1. A scanner converts the image that it sees into numeric digit before storing it in the computer. This conversion process is known as? 1. Modulation
2. Digitization
3. Reverberation
4. Contribution
5. Creation
2. __ recognition systems enables physically disable people to use computer?
1. Scanner
2. Ink jet printers
3. Speech recognition
4. Main frame comuter
5. None of these
3. Which among the following statements are true regarding the laser?
1. The laser recreates the image on a negatively charged drum. Which will collect Ink that is positively charged to attract to the areas of the image.
2. A dot-matric printers creates, the characters it prints.
3. The capture image virtually & print
4. They determine the size of the objects
5. All the above
4. The earliest calculating devices are ? 1. Calculators
2. Super computers
3. Abacus
4. Minicomputers
5. Micro Computers
5. ___can scan typed documents, pictures, graphics or even handwriting into a computer? 1. Launching Machine
2. Modulating Machine
3. Optional Scanners
4. Voice-recognition devices
5. None of these
6. Graphic display is made up of a series of dots called ____ whose pattern produces the images?1. Trick cels
2. Lead cells
3. Pixel
4. Inkers
5. Lines
7. The components of cathode Ray Tube (CRT) Display are? 1. Electrongun
2. Electron beam controlled by an electro magnetic field
3. A phosphor coated display screen
4. Only option 1 is correct
5. All 1,2,3, are correct
8. CGA (Color Graphic Adapter), MDA (Monochrome Display Adapter), HGA (Herc-ules Graphic Adapter), EGA (Enhanced Graphic (Adapter) are examples of?
1. CRT (Cathode Ray Tube)
2. Motor cycle
3. Screens
4. Drum printers
5. All the above
9. _____ is determined by the number of pixels horizontally & vertically? 1. Reverberation
2. Recognition
3. Reconciliation
4. Resolution
5. Reflection
10. The major advantage of LCD (Liquid Crystal display) is?1. High energy consumption
2. Low energy consumption
3. No energy consumption
4. Average energy consumption
5. None of these
11. _____ are most commonly used for large group presentations? 1. Projection Displays
2. Hard disk
3. Floppy disk
4. CPU
5. All the above
12. The main memory also known as the primary memory is a part of the CPU & is combination of both?1. REN & RAMP
2. RAM & ROM
3. Only RAM 4. Only ROM
5. Keyboard & Monitor
13. Which of the following statements are correct regarding RAM ? 1. It is volatile in nature & can read & write data
2. The information is lost as soon as the System is shut down unless saved
3. It is used to store programs & data during the computers operation
4. It is a permanent data
5. Only 1,2,3 are correct
14. Which of the following statements are true regarding ROM? 1. It is read only memory
2. It is non-volatile
3. It is used to store permanent programs
4. It is main memory
5. All the above
15. Access mode means? 1. How easily they are accessible
2. How easily they are deniable
3. How easily they are convertible
4. How easily they are defensible
5. None of these
16.Access time means? 1. The maximum time required to reach storage location
2. The average time required to reach a storage location & obtain its content
3. The time taken to destroy the elements
4. The average time required to delete the storage
5. None of these
17. Transfer rate can be defined as ? 1. The number of characters or words that a device can transfer per second
2. The number of characters or words that a device cannot transfer
3. The time taken to transfer an employ
4. Only 3 is correct
5. All the above
18.Cache memory is a part of ?1. CPU
2. Monitor
3. Key board
4. Mouse
5. All the above
19.____ lies in the path between the processor & the main memory? 1. Cake memory
2. Cache memory
3. Cane memory
4. Cat memory
5. cathode memory
ANSWERS:
1. 2, 2. 3, 3. 1, 4. 3, 5. 3, 6. 3, 7. 5, 8. 1, 9. 4, 10. 2,
11. 1, 12. 2, 13. 5, 14. 5, 15. 1, 16. 2, 17. 1, 18. 1, 19. 2
Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Wednesday 6 November 2013
Sunday 3 November 2013
COMPUTER AWARENESS PRACTICE QUESTIONS
1. A repository for data, usually covering some specific topic is called......
1) Data bank
2) Database
3) Data acquisition
4) Database system
5) Data Mart
2. A popular word processing program for microcomputers is........
1) BASEB
2) WORDSTAR
3) LOTUS
4) BASIC
5) FOX PRO
3. The first large commercial magnetic disk device was introduced in 1956 by....
1) IBM
2) Hewlett-Packard
3) Victor Poor
4) Digital Equipment Corporation
5) Honey-Well
4. The range of a char type is........
1) 0 to 65,536
2) 0 to 65,537
3) 0 to 65,636
4) 0 to 65,538
5) 0 to 128
5. The report card and merit list forms the....
1) Input data
2) Output data
3) Data processing
4) Central Processing
5) None
6. A common boundary between two systems is called.....
1) Surface
2) Intradiction
3) Interface
4) Interdiction
5) Port
7. Which of the following is directory controlled from a keyboard?
1) Punched paper tape
2) Card punch
3) Magnetic tape
4) Magnetic disk
5) Audio Tape
8. A device or peripheral equipment which is not in direct communication with CPU of a computer is known as.......
1) On line device
2) Off line device
3) Channel
4) Intelligent terminal
5) None
9. Pseudo instructions are .......
1) Introduction in any program that have no corresponding machine code instruction
2) Instructions that are partially executed
3) Instructions for caches
4) Assembler directives
5) None
10. The Hexa decimal number A 23 F is represented in binary by ?
1) 1010 0010 0011 1110
2) 1010 0010 0100 1111
3) 1010 0010 0011 1111
4) 1101 0010 0011 1111
5) None
11. UNI CODE is .......
1) 8 bit
2) 16 bit
3) 7 bit
4) 12 bit
5) 24 bit
12. Who is responsible for introducing the concept of stored program?
1) Blase Pascal
2) Herman Hollerth
3) Charles Babbage
4) John Von Neumann
5) Henry Ford
13. CRAY-II is a ......
1) Mini Computer
2) Micro Computer
3) Super Computer
4) First Mainframe Computer
5) None
14. In computer terminology the term wetware stands for ......
1) Artificial Intelligence
2) Any Organic Intelligence
3) Speech Recognition
4) Molecular scale computer
5) None
15. Who is the creator of PASCAL language?
1) Dijkstra
2) Niklaus writh
3) D. Khuth
4) Aho
5) Dennis Ritichie
16. The Index consists of ......
1) a list of Keys
2) Pointers to the master list
3) both (1) and (2)
4) Pointers to the duplicate list
5) None
17. A compound key ......
1) is made up a several pieces of information
2) uniquely identifies an item in list
3) both (1) and (2)
