OBJECTIVE: COMPUTER KNOWLEDGE-- with explanation
1. What does the acronym PDF stand for ?
a) Portable Documenting Format b) Portable Documentation File
c) Portable Documentation Format d) Portable Document Format
e) Portable Document File
Exp: d) PDF stands for Portable Document Format. It is a file format used to present documents in a manner independent of application software, hardware, and operating systems. In 1991, Adobe Systems’ co-founder John Warnock outlined a system called “Camelot” that evolved into PDF.
2. LSI in chip technology stands for
a) Large-Scale Integration b) Low — Scale Internet
c) Local — Scale Integration d) Large — Scale Internet
e) Low-Scale Integration
Exp: a) In computing, LSI stands for Large-Scale Integration. It is the process of integrating or embedding thousands of transistors on a single silicon semiconductor microchip. LSI technology was conceived in the mid-1970s; it is no longer in use. It has been succeeded by very large-scale integration (VLSI) and ultra large-scale integration (ULSI) technologies.
3. Which of the following best describes a network in which a company's data and applications are stored at offsite data centers that are accessed over the Internet?
a) Extranet b) Intranet c) Virtual Private Network d) Cloud Computing
e) Local Area Network
Exp: d) Cloud computing refers to a form of network in which a company’s data and apps are stored at offsite data centers that are accessed over the internet. Also known as on-demand computing, it is a kind of Internet-based computing, where shared resources, data and information are provided to computers and other devices on-demand.
4. Which of the following is not a binary number?
a) 110 b) 1001 c) 100110 d) 233 e) 11101
Exp: d) In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system or base-2 numeral system which represents numeric values using two different symbols: typically 0 (zero) and 1 (one). So 233 is not a binary number.
5. Micro Processor speed is measured in
a) Megabytes b) bytes c) kilobytes d) gigabytes e) gigahertz
Exp: e) The speed of microprocessors, called the clock speed, is measured in megahertz (MHz) or gigahertz (GHz). Current microprocessor speed is measured in gigahertz (GHz), or billions of cycles per second. The higher the value, the faster the microprocessor, with average speeds between 2.0 GHz (slower) and 4.0 GHz (faster).
6. __________ is a computer hardware component that connects a computer to computer network.
a) Networking Internet Connection b) Newer Industrial Computer
c) Network Integration Card d) Network Internal Card
e) Network Interface Card
Exp: e) Network Interface Controller, also known as Network Interface Card, is a computer hardware component that connects a computer to a computer network. The NIC contains the electronic circuitry required to communicate using a wired connection (e.g., Ethernet) or a wireless connection (e.g., WiFi).
7. A hard disk drive consists of several fixed, rotating disks called
a) Platters b) RAIDs c) Cylinders d) Plotters e) Mini-disks
Exp: a) A Hard Disk Drive is a secondary storage, random access, high-capacity, high-speed device, usually housed in the system unit, that consists of several rapidly rotating disks called platters on which programs, data, and processed results are stored. In almost all modern computers, the hard disk is by far the most important storage medium.
8. Which of the following is the correct order of the four major functions of a computer?
a) Process, Storage, Input, Output b) Input, Process, Output, Storage
c) Process, Output, Input, Storage d) Storage, Output, Process, Input
e) Input, Output, Process, Storage
Exp: b) A computer is designed for input-output functions which generally include data entry, data processing, information output and storage. Ultimately, a computer is supposed to manipulate data and convert this into usable output. So the four functions of a computer are: Input, Process, Output and Storage.
9. What does the acronym PROM stand for?
a) Programmer Read Only Memory b) Programmable Read Only Memory
c) Programmable Read Once Memory d) Program Read Only Memory
e) Programmed Read Only Memory
Exp: b) PROM stands for Programmable Read-Only Memory. It is a type of ROM (read-only memory) meaning the data in it is permanent and cannot be changed. PROMs are used in digital electronic devices to store permanent data.
10. Which of the following is an electronic or paper log used to track computer activity?
a) Monitor b) Trace route c) Cookie d) Audit trail e) Weblog
Exp: d) In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries. In computing, the term is also used for an electronic or paper log used to track computer activity. Audit trails are used to record customer activity in e-commerce and to investigate cybercrimes.
11. The largest unit of storage is
a) byte b) terabyte c) megabyte d) kilobyte e) gigabyte
Exp: b) Among the given options, Terabyte is the largest unit of storage. It is equal to 1,000,000,000,000 bytes or 10004 bytes. Gigabyte: 10003 bytes; Megabyte: 10002 bytes; Kilobyte: 10001 bytes, etc.
12. Which of the following devices sends and receives data over telephone lines to and from computers?
a) Modem b) Expansion slot c) Printer d) Speaker e) Sound card
Exp: a) A modem (Modulator-Demodulator) is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.
13. How many bytes are there in a terabyte?
a) 1000 b) 1 billion c) 1 trillion d) 1 million e) 1 quadrillion
Exp: c) The terabyte is a multiple of the unit byte for digital information. The prefix ‘tera’ represents the fourth power of 1000, and means 1012 in the International System of Units (SI). Therefore, one terabyte is equal to 1 trillion bytes or 1,000,000,000,000 bytes or 10004 bytes.
14. Which is a pointing device?
a) Joystick b) Monitor c) Scanner d) Plotter e) Printer
Exp: a) The most important pointing devices include Mouse; Trackball; Pointing Stick; Joystick; Touch Pad; Touch Screen, etc. A joystick consists of a vertical handle or hand-held stick that is used to control the movement of pointer on the screen; Joystick is basically used to play video games and in some computer-aided design (CAD) system.
