Google Ads

COMPUTER KNOWLEDGE –IBPS PO/CLERK—SBI PO/CLERKS—LIC AAO/RBI ASSISTANT /RRB ASSISTANT ..


THANKS BSC CHRONCILE, KUNDAN SIR

COMPUTER KNOWLEDGE –IBPS PO/CLERK—SBI PO/CLERKS—LIC AAO/RBI ASSISTANT /RRB ASSISTANT ..

1. In addition to keying data directly into a database, data entry can also be done from a (an) 1) field 2) table 3) data dictionary 4) input form 5) None of these

2. A word processor would most likely be used to do which of the following? 1) Doing a computer search in the media centre 2) Keeping an account of money spent 3) Maintaining an inventory 4) Typing a biography 5) None of these

3. What is the main folder on a storage device called? 1) Interface 2) Root directory 3) Platform 4) Device driver 5) None of these

4. In database, a field is a 1) table of information 2) label 3) group of related records 4) category of information 5) None of these

5. Computer’s BIOS is stored in 1) ROM 2) RAM 3) Hard disk 4) Flopy drive 5) None of these

6. Bootstrap program is a program that 1) starts the working of a computer 2) terminates the working of a computer 3) is the middle part of the program 4) Both 1 and 2 5) None of these

7. You can do transactions on Internet using your bank account. This is called 1) Banking 2) Online banking 3) Offline banking 4) Transactions 5) None of these

8. Which of the following is graphics solution for Word Processor? 1) Clipart 2) Wordart 3) Dropcap 4) All the above 5) None of these

9. The command that is used to format a drive through command prompt is 1) Scandisk 2) X Format 3) Chkdisk 4) Format 5) None of these

10. “FIND” option is available under which menu? 1) Tools 2) View 3) File 4) Edit 5) None of these

11. DSL is an example of 1) Wireless 2) Broadband 3) Network 4) Slow 5) None of these

12. A saved document is referred to as 1) Folder 2) Object 3) File 4) Project 5) None of these

13. A computer that deals with physical quantities is known as 1) Digital Computer 2) Analog Computer 3) Hybrid Computer 4) Mainframe Computer 5) None of these

14. PDF extension is used for which of the following? 1) MS-Excel 2) Adobe Reader 3) Photoshop 4) Pagemaker 5) None of these

15. Since viruses are only a form of software, they primarily infect 1) Data 2) Hardware 3) Peripherals 4) Programs 5) None of these
16. What is the other name of LAN card? 1) Modem 2) NIC 3) Network connector 4) Internet card 5) None of these

17. Which of the following is the name given to devices that make up a computer that you can see or touch? 1) Print 2) Mouse 3) Hardware 4) Software 5) None of these

18. A(n)_____contains commands that can be selected. 1) icon 2) button 3) pointer 4) menu 5) None of these

19. Which of the following is not an image file? 1) TMP 2) BMP 3) GIF 4) JPEG 5) None of these

20. Which of the following is used to measure the speed of the processor? 1) Unit 2) Processing speed 3) Clock speed 4) Memory 5) None of these

21. What is a flowchart? 1) It represents process. 2) It represents algorithm. 3) It represents process or algorithm. 4) It represents mathematical subtraction. 5) None of these

22. Which of the following is used to find a saved document in the computer’s memory and bring it up on the screen to view? 1) Rerun 2) Reverse 3) Retrieve 4) Return 5) None of these

23. A computer uses_____ system to process data. 1) kilobyte 2) processing 3) binary 4) representational 5) None of these

24. Why is the Caps Lock key referred to as a toggle key? 1) Because it cannot be used to delete 2) Because it cannot be used for entering number 3) Because it cannot be used to insert 4) Because its function goes back and forth every time it is pressed 5) None of these

25. Which of the following keys launches the ‘Start’ button? 1) Windows 2) Shift 3) Shortcut 4) Esc 5) None of these

26. Which of the following is a collection of unprocessed items?

1)     Memory 2) Information 3) Data 4) Reports 5) None of these

27. Which command is given to ‘run’ or ‘switch off’ the computer? 1) Ctrl+Alt 2) Ctrl+Alt+Del3) Alt+Del 4) Alt+Shift+Del 5) None of these

28. What do we call the keys that change the meaning of what you type? 1) Change keys 2) Disk space 3) Modifier keys 4) Keyboard 5) None of these

29. What kind of files do we care about the most? (letters, pictures, memos, etc.) 1) Document files 2) Application files 3) System files 4) User files 5) None of these

30. In which of the following was artificial intelligence introduced? 1) First generation 2) Second generation 3) Third generation 4) Fourth generation 5) Fifth generation
31. What is full form of VLSI? 1) Very Large Scale Integration 2) Very Large Scale Intranet 3) Very Large Scale Internet 4) Very Large Scale Internetwork 5) None of these

32. Which of the following is the location to store a file in a drive? 1) File Folder 2) Version 3) Pad 4) Folder 5) None of these

