RBI Assisst Model solved question papers of English,General Awareness,Aptitude,Reasoning and computer knowledge questions with answers
Questions 1 to 5: Choose synonymous word
1. To surprise somebody greatly:
(a) Appraise
(b) Antonyms
(c) Astonish (Ans)
(d) Reveal
2. To make something more important that it really:
(a) Excess
(b) Elaborate
(c) Stress upon
(d) Exaggerate (Ans)
3. Express one’s opinion without evidence or full knowledge:
(a) Specify
(b) Speculate (Ans)
(c) Concede
(d) Sensing
4. An event that will happen soon:
(a) Imminent (Ans)
(b) Damnsure
(c) Immense
(d) Immutable
5. To lead somebody to do something:
(a) Persuade (Ans)
(b) Placate
(c) Persecute
(d) Perpend
Questions 6 to 9: Four words are given in each. Three of them can be grouped together applying a principle. One word does not belong to the group. Find it out.
6. (a) Violet
(b) Blue
(c) Magenda (Ans)
(d) Green
Ans :
► All the others colours present in rainbow.
7. (a) Cucumber
(b) Carrot (Ans)
(c) Brinjal
(d) Ladies finger
► It is a root vegetable.
8. (a) Yaswanth Sinha
(b)Jaswant Singh
(c) Shatrugnan Sinha (Ans)
(d) Manmohan Singh
► All others were Finance Ministers of India (d) Manmohan Singh can also be the answer as others were only union ministers
while Manmohan Singh is the Prime Minister.
9. (a) Cancel
(b) Nullify
(c) Void
(d) Confirm
Questions 10 to 13: Three words are given. There is a relationship between the first two words. Select a word that expresses a similar relationship with the third word from the given alternatives.
10. Pather Panjali : Sathyajith Ray; Athithi :
(a) K.P. Kumaran (Ans)
(b) M.T. Vasudevan Nair
(c) T.V. Chandran
(d) P.A. Backer
11. Bangladesh: Dhaka; Austria:
(a) Canberra
(b) Lapaz
(c) Santiago
(d) Vienna (Ans)
Ans :
► Canberra – capital of Australia
► Santiago – capital of Chile
Question 12 to 20: choose collect answer from the alternative to fill the blank space:
12. A,E, J,O,–,–
(a) M,Q
(b) S, X
(c) T, Y (Ans)
(d) U, Z
Ans :
A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z
E 5th position J 10th position
O 15th position T 20th position
Y 25th position
13. ADH, BEI, CFJ, –
(a) DGL
(b) DHK
(c) EHL
(d) FIM
Ans : (c) and (d) are correct
A + 3 = D, D + 4 = H
B + 3 = E, E + 4 = I
C + 3 = F, F + 4 = J
E + 3 = H, H + 4 = L
So answer is EHL
FIM also comes in the same manner
14. Veluthampi Dalawa ______ a brave fight against British Army.
(a) Put up (Ans)
(b) Put off
(c) Put in
(d) Put down
15. The train was coming, the supervisor ______ the workers to stop working on rail.
(a) called off
(b) called in
(c) called away
(d) called out (Ans)
16. It ________ rain this evening.
(a) can
(b) may (Ans)
(c) could
(d) is
17. ______ the suspected cause for earthquakes is the construction of dams.
(a) Most of
(b) Only
(c) One of (Ans)
(d) None of these
18. There were _______ telephone booths around, so that the old one is closed.
(a) few
(b) a little
(c) a few (Ans)
(d) little
19. Indian Patent Act was formed in
(a) 1970 (Ans)
(b) 1975
(c) 1977
(d) 1980
20. ‘One Life’ is written by:
(a) Dr. B. Iqbal
(b) Bergnan
(c) Kurozowa
(d) Dr. Christiaan Bernard (Ans)
Ans : Christiaan Bernard. One life is a book written by Dr Christiaan Bernard. He made the first human heart transplant in 1967.
RBI Computer question with answers
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B