Google Ads


Computer Knowledge

1.         Which of the following is a feature of UNIX?
            a) Multi - tasking            b) Multi-user      c) Reliable         d) All a, b and c
            e) None of these
2.         KDE and GNOME are two main
            a) Operating systems     b) System boards          c) Graphical user interfaces
            d) Both a and b              e) None of these
3.         __________ controls the way in which a computer system functions and provides name by which users can interact with the computer.
            a) The platform               b) Application software   c) Operating system
            d) The motherboard        e) None of these
4.         Servers are computers that provide resources to other computers connected to a
            a) Mainframe     b) network         c) supercomputer           d) client
            e) None of these
5.         The technique that extends storage capacities of main memory beyond the actual size of the main memory is called
            a) multitasking               b) virtual memory           c) multiprocessing
            d) multiprogramming       e) switching
6.         What are bas, doc, and htm examples of?
            a) extensions     b) domains        c) protocols       d) databases     e) None of these
7.         Office LANs that are spread geographically apart on a large scale can be connected using a corporate.
            a) CAN              b) LAN              c) DAN              d) WAN             e) TAN
8.         A program embedded in a semiconductor chip during their manufacture is called
            a) humanware    b) firmware        c) liveware         d) hardware       e) software
9.         A program that enable you to perform calculations involving rows and columns of numbers is called a
            a) spreadsheet program b) word processor          c) graphics package
            d) window                                  e) None of these
10.        What is the purpose of Software Documenting?
            a) Use and maintenance of software        b) To sell software at a handsome price
            c) To sell software to many customers     d) To show its importance
            e) None of these
11.        To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion point, you have to
            a) paste            b) stick in          c) fit in              d) push in          e) None of these
12.        This command is used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
            a) chop             b) cut                c) clip               d) cart away      e) None of these
13.        Which of the following will translate images of text, drawings and photos into digital form?
            a) digitizer         b) modem          c) scanner         d) keyboard       e) None of these
14.        Data representation is based on the ____________ number system, which users two numbers to represent all data.
            a) binary            b) biometric       c) bicentennial               d) byte e) None of these
15.        ___________ are words that a programming language has set aside for its own use.
            a) Control words             b) Reserved words          c) Reserved keys
            d) Control structures       e) None of these
16.        The blinking point which shows your position in the text is called
            a) blinker           b) cursor           c) causer           d) pointer           e) None of these
17.        SMTP is responsible (for)
            a) sending e-mail                       b) accessing any e-mail             
c) where mails are ready to be sent         d) where mails come      e) None of these
18.        Which type of switching uses the entire capacity of a dedicated link?
            a) Circuit Switching                    b) Virtual Circuit Packet Switching
            c) Datagram Packet Switching    d) Message Switching    e) None of these
19.        In the URL, the portion labeled http is the
            a) Host              b) Domain name            c) Protocol        d) Top-level
            e) None of these
20.        In database, a field is a
            a) label              b) table of information     c) group of related records
            d) category of information                        e) None of these
21.        What is a Gigabyte?
            a) Flash memory           
b) An optical storage medium capable of storing vast amount of information
c) Roughly a trillion bytes
d) Roughly a million bytes
e) Roughly a billion bytes
22.        Which of the following is a Web browser?
            a) Paint             b) PowerPoint                c) Firefox           d) Word
            e) All are Web browsers
23.        Which input device is also used in playing games?
            a) DVD              b) Joystick        c) Light pen       d) Scanner        e) None of these
24.        LCD stand for
            a) Liquid Carbon Diode   b) Liquid Crystal Diode   c) Liquid Crystal Display
            d) Light Crystal Display e) None of these
25.        Most of the commonly used personal computers/laptops do not have a command key known as ______.
            a) Turnover        b) Shift              c) Alt                d) Delete           e) Insert
26.        The database environment has all of the following components except
            a) database       b) DBA              c) users            d) SQL              e) separate files
27.        A set of step-by-step procedures for accomplishing a task written in any programming language is known as a(n)
            a) algorithm       b) software bug              c) pseudocode               d) firmware program
            e) flowchart
28.        The hardware device referred to as the heart of the computer is
            a) hard disk       b) motherboard              c) SMPS           d) processor
            e) None of these
29.        EBCDIC is a coding system which provides
            a) 64 different characters            b) 128 different characters
            c) 256 different characters           d) 512 different characters          
e) 1025 different characters
30.        Which of the following is not a basic step in creating a worksheet?
            a) Enter text and data     b) Save the workbook     c) Print the worksheet