33. Which of the following is the default setting in a cell of Excel sheet? 1) Left–aligned 2) Right–aligned 3) Centred 4) Justified 5) None of these

34. Information on a computer is stored as 1) Analog data 2) Digital data 3) Watts data 4) Modem data 5) None of these

35. Which of the following is used for writing the webpage code? 1) Winzip 2) Hypertext markup language 3) Fifth generation language 4) Part 5) None of these

36. FLASH is a 1) Hardware 2) Game 3) RAM 4) EEPROM 5) None of these

37 Which of the following is a must for a computer? 1) Chip 2) Data 3) Mouse 4) Processor 5) None of these

38. Disk can be used to store 1) Random files 2) Sequential files 3) Both 1 and 2 4) Horizontal files 5) None of these

39. How many characters can be typed in a single cell in an Excel sheet? 1) 256 2) 1024 3) 32000 4) 65535 5) None of these

40. Whas is the full form of “XP” in Windows-XP? 1) XTRA Power 2) XTREME Programming 3) XTRA Process 4) XTREME Power 5) None of these

41. Which key is used to send a digital signature? 1) Public key 2) Private key 3) Digital key 4) Keypad 5) None of these

42. The group of processors combined together to create a program is referred to as 1) Multiprogramming 2) Multitasking 3) Multiprocessing 4) Thrashing 5) None of these

43. Which program searches the fault of any software? 1) Debug 2) Inverse 3) EBCDIC 4) LOG 5) None of these

44. What is the default paper size of a word document? 1) A4 2) Letter 3) A3 4) Both 2 and 3 5) None of these

45. A device that is connected to the motherboard is 1) called an adjunct device 2) called an external device 3) connected by using a ribbon cable 4) called a peripheral device 5) None of these

46. Which of the following is used to find an individual item in a file immediately? 1) File allocation table 2) Sequential access 3) Direct access 4) Directory 5) None of these

47. In Excel, charts are created using which of the following options? 1) Pivot table 2) Chart Wizard3) Pie chart 4) Bar chart 5) None of these

48. Which device is used to access your computer from another computer or for talk over phone? 1) CD-Rom Drive 2) Hard Drive 3) RAM 4) Modem 5) None of these

49. Which of the following is the name of the software which is used for sending or receiving a message? 1) Telnet 2) Browser 3) Messenger 4) Operating system 5) None of these

50. Which of the following software applications would be most appropriate for performing numerical and statistical calculations? 1) Document Processor 2) Database 3) Graphics Package 4) Spreadsheet 5) None of these

51. Which of the following is the minimum zoom percentage supported by MS Word? 1) 10% 2) 15% 3) 25% 4) 4% 5) None of these

52. The default lines to drop for drop cap is 1) three lines 2) two lines 3) four lines 4) eight lines 5) None of these

53. The red wavyline in MS Word document indicates 1) spelling errors 2) grammar errors 3) address block 4) All the above5) None of these

54. The ascending order of a data hierarchy is 1) bit  byte  record  character database
2) bit  byte  field  record  file  database 3) bit  byte  record  field  file  database 4) All the above 5) None of these

55. Which of the following is a problem of file management system? 1) Lack of data independence 2) Data redundancy 3) Programme dependence 4) All the above 5) None of these

56. BASIC, ACGOL and COBOL are the examples of 1) High level language 2) Low level language 3) Middle level language 4) All the above5) None of these

57. COBOL was developed by 1) Dennis Ritchie 2) Grace Hopper 3) John Burden 4) Steve Jobs 5) None of these

58. How many bits are there in one MB? 1) 220 2) 221 3) 222 4) 219 5) None of these

59. Which page orientation will you select if you want to print in wide format? 1) Landscape 2) Horizontal 3) Portrait 4) Vertical 5) None of these

60. Which type of server is responsible for storing files for users on the network? 1) Web server 2) File server 3) Print server 4) Both (2) and (3) 5) Both (1) and (2)
61. Which network architecture is defined in IEEE 802.3 standard? 1) Token ring 2) FDDI 3) Fiber 4) Ethernet 5) None of these

62. PDA stands for 1) Portable Digital Assistant 2) Personal Digital Assistant 3) Personal Duplex Assistant 4) All the above5) None of these

63. Unix operating system was developed by 1) Walter Baatain 2) John Burdeen 3) Ken Thompson 4) All the above5) None of these

64. Which of the following is represented by a cluster in hard disk? 1) Group of sectors 2) Total number of sectors in a disk 3) Total number of tracks 4) All the above 5) None of these

65. Comparison of two or more numbers depends on 1) ALU 2) MU 3) CU 4) CPU 5) None of these

66. In DOS, primary hard disk drive has the drive letter 1) A 2) B 3) C 4) D 5) None of these

67. Default page size for word document is 1) Legal 2) A4 3) Letter 4) All the above5) None of these

68. We use ________ shortcut key to insert something in microsoft excel.
1) ctrl + W 2) ctrl + P 3) Shift + F11 4) Shift + Alt 5) None of these

