Wednesday, 11 December 2013

COMPUTER AWARENESS PRACTICE MCQs

1.    Which of the following is not shareware software?
     a) Cute Ftp     b) Get Right
     c) Win Zip    d) MSN Messenger
     e) None of these
 2.    The term "gigabyte" refers to?
     a) 1024 bytes    b) 1024 kilobytes
     c) 1024 megabytes
     d) 1024 gigabytes
     e) None of these
 3.    A program written in a high-level language is a?
     a) Objective program
     b) Source program
     c) Compiled Program
     d) All of the above
     e) None of these
 4.    Which of the following is represented by a cluster in a Hard disk?
     a) Total numbers of tracks
     b) Group of Tracks
     c) Group of Rows
     d) All of the above
     e) None of the above
 5.    Unix Operating system was developed by?
     a) Walter Baatain
     b) John Burdeen
     c) Ken Thompson
     d) All the above    e) None of these
 6.    Which of the following is a graphics solution for word processors?
     a) Clipart    b) Word art
     c) Drop cap    d) All the above
     e) None of these
 7.    A program for viewing web pages is called?
     a) Hardware    b) Software
     c) Storage    d) Browser
     e) None of These
 8.    What does SNMP Stands for?
     a)    Simple Network Mail Protocol
     b)    Single Network Mail Protocol
     c)    Single Network Message Protocol
     d)    Simple Network Message Protocol
     e)    None of these
 9.    What is Firmware?
     a) A program Started in RAM
     b) A Program started in a file
     c)    A program started in Boot sector
     d) A program Started in ROM
     e) None of these
 10.    To insert a new slide in the current presentation, we can choose?
     a) Ctrl+M    b) Ctrl+N
     c) Ctrl+O    d) Ctrl+F
     e) None of these
 11.    An Internet connection requires which of the following?
     a) a personal computer
     b) a modem
     c) a dial-up telephone line
     d) a software to operate
     e) All the above
 12.    ICMP stands for?
     a)    Intranet Control Message Protocol
     b)    Internet Control Message Protocol
     c)    Information Control Message Protocol
     d)    Internet communication message protocol
     e)    None of these
 13.    Which of the following device interconnects two or more networks, enabling data transfer to be made between them?
     a) Plotter    b) Joystick
     c) Gateway    d) Path
     e) None of these
 14.    Which common technique attempts to save time and energy by reducing redundant work in object-oriented programming?
     a)    Reducing lines of programming
     b)    Reuse of code
     c)    Reduce size of systems being developed
     d)    Merging different systems together
     e)    None of these
 15.    Dot matrix and band printers are _____ printers?
     a) Ink jet    b) Impact
     c) laser    d) thermal
     e) None of these
 16.    The topology with highest reliability is?
     a) Bus    b) Ring
     c) Tree    d) Mesh
     e) Star
 17.    Verification of a login name and password is knows as?
     a) Configuration
     b) Accessibility
     c) Authentication
     d) Logging in    e) None of these
 18.    The 16-bit microprocessor means that it has?
     a) 16 address lines
     b) 16 Buses    c) 16 data lines
     d) 16 routers    e) None of these
 19.    Which of the following is NOT a goal of Transaction Processing System?
     a)    Capture, process and store transactions
     b)    Produce a variety of documents related to routine business activities
     c)    Reduce manual effort associated with processing
     d)    Produce standard reports used for management decision making
     e)    None of these
 20.    Which of the following is a program that works like a calculator for keeping track of money and making budgets?
     a) Calculator    b) Spreadsheet
     c) Budgeter    d) Financier
     e) None of these
 21.    The process by which a computer receives information from a server on the internet is known as?
     a) Pulling    b) Pushing
     c) Downloading    d) transferring
     e) None of these
 22.    Which of the following is NOT a common feature of software application?
     a) Menu    b) Windows
     c) Help    d) Search
     e) None of the above
 23.    Selecting landscape changes our page from?
     a) a wide to tall orientation
     b) a tall to wide orientation
     c)    a normal font size to a condensed one
     d)    a condensed font size to a normal one
     e) None of the above
 24.    Unsolicited commercial E-mails is commonly Known as?
