printers and Thermal
2 printers are some examples of Non-Impact
printers.
36. When a user try to access a resource on a
web server (usually a web page) that doesn't 38. Which of the following keyboard key is used
exist, which type of Error exist that time? in a Microsoft PowerPoint presentation to select
a) HTTP Error 505 one hyperlink after another during a slide
b) HTTP Error 302 presentation?
c) HTTP Error 405 a) Shift+O
d) HTTP Error 403 b) Ctrl+P
e) HTTP Error 404 c) Alt+H
Ans: E d) F1
The Web server returns the HTTP 404 - File not e) Tab
found error message when it cannot retrieve the Ans: E
page that was requested. The following are
some common causes of this error message: 39. Flash memory is a non-volatile computer
The requested file has been renamed. The storage chip made up of __________________.
requested file has been moved to another a) DROM
location and/or deleted. b) MROM
c) PROM
37. Inkjet printers and laser printers are d) EPROM
examples of ____ printers. e) EEPROM
a) Impact Printers Ans: E
b) Semi-impact Printers EEPROM is the acronym of electrically erasable
c) Hashed out Printers programmable read-only memory, EEPROM is a
d) Priority Printers Programmable ROM that can be erased and
e) Non-Impact reprogrammed using an electrical charge. It was
Ans: E first was developed by George Perlegos. It
Non-impact printers create pictures, characters, allows the user to update the computer BIOS
and figures without any uninterrupted contact without having to open the computer or remove
between the printing device and the paper. any chips.

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 24
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

In this network, topology nodes are connected to


40. In which network every host is connected to a central hub. Nodes communicate across the
a central hub? network by passing data through the hub.
a) Bus topology Failure in one of the terminals does not affect
b) Mesh topology any other terminal. This network topology is
c) Ring topology used to connect terminals to a large time-
d) Hybrid topology sharing host computer.
e) Star topology
Ans: E

RRB PO Mains 2020

1. How does the cache memory act between the d) 4


CPU and the RAM? It acts a e) 3
a) Stack Ans: D
b) Queue
c) Buffer 3. Who developed/invented the 1st GUI?
d) Heap a) Adobe
e) None of the above b) Xerox PARC
Ans: C c) Apple
Cache memory is a very high speed d) Microsoft
semiconductor memory which can speed up the e) None of these
processor or CPU. It acts as a buffer between Ans: B
the CPU and main memory (RAM). It is used to GUI was first developed at Xerox PARC by Alan
hold those parts of data and program which are Kay, Larry Tesler, Dan Ingalls, David Smith,
most frequently used by CPU. Clarence Ellis and a number of other
researchers. This was introduced in the
2. How many layers are there in the TCP/IP Smalltalk programming environment.
protocol suite?
a) 5 4. Which browser is an inbuilt browser in
b) 6 windows?
c) 7 a) Internet explorer

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 25
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

b) Google chrome e) Ctrl + 1


c) Netscape Ans: C
d) Firefox
e) None of these 8. Word processing, Spreadsheet, and Google
Ans: A chrome are examples of ___
a) Application Software
5. Which one of the following is not a social b) Operating system software
networking site? c) System Software
a) Facebook d) Device drivers
b) Notebook e) None of these
c) LinkedIn Ans: A
d) Twitter
e) All of the above 9. A Keyboard, other than being an input device
Ans: C is a _____
a) Touch device
6. What is the decimal equivalent of the binary b) DAG converter
addition of 1010 and 0101? c) Terminal
a) 15 d) Dumb Terminal
b) 20 e) None of these
c) 19 Ans: D
d) 14 A dumb terminal is a very simple device with
e) 21 very little processing power and features
Ans: A
1010 = 10 and 0101 = 5 10. The right procedure to add a water mark in
MS EXCEL
7. In MS Excel 2010, the shortcut key to apply or a) Insert > Header & Footer > Design tab on the
remove bold formatting is: ribbon >Picture
a) Ctrl + 4 b) Insert >Picture
b) Ctrl + 3 c) Insert > Header & Footer > Design tab on the
c) Ctrl + 2 ribbon >Picture
d) Ctrl + 5 d) Insert > Clip Art > Design tab on the ribbon