4) is a duplicate key
5) None
18. Updating a database means ......
1) revising a file structure
2) recognizing the data base
3) modifying or adding records
4) Deleting records
5) None
19. The distinguishable parts of a record are called......
1) Data
2) Files
3) Information
4) Fields
5) All of the above
20. A front end processor used in.......
1) Multi programming
2) Virtual Storage
3) Time sharing
4) Multi processing
5) None
21. Turnaround time is defined as ......
1) Delay between job submission and job completion
2) Waiting time
3) Execution tine
4) Both (1) and (2)
5) None
22. In OSI network architecture, the routing is performed by ......
1) Network layer
2) Session layer
3) Physical Layer
4) Transport layer
5) Data link layer
23. The slowest transmission speeds are of......
1) Twisted pair wire
2) Coaxial wire
3) OFC
4) Microwave
5) None
24. Transmission of computerised data from one location to another is called ......
1) Data transfer
2) Data flow
3) Data communication
4) Data management
5) None
25. The first electronic computer in the world was ......
1) UNIVAC
2) EDVAC
3) ENIAC
4) ABACUS
5) None
26. Which was the computer conceived by Babbage?
1) Analytical engine
2) Arithmetic machine
3) Donald Knuth
4) Abacus
5) None
27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Memory buffer register
28. The subject of cybernetics deals with the science of ......
1) Genetics
2) Control and communications
3) Molecular biology
4) Biochemistry
5) Light
29. The memory which is programmed at the time it is manufactured ......
1) ROM
2) RAM
3) PROM
4) EPROM
5) Cache
30. Which command brings you to the first slide in your presentation?
1) Next slide button
2) Page up
3) Ctrl + Home
4) Ctrl + End
5) Ctrl + Back space
31. Which of the following is secondary memory
device?
1) CPU
2) ALU
3) Mouse
4) Floppy disk
5) None of these
32. A character is represented in EBCDIC by.....
1) One bit
2) Four bits
3) Eight bits
4) sixteen bits
5) None of the above
33. Which is considered a direct entry input device?
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above
34. Micro computer hardware consists of three basic categories of physical equipment.....
1) System unit, input / output secondary storage
2) Keyboard, monitor, hardware
3) System unit, input / output, memory
4) System unit, primary storage, secondary storage
5) DC, Floppy, pen drive
35. e-marketing is same as ........
1) Virtual marketing
2) Digital Marketing
3) Real time marketing
4) All of these
5) None of these
36. Grouping and processing all of these firm's transactions at one time is called.......
1) Batch processing
2) DBMS
3) Red time processing
4) On-line processing
5) Transaction processing
37. A file that includes pre-defined settings thatcan be used to create many common types of presentations is called a ......
1) Template
2) Pattern
3) Model
4) Blueprint
5) None of these
ANSWERS:
1-1, 2-2, 3-1, 4-1, 5-2, 6-3, 7-2, 8-2, 9-4, 10-3
11-2, 12-4, 13-3, 14-2, 15-2, 16-3, 17-3, 18-3, 19-3, 20-3
21-1, 22-1, 23-1, 24-3, 25-3, 26-1, 27-4, 28-2, 29-1, 30-3
31-4, 32-3, 33-5, 34-2, 35-2, 36-1, 37-1
1) Data bank
2) Database
3) Data acquisition
4) Database system
5) Data Mart
2. A popular word processing program for microcomputers is........
1) BASEB
2) WORDSTAR
3) LOTUS
4) BASIC
5) FOX PRO
3. The first large commercial magnetic disk device was introduced in 1956 by....
1) IBM
2) Hewlett-Packard
3) Victor Poor
4) Digital Equipment Corporation
5) Honey-Well
4. The range of a char type is........
1) 0 to 65,536
2) 0 to 65,537
3) 0 to 65,636
4) 0 to 65,538
5) 0 to 128
5. The report card and merit list forms the....
1) Input data
2) Output data
3) Data processing
4) Central Processing
5) None
6. A common boundary between two systems is called.....
1) Surface
2) Intradiction
3) Interface
4) Interdiction
5) Port
7. Which of the following is directory controlled from a keyboard?
1) Punched paper tape
2) Card punch
3) Magnetic tape
4) Magnetic disk
5) Audio Tape
8. A device or peripheral equipment which is not in direct communication with CPU of a computer is known as.......
1) On line device
2) Off line device
3) Channel
4) Intelligent terminal
5) None
9. Pseudo instructions are .......
1) Introduction in any program that have no corresponding machine code instruction
2) Instructions that are partially executed
3) Instructions for caches
4) Assembler directives
5) None
10. The Hexa decimal number A 23 F is represented in binary by ?
1) 1010 0010 0011 1110
2) 1010 0010 0100 1111
3) 1010 0010 0011 1111
4) 1101 0010 0011 1111
5) None
11. UNI CODE is .......
1) 8 bit
2) 16 bit
3) 7 bit
4) 12 bit
5) 24 bit
12. Who is responsible for introducing the concept of stored program?
1) Blase Pascal
2) Herman Hollerth
3) Charles Babbage
4) John Von Neumann
5) Henry Ford
13. CRAY-II is a ......
1) Mini Computer
2) Micro Computer
3) Super Computer
4) First Mainframe Computer
5) None
14. In computer terminology the term wetware stands for ......
1) Artificial Intelligence
2) Any Organic Intelligence
3) Speech Recognition
4) Molecular scale computer
5) None
15. Who is the creator of PASCAL language?
1) Dijkstra
2) Niklaus writh
3) D. Khuth
4) Aho
5) Dennis Ritichie
16. The Index consists of ......
1) a list of Keys
2) Pointers to the master list
3) both (1) and (2)
4) Pointers to the duplicate list
5) None
17. A compound key ......
1) is made up a several pieces of information
2) uniquely identifies an item in list
3) both (1) and (2)
4) is a duplicate key
5) None
18. Updating a database means ......
1) revising a file structure
2) recognizing the data base
3) modifying or adding records
4) Deleting records
5) None
19. The distinguishable parts of a record are called......
1) Data
2) Files
3) Information
4) Fields
5) All of the above
20. A front end processor used in.......
1) Multi programming
2) Virtual Storage
3) Time sharing
4) Multi processing
5) None
21. Turnaround time is defined as ......
1) Delay between job submission and job completion
2) Waiting time
3) Execution tine
4) Both (1) and (2)
5) None
22. In OSI network architecture, the routing is performed by ......
1) Network layer
2) Session layer
3) Physical Layer
4) Transport layer
5) Data link layer
23. The slowest transmission speeds are of......
1) Twisted pair wire
2) Coaxial wire
3) OFC
4) Microwave
5) None
24. Transmission of computerised data from one location to another is called ......
1) Data transfer
2) Data flow
3) Data communication
4) Data management
5) None
25. The first electronic computer in the world was ......
1) UNIVAC
2) EDVAC
3) ENIAC
4) ABACUS
5) None
26. Which was the computer conceived by Babbage?
1) Analytical engine
2) Arithmetic machine
3) Donald Knuth
4) Abacus
5) None
27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Memory buffer register
28. The subject of cybernetics deals with the science of ......
1) Genetics
2) Control and communications
3) Molecular biology
4) Biochemistry
5) Light
29. The memory which is programmed at the time it is manufactured ......
1) ROM
2) RAM
3) PROM
4) EPROM
5) Cache
30. Which command brings you to the first slide in your presentation?
1) Next slide button
2) Page up
3) Ctrl + Home
4) Ctrl + End
5) Ctrl + Back space
31. Which of the following is secondary memory
device?
