GK BY - SANJAY UTTAM
IMPORTANT COMPUTER CAPSULE FOR UPCOMING SSC / SBI / IBPS / PUNJAB JOBS
1. A peer-to-peer LAN is an appropriate network
architecture for____
(1) The
Internet.
(2) Home network.
(3) Network
requiring a server with shared resources.
(4) wide area
network
(5) None
of these
2. Similar to a hub in an Ethernet network, a ____________
helps relay data between wireless network nodes.
(1) Wireless
port
(2) Wireless
access point
(3) wireless
adapter
(4) wireless
transceiver
(5) None of
these
3. Cell phones use ____________ to access the
Internet.
(1) MMS
technology
(2) a notation
system
(3) micro
browser software
(4) HTML
language
(5) None of
these
4. In CSMA/CD, the computer sends a fixed unit
of data called a(n)_______
(1) Node.
(2) Packet.
(3) Override.
(4) Token.
(5) None of
these
5. The uniform resource locator (URL) is case
sensitive in the ____.
(1) Protocol
(2) Authority
(3) Directory
(4) Type
(5) None
of these
6. ASCII is a(n)________
(1) Numbering
system for representing numbers with decimals.
(2) Character
representation standard common in older mainframe computers.
(3) Encoding
standard used to represent letters and characters.
(4) Symbolic
programming language that directly represents machine instructions.
(5) None of
these
7. A global network made up of thousands of
privately owned computers and networks is called the:
(1) World Wide
Web.
(2) Internet.
(3) Specialized
search engine.
(4) Internet2.
(5) None of
these
8. Which of the following is NOT a basic
function of the operating system?
(1) Manage
memory
(2) Provide the
word processing system
(3) Start the
computer
(4) Provide the
user interface
(5) None
of these
9. Which of the following scrambles a message by
applying a secret code?
(1) Encryption
(2) Audits
(3) UPS
(4) Firewalls
(5) None of
these
10. The Internet began with the development of
1)
USENET
2)
ARPANET
3)
Ethernet
4)
Intranet
5)
None of these
www.thesanjayuttam.blogspot.in
11. Website is a collection of ________
1)
HTML documents
2)
Graphic files
3)
Audio and Video files
4)
All of the above
5)
None of these
12. Who designed the first electronic computer -
ENIAC ?
1)
Van Neuman
2)
Joseph M Jacquard
3)
J presper Eckert
4)
Both 1 and 2
5)
None of these
13. Which of the following is not a network?
1)
Local Area Network
2)
Wide Area Network
3)
Optical Fiber
4)
All are networks
5)
None of these
14. In MICR, C stands for?
1)
Code
2)
Colour
3)
Computer
4)
Character
5)
None of these
15. Which of the following is the largest unit of
storage?
1)
GB
2)
KB
3)
MB
4)
TB
5)
None of these
16. Virtual memory is?
1)
memory on the hard disk that the CPU uses an extended RAM
2)
in RAM
3)
only necessary if you do not have any RAM in your computer
4)
a back up device for floppy disks
5)
None of these
17. _______ is the process of finding errors in
software code?
1)
Compiling
2)
Testing
3)
Running
4)
Debugging
5)
None of these
18. What is the shortcut key to "Undo"
the last action in a document?
1)
Ctrl + X
2)
Ctrl + Y
3)
Ctrl + Z
4)
Ctrl + U
5)
None of these
19. The programs which are as permanent as
hardware and stored in ROM is known as
1)
Hardware
2)
Software
3)
Firmware
4)
ROM ware
5)
None of these
20. For creating a document, you
use….......Command at File Menu.
1)
Open
2)
Close
3)
New
4)
Save
5)
None of these
21. Computer uses the_______number system to store data and perform
calculations.
1) Binary
2) octal
3) Decimal
4) Hexadecimal
5) None of these
22. .............. is the process of carrying out
commands
1)
Fetching
2)
Storing
3)
Decoding
4)
Executing
5)
None of these
23. In word, when you indent a paragraph, you
…………….
1)
push the text in with respect to the margin
2)
change the margins on the page
3)
move the text up by one line
4)
move the text down by one line
5)
None of these
24. ASCII stands for ………………………
1)
American Special Computer for Information Interaction
2)
American Standard Computer for Information Interchange
3)
American Special Code for Information Interchange
4)
American Special Computer for Information Interchange
5)
American Standard Code for Information Interchange
25. Which of the following is used by the browser
to connect to the location of the Internet resources ?
1)
Linkers
2)
Protocol
3)
Cable
4)
URL
5)
None of these
26. ……….is the process of dividing the disk into
tracks and sectors.
(1)
Tracking
(2)
Formatting
(3)
Crashing
(4)
Allotting
(5)
None of these
27. What is the permanent memory built into your
computer called ?
(1)
RAM
(2)
Floppy
(3)
CPU
(4)
CO-ROM
(5)
ROM
28. Which computer memory is used for storing
programs and data currently being processed by the CPU ?
(1)
Mass memory
(2)
Internal memory
(3)
Non-volatile memory
(4)
PROM
(5)
None of these
29. Changing an existing document is called _____
the document.
1)
Creating
2)
Editing
3)
Modifying
4)
Adjusting
5)
None of these
30. What is backup?
1)
Adding more components to your network
2)
Protecting data by copying it from the original source to a different
destination
3)
Filtering old data from the new data
4)
Accessing data on tape
5)
None of these
31. What is a popular program for creating
documents that can be read on both a PC and a Macintosh computer?
(1) Microsoft
Word
(2) Adobe In
Design
(3) Adobe
Acrobat
(4) QuarkXPress
(5) None of
these
32. An image on a computer screen is made up of a
matrix of what?
(1) Byte
(2) Pixels
(3) Bit
(4) Palette
(5) None
of these
33. What does dots per inch (DPI) measure?
(1) number of
bits it takes to represent each color
(2) density of
the pixels on a computer screen
(3) the density
of bits on a disk
(4) density of
graphic files stored on a hard disk
(5) None of
these
34. What type of software creates a smaller file
that is faster to transfer over the Internet?
(1) MPEG
(2) Unzipped
(3) Fragmentation
(4) Compression
(5) None of
these
35. A unit of computer information that contains
data as well as all the procedures or operations is called:
(1) A method.
(2) Encapsulation.
(3) An object.
(4) An OOP
(5) None of
these
36. The world's first truly cross-platform
programming language is called:
(1) C++.
(2) Java.
(3) Visual
Basic.NET.
(4) Smalltalk.
(5) None of
these
37. The most widely used type of database
management system is the:
(1) Flat
database.
(2) Network
database.
(3) Relational
database.
(4) Hierarchical
database.
(5) None of
these
38. What is the newest type of database, which is
well suited for multimedia applications, called?
(1) Object-oriented
database
(2) Client/server
database
(3) Data
warehouse
(4) Multimedia
database
(5) None of
these
39. What do the circles on a data flow diagram
represent?
(1) Data sources
and destinations
(2) Data flows
(3) Transformation
processes
(4) Data stores
(5) None of
these
40. The type of printer that prints by
selectively unchanging static electricity from spots on a metal drum is a(n):
(1) Plotter
(2) Dot-matrix
printer
(3) Laser
printer
(4) Ink-jet
printer
(5) None
of these
41. A
warm boot in older versions of Windows is caused by:
(1)
Typing
the Alt+ Tab key combination
(2)
Selecting
Hibernate or Standby when shutting down
(3)
Typing
the Ctrl+ Alt+ Delete key combination
(4)
Pressing
the power switch
(5)
None
of these
42. Setting
fonts for the text in your document is an example of:
(1)
Formatting.
(2)
Formulas.
(3)
Tracking
changes.
(4)
Tools.
(5)
None
of these
43. ____________
is the file system used by the operating system to identify the physical
locations of files on the
hard drive.
(1)
RTOS
(2)
GIF
(3)
FAT
(4)
POST
(5)
None
of these
44. ___________software
allows the user to speak into the computer rather than type in text.
(1)
Speech
recognition
(2)
CHAT
(3)
Message
(4)
All
of the above
(5)
None
of these
45. A
server uses _________applications software to support its client computers.
(1)
back-end
(2)
front
end
(3)
programming
(4)
java
(5)
none
of these
46. What
does the XP stand for in Windows XP?
(1)
Exponential
(2)
Experience
(3)
Expertise
(4)
Exchange
(5)
None
of these
47. Which
symbol is used in Excel to denote exponential numbers?
(1)
*
(2)
^
(3)
&
(4)
$
(5)
None
of these
48. Which
of the following is NOT a source of viruses?
(1)
Diskettes
(2)
The
Internet
(3)
E-mail
messages
(4)
Computer
networks
(5) None
of these
49. Which
printer type is an impact printer?
