Monday, 16 April 2012

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1.The first generation of computers were based upon
(a) transistors
(b) lC’s
(c) valves
(d) conductor
Ans : c
2.Turbo switch on computer is in
(a) back panel
(b) is not there
(c) front panel
(d) All of these
Ans : c
3.The second generation computers were based upon
(a) transistors
(b) ICs
(c) valves
(d) chips
Ans : a
4.RAM stands for
(a) Random Allowed Memory
(b) Ready Access Memory
(c) Random Access Memory
(d) Random Added Memory
Ans : c
5.In programming, you use the following keys
(a) Arrow keys
(b) Function keys
(c) Alpha keys
(d) Num keys
Ans : b
6.Printer is a device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
7.Laser printer is device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
8.Track ball has a
(a) ball
(b) track
(c) football
(d) None of these
Ans : a
9.Dot matrix printer uses what for printing
(a) hammers
(b) slugs
(c) mouse
(d) nibs
Ans : a
10.A CD can hold approximately how much of data
(a) 200 MB
(b) 700 MB
(c) 1000 MB
(d) 2000 MB
Ans : b
11. Computer program which controls the operations of computer is called
(a) assembles
(b) operating System
(c) interpreter
(d) compiler
Ans : b
12. System software are of two types operating systems and
(a) applications
(b) word processing
(c) language trans
(d) None of these
Ans : c
13.Debugging tools are there to debug errors in
(a) printers
(b) keyboards
(c) programs
(d) language
Ans : c
14. There are two basic types of disks-floppy disk and
(a) low disk
(b) hard disk
(c) soft disk
(d) None of these
Ans : b
15. It is a collection of facts and figures
(a) data
(b) information
(c) processing
(d) file
Ans : a
16.It converts accepted instructions into machine language
(a) input unit
(b) output unit
(c) processing unit
(d) memory unit
Ans : a
17. To open a new file in MS-Word, the shortcut key is
(a) Ctrl + X
(b) Ctrl + N
(c) Ctrl + Y
(d) Ctrl + V
Ans : b
18. What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper?
(a) Search & Replace
(b) Pagination
(c) Soft Copy
(d) WYSIWYG
Ans : d
19. Alignment buttons are available on which toolbar?
(a) Status
(b) Standard
(c) Formatting
(d) None of these
Ans : c
20. Which of the following is not an option of edit menu?
(a) Cut
(b) Copy
(c) Paste
(d) Page setup
Ans : d
21. By default the bottom margin in the word document is
(a) 2 inch
(b) 1 inch
(c) 3 inch
(d) 1.5 inch
Ans : b
22.A file name cannot contain in MS-Word database file
(a) a letter
(b) number
(c) underscore
(d) space
Ans : d
23.Selection of text involves only
(a) single word
(b) line or multiple lines
(c) paragraph or paragraphs and complete document
(d) All of the above
Ans : d
24.‘Replace’ option is available in
(a) Edit menu
(b) File menu
(c) Tools menu
(d) Insert menu
Ans : a
25.When you start spelling checker, it starts checking the spellings
(a) from the end of the document to upward
(b) from the beginning of the document and downward
(c) from the insertion point
(d) None of the above
Ans : c

IBPS COMPUTER KNOWLEDGE PRACTICE MCQs


Question 1: Name the device that provides attachment points for RAM, Video Cards, Graphics card, Modem etc.
1. processor
2. father board
3. motherboard
4. modem
Answer: 3.

Question 2: Which term identifies a specific computer on the web and main page of the entire site
1. None
2. URL
3. Website address
4. Hyperlink
5. Domain name
Answer: 2.

Question 3: In C, An array that uses more than two subscripts is known as
1. One dimentional Array
2. Two Dimentional Array
3. Three Dimentional Array
4. Multi Dimentional Array
Answer: 4.

Question 4: Predict the output or error(s) for the following:
void main()
{
int const * p=5;
printf("%d",++(*p));
}
1. Compiler error: Cannot modify a constant value.
2. 5
3. 6
4. 7
5.
Answer: 1.

Question 5: Which command is used to undelete delete a bunch of files with extension doc that you have just deleted
1. Undelete
2. Undelete *.doc
3. Undelete/all
4. All of the above
Answer: 2.

Question 6: In the SAR sub layer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and there is no added header or trailer
1. AAL1
2. AAL2
3. AAL3/4
4. AAL5
Answer: 4.

Question 7: Special I/O instruction r required for
1. a. Memory mapped I/O
2. b. I/O mapped I/O
3. c. both of these
4. d. none of these
Answer: 1.