69. GOTO statement is used in which of the following  programming languages? 1) C++ 2) Java 3) C 4) All the above5) None of these

70. .rar stands for 1) Read and right 2) Roshal Archieve 3) Right Attributes 4) All the above5) None of these

71. First general-purpose electric digital computer ENIAC was developed by 1) JP Eckert 2) JW Mauchley 3) John Von Neumann 4) All the above5) None of these

72. E-R stands for 1) Equity-Relationship 2) Entity-Relationship 3) Equal-Relationship 4) All the above5) None of these

73. In any table, record of any row is called 1) Entity 2) Tuple 3) Field 4) Attribute 5) None of these

74. Spelling check is performed by which of the following keys? 1) F2 2) F3 3) F5 4) F6 5) F7

75. Linux is a 1) software 2) operating system 3) application 4) application software 5) None of these

76. NIC stands for 1) National Informatics Centre 2) Network Interface Card 3) National Interface Code 4) Both (1) and (2) 5) None of these
77. Shell and kernel is a feature of 1) operating system 2) application 3) software 4) All the above5) None of these

78. An example(s) of universal gate is/are 1) NAND 2) NOT 3) NOR 4) Both (1) and (3) 5) None of these

79. Which of the following is not an example of a search engine? 1) Google 2) Protocol 3) Yahoo 4) Altavista 5) None of these

80. Which of the following is one’s complement of the binary number 110010? 1) 111111 2) 001111 3) 010101 4) 001101 5) None of these

81. Which of the following will come next in the series? 10, 01, 100, 011, 11001, .... 1) 0101 2) 00110 3) 01101 4) 00101 5) None of these

82. Which of the following is not a type of error? 1) Logical error 2) Run time error 3) Syntax error 4) All the above 5) None of these


83. Which key is used to search any data in a computer? 1) F1 2) F2 3) F3 4) F4 5) F5

84. First page of any website is called 1) home page 2) web page 3) website 4) All the above 5) None of these

85. In database, SQL stands for 1) Simple Query Language 2) Structure Query Language 3) Structure Question Language 4) All the above 5) None of these

86. In which topology, terminals are connected in a circular manner? 1) Ring 2) Star 3) Mesh 4) Bus 5) Tree

87. .bmp extension is used by 1) MS-Powerpoint 2) MS-Word 3) MS-Excel 4) Paint 5) All the above

88. Which of the following is/are called flash memory? 1) RAM 2) Pen drive 3) ROM 4) Both 1 and 2 5) Both 2 and 3

89. An example of web browser is 1) Mozilla 2) Google Chrome 3) Epic 4) Safari 5) All the above

90. Which of the following is used to click to open any web page? 1) URL 2) Hyperlink 3) Navigation 4) URN 5) None of these

91. Which of the following is one of the most business-oriented languages? 1) BASIC 2) COBOL 3) ALGOL 4) FORTRAN 5) None of these

92. C language is a 1) High level language 2) High level and low level language 3) Low level language 4) High level language with some features of low level language 5) None of these
93. Which of the following codes needs 7 bits to represent any character? 1) EBCDIC 2) BCD 3) ASCII 4) All the above 5) None of these

94. For deleting data permanently, we use 1) Delete 2) Shift + Alt + Delete 3) Shift + Delete 4) Erase 5) All the above

95. Integrated circuits are made up of 1) Si 2) Al 3) Mn 4) Mg 5) All the above

96. WORM stands for 1) Wanted One Read Memory 2) Write Once Read Many 3) Write Original Read Many 4) All the above 5) None of these

97. Which of the following represents the size of a floppy? 1) 3.5 inches 2) 5.25 inches 3) 8.0 inches 4) All the above 5) None of these

98. Extension of a Word file in MS-Office 2007 is 1) .doc 2) .docx 3) .docxs 4) All the above5) None of these

99. What is Outlook Express? 1) Scheduler 2) E-mail Client 3) Address Book 4) All the above 5) None of these

100.Which of the following is not a correct IP address? 1) 192.28.238.191 2) 193.224.212.225 3) 138.124.256.225 4) 198.225.285.255 5) 224.252.252.251

101.The common name for the crime of stealing passwords is 1) spooling 2) identity theft 3) spoofing 4) hacking 5) None of these

102.Malicious software is known as 1) hardware 2) malware 3) malicious ware 4) illegal ware 5) None of these

103.HTML viruses infect 1) your computer 2) a Web page in the HTML code 3) both a Web page and the computer that is viewing it 4) All the above 5) None of these

104.____ is the measurement of things such as fingerprints and retinal scans used for security access. 1) Biometrics 2) Bio measurement 3) Computer security 4) Smart weapon machinery 5) None of these

105.The scrambling of code is known as 1) encryption 2) firewall 3) scrambling 4) password-proofing  5) None of these

