Monday, 7 October 2013

COMPUTER AWARENESS PRACTICE MCQs

1.    Which of the following component is required to process data into information and consists of integrated circuits.
     1) hard disk    
2) RAM
     3) CPU     
4) ROM
     5) none of these
 
 2.    Which of the following is a networking hardware?
     1) Bridge    
2) Router
     3) NIC    
4) Switch
     5) All the above
 
 3.    Two or more computers connected to each other for sharing information form a ____
     1) network    
2) router
     3) server   
4) tunnel    
5) pipeline
 
 4.    Computers that are portable and convenient for users who travel are known as ____
     1) super computers
     2) laptops    
3) mini computers
     4) file server    
5) none
 
 5.    What is the term for unsolicited e-mail?
     1) newsgroup    
2) usenet
     3) backbone    
4) spam
     5) none of these
 
 6.    Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
     1) Data Independence
     2) Data Redundancy
     3) Data Maintainance
     4) Data Security
     5) None of these
 
 7.    The code for a web page is written using ____
     1) a 5th generation language
     2) Wip Zip    
3) perl
     4) HTML    
5)URL
 
 8.    The first computers were programmed using ____
     1) assembly language
     2) machine language
     3) source code
     4) object code    
5) none
 
 9.    When the pointer is positioned on a ____ it is shaped link a hand.
     1) grammar error    
2) hyperlink
     3) screen tip    
4) spelling error
     5) all
 
 10.    My SQL, MS Access are examples of:
     1)    Dataware Houses
     2)    File Management Systems
     3)    Database Management Systems
     4)    Multi Dimensional Database
     5)    None of these
 
 11.    Which of the following is the software application which enables the electronic handling of recruitment needs.
     1)    Applicant Tracking System (ATS)
     2)    Web Conference
     3)    Information System
     4)    Online Interview
     5)    None of these
 
 12.    Which of the following device operates at the physical layer ?
     1) bridge   
2) router    
3) repeater
     4) all of the above    
5) none
 
 13.    For separating channels in FDM, it is necessary to use
     1) time slots    
2) bandpass filters
     3) differentiation
     4) all of these     
5) none
 
 14.    Encryption and decryption are functions of
     1) transport layer 
2) session layer
     3) presentation layer
     4) all of these    
5) none
 
 15.    Which of the following types of table constraints will prevent the entry of duplicate rows?
     1) primary key    
2) unique
     3) null     
4) foreign key
     5) none of these
 
 16.    ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
     1) Wireless data transmission
     2) Digitization    
3) Convergence
     4) Analog transfer
     5) None of these
 
 17.    Which multiplexing technique transmits analog signals?
     1) FDM
     2) synchronous TDM
     3) asynchronous TDM
     4) 2 and 3    
5) none
 
 18.    ____ was a search engine system for the Gopher protocol
     1) gobbler     
2) archie
     3) mikky     
4) veronica
     5) none of these
 
 19.    array is ____
     1) linear data structure
     2) object     
3) class
     4) interface    
5) none of these
 
 20.    How many options does a binary choice offer?
     1) none    
2) one
     3) two    
4) four    
5) eight
 
 21.    Data going into the computer is called
     1) output     
2) algorithm
     3) input     
4) flowchart
     5) all of these
 
 22.    How many values can be represented by a single byte?
     1) 4    
2) 16  
3) 64  
4) 256    
5) 512
 
 23.    ____ is a technique that is used to send more than one call over a single line.
     1) Multiplexing
     2) Infrared transmission
     3) Streaming
     4) Digital transmission
     5) None of these
 
 24.    ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
     1) Transaction acquisition
     2) Internet protocol
     3) Circuit switching
     4) Packet switching
     5) None of these
 
 25.    A set of instructions telling the computer what to do is called
     1) mentor     
2) instructor
     3) compiler     
4) program
     5) debugger
 
 26.    computer connected to a LAN can
     1) run faster    
2) go on line
     3) share information
     4) E-mail    
5) none
 
 27.    Which of the following refers to the memory in your computer?
     1) RAM    
2) DSL    
3) USB
     4) LAN    
5) CPU
 
 28.    Information travels between components on the motherboard through
     1) flash memory
     2) CMOS    
3) bays
     4) buses    
5) peripherals
 
 29.    One megabyte equals approximately
     1) 1000 bytes    
2) 1000 bits
     3) 1 million bytes
     4) 1 million bits    
5) 2000 bytes
 