(1)
Page
printers
(2)
Laser
printers
(3)
Ink-jet
printers
(4)
Dot-matrix
printers
(5)
None
of these
50. What
type of software must to be used to translate scanned text into a format that
can be manipulated?
(1)
OCR
(2)
CRT
(3)
RGB
(4)
MIDI
(5) None
of these
51. ―High
Resolution‖ computer monitors will have_____
(1) High dpi
(2) Low dpi
(3) 256 colors
(4) Resolution is not measured in dpi
(5) None of these
52. A
world wide web contains web pages ______
(1) Residing in many computers
(2) Created using HTML
(3) With links to other web pages
(4) Residing in many
computers linked together using HTML
(5) None of these
53. Word
processing, spreadsheet, and photo-editing are examples of________
(1) application software
(2) system software
(3) operating system software
(4) platform software
(5) none of these
54. Retail
employees typically use ____________ terminals to process sales transactions.
(1) sales processing
(2) transaction point
(3) automatic teller
(4) point of sale
(5) None of these
55. The
primary purpose of a computer is to process _____________ and convert it into
information.
(1) electricity
(2) data
(3) raw material
(4) a bit
(5) None of these
56. The
simultaneous processing of two or more programs by multiple processors is _____
(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing
(5) None of these
57. Help
Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
58. The……….folder
retains copies of messages that you have started but are not yet ready to send.
(1) Drafts
(2) Outbox
(3) Address Book
(4) Sent Items
(5) None of these
59. Which
of the following statements is true?
(1) Microsoft Windows defines the
operating environment standard for computers with Linux processors
(2) Microsoft Windows defines the
operating environment standard for computers with UNIX processors
(3) Mac OS defines the operating
environment standard for computers with Intel processors
(4) Microsoft Windows
defines the operating environment standard for computers with Intel
processors
(5) None of these
60. The
___________ records the name and exact location of every file on a disk.
(1) partition master
(2) file allocation table
(3) disk controller
(4) boot sector
(5) None of these
61. Inheritance
is the ability of an object to pass on its characteristics to its ____________.
(1) subclasses
(2) off-spring
(3) super classes
(4) parents
(5) none of these
62. Which
of the following activities is NOT a component of e-business?
(1) Collaboration with business partners
(2) Cash flow management
(3) Customer service
(4) Selling
(5) None of these
63. Which
of the following extends data across networks rather than store it in one
central site?.
(1) PIM
(2) File manager
(3) Distributed database
(4) Data mining program
(5) None of these
64. What
is a serial port that adds a direct connection to a network?
(1) FireWire
(2) NIC
(3) USB
(4) Internal modem
(5) None of these
65. Which of the following is saved to noncontiguous clusters on a
hard disk?
(1) Clustered
file
(2) Defragmented
file
(3) Sectored
file
(4) Fragmented
file
(5) None of
these
66. What should be used if a company wants to include its company name
and logo at the bottom of every page of a
brochure?
(1) Header
(2) Macro
(3) Footer
(4) Footnote
(5) None of
these
67. ___________ is an event-driven programming language developed in
the early 1990.
(1) C
(2) VB
(3) C++
(4) Pascal
(5) None of
these
68. Linux is a_____
(1) Utility
program for peer-to-peer file sharing
(2) Real-time
operating system
(3) Network
operating system
(4) PDA
platform
(5) None of
these
69. The_________ runs the front-end applications software in a
network.
(1) Client
(2) Database
(3) Server
(4) CPU
(5) None of
these
70. Which of the following is used for close a tab on a browser?
(1) Ctrl + T
(2) Ctrl + W
(3) Ctrl + A
(4) Ctrl + Y
(5) None of
these
71. What is RISC?
(1) Storage
Device
(2) Computer
Network
(3) Microprocessor
(4) Operating
System
(5) None of
these
72. NORTON‘ is an ____
(1) Software
(2) Anti-Virus
Program
(3) Network
(4) Program
(5) None of
these
73. A program that converts high level language to machine Language
is _______
(1) Linker
(2) Assembler
(3) Compiler
(4) All of
the above
(5) None of
these
74. Zip is a -----file.
(1) Executable
File
(2) Compressed
File
(3) System
File
(4) Combo
(5) None of
these
75. At a time how many operating system can be at work on a computer
?
(1) Only
one
(2) Two
(3) Three
(4) Four
(5) None of
these
76. Answer Sheets in bank PO‘s/Clerk‘s examinations are checked by
using –
(1) Optical
Character Reader
(2) Optical
Mark Reader
(3) Magnetic
ink Character Reader
(4) All of
the above
(5) None of
these
77. Image can be sent over telephone lines by using ------
(1) Larger
bandwidth
(2) Fax
(3) Scanner
(4) Cable
(5) None of
these
78. Which among the following is a Scientific Computer Language?
(1) BASIC
(2) COBOL
(3) FORTRAN
(4) PASCAL
(5) None of
these
79. What is ―Oracle‖ ?
(1) A
Co-ordination System
(2) Word
Software
(3) Database
Software
(4) All of
the above
(5) None of
these
80. IC Chip is made of -----.
(1) Silicon
(2) Nickel
(3) Iron
(4) Copper
(5) None of
these
81. At which place is India‘s Silicon Valley situated?
(1) Bangalore
(2) Hyderabad
(3) Chennai
(4) Kolkata
(5) None of
these
82. A connection from one HTML document to another HTML document is
called ____________
(1) Hyper
Link
(2) Connecting
Link
(3) Icon
(4) All of
these
(5) None of
these
83. This device is used to connect your computer with a telephone
line, so that can access information from other
servers and ordinary
users too, said device is called ___________
(1) Modem
(2) Set Top
Box
(3) LAN
Card
(4) UPS
(5) None of
these
84. Device on one network can communicate with devices on another
network via_______
(1) File
Server
(2) Utility
Server
(3) Printer
Server
(4) Gateway
(5) None of
these
85. The screen background is known as the________
(1) Application
(2) Window
(3) Desktop
(4) Frames
(5) None of
these
86. Which of the following is not an input device?
(1) Mouse
(2) Keyboard
(3) Light
pen
(4) VDU
(5) None of
these
87. What are the units used to count the speed of a printer ?
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of
these
88. A computer that combines the characteristic of analog and
digital computers_________
(1) Hybrid
Computer
(2) Digital
Computer
(3) Analog
Computer
(4) Super
Computer
(5) None of
these
89. WORM stands for?
(1) Write
Once Read Memory
(2) Wanted
Once Read Memory
(3) Wanted
Original Read Memory
(4) Write
Original Read Memory
(5) None of
these
90. Memory unit is a part of ______
(1) Input
Device
(2) Control
Unit
(3) Output
Device
(4) Central
Processing Unit
(5) None of
these
91. Which of the following companies developed MS Office-2000?
(1) Novell
(2) Corel
(3) Lotus
(4) Microsoft
(5) None of
these
92. What is the meaning of ‗MICR‘?
(1) Magnetic
Ink Character Recognition
(2) Magnetic
Intelligence Character Recognition
(3) Magnetic
Information Cable Recognition
(4) Magnetic
Insurance Cases Recognition
(5) None of
these
93. VIRUS stands for________
(1) Very
Important Record User Searched
(2) Verify
Interchanged Result Until Source
(3) Vital
Information Resource Under Seize
(4) Very
Important Resource Under Search
(5) None of
these
94. The technique that extends storage capacities of main memory
beyond the actual size of the main memory is
called _______
(1) Multitasking
(2) Virtual
storage
(3) Multiprocessing
(4) Multiprogramming
(5) Switching
95. ____________Command we can use to close the windows.
(1) Alt+ F1
(2) Alt+ S
(3) Alt+
End
(4) Alt+F4
(5) None of
these
96. Algorithm is used -------
(1) To
bring itself into desired state by its own action
(2) To
perform logarithmic operations
(3) To
describe a set of procedure by given result is obtained
(4) As a
high level language
(5) None of
these
97. FOXPRO is a ---------
(1) RDMBS
(2) DBMS
(3) Language
(4) All of
the above
(5) None of
these
98. Who is considered to the father of computers?
(1) John
Bardeen
(2) Charles
Babbage
(3) John
Backus
(4) William
Shockley
(5) None of
these
99. Which of the following will connect you to the Internet?
(1) An
Commercial online service
(2) An
Internet service provider
(3) A
network connection
(4) All of
the above
(5) None of
these
100. What software allows you to view internet
sites?
(1) A cyber
café
(2) A
browser
(3) A modem
(4) Your
computer
(5) None of
these
101. When more than one window is open, to switch
to the next window — is the key combination.
(1) CTRL+F5
(2) CTRL+F6
(3) CTRL+F7
(4) CTRL+F8
(5) None of
these
102. Where are data and program stored when the
processor uses them ?