106.Which is the part of a computer that one can touch and feel? 1) Programs 2) Software 3) Hardware 4) Output 5) None of these

107.Which of the following moves the cursor one space to the right to puts spaces in between words? 1) Control key 2) Space bar 3) Printer 4) Mouse 5) None of these

108.When your computer stops working suddenly, it is referred to as a 1) crash 2) die 3) death 4) penalty 5) None of these

109.A symbol or question on the screen that prompts you to take action and tell the computer what to do next is called 1) scanner 2) questionnaire 3) prompt and dialog box 4) information seeker 5) None of these

110. A place that a user can create to store files is called 1) cursor 2) text 3) folder 4) boot 5) None of these

111.Name the key that will erase information from the computer’s memory and characters on the screen. 1) Edit 2) Delete key 3) Dummy out 4) Trust key 5) None of these

112.A program that works like a calculator for keeping track of money and making budgets. 1) Calculator 2) Spreadsheet 3) Budgeter 4) Financier 5) None of these

113. The OSI model is divided into _______ processes called layers. 1) five 2) six 3) seven 4) eight 5) None of these

114._____ are specially designed computer chips that reside inside other devices such as your car or your electronic thermostat. 1) Servers 2) Embedded computers 3) Robotic computers 4) Mainframes 5) None of these

115.The  goal of data mining is 1) to explain some observed event or condition 2) to confirm that data exists 3) to analyse data for expected relationships 4) to create a new data warehouse 5) None of these

116. A database management system (DBMS) is a 1)hardware system used to create, maintain and provide controlled access to a database. 2)hardware system used to create, maintain, and provide uncontrolled access to a database. 3)software system used to create, maintain, and provide uncontrolled access to a database. 4)software system used to create, maintain, and provide controlled access to a database. 5)None of these

117.Which of the following describes database fields? 1) Structures 2) Field markers 3) Field definition 4) Field names 5) None of these

118.A goal of normalization is to 1) minimize the number of relationships 2) minimize the number of entities 3) minimize the number of tables 4) minimize the number of redundancy 5) None of these

119.The code that relational database management systems use to perform their database task is referred as 1) QBE 2) SQL 3) OLAP 4) Sequel Server  5) None of these

120.Chip is a common nickname for a (n) 1) transistor 2) resistor 3) integrated circuit  4) semiconductor 5) None of these
121.The most frequently used instructions of a computer program are likely to be fetched from 1) the hard disk 2) cache memory 3) RAM 4) registers 5) None of these

122.   ------are viruses that are triggered off by the passage of time or on a certain date. 1) Boot-sector viruses 2) Macro viruses 3) Time bombs 4) Worms 5) None of these

123.Which of the following places the common data elements in order from smallest to largest? 1) character, file, record, field, database 2) character, record, field, database, file 3) character, field, record, file, database 4) bit, byte, character, record, field, file, database, 5) None of these

124.The Internet is 1) a large network of networks 2) an internal communication system for a business 3) a communication system for the Indian government 4) All the above 5) None of these

125.Verification of a login name and password is known as 1) configuration2) accessibility 3) authentication  4) logging in 5) None of these

126.Which of the following would most likely NOT be a symptom of a virus? 1) Existing program files and icons disappear. 2) The CD-ROM stops functioning. 3) The Web browser opens to an unusual home page. 4) Odd messages or images are displayed on the screen. 5) None of these

127.The PC and the Apple Macintosh are examples of two different 1) platforms 2) applications 3) programs 4) storage devices  5) None of these

128. The metal or plastic case that holds all the physical parts of the computer is the 1) system unit 2) CPU 3) mainframe 4) platform 5) None of these

129.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called 1) robotics 2) simulation 3) computer forensics 4) animation 5) None of these

130.______ server stores and manages files for network users. 1) Authentication  2) Main 3) Web 4) File   5) None of these

131.In a ring topology, the computer in possession of the ____ can transmit data. 1) packet 2) data 3) access method  4) token 5) None of these

132.When data changes in multiple lists and all lists are not updated, this causes 1) data redundancy 2) information overload 3) duplicate data 4) data inconsistency 5) None of these

133.____ are words that a programming language sets aside for its own use. 1) Control words 2) Reserved words 3) Control structures 4) Reserved keys 5) None of these

134.  You must instal a(n) ____ on a network if you want to share a broadband Internet connection. 1) router 2) modem 3) node 4) cable 5) None of these
135. A dedicated computer is one 1) which is used by one person only. 2) which is assigned one and only one task. 3) which uses one kind of software. 4) which is meant for application software. 5) None of these

136.The system unit of a personal computer typically contains all of the following except 1) Microprocessor 2) Disk controller 3) Serial interface 4) Modem 5) None of these

137.A small or intelligent device is so called because it contains within it a 1) Computer 2) Microcomputer  3) Programmable data  4) Sensor   5) None of these