 30.    An expansion board that provides the electronic components to make a connection between a computer and a network is called a  ____.
     1) collective network
     2) logical address
     3) network interface card (NIC)
     4) wide area network
     5) None of these
 
 31.    How are data organized in a spreadsheet?
     1) lines and spaces
     2) layers and planes    
3) height
     4) columns and rows    
5) none
 
 32.    The blinking symbol on the computers screen is called the
     1) mouse    
2) logo    
3) hand
     4) palm    
5) cursor
 
 33.    When a particular object or an image is copied, in which of the following places it is stored?
     1) ROM 
2) hard drive 
3) diskette
     4) dash bord    
5) clipboard
 
 34.    A software that is not protected by copyright or trademark is?
     1) Vertical Market software
     2) Public domain software
     3) Shareware Software
     4) Trial ware     
5) Adware
 
 35.    MIME is an acronym for ____
     1)    Multiprogramming Internet Mail extension
     2)    Multicasting Internet Mail Extension
     3)    Multiple Internet Mail Extension
     4)    Multipurpose Internet Mail Extension
     5)    None of these
 
 36.    Any crime that involves a Computer and a Network is called:
     1) Virus    
2) Malware
     3) Trojan Horse    
4) Cyber crime
     5) Identity Theft
 
 37.    A program embedded in a semiconductor chip during their manufacture is called
     1) humanware 
2) firmware
     3) liveware 
4) handware
     5) software
 
 38.    Which of the following is an Object Oriented Programming Language?
     1) C         
2) Java    
3) C++
     4) Both 2 and 3     
5) Both 1 and 2
 
 39.    The popular name for 'Infor-mation Super Highway' is:
     1) Intranet    
2) Extranet
     3) Virtual Private Network
     4) MAN     
5) Internet
 
 40.    Blu-Ray disk is an example of a(n) ____
     1) Hard disk    
2) Magnetic Disk
     3) Optical Disk
     4) Output Device
     5) None of these
 
 41.    A register that keeps track of the next instruction to be executed is called a(n):
     1) Data Register
     2) Instruction Register
     3) Action Register
     4) Program Counter
     5) None of these
 
 42.    ____ is the storage area for e-mails
     1) Folder    
2) Mail box
     3) Directory    
4) Hard Disk
     5) None of these
 
 43.    Which of the following best defines Embedded system?
     1)    A program that comes wrapped in a box
     2)    A program that is permanent part of a computer
     3)    A computer that is a part of a larger computer
     4)    A computer and software system that controls a machine
     5)    None of these
 
 44.    Thermal Printer is ____ kind of printer.
     1) Impact Printer
     2) Non impact printer
     3) Laser printer    
    4) Line printer
     5) None of these
 
 45.    Which of the following is not a web browser?
     1) Firefox     
2) IE
     3) Opera    
4) Skype
     5) Chrome
 
 46.    Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
     1) Puck     
2) Printer
     3) Plotter     
4) Television
     5) Projector
 
 
 Answers:
 1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3; 
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3; 
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3; 
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3; 
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1

COMPUTER AWARENESS PRACTICE MCQs

1.    Which of the following component is required to process data into information and consists of integrated circuits.
     1) hard disk    
2) RAM
     3) CPU     
4) ROM
     5) none of these
 
 2.    Which of the following is a networking hardware?
     1) Bridge    
2) Router
     3) NIC    
4) Switch
     5) All the above
 
 3.    Two or more computers connected to each other for sharing information form a ____
     1) network    
2) router
     3) server   
4) tunnel    
5) pipeline
 
 4.    Computers that are portable and convenient for users who travel are known as ____
     1) super computers
     2) laptops    
3) mini computers
     4) file server    
5) none
 
 5.    What is the term for unsolicited e-mail?
     1) newsgroup    
2) usenet
     3) backbone    
4) spam
     5) none of these
 
 6.    Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
     1) Data Independence
     2) Data Redundancy
     3) Data Maintainance
     4) Data Security
     5) None of these
 
 7.    The code for a web page is written using ____
     1) a 5th generation language
     2) Wip Zip    
3) perl
     4) HTML    
5)URL
 
 8.    The first computers were programmed using ____
     1) assembly language
     2) machine language
     3) source code
     4) object code    
5) none
 
 9.    When the pointer is positioned on a ____ it is shaped link a hand.
     1) grammar error    
2) hyperlink
     3) screen tip    
4) spelling error
     5) all
 
 10.    My SQL, MS Access are examples of:
     1)    Dataware Houses
     2)    File Management Systems
     3)    Database Management Systems
     4)    Multi Dimensional Database
     5)    None of these
 