Question 8: Which of the following is not a type of UNIX shell?
1. KORN SHELL
2. BOURNE SHELL
3. C SHELL
4. JOIN SHELL
Answer: 4.

Question 9: The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual pipe between the customer and the carrier through which bits flow
1. digital byte pipe
2. analog bit pipe
3. digital pipe
4. digital bit pipe
Answer: 4.

Question 10: You use the History panel to:
1. insert Flash buttons.
2. insert images.
3. format text.
4. display the actions performed.
Answer: 4.

Question 11: What was the first ARPANET message?
1. "lo"
2. "hello world"
3. "mary had a little lamb"
4. "cyberspace, the final frontier"
Answer: 1.

Question 12: The name for the way that computers manipulate data into information is called:
1. Programming
2. Processing
3. Storing
4. Organizing
Answer: 2.

Question 13: The information related to multi-programmed hosts is placed in the header of _ _ _ _ _ _ _ Layer
1. Application layer
2. Transport Layer
3. Session layer
4. Network Layer.
Answer: 2.

Question 14: Which is not true for primary storage?
1. Information must be transferred to primary storage
2. It is relatively more expensive and it is a part of the CPU
3. It allows very fast access to data
4. All the above
Answer: 4.

Question 15: At which OSI layer does data translation and code formatting occur?
1. Network
2. Physical
3. Data link
4. Transport
5. Presentation
Answer: 5.

Question 16: Purpose of PC (Program Counter) in a Microprocessor is
1. To store address of TOS (Top Of Stack)
2. To store address of next instruction to be executed.
3. Count the number of instructions.
4. To store base address of the stack.
Answer: 2.

Question 17: In Photoshop You want to specify a halftone screen frequency when you print your image. Which command should you choose to access this option?
1. File > Print with Preview
2. File > Print
3. File > Page Setup
4. File > Print One Copy
Answer: 1.

Question 18: What command is used to partition a hard drive?
1. Fdisk
2. Format
3. Chkdsk
Answer: 1.

Question 19: For most of computers,the number of scan lines varies between
1. 100 and 1000
2. 200 and 2000
3. 300 and 3000
4. None of these
Answer: 1.

Question 20: The ..... tells the rest of the computer how to carry out a program's instructions.
1. ALU
2. System Unit
3. Control Unit
4. Motherboard
Answer: 2.

Question 21: You are working on a complex marketing problem and want to use the Solver feature of Excel. What are the three pieces of information that must be provided to the Solver to solve the problem?
1. Your data, variables, and constraints.
2. Your target, variables and data range.
3. Your target, variables and constraints.
4. Your target, subtotals and constraints.
Answer: 3.

Question 22: Default line spacing in Word is
1. Single
2. Double
3. 1.5
4. Multiple
Answer: 1.

Question 23: The computer code for interchange of information between terminals is
1. ASCII
2. BCD
3. BCDIC
4. Hollerith
Answer: 1.

Question 24: Which of the following command is used to count just the number of lines contained in a file ?
1. wc-1
2. wc-w
3. wc-c
4. wc-r
Answer: 1.

Question 25: One of the major components of a PC is the Central Processing Unit (CPU) which can be best described as:
1. The device that sends the bus signals telling it what to do.
2. The area that regulates all of the system power usage
3. The area where all the of the Basic input/output routines are stored
4. The area where all of the processing takes place
Answer: 4.

IBPS COMPUTER KNOWLEDGE PRACTICE PAPER


1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)

2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)

3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)

4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)

5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)


6. An ad hoc query is a______________
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)

7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)

8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)

9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)

10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)

11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)

12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)

13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)

14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)

16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)

17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)

18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)

19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)

20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)

21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)

22. The motherboard is the_____________
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)

23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)

24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)

25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)

26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)

27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)

28. All the deleted files go to_____________
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)

30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)

31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)

32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)

33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)

34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)

35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)

36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)

37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)

38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)

39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)

40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)

41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)

42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as____________
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)

43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)

44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)

45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)

46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)

47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)

48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)

49. The first step in the transaction processing cycle is___________
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)

50. In the information systems concept, the output function involves__________
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)

COMPUTER KNOWLEDGE PRACTICE MCQs


Question 1: Which of the following is not part of the data link layer?
1. Transports data across the physical link
2. Performs physical addressing
3. Performs flow control
4. Determines network topology
5. Terminates a session
Answer: 5.

Question 2: A sensor that informs a body computer about temperature, such as an ambient air temperature sensor for A/C is a:
1. potentiometer.
2. hall-effect switch.
3. thermistor.
4. thermodiode.
Answer: 3.