1) CPU
2) ALU
3) Mouse
4) Floppy disk
5) None of these
32. A character is represented in EBCDIC by.....
1) One bit
2) Four bits
3) Eight bits
4) sixteen bits
5) None of the above
33. Which is considered a direct entry input device?
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above
34. Micro computer hardware consists of three basic categories of physical equipment.....
1) System unit, input / output secondary storage
2) Keyboard, monitor, hardware
3) System unit, input / output, memory
4) System unit, primary storage, secondary storage
5) DC, Floppy, pen drive
35. e-marketing is same as ........
1) Virtual marketing
2) Digital Marketing
3) Real time marketing
4) All of these
5) None of these
36. Grouping and processing all of these firm's transactions at one time is called.......
1) Batch processing
2) DBMS
3) Red time processing
4) On-line processing
5) Transaction processing
37. A file that includes pre-defined settings thatcan be used to create many common types of presentations is called a ......
1) Template
2) Pattern
3) Model
4) Blueprint
5) None of these
ANSWERS:
1-1, 2-2, 3-1, 4-1, 5-2, 6-3, 7-2, 8-2, 9-4, 10-3
11-2, 12-4, 13-3, 14-2, 15-2, 16-3, 17-3, 18-3, 19-3, 20-3
21-1, 22-1, 23-1, 24-3, 25-3, 26-1, 27-4, 28-2, 29-1, 30-3
31-4, 32-3, 33-5, 34-2, 35-2, 36-1, 37-1
Monday 21 October 2013
COMPUTER AWARENESS PRACTICE MCQs
1. Assembly language is?
a) Machine Language
b) High-level programming language
c) A low-level programming language
d) Language for assembling computers
e) A Middle-level language
2. Which of the following is not one of the syntax rules?
a) The order in which you list the function's arguments
b) The precedence of the arguments
c) Whether or not the function has arguments
d) Properly spelling the function's name
e) None of these
3. The binary system is a number to the base?
a) 2
b) 4
c) 8
d) 10
e) 16
4. Which of the following is not an example of hardware?
a) Scanner
b) Printer
c) Monitor
d) Mouse
e) Interprete
5. Which content is lost when the computer turn off?
a) Storage
b) Input
c) Output
d) Memory
e) None of these
6. Which of the following is hardware and not software?
a) Excel
b) Printer driver
c) Operating system
d) Power point
e) CPU
7. On a CD-RW you can
a) Read and write information
b) Only read information
c) Only write information
d) Read, write and rewrite information
e) None of these
8. To be able to 'boot' the computer must have a(n)?
a) Compiler
b) Loader
c) Operating system
d) Assembler
e) Application Software
9. This is not a function category in Excel?
a) Logical
b) Data Series
c) Financial
d) Text
e) Date/ Time
10. In Excel, this is a pre-recorded formula that provide a shortcut for complex calculations?
a) Value
b) Data series
c) Function
d) Field
e) Formula
11.The following computer's memory is characterised by low cost per bit stored?
a) Primary
b) Secondary
c) Hard Disk
d) All of these
e) Virtual Memory
12. What happens when we try to delete the files on the floppy?
a) The files get moved to the Recycle Bin
b) Files on a floppy cannot be deleted
c) The files get deleted and can be restored again from recycle bin
d) The files get deleted and cannot be restored again
e) The files get copied on the Hard disk
13. In word, replace option is available on?
a) File menu
b) View menu
c) Edit menu
d) Format menu
e) Window
14. In word, you can change Page Margins by?
a) Dragging the scroll box on the scroll bars
b) Deleting the margin boundaries on the rulers
c) Dragging the margin boundaries on the rulers
d) Clicking the right mouse button on the Ruler
e) Clicking the middle mouse button on the Ruler
15. What type of keys are 'ctrl and shift'?
a) Adjustment
b) Function
c) Modifier
d) Alphanumeric
e) Special
16. A word gets selected by clicking it to select a word, in Word?
a) Once
b) Twice
c) Three times
d) Four times
e) Just left click
17. To reverse the effect of your last action in word?
a) Use the cut command
b) Use the Undo command
c) Press the delete key
d) Use the Redo command
e) Use Redo/Undo at a time
18. Your position in the text is shown by a?
a) Blinker
b) Cursor
c) Causer
d) Pointer
e) Blinker
19. The time for the actual data transfer after receiving the request for data from secondary storage is referred to as the disk's?
a) Transfer time
b) Movement-time
c) Access time
d) Data input time
e) Accept time
20. Which of the following categories would include a keyboard?
a) Printing device
b) Output device
c) Pointing device
d) Storage device
e) Input device
21. Using output devices one can?
a) Input data
b) Store data
c) Scan data
d) View or print data
e) Send-in
22. Why is the Caps Lock key referred to as toggle key?
a) Because its function goes back and forth every time it is pressed
b) Because it cannot be used for entering numbers
c) Because it cannot be used to delete
d) Because it cannot be used to insert
e) Because it cannot be used to view
23. Using print preview is useful when you want to?
a) Colour the document
b) Save the document
c) Delete the document
d) Copy the document
e) View how the document will appear when printed
24. Which of the following can input graphical images and pictures for a computer?
a) Plotter
b) Scanner
c) Mouse
d) Printer
e) Keyboard
25. When a chart is placed on this, it is much larger and there is no other data on it?
a) Chart sheet
b) Exclusive sheet
c) Primary sheet
d) Reference sheet
e) Secondary sheet
26. The process of trading goods over the internet is known as?
a) e-selling-n-buying
b) e-trading
c) e-finance
d) e-salesmanship
e) e-commerce
27. Information that comes from an external source and fed into computer software is called?
a) Output
b) Input
c) Throughput
d) Reports
e) I/O
28. The main system board of a computer is called the?
a) Integrated circuit
b) Motherboard
c) Processor
d) Microchip
e) Daughterboard
29. Extension to motherboard is referred as?
a) Integrated circuit
b) ROM
c) Processor
d) Microchip
e) Daughterboard
30. If you change Windows 98 to Windows XP, you are actually performing ?
a) Upstart
b) Upgrade
c) Update
d) Patch
e) Upload
31. The operating system that is self-contained in a device and resident in the ROM is ?
a) Batch operating system
b) Real-time operating system
c) Embedded operating system
d) Multi operating
e) Imbedded operating oystem
32. To make a copy of the current document to disk?
a) Use the 'save' command
b) This cannot be done
c) Use the 'duplicate' command
d) Copy the document
e) Use the 'save as' command
33. ...... is the process of carrying out commands.
a) Fetching
b) Storing
c) Decoding
d) Executing
e) Inputting
34. In the formula, =B1/B2+B3, which of the following is the correct precedence?
a) Addition higher precedence than division
b) Equal precedence among the two operators; proceed right to left
c) Equal precedence among the two operators; proceed left to right
d) Division higher precedence than addition
e) Division high precedence than subtraction.