 11.    Which of the following is the software application which enables the electronic handling of recruitment needs.
     1)    Applicant Tracking System (ATS)
     2)    Web Conference
     3)    Information System
     4)    Online Interview
     5)    None of these
 
 12.    Which of the following device operates at the physical layer ?
     1) bridge   
2) router    
3) repeater
     4) all of the above    
5) none
 
 13.    For separating channels in FDM, it is necessary to use
     1) time slots    
2) bandpass filters
     3) differentiation
     4) all of these     
5) none
 
 14.    Encryption and decryption are functions of
     1) transport layer 
2) session layer
     3) presentation layer
     4) all of these    
5) none
 
 15.    Which of the following types of table constraints will prevent the entry of duplicate rows?
     1) primary key    
2) unique
     3) null     
4) foreign key
     5) none of these
 
 16.    ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
     1) Wireless data transmission
     2) Digitization    
3) Convergence
     4) Analog transfer
     5) None of these
 
 17.    Which multiplexing technique transmits analog signals?
     1) FDM
     2) synchronous TDM
     3) asynchronous TDM
     4) 2 and 3    
5) none
 
 18.    ____ was a search engine system for the Gopher protocol
     1) gobbler     
2) archie
     3) mikky     
4) veronica
     5) none of these
 
 19.    array is ____
     1) linear data structure
     2) object     
3) class
     4) interface    
5) none of these
 
 20.    How many options does a binary choice offer?
     1) none    
2) one
     3) two    
4) four    
5) eight
 
 21.    Data going into the computer is called
     1) output     
2) algorithm
     3) input     
4) flowchart
     5) all of these
 
 22.    How many values can be represented by a single byte?
     1) 4    
2) 16  
3) 64  
4) 256    
5) 512
 
 23.    ____ is a technique that is used to send more than one call over a single line.
     1) Multiplexing
     2) Infrared transmission
     3) Streaming
     4) Digital transmission
     5) None of these
 
 24.    ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
     1) Transaction acquisition
     2) Internet protocol
     3) Circuit switching
     4) Packet switching
     5) None of these
 
 25.    A set of instructions telling the computer what to do is called
     1) mentor     
2) instructor
     3) compiler     
4) program
     5) debugger
 
 26.    computer connected to a LAN can
     1) run faster    
2) go on line
     3) share information
     4) E-mail    
5) none
 
 27.    Which of the following refers to the memory in your computer?
     1) RAM    
2) DSL    
3) USB
     4) LAN    
5) CPU
 
 28.    Information travels between components on the motherboard through
     1) flash memory
     2) CMOS    
3) bays
     4) buses    
5) peripherals
 
 29.    One megabyte equals approximately
     1) 1000 bytes    
2) 1000 bits
     3) 1 million bytes
     4) 1 million bits    
5) 2000 bytes
 
 30.    An expansion board that provides the electronic components to make a connection between a computer and a network is called a  ____.
     1) collective network
     2) logical address
     3) network interface card (NIC)
     4) wide area network
     5) None of these
 
 31.    How are data organized in a spreadsheet?
     1) lines and spaces
     2) layers and planes    
3) height
     4) columns and rows    
5) none
 
 32.    The blinking symbol on the computers screen is called the
     1) mouse    
2) logo    
3) hand
     4) palm    
5) cursor
 
 33.    When a particular object or an image is copied, in which of the following places it is stored?
     1) ROM 
2) hard drive 
3) diskette
     4) dash bord    
5) clipboard
 
 34.    A software that is not protected by copyright or trademark is?
     1) Vertical Market software
     2) Public domain software
     3) Shareware Software
     4) Trial ware     
5) Adware
 
 35.    MIME is an acronym for ____
     1)    Multiprogramming Internet Mail extension
     2)    Multicasting Internet Mail Extension
     3)    Multiple Internet Mail Extension
     4)    Multipurpose Internet Mail Extension
     5)    None of these
 
 36.    Any crime that involves a Computer and a Network is called:
     1) Virus    
2) Malware
     3) Trojan Horse    
4) Cyber crime
     5) Identity Theft
 
 37.    A program embedded in a semiconductor chip during their manufacture is called
     1) humanware 
2) firmware
     3) liveware 
4) handware
     5) software
 
 38.    Which of the following is an Object Oriented Programming Language?
     1) C         
2) Java    
3) C++
     4) Both 2 and 3     
5) Both 1 and 2
 
 39.    The popular name for 'Infor-mation Super Highway' is:
     1) Intranet    
2) Extranet
     3) Virtual Private Network
     4) MAN     
5) Internet
 