            d) Modify the worksheet                          e) Copy the worksheet
31.        If a user turns on a Windows XP system, which of the following programs will be activated first?
            a) Exhaust fan of SMPS will start rotating           
b) Windows XP logo screen will appears with progress bar.
c) Operating System will start loading its file in RAM
d) Desktop screen will appear with mouse pointer.
e) BIOS, the in-charge of the system, will start executing.
32.        Which of the following is not true?
            a) TCP is a connection - oriented protocol            b) 48 is an octal number
            c) FTP stands for File Transfer Protocol              
d) A file having extension PNG is a graphic file    
e) C++ is a computer programming language
33.        Which of the following is an example of course management software?
            a) Blackboard    b) Microsoft Outlook       c) Encarta         d) Adobe Acrobat          
            e) None of these
34.        An example of software that includes electronic checkbook registers and automatic bill payment tools is
            a) Microsoft Project        b) Microsoft Word          c) Adobe Acrobat
            d) Intuit Quicken            e) None of these
35.        The goal of data mining is
            a) to explain some observed even or condition
            b) to confirm that data exists       c) to analyse data for expected relationships       
            d) to create a new data warehouse          e) None of these
36.        A database management system (DBMS) is a
            a) hardware system used to create, maintain and provide controlled access to a database
            b) hardware system used to create, maintain, and provide uncontrolled access to a database.
            c) software system used to create, maintain, and provide uncontrolled access to a database
            d) software system used to create, maintain, and provide controlled access to a database.
            e) None of these
37.        In which type of channel, message may flow in two directions but never at the same time?
            a) Full duplex     b) Half duplex    c) Simplex         d) This is not possible
            e) None of these
38.        The first line of the “C” program contain a/an ____, indicated by “#include”.
            a) preprocessing directive           b) processing directive    c) main directive
            d) new line character                  e) None of these
39.        A clerk in a bank has to access data in customer account. Logical access control for these users would be
            a) use of individual passwords     b) use of an Accounts Receivable Section password
            c) use of individual passwords plus separate access passwords for customer data and product data
            d) Can’t say       e) None of these
40.        To stop unauthorized access to the computer system, we should
            a) have a trustworthy system administrator           b) have a good password policy
            c) have a sound encryption policy                        d) All the above
            e) None of these
41.        Which of the following is true for ‘Voicemail’?
            a) It is the exchange of text message and computer files transmitted via communications network such as a local area network or Internet.
            b) It permits users to converse in real time with each other via computer while connected to internet.
            c) If functions much like an answering machine, allowing callers to leave a voice message for the called party.
            d) It involves using video and computer technology to conduct a meeting of participants present at geographically separated locations.
            e) None of these
42.        A communication processor that connects dissimilar networks by providing the translation of one set of protocol to another is called
            a) Bridge           b) Gateway        c) Router           d) Modem          e) All the above
43.        Which of the following lets you leave a screen or program?
            a) Boot              b) Programs      c) Exit               d) Text              e) None of these
44.        Which of the following represents the instructions that tell the computer what to do? It can also be taken as another name for software.
            a) programs       b) CPU              c) options          d) folder             e) None of these
45.        A computer’s hard disk is a/an
            a) arithmetic and logical unit       b) computer software      c) operating system
            d) computer hardware                 e) None of these
46.        What is the full form of USB as used in computer - related activities?
            a) Universal Security Block         b) Ultra Serial Block       c) United Services Block
            d) Universal Serial Bus               e) None of these
47.        The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the _________ command.
            a) Replace         b) Find              c) Lookup          d) Search          e) None of these
48.        For creating a document, you use ______ command at file menu.
            a) open             b) close             c) new               d) save              e) None of these
49.        To add two cells (A1 and A2) together, you use which of the following formula?
            a) =A1+A2        b) =Add (A1+A2)            c) = together (A1:A2)     
            d) A1 plus A2    e) None of these
50.        Find the correct set of three types of data fund in a spreadsheet.
            a) Data, words, numbers             b) Equations, data, numbers      
c) Words, numbers, labels          d) Numbers, formulas, labels       e) None of these


1.D       2.C       3.C       4.B       5.B       6.A       7.D       8.B       9.A       10.A

11.A     12.B     13.C     14.A     15.B     16.B     17.A     18.C     19.C     20.C

21.E     22.C     23.B     24.C     25.A     26.E     27.A     28.D     29.C     30.E

31.C     32.B     33.A     34.D     35.C     36.D     37.B     38.A     39.A     40.B

41.C     42.B     43.C     44.A     45.D     46.D     47.B     48.C     49.A     50.D


37.B; Half duplex is bidirectional connection with the restriction that data can travel in one direction at a time.

No comments

Powered by Blogger.