Question 3: Which of the following is single user computer with many features and good processing power?
1. Minicomputer
2. Workstation
3. Macintosh
4. None of these
Answer: 2.

Question 4: Computer ethics has its own roots in the work of ________during the World War II
1. Nobert Wiener
2. Herman Hollerith
3. Robert Wiener
4. Herman Wiener
Answer: 1.

Question 5: The windows registry consists of which two files?
1. autoexec.bat and config.sys
2. user.dat and win.ini
3. user.dat and system.dat
4. win.reg and user.dat
Answer: 3.

Question 6: Which Open Systems Interconnections (OSI) layer does IP belong to?
1. Session layer
2. Data link layer
3. Transport layer
4. Network layer
Answer: 4.

Question 7: Keyboard is an ............
1. Input device
2. Memory device
3. Output device
4. None of the above
Answer: 1.

Question 8: The destroyList() member function deletes the contents of the linked list and
1. does not delete the linked list itself
2. delete the linked list itself
3. adds the linked list itself
4. None of the above
Answer: 1.

Question 9: The Objective of testing is-
1. Debugging
2. To uncover errors
3. To gain modularity
4. To analyze system
Answer: 2.



Question 10: In token Ring , when a frame reaches its destination station, which of the following occurs?
1. the message is copied
2. four bits in the packet are not changed
3. the message is take off the ring and replaced by the token
4. the message is removed from the buffer
Answer: 1.

Question 11: MSword what is the short cut of paste
1. CTRL+V
2. CTRL+A
3. CTRL+C
4. CTRL+F
Answer: 1.

Question 12: In digital computer, all the expressions are coded into ...........
1. Octal digits
2. Binary digits
3. Hexadecimal digits
4. Decimal digits
Answer: 2.

Question 13: The purpose of the _______ layer is to transport a raw bit stream from one machine to another
1. Physical Layer
2. Data Link Layer
3. Network layer
4. Application Layer
Answer: 1.

Question 14: Register is a
1. Set of capacitors used to register input instructions in a digital computer
2. Set of paper tapes and cards put in a file
3. Temporary storage unit within the CPU having dedicated or general purpose use
4. part of the auxiliary memory
Answer: 3.

Question 15: Identify the directives of JSP.
1. page, include, and taglib
2. include, autoFlush, and taglib
3. page, import, taglib, and buffer
4. contentType, include, and taglib
Answer: 1.

Question 16: A(n) ____________ system is a small, wireless handheld computer that scans an item̢۪s tag and pulls up the current price (and any special offers) as you shop
1. PSS
2. POS
3. inventory
4. data mining
Answer: 1.

Question 17: Which one of the following is the valid SAX enabled parser?
1. XML4J
2. XML Parser
3. DTD Parser
4. Tool Parser
Answer: 1.

Question 18: In the following the fastest computer constituent is
1. CPU
2. Magnetic Tape
3. Video Terminal
4. Sensors and Mechanical controllers
Answer: 1.

Question 19: DSDD is
1. Double Sided Double Density
2. Dual Sided Double Density
3. Double Sided Dual Density
4. Dual Sided Dual Density
Answer: 1.

Question 20: Which among the following is a software based virtual computer
1. Digital immune module
2. CPU emulator
3. Virus signature scanner
4. Emulation control module
Answer: 2.

Question 21: The operation of subnet is controlled by _ _ _ _ _ _ _ _
1. Network Layer.
2. Data Link Layer
3. Data Layer
4. Transport Layer
Answer: 1.

Question 22: Which one of the following files forms a link to the physical devices and peripherals on a system?
1. Regular files
2. Directory files
3. Device special files
4. Link files
Answer: 3.

Question 23: Name the latest version of Windows
1. Windows 3.1
2. Windows NT
3. Windows 98
4. Windows Vista
Answer: 4.

Question 24: A trie structure is a complete _ _ _ _ _ _ _ _ _ _ _ _ _ tree [19S04]
1. binary
2. search
3. B-tree
4. m- ary
Answer: 4.

COMPUTER AWARENESS PRACTICE MCQs

1. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary
(B) open
(C) experimental
(D) in the public domain
(E) None of these
Answer: (A)

2. A typical modern computer uses
(A) Magnetic cores
(B) LSI chips
(C) Magnetic tapes
(D) More than 1000 vacuum tubes
(E) None of these
Answer: (B)

3.ALU is called for _____ of a computer
(A) Heart
(B) Master dispatcher
(C) Primary memory
(D) All of the above
(E) None of these
Answer: (C)

4. A single dimensional array is called
(A) List
(B) Subscripts
(C) Matrix
(D) File
(E) None of these
Answer: (A)

5.How many types of drawing objects are available in drawing Tool Bar ?
(A) 4
(B) 5
(C) 10
(D) 12
(E) None of these
Answer: (E)

6.Data processing is___
(A) data collection
(B) similar to computer programming
(C) associated with commercial work
(D) akin to data coding
(E) None of these
Answer: (C)

7.In computer terminology, information means
(A) Raw data
(B) Data in more useful
(C) Alphanumeric data
(D) Program
(E) None of these
Answer: (B)

8.What is meant by the term RAM?
(A) Memory which can only be read
(B) Memory which can be both read and written to
(C) Memory which is used for permanent storage
(D) Memory which can only be written to
(E) None of these
Answer: (B)

9. In UNIX, which command is used to sort the lines of data in a file in reverse order
(A) sort
(B) sh
(C) st
(D) sort –r
(E) None of these
Answer: (D)

10. The commonly used UNIX commands like date, ls, cat etc. are stored in
(A) /dev directory
(B) /bin directory
(C) /tmp directory
(D) /unix directory
(E) None of these
Answer: (B)

11. In UNIX, which command is used to change the protection mode of files starting with the string emp and ending with 1, 2 or 3 ?
(A) Chmod u+x emp[1-3]
(B) Chmod 777 emp*
(C) Chmod u+r ??? emp
(D) Chmod 222 emp ?
(E) None of these
Answer: (A)

12. The variables which can be accessed by all modules in a C program, are known as
(A) Local variables
(B) Internal variables
(C) External variables
(D) Global variables
(E) None of these
Answer: (D)

13. Which computer memory is used for storing programs and data currently being processed by the CPU ?
(A) Mass memory
(B) Internal memory
(C) Non-volatile memory
(D) PROM
(E) None of these
Answer: (B)

14. A record that follws a group of related records and contains data relevant to those records is called as....
(A) Trailer record
(B) Traffic record
(C) Transaction record
(D) Transducer
(E) None of these
Answer: (A)

15. A type of semiconductor memory that usually has small capacity but very fast access is
(A) PROM
(B) RAM
(C) Scratchpad
(D) ROM
(E) None of these
Answer: (C)

16. ____ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A) Nanoscience
(B) Microelectrodes
(C) Computer forensics
(D) Artificial intelligence
(E) None of these
Answer: (A)

17.A single pole, single throw switch with one common line and one output line is
(A) Switch circuit
(B) SPDT switch
(C) SPST switch
(D) Star bit
(E) None of these
Answer: (C)

18.A one-bit signal that indicates the start of data transmission by an asynchronous device is
(A) Parity bit
(B) Status bit
(C) Zero bit
(D) Star bit
(E) None of these
Answer: (D)

19.__ is data that has been organized or presented in a meaningful fashion.
(A) A process
(B) Software
(C) Storage
(D) Information
(E) None of these
Answer: (D)

20. The name for the way that computers manipulate data into information is called
(A) programming
(B) processing
(C) storing
(D) organizing
(E) None of these
Answer: (B)

21. Computers gather data, which means that they allow users to _____ data.
(A) present
(B) input
(C) output
(D) store
(E) None of these
Answer: (B)

22. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered
(A) data
(B) output
(C) input
(D) the process
(E) None of these
Answer: (B)

23. A circut with about 100 transistors fabricated on a single chip is called
(A) MCR
(B) MSI
(C) MIS
(D) RJE
(E) None of these
Answer: (B)

Tuesday, 10 April 2012

COMPUTER KNOWLEDGE PRACTICE MCQs


1. ——Key combination that lets you toggle between open windows
a) ALT+SHIFT+TAB
b) ALT+CTRL+TAB
c) ALT+CTRL
d) ALT+TAB

2. When more than one window is open, to switch to the next window — is the key combination
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8

3. To select or unselect one word to the right
a) CTRL+SHIFT
b) CTRL+SHIFT+Down Arrow
c) CTRL+SHIFT+Right Arrow
d) None of the above

4. To maximize or restore a selected window
a) CTRL+F7
b) CTRL+F10
c) CTRL+F8
d) CTRL+F9

5. To Copy a picture of the selected window to the clipboard
a) ALT+TAB
b) ALT+Print Screen
c) Both (a) and (b)
d) None of the above

6. —— Is the key to close a selected drop-down list; cancel a command and close a dialog box
a) TAB
b) SHIFT
c) ESC
d) None of the above

7. — Is the key we use to run the selected command
a) SHIFT
b) TAB
c) ENTER
d) CTRL