35. POST stands for?
a) Process On-self Test
b) Post On-self Test
c) Pre-boot On-self Test
d) Power On-self Test
e) Pre Output-self Test
ANSWERS:
1- c, 2- e, 3- a, 4- e, 5- d, 6- e, 7- d, 8- c, 9- a, 10- c
11- b, 12- d, 13- c, 14- d, 15- c, 16- b, 17- b, 18- b, 19- c, 20- e
21- d, 22- a, 23- e, 24- b, 25- d, 26- e, 27- b, 28- b, 29- e, 30- b
31- c, 32- e, 33- d, 34- d, 35- d
a) Machine Language
b) High-level programming language
c) A low-level programming language
d) Language for assembling computers
e) A Middle-level language
2. Which of the following is not one of the syntax rules?
a) The order in which you list the function's arguments
b) The precedence of the arguments
c) Whether or not the function has arguments
d) Properly spelling the function's name
e) None of these
3. The binary system is a number to the base?
a) 2
b) 4
c) 8
d) 10
e) 16
4. Which of the following is not an example of hardware?
a) Scanner
b) Printer
c) Monitor
d) Mouse
e) Interprete
5. Which content is lost when the computer turn off?
a) Storage
b) Input
c) Output
d) Memory
e) None of these
6. Which of the following is hardware and not software?
a) Excel
b) Printer driver
c) Operating system
d) Power point
e) CPU
7. On a CD-RW you can
a) Read and write information
b) Only read information
c) Only write information
d) Read, write and rewrite information
e) None of these
8. To be able to 'boot' the computer must have a(n)?
a) Compiler
b) Loader
c) Operating system
d) Assembler
e) Application Software
9. This is not a function category in Excel?
a) Logical
b) Data Series
c) Financial
d) Text
e) Date/ Time
10. In Excel, this is a pre-recorded formula that provide a shortcut for complex calculations?
a) Value
b) Data series
c) Function
d) Field
e) Formula
11.The following computer's memory is characterised by low cost per bit stored?
a) Primary
b) Secondary
c) Hard Disk
d) All of these
e) Virtual Memory
12. What happens when we try to delete the files on the floppy?
a) The files get moved to the Recycle Bin
b) Files on a floppy cannot be deleted
c) The files get deleted and can be restored again from recycle bin
d) The files get deleted and cannot be restored again
e) The files get copied on the Hard disk
13. In word, replace option is available on?
a) File menu
b) View menu
c) Edit menu
d) Format menu
e) Window
14. In word, you can change Page Margins by?
a) Dragging the scroll box on the scroll bars
b) Deleting the margin boundaries on the rulers
c) Dragging the margin boundaries on the rulers
d) Clicking the right mouse button on the Ruler
e) Clicking the middle mouse button on the Ruler
15. What type of keys are 'ctrl and shift'?
a) Adjustment
b) Function
c) Modifier
d) Alphanumeric
e) Special
16. A word gets selected by clicking it to select a word, in Word?
a) Once
b) Twice
c) Three times
d) Four times
e) Just left click
17. To reverse the effect of your last action in word?
a) Use the cut command
b) Use the Undo command
c) Press the delete key
d) Use the Redo command
e) Use Redo/Undo at a time
18. Your position in the text is shown by a?
a) Blinker
b) Cursor
c) Causer
d) Pointer
e) Blinker
19. The time for the actual data transfer after receiving the request for data from secondary storage is referred to as the disk's?
a) Transfer time
b) Movement-time
c) Access time
d) Data input time
e) Accept time
20. Which of the following categories would include a keyboard?
a) Printing device
b) Output device
c) Pointing device
d) Storage device
e) Input device
21. Using output devices one can?
a) Input data
b) Store data
c) Scan data
d) View or print data
e) Send-in
22. Why is the Caps Lock key referred to as toggle key?
a) Because its function goes back and forth every time it is pressed
b) Because it cannot be used for entering numbers
c) Because it cannot be used to delete
d) Because it cannot be used to insert
e) Because it cannot be used to view
23. Using print preview is useful when you want to?
a) Colour the document
b) Save the document
c) Delete the document
d) Copy the document
e) View how the document will appear when printed
24. Which of the following can input graphical images and pictures for a computer?
a) Plotter
b) Scanner
c) Mouse
d) Printer
e) Keyboard
25. When a chart is placed on this, it is much larger and there is no other data on it?
a) Chart sheet
b) Exclusive sheet
c) Primary sheet
d) Reference sheet
e) Secondary sheet
26. The process of trading goods over the internet is known as?
a) e-selling-n-buying
b) e-trading
c) e-finance
d) e-salesmanship
e) e-commerce
27. Information that comes from an external source and fed into computer software is called?
a) Output
b) Input
c) Throughput
d) Reports
e) I/O
28. The main system board of a computer is called the?
a) Integrated circuit
b) Motherboard
c) Processor
d) Microchip
e) Daughterboard
29. Extension to motherboard is referred as?
a) Integrated circuit
b) ROM
c) Processor
d) Microchip
e) Daughterboard
30. If you change Windows 98 to Windows XP, you are actually performing ?
a) Upstart
b) Upgrade
c) Update
d) Patch
e) Upload
31. The operating system that is self-contained in a device and resident in the ROM is ?
a) Batch operating system
b) Real-time operating system
c) Embedded operating system
d) Multi operating
e) Imbedded operating oystem
32. To make a copy of the current document to disk?
a) Use the 'save' command
b) This cannot be done
c) Use the 'duplicate' command
d) Copy the document
e) Use the 'save as' command
33. ...... is the process of carrying out commands.
a) Fetching
b) Storing
c) Decoding
d) Executing
e) Inputting
34. In the formula, =B1/B2+B3, which of the following is the correct precedence?
a) Addition higher precedence than division
b) Equal precedence among the two operators; proceed right to left
c) Equal precedence among the two operators; proceed left to right
d) Division higher precedence than addition
e) Division high precedence than subtraction.