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 26
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

>Picture c) Programmable Shortest Path routing


e) Insert > Header & Footer > Smart Art d) VPN (Virtual Private Network)
>Picture e) None of these
Ans: A Ans: D
VPN is used to hide/change the IP Address
11. In MS- Word you can force a page break__
a) By positioning your cursor at the appropriate 14. Which among the following is NOT a search
place and pressing the F1 key engine in the internet?
b) By positioning your cursor at the appropriate a) Archie
place and pressing Ctrl + Enter b) Google
c) By using the Insert/section break c) Nexus
d) By changing the font size of your documents d) Microsoft Bing
e) None of these e) Yahoo!
Ans: B Ans: C

12. The Hard disk and the CD-ROM are 15. In MS — Excel, Insert Function are located
connected at the? on the__
a) BT Attachment a) Vertical scroll bar
b) SATA Attachment b) Horizontal scroll bar
c) AT Attachment c) Formula bar
d) IDC Attachment d) Standard toolbar
e) None of these e) None of these
Ans: C Ans: D
AT Attachment stands for advanced technology The standard toolbar contains the Insert
attachment, it is an interface that connects hard functions
drives, CD-ROM drives, and other drives.
16. MAC address is used for
13. Technique/ Technology used in hiding or de- a) Identifying the physical address of a device
routing the IP address is _______. on the same local network
a) Spoofing b) Identifying the logical address of a device on
b) OSPF routing the same local network

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 27
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

c) Block the access • Token bus LAN.


d) Permit the access • Wired LAN.
e) None of these • Wireless LAN.
Ans: A • Cloud-managed LAN
MAC address is used to identify the physical
whereas the IP address is used to identify the 19. Specialized programs that assist users in
logical address. locating information on the Web are called
____________-.
17. In Computer Networking, devices have two a) Information engines
kinds of addresses? b) Locator engines
a) IP-logical address & MAC – physical address c) Web browsers
b) IP- physical address & MAC – logical address d) Resource locators
c) Memory address & Serial port address e) Search Engine
d) Device driver address & Serial Bus address Ans: D
e) None of these
Ans: A 20. Which of the following search engines
continuously send out that starts on a
18. Which among the following are the correct homepage of a server and pursues all links step
LANs? wise?
a) Hybrid LANs a) Spiders
b) Star & Mesh LANs b) Packets
c) Client/Server LANs & peer-to-peer LANs c) Cookies
d) Address specified and non-specified LANs d) Paddle
e) None of these e) None of these
Ans: C Ans: A
Types of Local Area Network (LAN)
In a client-server LAN environment, a single 21. Which among the following computer
server connects to multiple devices known as program is used to browse websites?
clients. a) MS-Word
• Peer to Peer (P2P) LAN. b) FOXPRO
• Token ring LAN. c) UNIX

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 28
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

d) Mozilla 2003.
e) None of these
Ans: D 25. Mobile OS is a type of?
a) Real Time OS
22. A Discrete signal is also known as ______ b) Embedded OS
a) Digital Signal c) Multiuser OS
b) Analog Signal d) Branched OS
c) Fourier Signal e) None of these
d) None of these Ans: B
e) All of the above An embedded operating system is a specialized
Ans: A operating system (OS) designed to perform a
specific task for a device that is not a computer.
23. How can the slide show be repeated The main job of an embedded OS is to run the
continuously in MS-PPT? code that allows the device to do its job
a) loop continuously until ‘Esc’
b) repeat continuously 26. The correct steps to convert the MS Word
c) loop more doc file to PDF is _____
d) One by one a) Click on Save as > Type PDF
e) None b) Rename file with .pdf extension
Ans: A c) Rename file with PDF words in the name
d) All are valid
24. The oldest version of Windows from the e) None of these
following is? Ans: A
a) Windows Server 2003
b) Windows XP 27. Computers connected to a LAN can__
c) Windows 8 a) Run faster
d) Windows 7 b) Go on line
e) Windows 10 c) Share information and/or share peripheral
Ans: B equipment
Windows XP was introduced in the year 2001 d) E-mail
whereas Windows server was introduced in e) None of these

