computer general knowledge 2

Upload: reet26

Post on 03-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Computer General Knowledge 2

    1/32

    omputer General Knowledge 21.The internet is ..........1) a large network of networks2) an internal communication system for a business3) a communications system for the Indian government4) All of these5) None of these2.Which of the following statements is FALSE concerning file names ? 1) Files may share the same name or the same extension but not both2) Every file in the same folder must have a unique, name3) File extension is another name for file type4) The file extension comes before the dot (.) followed by the file name5) None of these3.Which of the following would most likely NOT be a symptom of a virus ? 1) Existing program files and icons disappear2) The CD-ROM stops functioning3) The Web browser opens to an unusual home page4) Odd messages or images are displayed on the screen5) None of these4. What is a back up ?1) Restoring the information backup2) An exact copy of a system's information3) The ability to get a system u and running in the event of a system crash or failure4) All of these5) None of these5. ............ are lists of commands that appear on the screen 1) GUIs2) Icons3) Menus4) Windows5) None of these6. What is the correct association between a hardware component and a computer function?1) Monitor > input2) Mouse > input3) CPU > storage4) Hard disk > processing5) None of these

  • 7/29/2019 Computer General Knowledge 2

    2/32

    7. What is the function of Drop Cap ?1) It does not allow capital letters to be used in the documents2) It makes first letter of each word capital letter in the documents3) It lets you begin a paragraph with large dropped initial capital letter4) In automatically starts all paragraphs and sentences with capital letters5) None of these8.The errors that can be pointed out by the compiler are : 1) Syntax error2) Symantic error3) Logical error4) Internal error5) None of these9. The move to the bottom of a document, press........ 1) Auto summarize2) Home key3) Ctrl + Home key4) End key5) Ctrl + End key10. By default, your documents print in ..... Mode1) Landscape2) Portrait3) Page setup4) Print preview5)Noneofthese

    ANSWERS: 1) 1 2) 4 3) 2 4) 4 5) 3 6) 2 7) 3 8) 1 9) 5 10) 2

    Computer General Knowledge 31.What is the ultimate purpose of Defragmentation ?1) Make the PC faster2) Create More Free Space3) Delete temporary files4) Reduce Power consumption5) All of the above

  • 7/29/2019 Computer General Knowledge 2

    3/32

    2.Computers process data into information by working exclusively with :1) multimedia2) words3) characters4) numbers5) None of these3.You must install a (n) ......... on a network if you want to share a broadband Internetconnection1) router2) modem3) node4) cable5) None of these4.The purpose of the primary key in a database is to : 1) unlock the database2) provide a map of the data3) uniquely identify a record4) establish constraints on database operations5) None of these5.The design of the network is called the network 1) architecture2) server3) transmission4) type5) None of these6.The most frequently used instructions of a computer program are likely to be fetched from:1) the hard disk2) cache memory3) RAM4) registers5) None of these7.Personal logs or journal entries posted on the Web are known as : 1) listservs2) Webcasts3) blogs4) subject directories5) None of these8.Which of the following is NOT a type of broad band internet connection ?

  • 7/29/2019 Computer General Knowledge 2

    4/32

    1) Cable2) DSLspan>3) Dial-up4) Satellite5) None of these9.Linux is a(n) ........ operating system1) open-source2) Microsoft3) Windows4) Mac5) None of these10.Which of the following places the common data elements in order from smallest to largest 1) character, file, record, field, database2) character, record, field, database, file3) character, field, record, file, database4) Bit, byte, character, record, field, file, database5) None of these

    ANSWERS: 1) 2 2) 4 3) 1 4) 2 5) 1 6) 2 7) 3 8) 3 9) 1 10) 3

    Computer General Knowledge 41. =SUM (B1 : B8) is an example of a(A) Function(B) Formula(C) Cell address(D) Value(E) None of these2. Which of the following storage media provides sequential access only ? (A) Floppy disk(B) Magnetic disk(C) Magnetic tape(D) Optical disk(E) None of these3. Compilers and translators are one form of(A) ROM(B) RAM(C) Hard disk(D) Software(E) None of these