35. POST stands for?
a) Process On-self Test
b) Post On-self Test
c) Pre-boot On-self Test
d) Power On-self Test
e) Pre Output-self Test
ANSWERS:
1- c, 2- e, 3- a, 4- e, 5- d, 6- e, 7- d, 8- c, 9- a, 10- c
11- b, 12- d, 13- c, 14- d, 15- c, 16- b, 17- b, 18- b, 19- c, 20- e
21- d, 22- a, 23- e, 24- b, 25- d, 26- e, 27- b, 28- b, 29- e, 30- b
31- c, 32- e, 33- d, 34- d, 35- d
Sunday 20 October 2013
Computer Knowledge Practice Questions
1. Soft copy of a document has the characteristics that it can be:
1) touched
2) viewed only
3) touched and viewed
4) All of the above
5) None of the above
2. What is the meaning of 'justified text'?
1) the text headings are all in the same style
2) all four margins on the page are the same size
3) the text is the maximum size that will fit on a page
4) the text aligns with both the right and left margins
5) None of these
3. To identify the document, it is helpful to include the file name on each page as a
1) bibliography
2) header/ footer
3) find/ search
4) macro
5) None of these
4. Which of the following allows wireless mobile devices to access the Internet and its services such as the Web and e-mail etc?
1) TCP/IP
2) WAP
3) Ethernet
4) WiFi
5) None of these
5. A passive threat to computer security is
1) Malicious Intent
2) Espionage Agents
3) Accident Errors
4) Sabotage
5) None of these
6. The browser's ________ keeps a list of web pages you have visited during the current session.
1) history
2) cache
3) favorites
4) trail
5) None of these
7. Which application is not typically included in an MS Office suite?
1) word processor
2) spreadsheet
3) antivirus
4) database
5) None of these
8. Which device cannot be shared in network?
1) Floppy
2) Computer
3) Mouse
4) Printer
5) None of these
9. Bold, italics and underline are features used in many programs. To which of the following items can these features be applied?
1) files
2) pictures
3) text
4) windows
5) None of these
10. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
1) Bridge
2) Modem
3) Router
4) Gateway
5) None of these
11. What is the purpose of providing a Drafts folder in an email system?
1) to save unsent emails
2) to store spam emails
3) to save a copy of sent emails
4) to store deleted emails
5) None of these
12. Voice mail
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet.
2) functions much like an answering machine, allowing callers to leave a voice message for the called party.
3) involves using video and computer technology to conduct a meeting between participants at geographically separate locations.
4) permits users to converse in real time with each other via the computer while connected to the Internet.
5) None of these
13. Which of the following identifies a specific web page and its computer on the Web?
1) Website
2) Website address
3) URL
4) Domain Name
5) None of these
14. A(n) __________ allows network users to share a single copy of software, which resides on the network server.
1) single-user license agreement
2) end-user license agreement
3) network site license
4) business software license
5) None of these
15. Which port doesn't exist in computer?
1) Computer port
2) USB port
3) Printer port
4) Parallel port
5) None of these
16. All of the following are basic principles of networks, except
1) each computer must have a network card
2) each computer must have software that supports the movement of information
3) there must be at least one connecting device
4) there must be communications media connecting the network hardware devices
5) None of these
17. Workgroup means
1) Individual computer
2) Individual user
3) Computers in network
4) All of the above
5) None of the above
18. The type of software that can store, update, manipulate, and retrieve data is called
1) database management
2) spreadsheet
3) desktop publishing
4) graphics
5) None of these
19. Which command allows you to reduce fragments of file and optimize the performance of disk?
1) Scandisk
2) Defrag
3) Chkdsk
4) Diskcomp
5) None of these
20. What type of telecommunications hardware allows you to access the web?
1) Browser
2) IRC
3) FTP protocol
4) Modem
5) None of these
ANSWERS:
1-2, 2-4, 3-2, 4-2, 5-1, 6-1, 7-3, 8-3, 9-3, 10-4
11-1, 12-2, 13-2, 14-3, 15-1, 16-4, 17-3, 18-1, 19-2, 20-4
1) touched
2) viewed only
3) touched and viewed
4) All of the above
5) None of the above
2. What is the meaning of 'justified text'?
1) the text headings are all in the same style
2) all four margins on the page are the same size
3) the text is the maximum size that will fit on a page
4) the text aligns with both the right and left margins
5) None of these
3. To identify the document, it is helpful to include the file name on each page as a
1) bibliography
2) header/ footer
3) find/ search
4) macro
5) None of these
4. Which of the following allows wireless mobile devices to access the Internet and its services such as the Web and e-mail etc?
1) TCP/IP
2) WAP
3) Ethernet
4) WiFi
5) None of these
5. A passive threat to computer security is
1) Malicious Intent
2) Espionage Agents
3) Accident Errors
4) Sabotage
5) None of these
6. The browser's ________ keeps a list of web pages you have visited during the current session.
1) history
2) cache
3) favorites
4) trail
5) None of these
7. Which application is not typically included in an MS Office suite?
1) word processor
2) spreadsheet
3) antivirus
4) database
5) None of these
8. Which device cannot be shared in network?
1) Floppy
2) Computer
3) Mouse
4) Printer
5) None of these
9. Bold, italics and underline are features used in many programs. To which of the following items can these features be applied?
1) files
2) pictures
3) text
4) windows
5) None of these
10. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
1) Bridge
2) Modem
3) Router
4) Gateway
5) None of these
11. What is the purpose of providing a Drafts folder in an email system?
1) to save unsent emails
2) to store spam emails
3) to save a copy of sent emails
4) to store deleted emails
5) None of these
12. Voice mail
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet.
2) functions much like an answering machine, allowing callers to leave a voice message for the called party.
3) involves using video and computer technology to conduct a meeting between participants at geographically separate locations.
4) permits users to converse in real time with each other via the computer while connected to the Internet.