138.Which technology is used in compact disks? 1) Mechanical 2) Electrical 3) Electro Magnetic  4) Laser 5) None of these

139.EPROM can be used for 1) Erasing the contents of ROM 2) Reconstructing the contents of ROM 3) Erasing and reconstructing the contents of ROM 4) Duplicating ROM 5) None of these

140.Algorithm and Flow Chart help us to 1) Know the memory capacity 2) Identify the base of a number system 3) Direct the output to a printer 4) Specify the problem completely and clearly 5) None of these

141.Which of the following is not a valid size of a Floppy Disk? 1) 8” 2) 5 4 1 ” 3) 2 2 1 ” 4) 5 2 1 ” 5) None of these

142.The 16-bit microprocessor means that it has 1) 16 address lines  2) 16 buses 3) 16 data lines 4) 16 routes 5) None of these

143.Data going into the computer is called 1) Output 2) Algorithm 3) Input 4) Calculations 5) Flow chart

144.Which of the following is the fastest memory? 1) DDR RAM 2) DDR2 RAM 3) DDR3 RAM 4) Swap Memory  5) Buffer Memory

145.Which protocol is used by the operating system to generate error message like ‘Host Unreachable’ over a TCP/IP network? 1) HTTP/1.1 2) ICMP 3) PPP 4) ICGM 5) TCP/IP

146.What does SNMP stand for?
1) Simple Network Mail Protocol 2) Single Network Mail Protocol 3) Single Network Message Protocol
4) Simple Network Management Protocol 5) None of these

147.On a school computer, Lucy learned how to copy programs. A classmate asked her to copy a program for his home use. Her most ethical response would be which of the following? 1)I’ll copy it, but you have to promise not to tell anyone. 2)I don’t know how to copy disks. 3)I can’t copy it because it will break copyright laws. 4)I’ll copy it for you, but you can’t copy it for anyone else. 5)None of these
148.Which of the following is not true? 1) LOGO stands for Live On Google’s Orkut. 2) BIOS is a system software. 3) GRUB is a Linux boot loader. 4) Ruby is a web scripting language. 5) LILO is a Linux boot loader.

149.What is Mail-Merge? 1)a web based e-mail service with no spam 2)a name of Yahoo! MINDSET search feature 3)a new virus hoax which can delete data from mail inbox 4)a feature of MS-Word used to create multiple documents like letters, mailing labels, name tags etc 5)None of these

150.In MS-Word, a menu item in dim color (gray) indicates that the menu is? 1) toggle menu 2) unavailable for current context 3) not much required menu 4) over-used menu 5) None of these

151.Which of the following can’t be a proper virus detection and prevention tip? 1)Do not open any file attached to an email unless you know what it is, even if it appears to come  from a dear friend or someone you know. Some viruses can replicate themselves and spread through  email. Better be safe than sorry and confirm that they really sent it. 2)Do not open any file attached to an email if the subject line is questionable or unexpected. If the  need to do so is there, always save the file to your hard drive before doing so. 3)Open chain emails or junk mail and forward it to others. 4)Do not download any file from strangers. 5)None of these

152._____ temporarily holds program instructions, data and output until they are no longer needed by the computer.  1) Hard disk 2) Motherboard3) CD 4) RAM 5) Floppy disk

153.Which of the following statements is true about a storage media? 1)Storage media are non-volatile. 2)Hard disk has a very high access time as compared to RAM (10-20 million ns). 3)Hard disk is very cheap as compared to RAM and  large in capacity. 1) Only 1 2) Only 2                  3) Both 1 and  3
4) Both 1 and 2 5) All 1, 2 and 3

154.Basic Input Output System (BIOS) is necessary for 1) boot-up 2) mouse and keyboard only 3) resolution 4) audio and video system 5) None of these

155.255.255.0.0 is default mark of 1) Class A networks 2) Class B networks 3) Class C networks 4) Class D networks 5) None of these

156.SQL stands for 1) Structured Query Language 2) Solution to Query language 3) Sub Query Language 4) Structural Query Language 5) None of these

157.In which type of channel messages may flow in two directions but never at the same time? 1) Full duplex 2) Half duplex 3) Simplex 4) In data com, it is not possible. 5) None of these

158.The first line of the “C” program contains a/an _____, indicated by # include. 1) preprocessing directive 2) processing directive 3) main directive 4) new line character 5) None of these
159._____ technology standards have been used in the past, but Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies currently used to build LANs. 1) ARCNET, Token Ring   2) CIR     3) X.25 4) VoFR 5) None of these

160.POST stands for 1) Positive Operating System Test 2) Particle Of Static Transfer 3) Power-On Self-Test 4) Printer Online Static Test 5) None of these

161.Which of the following statements is true about Bluetooth? A.Bluetooth is a proprietary open-wireless-technology standard for exchanging data over short distances B.Bluetooth uses a radio technology called frequency-hopping spread spectrum. C.A PC that does not have embedded Bluetooth can be used with a Bluetooth adapter that will enable the PC to communicate with other Bluetooth devices. 1) Only A 2) Only B 3) Both A and  C  4) Both B and D  5) All A, B and C