  • 7/29/2019 Computer General Knowledge 2

    5/32

    4. Data representation is based on thenumber system, which uses two numbers torepresent all data.(A) binary(B) biometric(C) bicentennial(D) byte(E) None of these5. www means(A) world wide wonder(B) world wide wizard(C) world wide web(D) wide world web(E) None of these6. processing is used when a large mail-order company accumulates orders andprocesses them together in one large set.(A) Batch(B) Online(C) Real-time(D) Group(E) None of these7. What is the difference between a CD-ROM and a CD-RW ?(A) They are the samejust two different terms used by different manufacturers(B) A CD-ROM can be written to and a CD-RW cannot(C) A CD-RW can be written to, but a CD-ROM can only be read from(D) A CD-ROM holds more information than a CD-RW(E) None of these8. Holding the mouse button down while moving an object or text is known as (A) Moving(B) Dragging(C) Dropping(D) Highlighting(E) None of these9. Ais a collection of data that is stored electronically as a series of records in a table. (A) Spreadsheet(B) Presentation(C) Database(D) Web page(E) None of these10. Theprimarily take(s) care of the behind-the-scenes details and manage(s) thehardware.(A) Operating system(B) Application software(C) Peripheral devices(D) Hard disk(E) None of these11. Ais a professionally designed empty document that can be adapted to the usersneeds.(A) File(B) Guide(C) Template(D) User guide file(E) None of these

  • 7/29/2019 Computer General Knowledge 2

    6/32

    12. A group of 8 bits is known as a(A) Byte(B) Kilobyte(C) Binary digit(D) Megabit(E) None of these

    ANSWERS: 1.B 2.B 3.D 4.A 5.C 6.A 7.C 8.B 9.C 10.A11.C 12.A

    Computer General Knowledge 51. are often delivered to a PC through an e-mail attachment and are often designed todo harm.(A) Viruses(B) Spam(C) Portals(D) Email messages(E) None of these2. What is the storage area for e-mail messages called ? (A) A folder(B) A directory(C) A mailbox(D) The hard disk(E) None of these3. A desktop computer is also known as a(A) Palm Pilot(B) PC(C) Laptop(D) Mainframe(E) None of these4. When a file contains instructions that can be carried out by the computer, it is often calleda(n) file.(A) data(B) information(C) executable(D) application(E) None of these5. Documents converted tocan be published to the Web. (A) a.doc file(B) http(C) machine language(D) HTML(E) None of these6. If a user needs information instantly available to the CPU, it should be stored (A) on a CD

  • 7/29/2019 Computer General Knowledge 2

    7/32

    (B) in secondary storage(C) in the CPU(D) in RAM(E) None of these7. To what temporary area can you store text and other data, and later paste them to another

    location ?(A) The clipboard(B) ROM(C) CD-ROM(D) The hard disk(E) None of these8. In a spreadsheet, ais a number you will use in a calculation. (A) label(B) cell(C) field(D) value(E) None of these9. After slide-directed time, if you want to move ahead automatically, click incheck box intransition of this slide group in tab of animations(A) Transition timer(B) Automatically opter(C) Transition opter(D) Automatic timer(E) None of these10. All are included in removable media except the following (A) CD-ROMs(B) Diskette(C) DVDs(D) High disk drive(E) None of these11. If you open some menu and then decide that you do not want to select some option, thenclick the menu title again or press the key to layout the menu. (A) shift(B) tab(C) escape(D) F1(E) None of these12. Using theprocess, it is easy to change the name of the file. (A) transforming(B) crash(C) renaming(D) retagging(E) None of these13. view shows that how will content on printed page, alongwith footer and marginheader, appear.(A) Draft(B) Full screen reading(C) Outline(D) Page layout(E) None of these14. Using, the text can be entered and edited very efficiently.(A) Spreadsheet

  • 7/29/2019 Computer General Knowledge 2

    8/32

    (B) Typewriter(C) Word processing programme(D) Desktop publishing programme(E) None of these