 40.    Blu-Ray disk is an example of a(n) ____
     1) Hard disk    
2) Magnetic Disk
     3) Optical Disk
     4) Output Device
     5) None of these
 
 41.    A register that keeps track of the next instruction to be executed is called a(n):
     1) Data Register
     2) Instruction Register
     3) Action Register
     4) Program Counter
     5) None of these
 
 42.    ____ is the storage area for e-mails
     1) Folder    
2) Mail box
     3) Directory    
4) Hard Disk
     5) None of these
 
 43.    Which of the following best defines Embedded system?
     1)    A program that comes wrapped in a box
     2)    A program that is permanent part of a computer
     3)    A computer that is a part of a larger computer
     4)    A computer and software system that controls a machine
     5)    None of these
 
 44.    Thermal Printer is ____ kind of printer.
     1) Impact Printer
     2) Non impact printer
     3) Laser printer    
    4) Line printer
     5) None of these
 
 45.    Which of the following is not a web browser?
     1) Firefox     
2) IE
     3) Opera    
4) Skype
     5) Chrome
 
 46.    Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
     1) Puck     
2) Printer
     3) Plotter     
4) Television
     5) Projector
 
 
 Answers:
 1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3; 
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3; 
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3; 
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3; 
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1

Tuesday, 24 September 2013

COMPUTER AWARENESS PRACTICE MCQs

1.    The main reason to encrypt a file is?
    a) Reduce its size
    b) Secure it for transmission
    c) Prepare it for backup
    d) Include it in the start-up sequence
    e) None of the above

2.     Which of the following is used to communicate between two computers?
    a) Communication software
    b) Protocol
    c) Communication hardware
    d) All the above including access to Transmission medium
    e) None of the above

3.    The lowest form of computer language is called?
    a) BASIC    
b) FORTRAN
    c) Machine language
    d) COBOL    
e) None

4.    Which of the following is not a Operating system for mobile phones?
    a) Android    
b) Symbian    
c) iOS    
d) Bada
e) All of these are OS for mobile phones

5.    This type of file is created by word processors?
    a) worksheet    
b)document    
c) database    
d)presentation    
e) none of the these

6.    _____allows users to upload files to an online site so they can be viewed and edited from another location?
    a) General-purpose application
    b) Microsoft Outlook
    c) Web-hosted technology    
   d) Office Live  
   e) None of these

7.    Which of these is not a means of personal communication on the internet?
    a) Chat     
   b) Instant messaging
    c) Insta notes
    d) Electronic mail
    e) None of these

8.    When entering text within a document, the enter key is normally pressed at the end of every?
    a) Line    
b) Sentence    
c) Paragraph    
d) Word    
e) File

9.    Which of the following software could assist someone who cannot use their hands for computer input?
    a) Video conferencing
    b) speech recognition
    c) Audio digitizer
    d) Synthesizer
    e) None of these

10. ___ software creates a mirror image of the entire hard disk, including the operating system, applications, files, and data?
    a) Operating system
    b) Backup software
    c) Utility programs
    d) Driver imaging
    e) None of these

11.    If you are going to a site you use often, instead of having to type in the address every time, you should?
    a) Save it as a file
    b) Make a copy of it
    c) Bookmark it        
d) Delete it
    e) None of the above

12.     Outlook Express is a(n)?
    a) Word Processor
    b) Spread Sheet      
c) Email client
    d) Presentation   
e) None of these

13.    A device that provides emergency power to your computer, conditions the voltage, and protects against power out is called a?
    a) PSU = Power Supply Unit
b) USP = Universal Surge Protector    
c) UPPS = Universal Power Protection and Supply     
d) UPS = Uninterruptible Power Supply
    e) None of the above

14.    Which is a graphical represe-ntation of an application?
    a) Windows 95    
    b) Windows Explorer
    c) Icon    
d) Taskbar    
e) None of the above

15. A program that enables you to perform calculations involving rows and columns of numbers is called?
    a) Spreadsheet program
    b) Word processor
    c) Graphics package
    d) Window    
e) None of these

16.     In a network, the most reliable communication is provided by ____ protocol?
    a) FTP     
b) HTTP     
c) TCP
    d) IP          
e) UDP

17.    ____ terminals are often connected to  complex inven-tory and sales computer systems?
    a) Data    
b) Information    
c) Credit Cards      
d) Query
    e) Point-of-Sale (POS)