162.Short keys for FIND in MS Office Word 2003 are 1) Ctrl + B 2) Alt + Ctrl + A   3) Alt + Y 4) Ctrl + F 5) None of these

163._____ is an electronic spreadsheet. You can use it to organise your data into rows and columns. You can also use it to perform mathematical calculations quickly. 1) Microsoft Excel 2) Microsoft Word 3) Microsoft PowerPoint 4) Microsoft Calculator 5) None of these

164.  A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic media. 1) plates 2) disks 3) relays 4) memories 5) platters

165.The power supply supplies power to every single part in the PC. The power supply is to convert the 230 VAC into 3.3 V, 5 V and 12 VDC power that the system requires for the operations. It is commonly known as 1) Simple mode  power supply 2) Switch mode power supply 3) Uninterrupted power supply 4) Invertor 5) Convertor

166.Which of the following statements is NOT true about a computer? 1)8085 is an example of 8-bit  microprocessor. 2)Software is used to make computer usable. 3)Based on the microprocessor, systems are classified as PC-XT and PC-AT. 4)SMPS converts AC (Alternate Current) into DC (Direct Current). 5)None of these

167.The Intel 8085 is a/an _____ microprocessor introduced by Intel in the year _____. 1) 16-bit, 1976 2) 16-bit, 1977 3) 8-bit, 1978 4) 8-bit, 1977 5) 8-bit, 1967

168.Which of the following is NOT a goal of transaction processing system? 1)Capture, process and store transactions 2)Produce a variety of documents related to routine business activities 3)Reduce manual effort associated with processing business transactions 4)Produce standard reports used for management decision making 5)None of these

169.Which of the following is not an example of a virus? 1) Polymorphic 2) Logic Bombs      3) Worms          4) Tartan 5) Trojan

170.Timing and Control unit is a part of  a(an) 1) ALU 2) Processor 3) Memory 4) CMOS 5) BIOS

171._____ is a software that is available for use at no cost or for an optional fee, but usually with one or more restricted usage rights. 1) Firmware 2) Teachware 3) Testware 4) Freeware 5) Groupware

172.____ involves checking or logging the data in; checking the data for accuracy; entering the data into the computer; transforming the data and developing and documenting a database structure that integrates the various measures. 1) Data mining 2) Database 3) Data preparation  4) Data structuring   5) Data validation

173.Which of the following is true for OCR? A)OCR is an improvement over OMR. B)It is the mechanical or electronic translation of scanned images of handwritten, typewritten or printed text into machine-encoded text. C)It is widely used to convert books and documents into electronic files, to computerise a recordkeeping system in an office or to publish the text on a website. D)OCR systems require calibration to read a specific font; early versions needed to be programmed with images of each character, and worked on one font at a time. 1) Only A) 2) Only B) 3) Only A), C) and D) 4) Only B), C) and D) 5) All the above

174.   ISP stands for 1) Internet Surfing Provider 2) International Service Provider 3) Indian Service Provider 4) Internet Service Provider 5) Indian Surfing Provider

175.Every Web page is stored as a (an) 1) Hypertext markup language document 2) Web document 3) Hypertext message language document 4) Hyperlink document 5) Internet explorer document

176._____ is the amount of time a computer will repeat a single character when its key is held down. 1) Typematic rate 2) Recycle rate 3) Holding rate 4) Baud rate 5) Typewriter rate

177.Database that spreads information across different tables while maintaining links between them is referred as 1) Relational database 2) Rotational database 3) Database connection 4) Tabular database 5) None of these.

178.Which is the first electronic spreadsheet on a microcomputer that helped turn the Apple II computer into a success and greatly assisted in their widespread application? 1) Visi Calc 2) Lotus 1-2-3 3) Excel 4) TRS-80 5) None of these

179.____ is a process where an external device can get the attention of the microprocessor. The process starts from the I/O device and is asynchronous. 1) Request 2) Control 3) Interrupt 4) Interaction 5) None of these

180.In relation to computer which of the following is arranged in proper sequence? 1)Hardware–Assembly language–Machine language- High–level language 2)Hardware–Machine language–High-level language-Assembly Language 3)Machine language–Assembly language–High-level language–Hardware 4)Hardware–Machine language–Assembly language–High-level language 5)None of these

181.Which of the following statements is true about a computer language? 1)Machine languages are the only languages understood by computers. While easily understood by computers, machine languages are almost impossible for humans to use because they consist entirely of numbers. 2)An assembly language contains the same instructions as a machine language, but the instructions and variables have names instead of being just numbers. 3)Every CPU has its own unique machine language. 4)1) and 2) are true                  5) 1), 2) and 3) are true

182.Which of the following is NOT a current spreadsheet software? 1) IBM Lotus Symphony (2007)  2) KSpread 3) ZCubes-Calci 4) GNU Oleo  5) None of these

183.Database’s overall structure is maintained in a file called 1) Redolog file 2) Data file 3) Control file 4) Reload file 5) None of these

184.Which of the following is not an advantage of a client/server model? 1)A client/server model allows centralised control of data and centralised implementation of business   rules.