    ANSWERS: 1.A 2.C 3.B 4.C 5.D 6.B 7.A 8.D 9.B 10.D11.C 12.C 13.D 14.D

    Computer General Knowledge 61. By using slide, the characteristics of the fonts of all the slides in presentation, can bechanged.(A) theme(B) icon(C) Master(D) Style(E) None of these2. Though several programmers can be opened simultaneously yet onlyprogrammed

    can be active.(A) four(B) Three(C) two(D) One(E) None of these3. Straight and Uniform margins on both the sides indicate that there is in thedocument.(A) full justification(B) full alignment(C) left justification(D) right justification(E) None of these4. Among the typical computer programming languages used today, the following is notincluded in(A) C++(B) JAVA(C)Visual Basic.NET(D) Machine language(E) None of these5. .makes available the commands to righten the software. Instructions are translatedstep-by-step and executed by the processor so that some objective can be achieved or someproblem can be solved.(A) Software patch(B) Al language

  • 7/29/2019 Computer General Knowledge 2

    9/32

    (C) Presentation language(D) Programming language(E) None of these6. As you create documents, graphs and pictures your computer holds the data in (A) Restore file(B) Backup drive(C) Clip board(D) Memory(E) None of these7. Which of the following terms is used for the form in which the word will appear on the page?(A) Text formatting(B) Character formatting(C) Point size(D) Type face(E) None of these8. .helps to capture the raw data and enter into the computer system.(A) CPU(B) Integrated circuit(C) Input device(D) Motherboard(E) None of these9.The following are included in the world programme .Title Bar, Ribbon, Status Bar,Views, Document workspace.(A) Window(B) Browser(C) Explorer(D) Website(E) None of these

    ANSWERS: 1.B 2.B 3.A 4.D 5.C 6.D 7.A 8.C 9.A

    Computer General Knowledge 71. The software tools that enable a user to interact with a computer for specific purposes areknown as(A) Hardware(B) Networked Software(C) Shareware(D) Applications(E) None of these2. Ashares hardware, software, and data among authorized users.(A) network(B) protocol(C) hyperlink(D) transmitter(E) None of these

    http://www.blogger.com/email-post.g?blogID=4208664681358891281&postID=7309648740360279755http://www.blogger.com/email-post.g?blogID=4208664681358891281&postID=7309648740360279755
  • 7/29/2019 Computer General Knowledge 2

    10/32

    3. Computer programs are written in a high-level programming language; however, thehumanreadable version of a program is called

    (A) cache(B) instruction set(C) source code(D) word size(E) None of these4. In word processing, an efficient way to move the 3rd paragraph to place it after the5

    thparagraph is

    (A) copy and paste(B) copy, cut and paste(C) cut, copy and paste(D) cut and paste(E) None of these5. Which of the following is not a function of the control unit ? (A) Read instructions(B) Execute instructions(C) Interpret instructions(D) Direct operations(E) None of these6. Software for organizing storage and retrieval of information is a(n)(A) operating system(B) database(C) database program(D) data warehouse(E) None of these7. A set of step-by-step procedures for accomplishing a task is known as a(n) (A) algorithm(B) hardware program(C) software bug(D) firmware program(E) None of these8. Which of the following is not true about RAM ?(A) RAM is a temporary storage area(B) RAM is the same as hard disk storage(C) RAM is volatile(D) Information stored in RAM is gone when you turn the computer off(E) None of these9. The main directory of a disk is called thedirectory.(A) Root(B) Sub(C) Folder(D) Network(E) None of these10. The physical arrangement of elements on a page is referred to as a documents (A) Features(B) Format(C) Pagination(D) grid(E) None of these

  • 7/29/2019 Computer General Knowledge 2

    11/32

    ANSWERS: 1.D 2.A 3.C 4.D 5.D 6.C 7.A 8.B 9.A 10.B

    Computer General Knowledge 8

    1. If a word is typed that is not in Words dictionary, a ____________ wavy underline appears below

    the word.

    (A) red

    (B) green

    (C) blue

    (D) black

    (E) None of these

    2. The____________button on the quick access Toolbar allows you to cancel your recent commands

    or actions.

    (A) Search

    (B) Cut

    (C) Document

    (D) Undo

    (E) None of these

    3. In Excel, any set of characters containing a letter , hyphen, or space is considered

    (A) a formula

    (B) text

    (C) a name

    (D) a title

    (E) None of these

  • 7/29/2019 Computer General Knowledge 2

    12/32

    4. ____________Software allows users to perform calculations on rows and columns of data.