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 29
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

Ans: C Cookies are text files with small pieces of data


— like a username and password — that are
28. Which of the following is used as a used to identify your computer as you use a
surveying tool? computer network. Specific cookies known as
a) Google Sheets HTTP cookies are used to identify specific users
b) Google Docs and improve your web browsing experience.
c) Google Meet
d) Google Form 31. Which one of the following is not a property
e) None of these of a compact disc?
Ans: D a) Malleable
Google Forms is a survey administration b) Storing text files
software included as part of the free, web-based c) Storing video and audio files
Google Docs Editors suite offered by Google d) Storing pictures (.jpg,.png files)
e) None of these
29. Which of the following is NOT an Ans: A
accessories tool in a window 7 system? Other than malleable, all other are the properties
a) Paint of a CD. Malleable means having the property to
b) WordPad be hit or pressed without breaking
c) Notepad
d) MS SQL Server 32. Windows explorer is a program that is used
e) Snipping Tool to:
Ans: D a) Browse the internet
b) Navigate the files or folders in windows
30. The history of the website browsing details is operating system
stored in? c) Discover the number of window running in PC
a) Web Cookies d) Calculate how many application is running
b) URLs e) All of the above
c) Hard Disk Ans: B
d) Flash drives Windows explorer is used to navigate the files or
e) None of these folders in windows operating system
Ans: A 33. __is a small, portable flash memory card that

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 30
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

plugs into a computer’s USB port and functions Sequential Access is the ability to read or write
as a portable hard drive. each piece of information in a storage device in
a) CD-ROM approximately the same length of time
b) Flash drive regardless of its location
c) DVD-ROM
d) CD-RW 36. If a disk drive fails but the computer
e) All of these application running and using it can continue
Ans: B processing this application is said to have been
Flash driveis a small, portable flash memory designed with this feature.
card that plugs into a computer’s USB port and a) 100 percent uptime
functions as a portable hard drive b) Fault tolerance
c) High reliability
34. What kind of memory is both static and non- d) All of the above
volatile? e) None of these
a) BIOS Ans: B
b) CACHE If a disk drive fails but the computer application
c) RAM running and using it can continue processing
d) ROM this application is said to have been designed
e) All of the above with fault tolerance
Ans: D
37. Protecting data by copying it from the
35. The ability to read or write each piece of original source to a different destination is called
information in a storage device in approximately a) Formatting
the same length of timeregardless of its location b) Hacking
is__ c) Backup
a) Sequential Access d) Data diddling
b) Random Access e) None of these
c) Registerscan Ans: C
d) Linear Search
e) None of these 38. Cloud Storage can be defined as a virtual
Ans: A memory unit that allows users to create, update,

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 31
.

IBPS RRB PO Mains Memory Based Papers – Computer Awareness

delete and perform all manipulative operations Ans: B


on the data. The cloud storage is which type of Dr EF Codd represented 12 rules for relational
memory? database management system (RDBMS) in
a) Primary 1970.
b) Secondary
c) Cache 40. Which among the following software is not a
d) Cookie generated memory product of Microsoft?
e) None of these a) Open office
Ans: B b) Outlook
The cloud storage is a secondary memory c) Access
d) Visual studio express
39. Dr EF Codd represented _____ rules for e) Windows
relational database management system Ans: A
(RDBMS) in 1970 Open office, which is now discontinued, was a
a) 9 product developed by the Sun Microsystems in
b) 12 the late 90’s and then by Oracle corporation in
c) 14 the 2010s
d) 11
e) None of these

Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package

If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 32

You might also like