(1) Main
memory
(2) Secondary
memory
(3) Disk
memory
(4) Program
memory
(5) None of
these
103. _______Represents raw facts, where-
as.................is a meaningful data.
(1) Information,
reporting
(2) Data,
information
(3) Information,
bits
(4) Records,
bytes
(5) Bits,
bytes
104. Saving is a process-
(1) To copy
the document from memory to storage medium
(2) To bring
change in present status of the document
(3) To change
entire form
(4) All of
the above
(5) None of
these
105. PNG stands for________
(1) Potable
Name Generator
(2) Portable
Network Generator
(3) Printed
Name Graphics
(4) Portable
Network Graphics
(5) None of
these
106. The maximum Zoom percentage in MS PowerPoint
is________
(1) 100%
(2) 200%
(3) 400%
(4) 500%
(5) None of
these
107. The word ‗FTP‘ stands for________
(1) File
Translate Protocol
(2) File
Transit Protocol
(3) File
Typing Protocol
(4) File
Transfer Protocol
(5) None of
these
108. Compiler in computer system is a_________
(1) Package
(2) System
Software
(3) Process
(4) Application
Software
(5) None of
these
109. What is an intersection of a row and column
in a spreadsheet?
(1) Formula
(2) Worksheet
(3) Address
(4) Cell
(5) None of
these
110. What is the process of creating movement from
still images?
(1) Transition
(2) Twining
(3) Bit-mapped
graphic
(4) Animation
(5) None of
these
111. A set of rules for creating markup languages
that enables programming to capture specific types of data by
creating their own
elements is called______
(1) XML
(2) HTML
(3) Ada
(4) XHTML
(5) None of
these
112. Small plain text files that are written to
your computer's hard disk by many of the Web sites you visit are
called_______
(1) RFIDs
(2) Web
beacons
(3) GUIDs
(4) Cookies
(5) None of these
113. Which of the following is the proper way to
denote a cell in a spreadsheet?
(1) 5C
(2) C5
(3) 2-15
(3) C
(4) None of
these
114. Which broadband service is the most
available?
(1) C-able
(2) POTS
(3) Satellite
(4) DSL
(5) None of
these
115. _________ is a set of rules computers use to
talk to each other.
(1) Protocol
(2) Syntax
(3) DOS
command
(4) HTML
(5) None of
these
116. Which backup method only backs up files that
have been modified since the last backup?
(1) Incremental
backup
(2) Partial
backup
(3) Selective
backup
(4) Full
backup
(5) None of
these
117. Which type of transmission media is known as
regular telephone wire?
(1) Wi-Fi
(2) Twisted-pair
wire
(3) Fiber
optic cable
(4) Coaxial
cable
(5) None of
these
118. What is the purpose of a firewall on a
computer?
(1) To
protect a computer from unauthorized access
(2) To
protect a computer in case of fire
(3) To
protect a computer from spam
(4) All of
the above
(5) None of
these
119. A disk's content that is recorded at the time
of manufacture and that cannot be changed or erased by the user
is_______________
(1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
120. In word, you can change Page Margins by
......
(1) Dragging the scroll
box on the scroll bars
(2) Deleting the margin
boundaries on the Ruler
(3) Dragging the margin
boundaries on the Ruler
(4) Clicking the right
mouse button on the Ruler
(5) None of these
121. Which part of the computer helps to store
information?
(1) Monitor
(2) Keyboard
(3) Disk -
drive
(4) Printer
(5) Plotter
122. Which key is used to delete one character to
the left of the current position of the cursor ?
(1) Backspace
(2) Delete
(3) Insert
(4) Esc
(5) Ctrl
123. If you want to connect to your own computer
through the Internet from another location, you can use–
(1) e-mail
(2) FTP
(3) instant
message
(4) Telnet
(5) None of
these
124. A (n) ……….is a special visual and audio
effect applied in Power-point to text or content.
(1) Animation
(2) Flash
(3) Wipe
(4) Dissolve
(5) None of
these
125. Where does most data go first with in a
computer memory hierarchy?
(1) RAM
(2) ROM
(3) BIOS
(4) CACHE
(5) None of these
126. All of the following are examples of storage
devices EXCEPT _______
(1) hard disk drives
(2) printers
(3) floppy disk drives
(4) CD drives
(5) Pen drives
127. Select the Odd one_____
(1) Operating
system
(2) Interpreter
(3) Compiler
(4) Assembler
(5) None of
these
128. Which of the following is not an advantage of
magnetic disk storage?
(1) The access
time of magnetic disk is much less than that of magnetic tape
(2) Disk
storage is longer lasting than magnetic tape
(3) Disk
storage is less expensive than tape storage
(4) All of
the above
(5) None of
these
129. Perforated paper used as input or output
media is known as_____
(1) Paper
tape
(2) Magnetic
tape
(3) Punched
paper tape
(4) Card
punch
(5) None of
these
130. 30 The first generation computer system
used________
(1) Vacuum
tubes
(2) Transistors
(3) Registers
(4) Magnetic
cores
(5) Silicon chip
131. To access properties of an object, the mouse
technique to use is _______
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these
132. The ALU and Control Unit jointly known
as_______
(1) RAM
(2) ROM
(3) CPU
(4) PC
(5) none of these
133. Computers process data into information by
working exclusively with ______
(1) multimedia
(2) words
(3) characters
(4) numbers
(5) None of these
134. COBOL stands for _______
(1) Common Business
Oriented Language
(2) Computer Business Oriented
Language
(3) Common Business
Operated Language
(4) Common Business
Organized Language
(5) None of these
135. What is the other name for programmed chip?
(1) RAM
(2) ROM
(3) LSIC
(4) PROM
(5) None of these
136. ___________ Store data temporarily and pass
it on as directed by the control unit.
(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these
137. RAID stands for________
(1) Reproduce
Array of Intelligent Disks
(2) Reproduce
Array of Inexpensive Disks
(3) Redundant
Array of Inexpensive Drives
(4) Redundant
Array of Inexpensive Disks
138. Select the smallest memory size:-
(1) Terabyte
(2) Gigabyte
(3) Kilobyte
(4) Megabyte
(5) None of
these
139. In most Microsoft programs, what does
'alt+f4' do?
(1) Ends the program
(2) Opens the program
(3) Run the program
(4) Modify the program
(1) none of
these
140. A device that is used to transmit data from
one location to another is known as ________
(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these
141. Programs developed by an outside supplier and
provided to the user in a machine readable form is known
as___________.
(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these
142. Which of the following describe one or more
characteristics of a modem computer?
(1) An electronic
device
(2) A mechanical device
(3) An electro-mechanical
device
(4) All of the above
(5) None of these
143. Octal number system has a base ______.
(1) Two
(2) Four
(3) Eight
(4) Ten
(5) None of these
144. PL 1 (Programming Language One) Is
__________.
(1) High level
programming language
(2) Low level programming
language
(3) Machine language
(4) Assembly language
(5) None of these
145. Which of the following is a disadvantage of
machine language?
(1) Machine Dependent
(2) Slower Execution
(3) Machine Independent
(4) all of the above
(5) None of these
146. Android Operating system is an example of
which kind of Source Model?
(1) Vertical Market
Software
(2) Open Source
(3) Horizontal Market
Software
(4) Shareware
(5) None of these
147. You can use the tab key to___________.
(1) Move a cursor across
the screen
(2) Indent a paragraph
(3) Move the cursor down
the screen
(4) Only ((1) and (2)
(5) None of these
148. Which process checks to ensure the components
of the computer and operating are connected properly?
(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) None of these
149. What is the correct association between a
hardware component and a computer function?
(1) Monitor > input
(2) Mouse > input
(3) CPU > storage
(4) Hard disk >
processing
(5) None of these
150. The sharing of a medium and its path by 2 or
more devices is called ________.
(1) Modulation
(2) Encoding
(3) Line discipline
(4) Multiplexing
(5) None of these
151. The server on the internet is also known as
___________.
(1) Repeater
(2) Host
(3) Gateway
(4) AND Gate
(5) None of these
152. A database management system (DBMS) is
a__________.
(1) Hardware system used
to create, maintain and provide controlled access to a data- base
(2) hardware system used
to create, maintain, and provide uncontrolled access to a database.
(3) Software system used
to create, maintain, and provide uncontrolled access to a database.
(4) Software system
used to create, maintain and provide controlled access to a database.
(5) None of these
153. Which of the following is an example of
connectivity?
(1) Internet
(2) floppy disk
(3) power card
(4) data
(5) None of these
154. What menu is selected to cut, copy and paste?
(1) File
(2) Tools
(3) Special
(4) Edit
(5) None of these
155. To save a document in different location use
______.
(1) Save
(2) Save as
(3) Save as web page
(4) All of above
(5) None of these
156. Programming language built into user programs
such as Word and Excel are known as _______.