5) None of these
13. Which of the following identifies a specific web page and its computer on the Web?
1) Website
2) Website address
3) URL
4) Domain Name
5) None of these
14. A(n) __________ allows network users to share a single copy of software, which resides on the network server.
1) single-user license agreement
2) end-user license agreement
3) network site license
4) business software license
5) None of these
15. Which port doesn't exist in computer?
1) Computer port
2) USB port
3) Printer port
4) Parallel port
5) None of these
16. All of the following are basic principles of networks, except
1) each computer must have a network card
2) each computer must have software that supports the movement of information
3) there must be at least one connecting device
4) there must be communications media connecting the network hardware devices
5) None of these
17. Workgroup means
1) Individual computer
2) Individual user
3) Computers in network
4) All of the above
5) None of the above
18. The type of software that can store, update, manipulate, and retrieve data is called
1) database management
2) spreadsheet
3) desktop publishing
4) graphics
5) None of these
19. Which command allows you to reduce fragments of file and optimize the performance of disk?
1) Scandisk
2) Defrag
3) Chkdsk
4) Diskcomp
5) None of these
20. What type of telecommunications hardware allows you to access the web?
1) Browser
2) IRC
3) FTP protocol
4) Modem
5) None of these
ANSWERS:
1-2, 2-4, 3-2, 4-2, 5-1, 6-1, 7-3, 8-3, 9-3, 10-4
11-1, 12-2, 13-2, 14-3, 15-1, 16-4, 17-3, 18-1, 19-2, 20-4
Monday 7 October 2013
COMPUTER AWARENESS PRACTICE MCQs
1. Which of the following component is required to process data into information and consists of integrated circuits.
1) hard disk
2) RAM
3) CPU
4) ROM
5) none of these
2. Which of the following is a networking hardware?
1) Bridge
2) Router
3) NIC
4) Switch
5) All the above
3. Two or more computers connected to each other for sharing information form a ____
1) network
2) router
3) server
4) tunnel
5) pipeline
4. Computers that are portable and convenient for users who travel are known as ____
1) super computers
2) laptops
3) mini computers
4) file server
5) none
5. What is the term for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) none of these
6. Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
1) Data Independence
2) Data Redundancy
3) Data Maintainance
4) Data Security
5) None of these
7. The code for a web page is written using ____
1) a 5th generation language
2) Wip Zip
3) perl
4) HTML
5)URL
8. The first computers were programmed using ____
1) assembly language
2) machine language
3) source code
4) object code
5) none
9. When the pointer is positioned on a ____ it is shaped link a hand.
1) grammar error
2) hyperlink
3) screen tip
4) spelling error
5) all
10. My SQL, MS Access are examples of:
1) Dataware Houses
2) File Management Systems
3) Database Management Systems
4) Multi Dimensional Database
5) None of these
11. Which of the following is the software application which enables the electronic handling of recruitment needs.
1) Applicant Tracking System (ATS)
2) Web Conference
3) Information System
4) Online Interview
5) None of these
12. Which of the following device operates at the physical layer ?
1) bridge
2) router
3) repeater
4) all of the above
5) none
13. For separating channels in FDM, it is necessary to use
1) time slots
2) bandpass filters
3) differentiation
4) all of these
5) none
14. Encryption and decryption are functions of
1) transport layer
2) session layer
3) presentation layer
4) all of these
5) none
15. Which of the following types of table constraints will prevent the entry of duplicate rows?
1) primary key
2) unique
3) null
4) foreign key
5) none of these
16. ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
1) Wireless data transmission
2) Digitization
3) Convergence
4) Analog transfer
5) None of these
17. Which multiplexing technique transmits analog signals?
1) FDM
2) synchronous TDM
3) asynchronous TDM
4) 2 and 3
5) none
18. ____ was a search engine system for the Gopher protocol
1) gobbler
2) archie
3) mikky
4) veronica
5) none of these
19. array is ____
1) linear data structure
2) object
3) class
4) interface
5) none of these
20. How many options does a binary choice offer?
1) none
2) one
3) two
4) four
5) eight
21. Data going into the computer is called
1) output
2) algorithm
3) input
4) flowchart
5) all of these
22. How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) 512
23. ____ is a technique that is used to send more than one call over a single line.
1) Multiplexing
2) Infrared transmission
3) Streaming
4) Digital transmission
5) None of these
24. ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
1) Transaction acquisition
2) Internet protocol
3) Circuit switching
4) Packet switching
5) None of these
25. A set of instructions telling the computer what to do is called
1) mentor
2) instructor
3) compiler
4) program
5) debugger
26. computer connected to a LAN can
1) run faster
2) go on line
3) share information
4) E-mail
5) none
27. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
28. Information travels between components on the motherboard through
1) flash memory
2) CMOS
3) bays
4) buses
5) peripherals
29. One megabyte equals approximately
1) 1000 bytes
2) 1000 bits
3) 1 million bytes
4) 1 million bits
5) 2000 bytes
30. An expansion board that provides the electronic components to make a connection between a computer and a network is called a ____.
1) collective network
2) logical address
3) network interface card (NIC)
4) wide area network
5) None of these
31. How are data organized in a spreadsheet?
1) lines and spaces
2) layers and planes
3) height
4) columns and rows
5) none
32. The blinking symbol on the computers screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
33. When a particular object or an image is copied, in which of the following places it is stored?
1) ROM
2) hard drive
3) diskette
4) dash bord
5) clipboard
34. A software that is not protected by copyright or trademark is?
1) Vertical Market software
2) Public domain software
3) Shareware Software
4) Trial ware
5) Adware
35. MIME is an acronym for ____
1) Multiprogramming Internet Mail extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
36. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
37. A program embedded in a semiconductor chip during their manufacture is called
1) humanware
2) firmware
3) liveware
4) handware
5) software
38. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
39. The popular name for 'Infor-mation Super Highway' is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
40. Blu-Ray disk is an example of a(n) ____
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
41. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
42. ____ is the storage area for e-mails
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
43. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
44. Thermal Printer is ____ kind of printer.
1) Impact Printer
2) Non impact printer
3) Laser printer
4) Line printer
5) None of these
45. Which of the following is not a web browser?
1) Firefox
2) IE
3) Opera
4) Skype
5) Chrome
46. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
1) Puck
2) Printer
3) Plotter
4) Television
5) Projector
Answers:
1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3;
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3;
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3;
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3;