2) A client/server model increases developer’s productivity. 3)A client/server model is suitable for all applications. 4)A client/server model decreases developer’s productivity. 5)None of these

185.____ is a method of storing data on two or more hard drives that work in combination to do the job of a larger drive. 1) DAID 2) RAID 3) Shadowing 4) Casting 5) MiniSD

186.Which of the following is FALSE regarding SQL? 1) It can execute queries against a database. 2) It can retrieve data from a database. 3) It can insert records in a database. 4) It can update records in a database. 5) It can’t delete records from a database.

187.Which of the following is not a design principle of BASIC? 1)It is easy for beginners to use. 2)It is a general-purpose programming language. 3)Allow advanced features to be added for experts (while keeping the language simple for beginners). 4)It is not  interactive 5)It provides clear and friendly error messages.

188.C is a programming language originally developed for developing 1) LINUX operating system 2) Windows NT 3) Unix Operating system 4) Mac OS X 5) Windows ME

189.Which of the following is/are examples of upper layer technologies in the OSI model? 1) TCP 2) HTTP, SSL and NFS 3) IP 4) Ethernet 5) None of these

190.In a Batch Processing Operating System, interaction between the user and the processor is 1) limited 2) not possible 3) unlimited 4) depends upon user only 5) depends upon amount of work

191.In case of computer, “JUMPER” is 1) used to configure the hard disk 2) used to configure the primary memory 3) used to play computer game 4) a software language 5) machine language
192.Which of the following statements is true about FAT? 1)The initial version of FAT designed for 16-bit microprocessors is now referred to as FAT16. 2)FAT file systems are not found on floppy disks, flash memory cards and digital cameras. 3)FAT was not commonly used on hard disks throughout the DOS and Windows 9x eras. 4)FAT is a computer file system architecture now widely used on many computer systems. 5)None of these

193.First RAM chip was introduced by which of the following? 1) Microsoft 2) Intel 3) Dell 4) HP 5)Apple

194.  ------------is a system that pre-dates the World Wide Web for organising and displaying files on internet servers. 1) HTML 2) SGML 3) Telnet 4) Gopher 5) None of these

195.A specialised network device that determines the next network point to which it can forward a data packet towards the destination of the packet is commonly known as 1) bridge 2) router 3) switch 4) hub 5) repeater

196.Which of the following is a computer network service which allows clients to make indirect network connections to other network services? 1) Firewall 2) Proxy 3) Network address translator 4) Hub 5) Bridge

197.In a computer, a hardware and/or software that duplicates  the functions of a first computer system in a different second computer system, so that the behaviour of the second system closely resembles the behaviour of the first system is known as 1) Stimulator 2) Emulator 3) Scanner 4) Copier 5) None of these

198.A _____ is the basic unit of data storage on a hard disk. 1) track 2) sector 3) zone 4) gap 5) None of these

199.A method of transferring information directly from a mass storage device such as hard disk or from adapter card into memory (or vice versa) without information passing through processor is commonly known as 1) Direct memory access 2) Casting 3) Standard memory access 4) Directional memory access 5) None of these

200.____ is the portion of the data block (oracle block)  that contains information about the table having rows in this block. 1) Table directory 2) Table row 3) Table column 4) Header 5) Footer

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@









ANSWERS:
1. 4 2. 4 3. 2 4. 3
5.1; BIOS is ‘Basic Input Output System’. It is stored in computer’s permanent memory ROM. 6.1; Boot strap is a program which is loaded in BIOS and it is responsible to start a computer. 7.2; Transactions can be performed on Internet through online banking
8.1 9.4; Format drive name  is used to format a drive through command prompt.
10.4; “FIND” option is used to find a particular word or group of words. It is available under  “EDIT” menu.
 11.2 12. 3 13. 2
 14.2; PDF files can be opened through only PDF readers such as Adobe Reader.
15.4; Because programs are software
16.2; NIC, ie Netowork Interface Card, is another name of LAN card which provides interface between a computer and a network.
 17.3 18. 4
19.1; “TMP”—It is an extension of temporary file.
20. 3
21.3; Flowchart is a man-made diagram on paper, to represent algorithm and process both

22.4 
23. 3’ Computer understands only binary system, so it uses binary system to process data 24.4 25. 1 26. 3 27. 2
28.3; “Modifier key” is a key which is used to change the meaning what we write.
 29.1; Document files are the special type of files where we can store letters, photos and memories.
30.5; Artifical intelligence is the feature in which computers behave like human beings.
31.1 32. 4 33. 1 34. 2 35. 2
 36.3; FLASH memory is based on time memory that means all data will be lost whenever current is discontinued. So it is RAM.
37.4
38.3; Both Sequential and Random files can be stored on a disk.
 39.4 40. 2 41.2; Private key is used, because it is known to user only .
 42.3 43. 1 44. 2 45. 4 46.3 47. 2 48. 4
49.3; We can interchange the messages through Messenger, for example Yahoo Messenger, gtalk     etc.