(1) 4GLs
(2) Macro languages
(3) object-oriented
languages
(4) visual programming
languages
(5) None of these
157. Codes consisting of lines of varying widths
or lengths that are computer-readable are known as______.
(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
158. To reload a Web page, press the __________
button.
(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh
159. Personal computers can be connected together
to form a_______.
(1) server
(2) supercomputer
(3) network
(4) enterprise
(5) None of these
160. Which of the following is true?
(1) Byte is a single digit
in a binary number
(2) Bit represents a
grouping of digital numbers
(3) Eight-digit binary
number is called a byte
(4) Eight-digit binary
number is called a bit
(5) None of these
161. Which of the following can be used to select
the entire document?
(1) CTRL+A
(2) ALT+F5
(3) SHIFT+A
(4) CTRL+K
(5) CTRL+H
162. A concentric circle on a disk is called
a________
(1) cylinder
(2) track
(3) head
(4) sector
(5) none of
these
163. DSL is an example of a(n) ____________
connection.
(1) network
(2) wireless
(3) slow
(4) broadband
(5) none of
these
164. Instructions and data that are processed by
the CPU are located in________
(1) CD-ROM
(2) RAM
(3) the hard
disk
(4) the
motherboard
(5) none of
these
165. All of the following are considered to be
storage devices EXCEPT_______
(1) floppy
disk
(2) CPU
(3) CD
(4) hard disk
drive
(5) none of
these
166. The commonly used UNIX commands like date,
ls, cat etc. are stored in_________
(1) dev directory
(2) bin directory
(3) tmp directory
(4)unix directory
(5) None of these
167. A circuit with about 100 transistors
fabricated on a single chip is called _____
(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these
168. One megabyte equals approximately ___________
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
169. A computer checks the _____ of user names and
passwords for a match before granting access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these
170. Computers that are portable and convenient
for users who travel are known as _____
(1) Super computers
(2) Lap tops
(3) Mini computers
(4) File servers
(5) None of these
171. What is the term for unsolicited e-mail?
(1) News group
(2) Use net
(3) Backbone
(4) Flaming
(5) Spam
172. The _____ tells the computer how to use its
components.
(1) Utility
(2) Network
(3) Operating system
(4) Application program
(5) None of these
173. When sending an e-mail, the _____ line
describes the contents of the message.
(1) to
(2) subject
(3) contents
(4) CC
(5) None of these
174. The _____ key will launch the start buttons.
(1) Esc
(2) Shift
(3) Windows
(4) Shortcut
(5) None of these
175. What is the ultimate purpose of
Defragmentation?
(1) Make the PC faster
(2) Create More Free
Space
(3) Delete temporary files
(4) Reduce Power
consumption
(5) none of these
176. Which input device cannot be used to work in
MS Office?
(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen
177. . ........... Is a method in which multiple
communication devices are connected to one another efficiently.
(1) Switching
(2) Redundancy
(3) Capacity
(4) Detecting
(5) None of these
178. ............. is a collection of web - pages
and .......... is the very first page that we see on opening of a website.
(1) Home page, Web page
(2) Website, Home page
(3) Web page, Home page
(4) Web page, Website
(5) None of these
179. What's considered the 'backbone' of the World
Wide Web?
(1) URL
(2) HTML
(3) HTTP
(4) FTP
(5) None of these
180. SMTP stands for _________
(1) Simple Mail
Transfer Protocol
(2) Serve Message Text
Process
(3) Short Messaging Text
Process
(4) Short Messaging Transfer
Protocol
(5) None of these
181. Small application programs that run on a Web
page and provide animation are known as _________
(1) flash
(2) spiders
(3) cookies
(4) applets
(5) none of these
182. The errors that can be pointed out by the
compiler known as ______.
(1) Syntax errors
(2) Semantic errors
(3) Logic errors
(4) System errors
(5) None of these
183. A _______ contains specific rules and words
that express the logical steps of an algorithm?
(1) syntax
(2) programming structure
(3) programming language
(4) logic chart
(5) None of these
184. A Proxy server is used for which of the
following?
1)To provide security
against unauthorized users
(2)To process client
requests for web pages
(3)To provide TCP/IP
(4)To process client
requests for database access
(5) None of these
185. Storage that retains its data after the power
is turned off is referred to as?
(1) Volatile storage
(2) non-volatile
storage
(3) sequential storage
(4) direct storage
(5) None of these
186. Which term identifies main page of the entire
site?
(1) URL
(2) Web site address
(3) Hyperlink
(4) Domain name
(5) None of these
187. A hard copy of a document is_________
(1) stored in the hard
disk
(2) stored on a floppy
(3) stored on a CD
(4) printed on the
printer
(5) None of these
188. Which is the part of a computer that one can
touch and feel?
(1) Programs
(2) Software
(3) Hardware
(4) Output
(5) None of these
189. CPU stands for _________
(1) CD-run on memory
(2) central processing
unit
(3) call powers up
(4) create programs user
(5) None of these
190. Start or restart the
computer known as _____________
(1) exit
(2) kick
(3) boot
(4) kick-start
(5) None of these
191. This is not a function category in Excel
________
(1) Logical
(2) Data Series
(3) Financial
(4) Text
(5) None of these
192. The operating system that is self-contained
in a device and resident in the ROM is ______
(1) Batch Operating System
(2) Real - time Operating
System
(3) Embedded Operating
System
(4) Multi Operating System
(5) None of these
193. To be able to 'boot', the computer must have
a(n) ..........
(1) Compiler
(2) Loader
(3) Operating System
(4) Assembler
(5) None of these
194. On-line real time systems become popular
in..........Generation.
(1) First Generation
(2) Second Generation
(3) Third Generation
(4) Fourth Generation
(5) None of these
195. ___________is the ability of a device to
"jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these
196. . ............ is the combination of keys to
switch between the last four places that you have edited.
(1) ALT + CTRL + Z
(2) ALT + CTRL + Y
(3) ALT + TAB + Z
(4) ALT + SHIFT + Z
(5) None of these
197. ............ is the functional key to display
save-as box.
(1) F5
(2) F6
(3) F9
(4) F12
(5) None of these
198. Accessing data on tapes is much ....... than
that accessing data on disks.
(1) Slower
(2) Faster
(3) Same
(4) All of the above
(5) None of these
199. Who amongst the following is called the
father of modern computing?
(1) Charles Babbage
(2) Hollerith
(3) Gottfried von Leibnitz
(4) Joseph M. jacquard
(5) None of these
200. If you begin typing an entry into a cell and
then realize that you don't want your entry placed into a cell, you
_________
(1) Press the
Erase key
(2) Press esc
(3) Press the
Enter button
(4) Press the
Edit Formula button
(5) none of
these
201. Superscript, subscript, outline, emboss,
engrave are known as ______
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these
202. What is object of UPS?
(1) Using for storage
(2) To increase the speed
of a computer
(3) Provides backup
power
(4) All of these
(5) None of these
203. Documents converted to .......... can be
published to the Web.
(1) .doc file
(2) http
(3) machine language
(4) HTML
(5) none of these
204. Holding the mouse button down while moving an
object or text is known as ___
(1) Moving
(2) Dragging
(3) Dropping
(4) Highlighting
(5) None of these
205. When was the first Windows operating system
launched?
(1) 1984
(2) 1985
(3) 1988
(4) 1989
(5) 1990
206. What is the difference between a CD-ROM and a
CD-RW?
(1) They are the same;
just two different terms used by different manufacturers
(2) A D-ROM can be written
to and a CD-RW cannot
(3) A CD-RW can be written
to, but a CD-ROM can only be read from
(4) A CD-ROM holds more
information than a CD-RW
(5) None of these
207. What happens when we try to delete the fries
on the floppy ?
(1) The files get moved to
the Recycle Bin
(2) Files on a floppy
cannot be deleted
(3) The files get deleted
and can be restored again from Recycle Bin
(4) The files get
deleted and cannot be restored again
(5) The file gets copied
on the Hard disk
208. An educational institution would generally
have the following in its domain name ......
(1) .org
(2) .edu
(3) .inst
(4) .com
(5) .sch
209. POST stands for ...........
(1) Power on Self Test
(2) Program on Self Test
(3) Power on System Test
(4) Program on System Test
(5) Power Off System Test
210. Which of the following can input graphical
images and pictures for a computer?
(1) Plotter
(2) Scanner
(3) Mouse
(4) Printer
(5) Keyboard
211. Which of the following categories would
include a keyboard ?