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1
1) hard disk
2) RAM
3) CPU
4) ROM
5) none of these
2. Which of the following is a networking hardware?
1) Bridge
2) Router
3) NIC
4) Switch
5) All the above
3. Two or more computers connected to each other for sharing information form a ____
1) network
2) router
3) server
4) tunnel
5) pipeline
4. Computers that are portable and convenient for users who travel are known as ____
1) super computers
2) laptops
3) mini computers
4) file server
5) none
5. What is the term for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) none of these
6. Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
1) Data Independence
2) Data Redundancy
3) Data Maintainance
4) Data Security
5) None of these
7. The code for a web page is written using ____
1) a 5th generation language
2) Wip Zip
3) perl
4) HTML
5)URL
8. The first computers were programmed using ____
1) assembly language
2) machine language
3) source code
4) object code
5) none
9. When the pointer is positioned on a ____ it is shaped link a hand.
1) grammar error
2) hyperlink
3) screen tip
4) spelling error
5) all
10. My SQL, MS Access are examples of:
1) Dataware Houses
2) File Management Systems
3) Database Management Systems
4) Multi Dimensional Database
5) None of these
11. Which of the following is the software application which enables the electronic handling of recruitment needs.
1) Applicant Tracking System (ATS)
2) Web Conference
3) Information System
4) Online Interview
5) None of these
12. Which of the following device operates at the physical layer ?
1) bridge
2) router
3) repeater
4) all of the above
5) none
13. For separating channels in FDM, it is necessary to use
1) time slots
2) bandpass filters
3) differentiation
4) all of these
5) none
14. Encryption and decryption are functions of
1) transport layer
2) session layer
3) presentation layer
4) all of these
5) none
15. Which of the following types of table constraints will prevent the entry of duplicate rows?
1) primary key
2) unique
3) null
4) foreign key
5) none of these
16. ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
1) Wireless data transmission
2) Digitization
3) Convergence
4) Analog transfer
5) None of these
17. Which multiplexing technique transmits analog signals?
1) FDM
2) synchronous TDM
3) asynchronous TDM
4) 2 and 3
5) none
18. ____ was a search engine system for the Gopher protocol
1) gobbler
2) archie
3) mikky
4) veronica
5) none of these
19. array is ____
1) linear data structure
2) object
3) class
4) interface
5) none of these
20. How many options does a binary choice offer?
1) none
2) one
3) two
4) four
5) eight
21. Data going into the computer is called
1) output
2) algorithm
3) input
4) flowchart
5) all of these
22. How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) 512
23. ____ is a technique that is used to send more than one call over a single line.
1) Multiplexing
2) Infrared transmission
3) Streaming
4) Digital transmission
5) None of these
24. ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
1) Transaction acquisition
2) Internet protocol
3) Circuit switching
4) Packet switching
5) None of these
25. A set of instructions telling the computer what to do is called
1) mentor
2) instructor
3) compiler
4) program
5) debugger
26. computer connected to a LAN can
1) run faster
2) go on line
3) share information
4) E-mail
5) none
27. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
28. Information travels between components on the motherboard through
1) flash memory
2) CMOS
3) bays
4) buses
5) peripherals
29. One megabyte equals approximately
1) 1000 bytes
2) 1000 bits
3) 1 million bytes
4) 1 million bits
5) 2000 bytes
30. An expansion board that provides the electronic components to make a connection between a computer and a network is called a ____.
1) collective network
2) logical address
3) network interface card (NIC)
4) wide area network
5) None of these
31. How are data organized in a spreadsheet?
1) lines and spaces
2) layers and planes
3) height
4) columns and rows
5) none
32. The blinking symbol on the computers screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
33. When a particular object or an image is copied, in which of the following places it is stored?
1) ROM
2) hard drive
3) diskette
4) dash bord
5) clipboard
34. A software that is not protected by copyright or trademark is?
1) Vertical Market software
2) Public domain software
3) Shareware Software
4) Trial ware
5) Adware
35. MIME is an acronym for ____
1) Multiprogramming Internet Mail extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
36. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
37. A program embedded in a semiconductor chip during their manufacture is called
1) humanware
2) firmware
3) liveware
4) handware
5) software
38. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
39. The popular name for 'Infor-mation Super Highway' is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
40. Blu-Ray disk is an example of a(n) ____
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
41. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
42. ____ is the storage area for e-mails
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
43. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
44. Thermal Printer is ____ kind of printer.
1) Impact Printer
2) Non impact printer
3) Laser printer
4) Line printer
5) None of these
45. Which of the following is not a web browser?
1) Firefox
2) IE
3) Opera
4) Skype
5) Chrome
46. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
1) Puck
2) Printer
3) Plotter
4) Television
5) Projector
Answers:
1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3;
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3;
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3;
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3;
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1
COMPUTER AWARENESS PRACTICE MCQs
1. Which of the following component is required to process data into information and consists of integrated circuits.
1) hard disk
2) RAM
3) CPU
4) ROM
5) none of these
2. Which of the following is a networking hardware?
1) Bridge
2) Router
3) NIC
4) Switch
5) All the above
3. Two or more computers connected to each other for sharing information form a ____
1) network
2) router
3) server
4) tunnel
5) pipeline
4. Computers that are portable and convenient for users who travel are known as ____
1) super computers
2) laptops
3) mini computers
4) file server
5) none
5. What is the term for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) none of these
6. Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
1) Data Independence
2) Data Redundancy
3) Data Maintainance
4) Data Security
5) None of these
7. The code for a web page is written using ____
1) a 5th generation language
2) Wip Zip
3) perl
4) HTML
5)URL
8. The first computers were programmed using ____
1) assembly language
2) machine language
3) source code
4) object code
5) none
9. When the pointer is positioned on a ____ it is shaped link a hand.
1) grammar error
2) hyperlink
3) screen tip
4) spelling error
5) all
10. My SQL, MS Access are examples of:
1) Dataware Houses
2) File Management Systems
3) Database Management Systems
4) Multi Dimensional Database
5) None of these
11. Which of the following is the software application which enables the electronic handling of recruitment needs.
1) Applicant Tracking System (ATS)
2) Web Conference
3) Information System
4) Online Interview
5) None of these
12. Which of the following device operates at the physical layer ?
1) bridge
2) router
3) repeater
4) all of the above
5) none
13. For separating channels in FDM, it is necessary to use
1) time slots
2) bandpass filters
3) differentiation
4) all of these
5) none
14. Encryption and decryption are functions of
1) transport layer
2) session layer
3) presentation layer
4) all of these
5) none
15. Which of the following types of table constraints will prevent the entry of duplicate rows?
1) primary key
2) unique
3) null
4) foreign key
5) none of these
16. ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
1) Wireless data transmission
2) Digitization
3) Convergence
4) Analog transfer
5) None of these
17. Which multiplexing technique transmits analog signals?
1) FDM
2) synchronous TDM
3) asynchronous TDM
4) 2 and 3
5) none
18. ____ was a search engine system for the Gopher protocol
1) gobbler
2) archie
3) mikky
4) veronica
5) none of these
19. array is ____
1) linear data structure
2) object
3) class
4) interface
5) none of these
20. How many options does a binary choice offer?
1) none
2) one
3) two
4) four
5) eight
21. Data going into the computer is called
1) output
2) algorithm
3) input
4) flowchart
5) all of these
22. How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) 512
23. ____ is a technique that is used to send more than one call over a single line.