8. --- Is the functional key to display save as box
a) F5
b) F6
c) F9
d) F12

9. ----- Is the combination of keys to switch between the last four places that you have edited
a) ALT+CTRL+Z
b) ALT+CTRL+Y
c) ALT+TAB+Z
d) ALT+SHIFT+Z

10. To delete one word to the right
a) CTRL+SHIFT
b) CTRL+TAB
c) CTRL+DEL
d) CTRL+Z

11. --- Is the combination of keys we use to hide rows
a) CTRL+9
b) CTRL+8
c) CTRL+7
d) CTRL+6

12. To hide the columns --- is the functional key
a) CTRL+3
b) CTRL+2
c) CTRL+1
d) CTRL+0

13. --- Is the shortcut key to delete cells, rows or columns
a) CTRL+ Minus Sign
b) CTRL+ Plus Sign
c) CTRL+ Star Sign
d) CTRL+ Greater than Sign

14. To insert cells, rows or columns --- the keyboard shortcut key
a)CTRL+ Minus Sign
b)CTRL+SHIFT+ Plus Sign
c)CTRL+ Star Sign
d)CTRL+ Greater than Sign

15. —— Is the keyboard shortcut key to insert auto sum
a) ALT
b) ALT=
c) ALT+
d) ALT-

16. —— Is the shortcut key to move to the next worksheet
a) CTRL+Pagedown
b) CTRL+Pageup
c) CTRL+Right arrow
d) CTRL+Left arrow

17. —— Is the shortcut key to move to the previous worksheet
a) CTRL+Pagedown
b) CTRL+Pageup
c) CTRL+Right arrow
d) CTRL+Left arrow

18. — Key we use to select row
a) SHIFT+TAB
b) SHIFT+ Spacebar
c) CTRL+ Spacebar
d) SHIFT+ Enter

19. —— Key we use to select column
a) SHIFT+TAB
b) SHIFT+ Spacebar
c) CTRL+ Spacebar
d) SHIFT+ Enter

20. —— Is the key to exit from excel
a) ALT+F2
b) ALT+F3
c) ALT+F4
d) ALT+F5

21. A device, which is not connected to CPU, is called as —-
a) On-line device
b) Off-line device
c) Device
d) None of the above

22. What is the other name for programmed chip?
a) RAM
b) ROM
c) LSIC
d) None of the above

23. On-line real time systems become popular in ---- generation
a) First Generation
b) Second Generation
c) Third Generation
d) Fourth Generation

24. EDVAC stands for
a) Electronic Discrete Variable Automatic Computer
b) Electronic Discrete Value Automatic Computer
c) Electronic Device Variable Automatic Computer
d) Electronic Discrete Variable Advanced Computer

25. EDSAC stands for
a) Electronic Delay Storage Advanced Computer
b) Electronic Data Storage Automatic Computer
c) Electronic Delay Strong Automatic Computer
d) Electronic Delay Storage Automatic Computer

26. LSIC stands for
a) Large Scale Inner Circuits
b) Large Scale Integrated Computer
c) Large Scale Integrated Circuits
d) Large Storage Integrated Circuits

27. The task of performing operations like arithmetic and logical operations is called ----
a) Processing
b) Storing
c) Editing
d) Sorting

28. The ALU and Control Unit jointly known as
a) RAM
b) ROM
c) CPU
d) None of the above

29. RAM is an example of
a) Secondary memory
b) Primary memory
c) Both (a) and (b)
d) None of the above

30. Magnetic disk is an example of
a) Secondary memory
b) Primary memory
c) Both (a) and (b)
d) None of the above

31. A bit is an acronym for
a) Digit
b) Binary digit
c) Number
d) None of the above

32. Each memory cell has a unique number, assigned to it is called as the — of the cell
a) Address
b) Register
c) Number
d) None of the above

33. RAM is also called as
a) Read/Write Memory
b) Long Memory
c) Permanent Memory
d) None of the above

34. —— Store data or information temporarily and pass it on as directed by the control unit
a) Address
b) Register
c) Number
d) None of the above

35. The secondary storage memory is also called as
a) Auxiliary Memory
b) Attractive Memory
c) Chip Memory
d) None of the above

ANSWERS

1. A  2. B 3. C  4. B 5. B 6. C 7. C 8. D 9. A 10. C
   
11. A 12. D 13. A 14.  B 15.  B 16. A  17. B 18. B 19. C 20. C

21. B 22. B 23. C 24. A  25. D 26. C  27. A 28. C  29. B 30. A
   
31. B 32. A 33. A 34. B 35. A