(1) Printing Device
(2) Output Device
(3) Pointing Device
(4) Storage Device
(5) Input Device
212. In Word you can force a page break–
(1) By positioning your
cursor at the appropriate place and pressing the F1 key
(2) By positioning your
cursor at the appropriate place and pressing Ctrl +Enter
(3) By using the
Insert/Section Break
(4) By changing the font
size of your document
(5) None of these
213. LSTs (Large Integration) used in?
(1) First generation
(2) Second generation
(3) Third generation
(4) Fourth generation
(5) None of these
214. The purpose of an application program is to?
(1) Meet specific user
needs
(2) Make equivalent run
better
(3) Allow the operating
system to control resources better
(4) Convert program
written in high-level language to machine level language
(5) None of these
215. Hypertext is a _________
(1) Text stored in the
memory of the computer
(2) Text displayed on the
screen of the computer
(3) Special text used in
developing Internet developing package
(4) A system of
managing textual Information by creating associations between different
documents
(5) None of these
216. For running WINDOW minimum disk free space
required is?
(1) 8 MB
(2) 10 MB
(3) 16 MB
(4) 32 MB
(5) None of these
217. Which of the following printers generates
character from a grid?
(1) Inkjet
(2) Laser
(3) Daisy wheel
(4) Dot matrix
(5) None of these
218. Accumulator is a _______
(1) Hardwired unit
(2) Sequential circuit
(3) Finite state machine
(4) Register
(5) None of these
219. _______Function key refreshes the current
window.
(1) F5
(2) F6
(3) F7
(4) F8
(5) None of these
220. In 1983, this person was the first to offer a
definition of the term 'computer virus'?
(1) MC Fee
(2) Smiths
(3) Frederick
Cohen
(4) Norton
(5) None of these
221. To minimize all open windows and display the
desktop?
(1) Windows logo +D
(2) Windows logo + E
(3) Windows logo + F
(4) Windows logo + G
(5) None of these
222. In MS-Word 'alt + shift + d' does what?
(1) Automatically
inserts the date
(2) Inserts the time
(3) Inserts the day
(4) All of the above
(5) None of these
223. ________ deletes an item immediately without
placing it in the recycle bin.
(1) Shift +enter
(2) Shift +delete
(3) Shift +right arrow
(4) Shift +left arrow
(5) None of these
224. Which of the following is not a network
topology?
(1) Star
(2) Bus
(3) Linear
(4) Ring
(5) None of these
225. A list of rules for transferring data over a
network is called?
(1) Protocol
(2) Program code
(3) Rules
(4) Flowchart
(5) None of these
226. A table consists of_________
(1) Fields and columns
(2) Rows and columns
(3) Rows and cells
(4) All of the above
(5) None of these
227. What does 'ctrl +esc' do?
(1) Shows the start
menu
(2) shows the format menu
(3) Shows the tools menu
(4) shows the insert menu
(5) None of these
228. A proxy server is used as the computer?
(1) With external access
(2) acting as a backup
(3) Performing file
handling
(4) Access user
permissions
(5) None of these
229. Which of the following best defines embedded
system?
(1) A program that comes
wrapped in a box
(2) A program that is
permanent part of a computer
(3) A computer that is a
part of a larger computer
(4) A computer and
software system that controls a machine
(5) None of these
230. To see the document before the printout is
taken, use.......
(1) Insert Table
(2) Paste
(3) Format Painter
(4) Cut
(5) Print Preview
231. Digital video consists of a series of_____
(1) Media
clips
(2) Captures
(3) Frames
(4) Pictures
(5) none of
these
232. The __________ is the smallest meaningful
unit of data.
(1) cell
(2) field
(3) application
(4) all of
the above
(5) none of
these
233. What are the four main aspects of data
handling with a computer?
(1) Input,
processing, output, and storage
(2) Comparing,
dividing, sorting, and organizing
(3) Decision
making, sorting, correcting, and mapping
(4) Adding,
subtracting, multiplying, and dividing
(5) none of
these
234. Most cash registers are now computers that
are known as ____________ terminals.
(1) POS
(2) DS
(3) UDC
(4) UPC
(5) none of
these
235. Which of the following is NOT an example of
system maintenance?
(1) Replacing
user interfaces
(2) Making
backup copies of files
(3) Adding,
deleting, adjusting records
(4) Providing
system security
(5) none of
these
236. Which of the following is the primary task of
a NAS server?
(1) Login
authentication
(2) File
sharing
(3) Internet
access
(4) E-mail
processing
(5) none of
these
237. If you change Windows 98 to Windows XP, you
are actually performing ...........
(1) Upstart
(2) upgrade
(3) update
(4) patch
(5) None of these
238. To make a copy of the current document to
disk ........
(1) Use the 'Save' command
(2) This cannot be done
(3) Use the 'duplicate'
command
(4) Copy the document
(5) Use the 'save as'
command
239. The main system board of a computer is called
the ..........
(1) integrated circuit
(2) motherboard
(3) processor
(4) microchip
(5) None of these
240. Your position in the text is shown by a
..........
(1) Blinker
(2)
Cursor
(3) Causer
(4) Pointer
(5) None of these
241. How many megabytes make a gigabyte ?
(1) 1024
(2) 128
(3) 256
(4) 512
(5) 64
242. Using output devices one can ............
(1) input data
(2) store data
(3) scan data
(4) view or print data
(5) None of these
243. Which contents are lost when the computer
turns off ?
(1) Storage
(2) input
(3) output
(4) memory
(5) None of these
244. When you save to this, your data will remain
intact even when the computer is turned off–
(1) RAM
(2) Motherboard
(3) Secondary storage
device
(4) Primary storage device
(5) None of these
245. A central computer that holds collections of
data and programs for many PCs, workstations, and other computers
is a(n) –
(1) supercomputer
(2) minicomputer
(3) laptop
(4) server
(5) None of these
246. The piece of hardware that converts your
computer's digital signal to an analog signal that can travel over
telephone lines is called
a–
(1) red wire
(2) blue cord
(3) tower
(4) modem
(5) None of these
247. When the pointer is positioned on a……….it is
shaped like a hand.
(1) Grammar error
(2) Formatting error
(3) Screen Tip
(4) Spelling error
(5) hyperlink
248. Mobile Commerce is best described as–
(1) The use of Kiosks in
marketing
(2) transporting products
(3) Buying and selling
goods/services through wireless handheld devices
(4) Using notebook PC's in
marketing
(5) None of the above
249. Which of the following is a storage device
that uses rigid, permanently installed magnetic disks to store
data/information–
(1) floppy diskette
(2) hard disk
(3) permanent disk
(4) optical disk
(5) None of these
250. Which of the following are advantages of
CD-ROM as a storage media?
(1) CD-ROM is an
inexpensive way to store large, amount of data and information
(2) CD-ROM disks retrieve
data and information more quickly than magnetic disks do
(3) CD-ROMs make less
errors than magnetic media
(4) All of the above
(5) None of these
251. A device, which is not connected to CPU, is
called as .......
(1) land-line device
(2) On-line device
(3) Off-line device
(4) Device
(5) None of the above
252. A computer program that converts an entire
program into machine language at one time is called a/ an ____
(1) interpreter
(2) simulator
(3) compiler
(4) numbers
(5) None of these
253. What is MS Word?
(1) A game
(2) An Operating System
(3)Word Processing
Software
(4) Typing tutor software
(5) None of these
254. For Scientific work the most popular language
is?
(1) PASCAL
(2) FORTRON
(3) COBOL
(4) PROLOG
(5)None of these
255. TCP stands for _______
(1) Transfer control
protocol
(2) Transfer control
process
(3) Transmission
control protocol
(4) Transmission control
process
(5)None of these
256. The first graphical web browser are?
(1) Gopher
(2) WAIS
(3) CERN
(4) Mosaic
(5)None of these
257. Total memory of system can be known using?
(1) DIR commands
(2) MEM commands
(3) Warm boot
(4) TOT MEM commands
(5)None of these
258. The meaning of double-click is?
(1) Pushing and
releasing the main mouse button twice in rapid succession when the on-tree
mouse
pointer
is positioned over the desired item
(2) Appearance of an icon
(3) To take a selection
from the document and move it to the clipboard
(4) All of the above
(5) None of these
259. The term overflow means?
(1) An excess of
Internal storage
(2) An excess of external
storage
(3) A situation where
record cannot fit in to its right place
(4) A device, which
controls the level of humidity in the computer room
(5) None of these
260. The access time refers to
(1) Time
required locating and retrieving stored data
(2) Time
required locating the lost data
(3) Time
required deleting specific data on a certain memory location
(4) All of
the above
(5) None of
these
261. Rotational delay time is also known as
(1) Seek time
(2) Shift
time
(3) Latency
(4) Access
time
(5) None of
these
262. Which memory is non-volatile and may be
written only once?