1) Multiplexing
2) Infrared transmission
3) Streaming
4) Digital transmission
5) None of these
24. ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
1) Transaction acquisition
2) Internet protocol
3) Circuit switching
4) Packet switching
5) None of these
25. A set of instructions telling the computer what to do is called
1) mentor
2) instructor
3) compiler
4) program
5) debugger
26. computer connected to a LAN can
1) run faster
2) go on line
3) share information
4) E-mail
5) none
27. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
28. Information travels between components on the motherboard through
1) flash memory
2) CMOS
3) bays
4) buses
5) peripherals
29. One megabyte equals approximately
1) 1000 bytes
2) 1000 bits
3) 1 million bytes
4) 1 million bits
5) 2000 bytes
30. An expansion board that provides the electronic components to make a connection between a computer and a network is called a ____.
1) collective network
2) logical address
3) network interface card (NIC)
4) wide area network
5) None of these
31. How are data organized in a spreadsheet?
1) lines and spaces
2) layers and planes
3) height
4) columns and rows
5) none
32. The blinking symbol on the computers screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
33. When a particular object or an image is copied, in which of the following places it is stored?
1) ROM
2) hard drive
3) diskette
4) dash bord
5) clipboard
34. A software that is not protected by copyright or trademark is?
1) Vertical Market software
2) Public domain software
3) Shareware Software
4) Trial ware
5) Adware
35. MIME is an acronym for ____
1) Multiprogramming Internet Mail extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
36. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
37. A program embedded in a semiconductor chip during their manufacture is called
1) humanware
2) firmware
3) liveware
4) handware
5) software
38. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
39. The popular name for 'Infor-mation Super Highway' is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
40. Blu-Ray disk is an example of a(n) ____
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
41. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
42. ____ is the storage area for e-mails
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
43. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
44. Thermal Printer is ____ kind of printer.
1) Impact Printer
2) Non impact printer
3) Laser printer
4) Line printer
5) None of these
45. Which of the following is not a web browser?
1) Firefox
2) IE
3) Opera
4) Skype
5) Chrome
46. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
1) Puck
2) Printer
3) Plotter
4) Television
5) Projector
Answers:
1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3;
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3;
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3;
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3;
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1
1) hard disk
2) RAM
3) CPU
4) ROM
5) none of these
2. Which of the following is a networking hardware?
1) Bridge
2) Router
3) NIC
4) Switch
5) All the above
3. Two or more computers connected to each other for sharing information form a ____
1) network
2) router
3) server
4) tunnel
5) pipeline
4. Computers that are portable and convenient for users who travel are known as ____
1) super computers
2) laptops
3) mini computers
4) file server
5) none
5. What is the term for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) none of these
6. Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
1) Data Independence
2) Data Redundancy
3) Data Maintainance
4) Data Security
5) None of these
7. The code for a web page is written using ____
1) a 5th generation language
2) Wip Zip
3) perl
4) HTML
5)URL
8. The first computers were programmed using ____
1) assembly language
2) machine language
3) source code
4) object code
5) none
9. When the pointer is positioned on a ____ it is shaped link a hand.
1) grammar error
2) hyperlink
3) screen tip
4) spelling error
5) all
10. My SQL, MS Access are examples of:
1) Dataware Houses
2) File Management Systems
3) Database Management Systems
4) Multi Dimensional Database
5) None of these
11. Which of the following is the software application which enables the electronic handling of recruitment needs.
1) Applicant Tracking System (ATS)
2) Web Conference
3) Information System
4) Online Interview
5) None of these
12. Which of the following device operates at the physical layer ?
1) bridge
2) router
3) repeater
4) all of the above
5) none
13. For separating channels in FDM, it is necessary to use
1) time slots
2) bandpass filters
3) differentiation
4) all of these
5) none
14. Encryption and decryption are functions of
1) transport layer
2) session layer
3) presentation layer
4) all of these
5) none
15. Which of the following types of table constraints will prevent the entry of duplicate rows?
1) primary key
2) unique
3) null
4) foreign key
5) none of these
16. ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
1) Wireless data transmission
2) Digitization
3) Convergence
4) Analog transfer
5) None of these
17. Which multiplexing technique transmits analog signals?
1) FDM
2) synchronous TDM
3) asynchronous TDM
4) 2 and 3
5) none
18. ____ was a search engine system for the Gopher protocol
1) gobbler
2) archie
3) mikky
4) veronica
5) none of these
19. array is ____
1) linear data structure
2) object
3) class
4) interface
5) none of these
20. How many options does a binary choice offer?
1) none
2) one
3) two
4) four
5) eight
21. Data going into the computer is called
1) output
2) algorithm
3) input
4) flowchart
5) all of these
22. How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) 512
23. ____ is a technique that is used to send more than one call over a single line.
1) Multiplexing
2) Infrared transmission
3) Streaming
4) Digital transmission
5) None of these
24. ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
1) Transaction acquisition
2) Internet protocol
3) Circuit switching
4) Packet switching
5) None of these
25. A set of instructions telling the computer what to do is called
1) mentor
2) instructor
3) compiler
4) program
5) debugger
26. computer connected to a LAN can
1) run faster
2) go on line
3) share information
4) E-mail
5) none
27. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
28. Information travels between components on the motherboard through
1) flash memory
2) CMOS
3) bays
4) buses
5) peripherals
29. One megabyte equals approximately
1) 1000 bytes
2) 1000 bits
3) 1 million bytes
4) 1 million bits
5) 2000 bytes
30. An expansion board that provides the electronic components to make a connection between a computer and a network is called a ____.
1) collective network
2) logical address
3) network interface card (NIC)
4) wide area network
5) None of these
31. How are data organized in a spreadsheet?
1) lines and spaces
2) layers and planes
3) height
4) columns and rows
5) none
32. The blinking symbol on the computers screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
33. When a particular object or an image is copied, in which of the following places it is stored?
1) ROM
2) hard drive
3) diskette
4) dash bord
5) clipboard
34. A software that is not protected by copyright or trademark is?
1) Vertical Market software
2) Public domain software
3) Shareware Software
4) Trial ware
5) Adware
35. MIME is an acronym for ____
1) Multiprogramming Internet Mail extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
36. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
37. A program embedded in a semiconductor chip during their manufacture is called
1) humanware
2) firmware
3) liveware
4) handware
5) software
38. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
39. The popular name for 'Infor-mation Super Highway' is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
40. Blu-Ray disk is an example of a(n) ____
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
41. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
42. ____ is the storage area for e-mails
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
43. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
44. Thermal Printer is ____ kind of printer.
1) Impact Printer
2) Non impact printer
3) Laser printer
4) Line printer
5) None of these
45. Which of the following is not a web browser?
1) Firefox
2) IE
3) Opera
4) Skype
5) Chrome
46. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
1) Puck
2) Printer
3) Plotter
4) Television
5) Projector
Answers:
1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3;
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3;
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3;
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3;
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1
Subscribe to:
Posts (Atom)