15. Checking whether a program functions correctly, and then correcting errors, is known as a) Decoding b) Error-proofing a program c) Debugging
d) De-erroring e) Default error-checking
Exp: c) When a programmer checks to see if a program functions correctly and then “corrects errors, it is known as debugging. It is the art of diagnosing errors in programs and determining how to correct them. “Bugs” come in a variety of forms, including coding errors, design errors, complex interactions, poor user interface designs, and system failures.
16. This system conversion called __________ involves running the old and new systems simultaneously before converting completely to the new system.
a) pilot conversion b) convergent conversion c) phased conversion
d) direct conversion e) parallel conversion
Exp: e) In parallel conversion, the old and new systems operate simultaneously for a time. This strategy is seldom used today since it is impractical when both the old and new systems are online. Besides, it is the most time consuming and costly conversion process.
17. Programs such as Mozilla Firefox that serve as navigable windows into web are called
a) Internet b) Networks c) Web browser d) URL e) Hypertext
Exp: c) Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. As of October 2015, Firefox was the second most popular web browser after Google Chrome.
18. Which of the following protects the system from hackers?
a) Snort b) Scanner c) Firewall d) Backup e) Hub
Exp: c) The firewall helps protect our computer from hackers who might try to gain access in order to crash it, delete information, or even steal passwords or other sensitive information. It does so by examining the electronic data coming in to and out of our computer.
19. What is Linux?
a) Input Device b) Operating System c) Processor d) Storage Device
e) Output Device
Exp: b) Linux is a Unix-like and mostly POSIX-compliant computer operating system (OS) assembled under the model of free and open-source software development and distribution. The development of Linux is one of the most prominent examples of free and open- source software collaboration.
20. The cell reference for range D20 to H35 in MS Excel will be
a) D20 + H35 b) D20:H35 c) D20 ; H35 d) D20 - H35
e) D20, H35
Exp: b) Each cell reference is an address named for the column - row intersection where the cell is located. D20, for example, is the cell at the intersection of column D and row 20. A range of cells is identified by a pair of cell references separated by a colon (:). D20:H35 for example, refers to the rectangular block of cells between D20 and H35 inclusive.
21. The digital telecommunications term ISDN is an abbreviation for
a) International Service Digital Network b) Integrated Standard Digital Networks
c) Internet Services Data Network d) Interactive Standard Dynamic Networks
e) Integrated Services Digital Network
Exp: e) ISDN stands for Integrated Services for Digital Network. It is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It integrates speech and data on the same lines, adding features that were not available in the classic telephone system.
22. Verification of login name and password is known as
a) Logging in b) Alienation c) Certification d) Authentication
Exp: d) Authentication is the act of confirming the truth of an attribute of a single piece of claimed true by an entity. It involves the prevention of unauthorized access to computer systems. Authentication takes a variety of forms, ranging from verifying account credentials (using, amongst other things, a login name and password) to physical identity verification.
23. If You change Windows 98 operating system to Windows XP, you are performing a(n)
a) push up b) patch c) upgrade d) update e) pull down
Exp: c) In computing and consumer electronics an upgrade is generally a replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics. Changing older operating system is an example of upgrade.
24. While using MS Word, which key deletes text before, or to the left of, the insertion point?
a) Escape b) Delete c) Backspace d) Page down e) Page up
Exp: c) In MS Word, the Backspace key erases the text to the left of the insertion point one character at a time. The Delete key (located below the insert key) erases the text to the right of the insertion point.
25. The minimum number of rows and columns in MS Word document is
a) 1 and 2 b) 1 and 1 c) 2 and 2 d) 2 and 1 e) 3 and 3
Exp: b) The minimum number of rows and columns in MS Word document is 1 and 1. It only has to have 1 cell. Rows are horizontal cells; columns are vertical cells. So naturally, a Word document has 1 row and 1 column.
26. VoIP stands for
a) Voice over Internet Protocol b) Visual Object Integration Program
c) Virtual Object Integration Program d) Virtual object integration Protocol
e) Voice Object Integration Program
Exp: a) VoIP stands for Voice over Internet Protocol. It is a category of hardware and software that enables people to use the Internet as the transmission medium for voice calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.
27. Which of the following place the common data elements in order from smallest to largest?
a) Character, Record, Field, Database, File
b) Character, File, Record, Field, Database
c) Character, Record, Field, File, Database
d) Character, Field, Record, File, Database
e) Database, File, Record, Field, Character
Exp: d) Data are logically organized into:
1. Bits (characters);
The correct order is Database > File > Record > Field > Byte > Bit (Character). Data hierarchy refers to the systematic organization of data, often in a hierarchical form.
28. Which of the following is not an output device in computer organisation?
a) Plotter b) Speaker c) Scanner d) Monitor e) Printer
Exp: c) In computing, an image scanner is a device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image. It is an input device used for direct data entry from the source document into the computer system. It converts the document image into digital form so that it can be fed into the computer.
29. The process of writing computer instructions in a programming language is known as Z,
a) Algorithming b) Processing c) File d) Instructioning
Exp: e) The process of writing computer instructions in a programming language is known as coding. From the program in its human readable form of source coda, a compiler can derive machine code - a form consisting of instructions that the computer can directly execute. Alternatively, a computer program in may be executed with the aid of an interpreter.
30. Which language is directly understood by the computer without translation program?
a) High level language b) Low level language c) Middle level language
d) Assembly language e) Machine language
Exp: e) Machine language, or machine code, is the only language that is directly understood by the computer, and it does not need to be translated. All instructions use binary notation and are written as a string of 1s and 0s. Technically speaking, this is the only language computer hardware understands.
OBJECTIVE: COMPUTER KNOWLEDGE-- with explanation Reviewed by sambasivan srinivasan on 8:58:00 PM Rating: