Rajasthan Informatics Assistant Questions

Vikram Singh6 months ago 1.2K Views Join Examsbookapp store google play
Rajasthan Informatics Assistant Questions
Q :  

How do you open a Search window from the Metro screen?

(A) Windows Key + S

(B) Click on the search tile

(C) Type the word search

(D) Window key + F


Correct Answer : A
Explanation :

To open a Search window from the Metro screen (also known as the Start screen) in Windows 8 and later versions, you can press the Windows Key + S keyboard shortcut. This will bring up the Search charm, allowing you to search for apps, files, settings, and other content on your computer.


Q :  

What is it called when more than one if-statement is used together?

(A) if-else statement

(B) nested statement

(C) more if statements

(D) None of the above


Correct Answer : B
Explanation :
Certainly! A nested if statement refers to an if statement that is placed inside another if statement or other control structures. It allows for more specific conditions and complex decision-making in a program. The inner if statement is only executed if the outer if statement's condition is true.



Q :  

Modification of the work done in a cell is called-

(A) Editing

(B) range

(C) fixing

(D) none of the above


Correct Answer : B
Explanation :

Actually, the modification of the work done in a cell in Excel is typically referred to as "editing" the cell, not "range." Editing a cell means changing or modifying the data or formula within that specific cell. A "range" in Excel refers to a group of two or more cells on a worksheet. When you edit a cell, you are making changes to the content of that particular cell.


Q :  

The extension of MS Excel's workbook or file is-

(A) .DOC

(B) .XLX

(C) .XLC

(D) .XLSX


Correct Answer : D

Q :  

With which of the following is the Break statement used?

(A) if Statement

(B) else if Statement

(C) Switch Statement

(D) None of these


Correct Answer : C
Explanation :
The break statement is used with loops (such as for and while loops) and switch statements in programming. In loops, it is used to exit the loop prematurely, while in a switch statement, it is used to exit the switch block after executing a specific case.



Q :  

The number of rows in Excel 2003 is ______.

(A) 65535

(B) 65536

(C) 65534

(D) 65533


Correct Answer : B
Explanation :

In Excel 2003, the number of rows is 65,536. Each worksheet in Excel 2003 consists of 65,536 rows and 256 columns.


Q :  

Delayed payload of some virus is called-

(A) Time

(B) Anti-virus

(C) Bomb

(D) None of the above


Correct Answer : C
Explanation :

 In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.


Q :  

What is virus that spreads in computer?

(A) It is hardware

(B) It is a computer program

(C) It is system software

(D) It is a windows tool


Correct Answer : B
Explanation :

a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.


Q :  

What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?

(A) Computer virus

(B) Phishing Scams

(C) Spyware Scams

(D) None of the above


Correct Answer : B
Explanation :
The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.



Q :  

When does Time Bomb happen?

(A) during a particular logic and data

(B) during a particular date or time

(C) during a particular time

(D) none of the above


Correct Answer : B
Explanation :

it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.


Showing page 3 of 3

    Choose from these tabs.

    You may also like

    About author

    Vikram Singh

    Providing knowledgable questions of Reasoning and Aptitude for the competitive exams.

    Read more articles

      Report Error: Rajasthan Informatics Assistant Questions

    Please Enter Message
    Error Reported Successfully