18.    VOIP is the acronym for?
a)    Voice Oriented Internet Protocol    
b)    Virtual Object Internet Protocol
c)    Voice Over Internet Protocol
d)    Virtual Object Intranet Protocol    
    e) None of these

19.    What type of program controls various computer parts and allows the user to interact with the computer ?
    a) Utility software
    b) Operating system
    c) Word processing software
    d) Database program
    e) None of the above

20.    What is the full form of EPROM?
a)    Erasable Program Read Only Memory
b)    Electrically Programmable  Read Only Memory
c) Erasable Programmable Read  Only Memory
d)    Erasable Progressive  Read Only Memory
e) Erasable Periodic Read Only Memory

21. In MS-Word, a menu item in dim color (gray) indicates that the item is?
    a) Toggle menu
b)    Unavailable for current context
    c) Not much required menu    
d) Over-used menu
    e) None of these

22. _____ is a technique that is used to send more than one call over a single line?
    a) Digitizing    
b) Duplexing    
c) Infrared Transmission    
    d) Streaming    
e) Multiplexing

23.    Which of the following term is not associated with Display Device of the computer?
    a) LCD    
b) LED    
    c) CRT    
d) WAT    
e) TFT    

24.    The fifth generation computer is also known as?
a) Knowledge information processing system
b)    Very Large Scale Integration (VLSI)
    c) Superfast computer    
    d) Both a and b        
    e) None of the these

25.    Universal Product Code (UPC) is a?
    a) Scanner
    b) Hardware Equipment    
    c) Antivirus
    d) Graphics Adapter
    e) Barcode system

26.    Microsoft office is?
    a) Shareware
    b) Public - domain software
    c) Open - source software
    d) A vertical market application
    e) An application suite

27.    The scrambling of code is also known as?
    a) Encryption    
b) Firewall    
c) Encoding
    d) Password - proofing
    e) None of these

28.    A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic media?
    a) plates     
b) disks
    c) relays    
d) memories
    e) platters

29.    Which of the following is the advantage if using a spread-sheet ?
    a)    Calculations can be done automatically     
    b)    Changing data automatically updates calculations
    c) More flexibility
    d) All the above
    e) None of the above

30.    Which of the following memories can be read directly by the computer processor?
    a) Hard Disk    
    b) Main Memory   
c) CD
    d) DVD    
e) None of these

31.    The _______, also called the Web, contains billions of documents?
    a) Word Wide Web
    b) HTTP    
c) Web portal    
d) Domain    
e) None of these

32.    Ctrl, Shift, Alt are called ____ Keys?
    a) Modifier    
b) Function    
c) Alphanumeric
    d) adjustment    
e) Specifier

33.    A mistake in an algorithm that causes incorrect results is called?
    a) Logical error        
b) Syntax error    
c) Machine Error    
    d) Compiler error 
e) None

34.    Magnetic Disk medium uses ___ method for accessing data?
    a) Direct    
b) Serial    
    c) Sequential    
d) Rotational    
e) None

35.    CGI Stands for?
    a) Common Gateway Imaging    
b) Computer Gateway Imaging            
c) Computer Generated Imagery    
d) All the above
    e) None of the above

36.    Firewalls are used to protect against?
    a) Unauthorised attacks
    b) Virus attacks
    c) Data - driven attacks
    d) Fire attacks
    e) None of these

37.    The Software that allows users to surf the internet is called?
    a) Search engine
    b) Internet Service Provider(ISP)
    c) Multimedia    d) Browser
    e) None of these

38.    Following is true for Bandwidth?
a)    The narrow the bandwidth of a communications system the less data it can transmit in a given period of time.
b)    The narrow the bandwidth of a communications system the more data it can transmit in a given period of time.
c)    The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
    d) All of the above
    e) None is true

39.    The following is a communica-tion device (modem) which allows an ordinary telephone to be used with a computer device for data transmission?
    a) Keyboard  
b) Acoustic coupler
    c) Mobile phone
    d) All of the above 
e) None

40. For Creating a document, you use __command from the  file menu?
    a) Open    
b) Close   
c) New    
d) Save     
e) None of the above

Answers
1)  b    2)  d    3)  c    4)  e    5)  b          6)  c    7)  c    8)  c    9)  b    10) b
11) c    12) c    13) d    14) c    15) a   16) c    17) e    18) c    19) b    20) c
21) b    22) e    23) d    24) a    25) e   26) e    27) a    28) e    29) d    30) b
31) a    32) a    33) a    34) a    35) c   36) a    37) d    38) a    39) b    40) c