50.4 51. 1 52. 1 53. 1 54. 2 55. 4 56. 2 57. 2 58. 5 59. 1 60. 4 61. 5 62. 2 63. 3 64. 2 65. 1 66. 3 67. 2 68. 3 69. 3 70. 2 71. 1 72. 2 73. 2 74. 5 75. 2 76. 4 77. 1 78. 4 79. 2 80. 4 81. 2 82. 5 83. 3 84. 1 85. 2 86. 1 87. 4 88. 4 89. 5 90. 2 91. 2 92. 4 93. 3 94. 3 95. 1 96. 2 97. 4 98. 2 99. 2 100. 3 101. 3 102. 2 103. 4 104. 1 105. 1 106. 3 107. 2 108. 5 109. 3 110. 3 111. 2 112. 2 113. 3 114. 2 115. 1 116. 4 117. 4 118. 4 119. 2 120. 3 121. 2 122. 3 123. 3 124. 1 125. 3 126. 2 127. 1 128. 1 129. 3 130. 4 131. 4 132. 4 133. 2 134. 1 135. 2 136. 4 137. 4 138. 4 139. 3 140. 4 141. 2 142. 3 143. 3 144. 5 145. 2 146. 4 147. 3 148. 1 149. 4 150. 2 151. 3

152. 4; RAM is called primary memory of a computer.
153. 5 154. 1
155.2;Class A’s default mask is 255.0.0.0          Class B’s default mask is 255.255.0.0          Class C’s default mask is 255.255.255.0
156. 1
157. 2; Half duplex is bidirectional connection, with the restriction that data can travel in  one        direction at a time.
158. 1 159. 1
           
160. 3; POST: Power-On Self-Test refers to routines run immediately after power is applied, by       nearly all electronic devices.
 161. 5 162. 4 163. 1 164. 5 165. 2 166. 5 167. 4 168. 2 169. 4 170. 2
171. 4; Freeware (from “free” and “software”) is a computer software that is available for use at no       cost or for an optional fee, but usually with one or more restricted usage rights.
172. 3 173. 5 174. 4 175. 1 176. 1
177. 1; A relational database stores information across different tables and connects them with links        in the computer.
 178. 1; VisiCalc: It was the first spreadsheet that combined all essential features of modern spreadsheet       applications.
 179. 3 180. 4 181. 5 182. 5 183. 3 184. 3

185. 2; RAID (redundant Arrays of Independent Disks) is a method of storing data on two or more         hard drives that work in combination to do the job of a larger drive. Although RAID can be          used to increase performance, it is most often used to protect critical data on a storage server.
186. 5 187. 4
188. 3; C is a computer programming language developed for general purpose between 1969 and     1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating       system.
 189. 2; OSI designates the application, presentation and session stages of the stack as the upper     layers. Generally speaking, software in these layers performs application-specific functions like      data formatting encryption, and connection management. Examples of upper—layer technologies     in the OSI model are HTTP, SSL and NFS.
190. 1; In a batch processing operating system, interaction between the user and the processor is   limited or there is no interaction at all during the execution of work. Data and programs that   need to be processed are bundled and collected as a ‘batch’ and executed together.
191. 1; Several different connectors and jumpers are used to configure the hard disk and connect it      to the rest of the system. The number and types of connectors on the hard disk depend on the     data interface it uses to connect to the system, the manufacturer of the drive and any special     features that the drive may possess.
192. 5; File Allocation Table (FAT) is a computer file system architecture now widely used on many     computer systems and most memory cards, such as those used with digital cameras. FAT file    systems are commonly found on floppy disks, flash memory cards, digital cameras and many     other portable devices because of their relative simplicity. FAT was also commonly used on hard     disks throughout the DOS and Windows 9x eras, but its use on hard drives has declined since the    introduction of Windows XP, which primarily uses the newer NTFS.The initial version of FAT    designed for 16-bit microprocessors is now referred to as FAT12.
 193. 2
194. 4; Gopher is a system that pre-dates the World Wide Web for organising and displaying files on     Internet servers. A Gopher server presents its contents as a hierarchically structured list of files.      With the ascendance of the Web, many gopher databases were converted to Web sites which can      be more easily accessed via Web search engines
195. 2
196. 2; Proxy is the computer network service which allows clients to make indirect network       connections to other network services.
197. 2
198. 2; A sector is the basic unit of data storage on a hard disk. The term “sector” emanates from a      mathematical term referring to that pie-shaped angular section of a circle.
 199. 1 200. 1

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

No comments

Powered by Blogger.