(1) RAM
(2) EPROM
(3) EEPROM
(4) PROM
(5) None of
these
263. Peer-to-peer is a description–
(1) Of communications
between two dissimilar devices
(2) of communications
between two equal devices
(3) of communications
between two different devices
(4) All of the above
(5) None of these
264. Pascal is
(1) A
high-level programming language
(2) Named
after Blaise Pascal
(3) Named
after mathematician that facilitates structured programming techniques
(4) All of
the above
(5) None of
these
265. Technique to implement virtual memory where
memory is divided into units of fixed size memory is–
(1) Paging
(2) De-fragments
(3) Segmentation
(4) All of
the above
(5) None of
these
266. An adder where all the bits of the two
operands are added simultaneously–
(1) Parallel
adder
(2) Half
adder
(3) Full
adder
(4) All of
the above
(5) None of
these
267. The point at which the flow of text in a
document moves to the top of a new page–
(1) Page insert
(2) Page
break
(3) Page format
(4) All of the above
(5) None of these
268. Multiprocessor is a computer system–
(1) Where
many CPU under a common control
(2) Consisting
of more than one input devices under common control
(3) Where
many output devices under
(4) All of
the above
(5) None of
these
269. Non-document files are–
(1) Pure
ASCII files that can be listed for any word processing software
(2) Non ASCII
files that can be listed for any word processing software
(3) Pure
ASCII files that can be listed for specific word processing software
(4) Non ASCII
files that can be listed for specific word processing software
(5) All of
the above
270. Which of the Following is not a non-impact
printer?
(1) Thermal
printer
(2) Ink-jet
printer
(3) Laser
printer
(4) Dot-matrix
printer
(5) All of
the above
271. EDVAC stands for_______
(1) Electronic
Discrete Variable Automatic Computer
(2) Electronic
Discrete Value Automatic Computer
(3) Electronic
Device Variable Automatic Computer
(4) Electronic
Discrete Variable Advanced Computer
(5) None of
these
272. When a file is saved for the first
time-_______
(1) a copy is
automatically printed
(2) it must
be given a name to identify it
(3) it does
not need a name
(4) it only
needs a name if it is not going to be printed
(5) None of
these
273. The computers which are relatively rare
because of their cost and size are:
(1) Mini Computers
(2) Micro Computers
(3) Super Computers
(4) Laptops
(5) Mainframe Computer
274. A mistake in an algorithm that causes
incorrect results is called a .......
(1) Logical error
(2) Syntax error
(3) Machine Error
(4) Compiler error
(5) None
of these
275. A(n) .... program is one that is ready to run
and does not need to be altered in any way.
(1) Interpreter
(2) High-level
(3) Compiler
(4) COBOL
(5) Executable
276. A set of step-by-step procedures for
accomplishing a task is known as a(n)—
(1) algorithm
(2) hardware program
(3) software bug
(4) firmware program
(5) None of these
277. The main directory of a disk is called
the………directory.
(1) root
(2) sub
(3) folder
(4) network
(5) None of these
278. A………is a collection of data that is stored
electronically as a series of records in a table.
(1) spreadsheet
(2) presentation
(3) database
(4) web page
(5) None of these
279. As you create documents, graphs and pictures
your computer holds the data in—
(1) Restore file
(2) Backup drive
(3) Clip board
(4) Memory
(5) None of these
280. All are included in removable media except
the following—
(1) CD-ROMs
(2) Diskette
(3) DVDs
(4) High disk drive
(5) None of these
281. ………processing is used when a large mail-order
company accumulates orders and processes them together in
one large set.
(1) Batch
(2) Online
(3) Real-time
(4) Group
(5) None of these
282. Computer programs are written in a high-level
programming language; however, the human readable version of a
program is called—
(1) cache
(2) instruction set
(3) source code
(4) word size
(5) None of these
283. What happens if you press Ctrl + Shift + F8?
(1) It
activates extended selection
(2) It
activates the rectangular selection
(3) It
selects the paragraph on which the insertion line is.
(4) None of
above
(5) All the
above
284. Which of the following is not valid version
of MS Office?
(1) Office XP
(2) Office
Vista
(3) Office
2007
(4) None of
above
(5) None of
these
285. What is the short cut key to open the Open
dialog box in ms word?
(1) F12
(2) Shift F12
(3) Alt + F12
(4) Ctrl +
F12
(5) None of
these
286. How can you disable extended selection mode?
(1) Press F8
again to disable
(2) Press Del
to disable
(3) Press Esc
to disable
(4) Press
Enter to disable
(5) None of
these
287. Auto Calculate will quickly add selected
cells if you…..
(1) right
click on the status bar and select Sum
(2) click the
Auto Calculate button on the toolbar
(3) use the
key combination Ctrl+$
(4) Double
click the selection
(5) None of
the above
288. You can add a hyperlink to your worksheet by
pressing
(1) Alt + K
(2) Ctrl + H
(3) Ctrl + K
(4) Ctrl +
Shift + K
(5) None of
the above
289. __________are 'attempts by individuals to
obtain confidential information from you by falsifying their identity.
(1) Phishing
(2) Computer
viruses
(3) Spyware
scams
(4) Viruses
(5) None of
the above
290. Which of the following is the fastest type of
computer?
(1) Laptop
(2) Notebook
(3) Personal computer
(4) Workstation
(5) Supercomputer
291. Which of the following is not a term
pertaining to the Internet?
(1) Keyboard
(2) Link
(3) Browser
(4) Search Engine
(5) Hyperlink
292. The operating system that is self-contained
in a device and resident in the ROM is .......
(1) Batch Operating System
(2) Real - time Operating
System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these
293. The computer abbreviation KB usually means–
(1) Key Block
(2) Kernel Boot
(3) Key Byte
(4) Kit Bit
(5) Kilo Byte
294. .......... is the key to close a selected
drop - down list; cancel a command and close a dialog box.
(1) TAB
(2) SHIFT
(3) ESC
(4) F10
(5) None of these
295. Which of the following is NOT one of the four
major data processing functions of a computer?
(1) gathering data
(2) processing data into
information
(3) analyzing the data
or information
(4) storing the data or
information
(5) None of these
296. The CPU and memory are located on the :
(1) expansion board
(2) motherboard
(3) storage device
(4) output device
(5) display board
297. A ............ is an additional set of
commands that the computer displays after you make a selection from the main
menu
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these
298. A letter, memo, proposal or other file that
is created using Microsoft Word is called as?
(1) Master
(2) Slide
(3) Document
(4) Worksheet
(5) None of these
299. Which of the following are parts of the CPU?
(1) Secondary Memory
(2) Control unit
(3) Input device
(4) Printer
(5) None
of these
300. Which is not the portable computer?
(1) Micro-processor
(2) Calculator
(3) Series Computes
(4) Parallel Computers
(5) None of these
301. The
ROM chip which can be rewritten several times and requires the action of
ultraviolet radiations to erase its
contents is________
(1) Flash memory
(2) PROM
(3) EEPROM
(4) EPROM
(5) None of these www.thesanjayuttam.blogspot.in
302. FPI
stands for____
(1) Faults per inch
(2) Frames per inch
(3) Figure per inch
(4) Film per inch
(5) None of these
303. A
terabyte comprises
(1) 1024 gigabyte
(2) 1024 kilobyte
(3) 1024 megabyte
(4) 1024 byte
(5) None of these
304. The
memory which is utmost accessible to the processor is_____
(1) Cache memory
(2) RAM
(3) Hard disk
(4) Flash memory
(5) None of these
305. In
which kind of disk does the read/write head physically touches the surface?
(1) Hard Disk
(2) Compact Disk
(3) Floppy Disk
(4) all of the above
(5) None of these
306. What
is the correct syntax for typing a function into a cell?
(1) Equal sign, Function Name,
Matching brackets
(2) Function Name, Equal sign,
Matching brackets
(3) Equal sign, Matching brackets,
Function Name
(4) None of the above
(5) None of these
307. If
you see a small red triangle in the top right corner of a cell, it means there
is something attached to the
call. What is it?