    (A) Word processing

    (B) Presentation graphics

    (C) Database Management Systems

    (D) Electronic Spreadsheet

    (E) None of these

    5. A ____________represent approximately one billion memory locations.

    (A) Kilobyte

    (B) megabyte

    (C) gigabyte

    (D) terabyte

    (E) None of these

    6. ____________cells involves creating a single cell by combining two or more selected cells.

    (A) Formatting

    (B) Merging

    (C) Embedding

    (D) Splitting

    (E) None of these

    7. The operating system is the most common type of____________software.

    (A) Communication

    (B) application

    (C) system

    (D) word-processing

  • 7/29/2019 Computer General Knowledge 2

    13/32

    (E) None of these

    8. When you quickly press and releaes the left mouse button twice , you are

    (A) Primary-clicking

    (B) pointing

    (C) Double-clicking

    (D) Secondary-clicking

    (E) None of these

    9. The horizontal and vertical lines on a worksheet are called

    (A) cells

    (B) sheets

    (C) block lines

    (D) gridlines

    (E) None of these

    10. To delete an incorrect character in a document, ____________ to erase to the right of the

    insertion point.

    (A) press the left mouse key

    (B) double-click the right mouse key

    (C) press the BACKSPACE key

    (D) press the delete key

    (E) None of these

    11. The operating system does all of the following EXCEPT:

    (A) provide a way for the user to interact with the computer.

    (B) Manage the central processing unit (CPU).

    (C) Manage memory and storage.

  • 7/29/2019 Computer General Knowledge 2

    14/32

    (D) Enable users to perform a specific task such as document editing.

    12. During the boot process, the____________looks for the system files.

    (A) CD

    B. BIOS

    C. CPU

    D. DVD

    13. ____________ are lists of commands that appear on the screen.

    (A) GUIs

    (B) Icons

    (C) Menus

    (D) Windows

    14. ____________ is the ability of an operating system to control the activities of multiple programs

    at the same time.

    (A) Multitasking

    (B) Streamlining

    (C) Multiuser

    (D) Simulcasting

    15. The unique signal, generated by a device, that tells the operating system that it is in need of

    immediate attention is called an:

    (A) action.

    (B) Event.

    (C) Interrupt.

    (D) Activity.

  • 7/29/2019 Computer General Knowledge 2

    15/32

    16. The operating system controls access to the processor by assigning a(n) ____________ to each

    task requiring the processors attention.

    (A) CPU

    (B) slice of time

    (C) stack

    (D) event

    17. The blocks of code, included in the operating system, that software applications interact with are

    known as:

    (A) application programming interfaces (APIs).

    (B) Complimentary metal-oxide conductors (CMOS).

    (C) Device drivers.

    (D) Bootstrap loaders.

    18. MS-DOS is a ____________ operating system.

    (A) point-and-click

    (B) user-friendly

    (C) command-driven

    (D) Mac

    19. An interrupt handler is a (n):

    (A) location in memory that keeps track of recently generated interrupts.

    (B) Peripheral device.

    (C) Utility program.

    (D) Special numeric code that indicates the priority of a request.

    20. A spooler is a (n):

    (A) location in memory that maintains the contents of a document until it prints out.

  • 7/29/2019 Computer General Knowledge 2

    16/32

    (B) Print job.

    (C) Program that coordinates the print jobs that are waiting to print.

    (D) Message sent from the printer to the operating system when a print job is completed.

    ANSWERS: 1.A 2.D 3.B 4.C 5.C 6.B 7.C 8.C 9.D 10.D 11.D

    12.B 13.C 14.A 15.C 16.B 17.A 18.C 19.D 20.C

    Computer General Knowledge 91. Which of the following is not a type of computer software which can be bought ? (A) Off-the-shelf(B) Tailor-made(C) Custom-developed(D) Off-the-shelf with alterations(E) All of these can be purchased2. You can useto copy selected text, and to paste it in a document.(A) CTRL + C, CTRL + V(B) CTRL + C, CTRL + P(C) CTRL + S, CTRL + S(D) SHIFT + C, ALT + P(E) CTRL + D, CTRL + A3. Video processors consist of and , which store and process images. (A) CPU and VGA(B) CPU and memory(C) VGA and memory(D) VGI and DVI(E) VGA and VGI4. The main memory of a computer can also be called(A) Primary storage(B) Internal memory(C) Primary memory(D) All of these(E) None of these5. Computer software can be defined as(A) The computer and its associated equipment(B) The instructions that tell the computer what to do(C) Computer components that act to accomplish a goal(D) An interface between the computer and the network(E) The interaction between the computer and its database