     a) Junk    b) Hypertext
     c) Spam    d) Hoaxes
     e) All of the above
 25.    When a computer is attacked by a virus it cannot lead to ?
     a) Disk Crash
     b) Motherboard Crash
     c) Corruption of a program
     d) Deletion of files
     e) None of these
 26.    Which of the following is another name for a preprogrammed formula in Excel?
     a) Range    b) Graph
     c) Function    d) Cell
     e) None of these
 27.    The name for the way that computers manipulate data into information is called?
     a) programming    b) processing
     c) storing    d) organizing
     e) None of these
 28.    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
     a) eight bytes    b) eight kilobytes
     c) eight characters
     d) eight bits    e) None of these
 29.    The components that process data are located in the?
     a) Input devices
     b) output devices
     c) System unit
     d) Storage component
     e) None of these
 30.    The keyboard shortcut to centralize the selected text in word is?
     a) Ctrl+F    b) Alt+C
     c) Ctrl+C    d) Ctrl+E
     e)    there is no short key for this operation
 31.    A touchpad responds to?
     a) Light    b) Pressure
     c) Clicking
     d)    The sense of from fingertips
     e) None of these
 32.    Which command is used to sea-rch all the text files in any drive?
     a) file.txt    b) .txt
     c) .jpg    d) file1.txt
     e) None of these
 33.    In a ring topology, the computer in possession of the _____ can transmit data?
     a) packet    b) data
     c) access method
     d) token    e) None of these
 34.    A database management system (DBMS) is a?
     a)    Hardware system used to create, maintain and provide controlled access to a database
     b)    Hardware system used to create, maintain and provide un-controlled access to a database
     c)    Software system used to create, maintain and provide un-controlled access to a database
     d)    Software system used to create, maintain and provide controlled access to a database
     e)    None of these
 35.    Bandwidth refers to?
     a)    the cost of the cable required to implemented a WAN
     b)    the cost of the cable required to implemented a LAN
     c)    the amount of information a peer-to-peer network can store
     d)    the amount of information can transfer in a communication medium in a given time
     e)    None of these
 36.    Which term identifies a specific computer on the web and the main page of the entire site?
     a) URL    b) Web site address
     c) Hyperlink    d) Domain name
     e) None of these
 37.    Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as?
     a) spyware    b) Hardware
     c) spam    d) Malware
     e) None of these
 38.    Human beings are referred to as Homo Sapiens. Which of the following is referred to as Silico Sapiens?
     a) Monitor    b) Hardware
     c) Robot    d) Computer
     e) All the above
 39.    Which of the following is not a form of Biometrics?
     a) fingerprint    b) password
     c) retina scan    d) breath scan
     e) None of these
 40.    What type of computer could be found in a digital watch?
     a) Mainframe computer
     b) Supercomputer
     c) Embedded computer
     d) Notebook computer
     e) None of these
 41.    Virtual memory is?
     a)    memory on the hard disk that the CPU uses as extended RAM
     b)    Only necessary if you do not have any RAM in your computer
     c)    a backup device for floppy disks
     d)    Both 1 and 3
     e)    None of these
 42.    Servers are those computers which provide resources to other computers connected by?
     a) Network    
b) Main frame
     c) Super computer
     d) Client    
e) None of these
 
 Answers
     1) d        2) c       3) b     4) b      5) c        6) a    7) d        8) d      9) d      10) a
     11) e    12) b    13) c    14) b    15) b      16) d    17) c    18) c    19) d     20) b
     21) c    22) b    23) b     24) c    25) b      26) c    27) b    28) d    29) c    30) d
     31) b    32) b    33) d    34) d    35) d       36) a    37) d    38) d    39) d    40) c
     41) a    42) a

3 comments:

  1. Thanks for sharing such useful Information

    ReplyDelete
  2. Hi visit there to know about Computer knowledge alot of information is here.Computer Important Tips

    ReplyDelete
  3. Excellent post! I must thank you for this informative read. I hope you will post again soon.
    Laptop Screen Replacement


    ReplyDelete