(1) A comment
(2) An attachment
(3) An error
(4) None of the above
(5) None of these
308. Cache
memory is–
(1) Smaller and faster
than main storage
(2) Bigger and slower than main storage
(3) Smaller but slower than main memory
(4) Bigger and faster than main memory
(5) None of these
309. The
overall design, construction, organization and interconnecting of the various
components of a
computer system is
referred as–
(1) Computer Architecture
(2) Computer Flowchart
(3) Computer Algorithm
(4) All of the above
(5) None of these
310. BIOS
are responsible for
(1) Handling the particulars of
input/output operations
(2) Output operations
(3) Input operations
(4) All of the above
(5) None of these
311. BISYNC
is an abbreviation for–
(1) Binary Input/Binary Output
(2) Binary synchronous
(3) Binary digit
(4) All of the above
(5) None of these
312. A
process of trying out a new product by independent users before it is finally
manufactured/developed–
(1) Alpha test
(2) Beta Test
(3) Gamma test
(4) All of the above
(5) None of these
313. An
E-mail protocol for storage, management and change, especially in corporate
offices–
(1) Message handling
service
(2) Postal service‘s
(3) Data storage
(4) All of the above
(5) None of these
314. Password
is–
(1) Code by which a user
gains access to a computer system
(2) Pass for viewing movie
(3) Entrance without paying something
(4) All of the above
(5) None of these
315. The
technique where digital signals are converted to its analog form for
transmission over an analog facility is
called–
(1) Modulation
(2) Digitization
(3) Multiprocessing
(4) All of the above
\(5) None of these
316. Narrowband
channel is a communication channels–
(1) That handles low volumes of
data
(2) Used mainly for telegraph lines
and low speed terminals
(3) Both (1) and (2)
(4) All of the above
(5) None of these
317. MIME
is an acronym for ....
(1) Multiprogramming Internet Mail
Extension
(2) Multicasting Internet Mail
Extension
(3) Multiple Internet Mail Extension
(4) Multipurpose Internet Mail
Extension
(5) None of these
318. The...........
Settings are automatic and standard.
(1) Default
(2) CPU
(3) Peripheral
(4) User-friendly
(5) None of these
319. Pop-ups
are a form of ________on the World Wide Web?
(1) Instant Messaging
(2) Search Engines
(3) Browsers
(4) Mark-up Languages
(5) Online Advertising
320. Which
of the following is true about Operating System?
(1) It is an interface between user
and the computer.
(2) It manages all resources
(3) It does all Memory management and
Process management tasks
(4) All are true
(5) None of these
321. All
formula in Excel start with
(1) %
(2) +
(3) =
(4) –
(5) None of the above
322. Which
of the following displays the contents of the active cell?
(1) Active cell
(2) Formula bar
(3) Menu bar
(4) Name box
(5) None of the above
323. Tab
scrolling buttons
(1) Allow you to view a different
worksheet
(2) Allow you to view additional worksheet
row down
(3) Allow you to view additional worksheet
columns to the right
(4) Allow you to view
additional sheet tabs
(5) None of the above
324. What
is the keyboard shortcut for creating a chart from the selected cells?
(1) F3
(2) F5
(3) F7
(4) F11
(5) None of the above
325. You
cannot close MS Word application by
(1) Choosing File menu then Exit submenu
(2) Press Alt+F4
(3) Click X button on title bar
(4) From File menu choose
Close submenu
(5) None of these
326. Which
file starts MS Word?
(1) Winword.exe
(2) Word.exe
(3) Msword.exe
(4) Word2003.exe
(5) None of these
327. Where
can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of
vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these
328. One
of the functions of the arithmetic logic unit is to:
(1) receive data from the
registers
(2) convert negative numbers to
hexadecimal code
(3) send logical operations, such as AND
or NOT, to the alphabetic unit
(4) retrieve data from virtual memory
(5) none of these
329. What
is defined as the number of bits that the CPU processes as a unit?
(1) A computer sentence
(2) A computer word
(3) A computer phrase
(4) A computer term
(5) None of these
330. _________
Systems use a light beam to scan input data and convert it into electrical
signals, which are sent to
the computer for processing.
(1) Image recognition
(2) Optical recognition
(3) PDF
(4) Application
(5) None of these
331. _________
Devices accept the spoken word through a microphone and convert it into binary
code that can be
understood by the computer.
(1) Speech recognition
(2) Handwriting recognition
(3) Peripheral
(4) All of the above
(5) None of these
332. Name
the technique of processing transactions in random order.
(1) Transaction
processing
(2) Batch processing
(3) Offline processing
(4) Sequential file processing
(5) None of these
333. _________
Means that a transaction is processed fast enough for the result to come back
and be acted upon
right away.
(1) Real-time processing
(2) Records processing
(3) Batch processing
(4) All of the above
(5) None of these
334. _________
uses an area of memory to temporarily store data from disk that the program
might need soon.
(1) Data transferring
(2) DVD
(3) Disk caching
(4) All of the above
(5) None of these
335. What
is a device that prevents electrical problems from affecting computer data
files?
(1) An incremental backup
(2) A full backup
(3) A surge protector
(4) A differential backup
(5) None of these
336. What
is any text that can be keyed in, such as a memo?
(1) A database
(2) A spreadsheet
(3) A text document
(4) A business presentation
(5) None of these
337. What
type of program lets you produce professional-looking documents containing both
text and graphics?
(1) A page composer
(2) A thesaurus
(3) A desktop publisher
(4) A speller checker
(5) None of these
338. The
letter and number of the intersecting column and row is the:
(1) Cell coordinates
(2) Cell location
(3) Cell position
(4) Cell address
(5) None of these
339. What
is the standard query language supported by most DBMSs?
(1) Object-oriented language
(2) Report generator language
(3) Structured Query
Language (SQL)
(4) Query-by-example (QBE)
(5) None of these
340. Which
of the following are three fundamental characteristics that make a computer
useful?
(1) Lightweight, inexpensive, and sturdy
(2) Speed, reliability,
and storage capability
(3) Durable, connectible, and renewable
(4) all of the above
(5) none of these
341. Which
of the following is an appropriate use of groupware?
(1) A top-secret project
(2) A highly classified project
(3) An individual employee project
(4) A team project
(5) None of these
342. Software
used for database management can store data, update it, __________ it, retrieve
it, report it, and print it.
(1) manipulate
(2) download
(3) see
(4) all of the above
(5) none of these
343. Which
of the following is NOT a function of an operating system?
(1) Executing and providing services for
applications software
(2) Managing the computer‘s resources
(3) Establishing a user interface
(4) Formatting a word
document
(5) None of these
344. Which
of the following helps describe the Windows .NET Server?
(1) It is designed for
different levels of network complexity.
(2) It is a direct upgrade from Windows
NT.
(3) It is designed to replace Novell‘s
Netware.
(4) It has limited complexity.
(5) None of these
345. The
process of analyzing large data sets in search of new, previously undiscovered
relationships is known as:
(1) data mining
(2) data marting
(3) data maintenance
(4) data warehousing
(5) none of these
346. The
focus of the first phase of the systems development life cycle is to:
(1) Design what the new system should do
(2) Analyze and document the existing
system
(3) Identify problems and
opportunities
(4) Implement the new system
(5) None of these
347. Which
of the following is a network in which computers are located physically close
together, often in the same
building?
(1) WAN
(2) PAN
(3) MAN
(4) LAN
(5) None of these
348. What
is a modulator/demodulator that is connected to a circuit board or motherboard?
(1) Fax modem
(2) Network Interface Card (NIC)
(3) Internal modem
(4) External modem
(5) None of these
349. What
kind of server converts IP addresses to domain names?
(1) File
(2) DNS
(3) Email
(4) P2P
(5) None of these
350. In
the OSI model, the actual transmission of data is handled in the ____________
layer.
(1) data link
(2) physical
(3) network
(4) transport
(5) none of these
351. Which
of the following is NOT true about laptop computers?
(1) They are typically more expensive than
desktops.
(2) They are typically more expensive than
desktops.
(3) They often have fewer components than
PCs.
(4) They cannot be
connected to a PC.
(5) None of these
352. On
a CD-RW you can
(1) read and write information
(2) only read information
(3) only write information
(4) read, write and
rewrite information
(5) None of these
353. In
computer terminology, information means
(1) Raw data
(2) Data in more useful
(3) Alphanumeric data
(4) Program
(5) None of these
354. After
a picture has been taken with a digital camera and processed appropriately, the
actual print of the picture is
considered
(1) data
(2) input
(3) output
(4) the process
(5) None of these
355. What
is output?
(1) What the processor takes from the user
(2) What the user gives to the processor
(3) What the processor gets from the user
(4) What the processor
gives to the user
(5) None of these
356. What
is the main difference between a mainframe and a super computer ?
(1) Super computer is much larger than
mainframe computers
(2) Super computers are much smaller than
mainframe computers
(3) Supercomputers are
focused to execute few programs as fast as possible while mainframe uses
its power to execute
as many programs concurrently
(4) Supercomputers are focused to execute
as many programs as possible while mainframe uses its power
to execute few programs as fast as
possible
(5) None of these
357. Programs
such as Mozilla Firefox that serve as navigable windows into the Web are called
..........
(1) Hypertext
(2) Networks
(3) Internet
(4) Web browsers
(5) None of these
358. What
is the function of Recycle Bin?
(1) Store deleted file
(2) Store temporary file
(3) Store corrupted file
(4) Store Document file
(5) None of these
359. Which
device cannot be shared in network ?
(1) Floppy
(2) Keyword
(3) Computer
(4) Printer
(5) None of these
360. A
right click on the desktop itself will........
(1) open the Display
Properties dialog box
(2) show a context - sensitive menu
(3) open the Control Panel
(4) minimize all open applications
(5) None of these
361. The
advantage of using a spreadsheet is:
(1) Calculations can be done
automatically.
(2) changing data automatically updates
calculations
(3) more flexibility
(4) all of the above
(5) None of the above
362. Documentations
should include
(1) Destination and users of the output
data
(2) Source of input data
(3) Information on the purpose of the
workbook
(4) All of above
(5) None of the above
363. To
edit the selected cell in ms excel-
(1) Press F1
(2) Press F2
(3) Press F4
(4) Press F5
(5) None of these
364. You
can convert existing Excel worksheet data and charts to HTML document by using
the
(1) FTP Wizard
(2) Internet Assistant
Wizard
(3) Intranet Wizard
(4) Import Wizard
(5) None of the above
365. Which
of the following is graphics solution for Word Processors?
(1) Clipart
(2) WordArt
(3) Drop Cap
(4) All of above
(5) None of the Above
366. You
can detect spelling and grammar errors by-
(1) Press Shift + F7
(2) Press Ctrl + F7
(3) Press Alt+ F7
(4) Press F7
(5) None of the Above
367. What
is the shortcut key to Indent the paragraph in ms word?
(1) Ctrl + M
(2) Ctrl + P
(3) Shift + M
(4) Ctrl + I
(5) None of these
368. Which
of the following storage media provides sequential access only ?
(1) Floppy disk
(2) Magnetic disk
(3) Magnetic tape
(4) Optical disk
(5) None of these
369. What
is the storage area for e-mail messages called?
(1) A folder
(2) A directory
(3) A mailbox
(4) The hard disk
(5) None of these
370. The
set of parallel electrical conducting lines through which different components
on the mother board of a PC
unit are linked together are called:
(1) Conductors
(2) Buses
(3) Slide Master
(4) Consecutives
(5) None of these
371. A
PDA's memory contents remain intact when it is turned off because:
(1) A battery keeps
current available for RAM
(2) The memory contents are synchronized
with a desktop
(3) The memory contents are copied to
flash cards
(4) The memory contents are stored in ROM
(5) None of these
372. A
network of geographically distant computers and terminals is called a-
(1) Integrated Services Digital Network
(ISDN)
(2) Metropolitan area network (MAN).
(3) Wide area network
(WAN)
(4) Local area network (LAN)
(5) None of these
373. One
byte represents:
(1) Eight characters
(2) Eight bits
(3) A single digit with two possible
states
(4) A word
(5) None of these
374. Saving
files in HTML format:
(1) Makes it possible for
anyone to view the file in a Web browser
(2) Increases file conversion costs
(3) Decreases software compatibility
(4) All of the above
(5) None of these
375. Which
of the following would NOT be performed with application software?
(1) Financial report sent to investors
(2) Hard disk cleanup
(3) Charts for a sales meeting
presentation
(4) Customer list used for mailing
invoices
(5) None of these
376. Which
of the following statements is TRUE about the public switched telephone network
(PSTN)?
(1) PSTN is a packet-switching network
(2) PSTN is comprised of
a variety of physical media, including twisted pair and fiber optic cable
(3) PSTN is exclusively a digital network
system
(4) PSTN is only used for voice
transmissions, while the Internet is used for data transmissions
(5) None of these
377. Which
of the following best describes the difference between the Internet and the
World Wide Web?
(1) The Internet is the collection of
computers, while the World Wide Web is the wiring and transmission
protocols that connect them
(2) The Internet carries traffic for
schools, government offices, and other public organizations, while the
World Wide Web carries commercial
traffic
(3) The Internet consists of software
programs such as e-mail and IRC, while the World Wide Web is a
collection of Web pages
(4) The Internet is the
physical network of global computers, while the World Wide Web is many
hypertext documents
distributed globally over many computers
(5) None of these
378. Which
of the following runs on a user's local computer and is used to request and
display Web pages?
(1) FTP
(2) Web browser
(3) Web server
(4) HTML
(5) None of these
379. Which
of the following computer types is most powerful?
(1) Professional
workstation
(2) Internet appliance
(3) Desktop computer
(4) Network computer
(5) None of these
380. Which
of the following is the most frequently used input device?
(1) Microphone
(2) Scanner
(3) Touch screen
(4) Mouse
(5) None of these
381. A
modem is necessary if you want to-
(1) Add a scanner to your computer system
(2) Have voice mail added to your regular
telephone service
(3) Connect to other
computers or to the Internet using phone line, cable, or wireless connections.
(4) Display digital camera photographs on
your computer screen
(5) None of these
382. MS
Excel is a?
(1) Window based word processor package
(2) Window based
spreadsheet package
(3) DOS based spreadsheet package
(4) Window based accounting package
(5) None of these
383. What
is the flow of data between countries commonly called?
(1) International information system
(2) EDI
(3) Outsourcing
(4) Trans border data
flow
(5) None of these
384. Which
of the following is NOT a purpose of antivirus programs?
(1) Remove any identified viruses
(2) Copy the name of the
virus and send it to Microsoft for inspection
(3) Notify a user if a virus is found
(4) Search for viruses
(5) None of these
385. <H1>
is an example of _____.
(1) HTML
(2) GML
(3) SGML
(4) NSGML
(5) None of these
386. Which
type of network requires HPNA adapters for communication between network nodes?
(1) Phone line
(2) Wireless
(3) Power line
(4) Ethernet
(5) None of these
387. To
analyze vast quantities of scientific data and display underlying patterns, you
would use a:
(1) Mainframe
(2) Server
(3) Supercomputer
(4) Minicomputer
(5) None of these
388. The
free, open-source operating system that is becoming popular is:
(1) Mac OS X
(2) Microsoft Windows XP
(3) UNIX
(4) Linux
(5) None of these
389. What
term is used to describe software that monitors your online computer
activities?
(1) Snooper ware
(2) Spyware
(3) Tracker ware
(4) Travel ware
(5) None of these
390. Which
of the following is a memory management technique that makes the random access
memory appear larger
than it is?
(1) Byte mapping
(2) Preemptive multitasking
(3) Read-only memory
(4) Virtual memory
(5) None of these
391. The
two major components of system software are:
(1) The operating system
and system utilities
(2) Application software and system
utilities
(3) Primary memory and storage
(4) The operating system and applications
software
(5) None of these
392. Which
of the following may be necessary for you to do after you install new application
software?
(1) Turn the computer power switch off and
then back on
(2) Do a cold boot
(3) Press Shift + Alt + Del
(4) Do a warm boot
(5) None of these
393. The
power-on self-test----------------
(1) Checks for upgrades to the application
software
(2) Verifies that the
computer hardware is working properly
(3) Is able to provide easy-to-follow
on-screen instructions to correct hardware problems
(4) Is conducted after the BIOS
instructions are placed in memory
(5) None of these
394. Input,
processing, output, and storage are collectively referred to as:
(1) The systems cycle
(2) The information
processing cycle
(3) The system unit
(4) Communication
(5) None of these
395. Which
of the following is NOT part of the motherboard?
(1) System clock
(2) Connector
(3) CPU
(4) Chipset
(5) None of these
396. An
example of a wireless medium that sends data through the air or space is:
(1) Fiber-optic cable.
(2) Coaxial cable.
(3) Twisted pair.
(4) Microwaves.
(5) None of these
397. To
reverse the effect of your last action in word ------------
(1) Use the cut command
(2) Use the Undo command
(3) Press the delete key
(4) Use the Redo command
(5) None of these
398. Information
that comes from an external source and fed into computer software is called
................
(1) Output
(2) Input
(3) Throughput
(4) Reports
(5) None of these
399. The
basic unit of a worksheet into which you enter data in Excel is called a–
(1) tab
(2) box
(3) range
(4) cell
(5) None of these
400. All
of the following are examples of real security and privacy risks EXCEPT
(1) hackers
(2) viruses
(3) Spam
(4) identity theft
(5) None of these
DOWNLOAD PDF............
https://drive.google.com/file/d/0B9xjKMlkMH1QRkFJbWtYSmZFVG8/view?usp=sharing
https://drive.google.com/file/d/0B9xjKMlkMH1QRkFJbWtYSmZFVG8/view?usp=sharing
CORRECT ANSWERS ARE GIVEN IN THE FORM OF BOLD OPTION.
No comments:
Post a Comment