  • 7/29/2019 Computer General Knowledge 2

    17/32

    6. When speaking of computer input and output, input refers to (A) Any data processing that occurs from new data input into the computer(B) Retrieval of data or information that has been input into the computer(C) Data or information that has been entered into the computer(D) The transmission of data that has been input into the computer(E) Both (C) and (D) above7. A is a set of rules.(A) Resource locator(B) Domain(C) Hypertext(D) URL(E) Protocol8. The connection between your computer at home and your local ISP is called(A) The last mile(B) The home stretch(C) The home page(D) The backbone(E) The vital mile9. All of the logic and mathematical calculations done by the computer happen in/on the (A) System board(B) Central control unit(C) Central processing unit(D) Mother board(E) Memory10. The operating system called UNIX is typically used for(A) Desktop computers(B) Laptop computers(C) Supercomputers(D) Web servers(E) All of these11. Thefile format is a method of encoding pictures on a computer.(A) HTML(B) JPEG(C) FTP(D) URL(E) DOC12. Pressto move the insertion point to the Address box, or to highlight the URL in theAddress box.(A) ALT + D(B) ALT + A(C) SHIFT + TAB(D) TAB + CTRL(E) CTRL + S

    ANSWERS: 1.D 2.A 3.C 4.C 5.B 6.E 7.E 8.C 9.C 10.E

    11.B 12.A

  • 7/29/2019 Computer General Knowledge 2

    18/32

    Computer General Knowledge 10

    1. Virtual memory is typically located:

    (A) on a floppy disk.

    (B) In the CPU.

    (C) In a flash card.

    (D) On the hard drive.

    2. The purpose of a swap (or page) file is to:(A) maintain pages of documents that are being spooled

    to the printer.

    (B) Hold a programs data or instructions in virtual memory when it cant fit in RAM.

    (C) Prevent thrashing in a multitasking environment.

    (D) Allow multiple print jobs to print their pages out simultaneously.

    3. The definition of thrashing is:

    (A) swapping data between virtual memory and RAM too frequently.

    (B) Insufficient hard disk space.

    (C) Too many processors being managed by the operating system.

    (D) Inaccurate information stored in the registry.

    4. All of the following are TRUE of Safe Mode EXCEPT:

    (A) Safe Mode is a special diagnostic mode.

    (B) Safe Mode loads all nonessential icons.

    (C) Safe Mode allows users to troubleshoot errors.

    (D) Safe Mode loads only the most essential devices.

    5. Verification of a login name and password is known as:

    (A) configuration.

  • 7/29/2019 Computer General Knowledge 2

    19/32

    (B) Accessibility.

    (C) Authentication.

    (D) Logging in.

    6. The combination of the operating system and the processor is referred to as the computers:

    (A) CPU.

    (B) Platform.

    (C) BIOS.

    (D) CMOS.

    7. The following message generally means:

    (A) a nonsystem floppy has been left in the floppy disk drive.

    (B) the CD drive is not functioning.

    (C) the BIOS is corrupted.

    (D) there is a problem loading a device.

    8. Which of the following is the correct sequence of actions that takes place during the boot-up

    process?

    (A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings

    (B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings

    (C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings

    (D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system

    9. All of the following are steps involved in the boot process EXCEPT:

    (A) load the operating system into RAM.

    (B) the power-on self-test.

    (C) activate the basic input/output system (BIOS).

    (D) load application programs.

  • 7/29/2019 Computer General Knowledge 2

    20/32

    10. The ____________, stored on a ROM chip, is responsible for loading the operating system from

    its permanent location on the hard drive into RAM.

    (A) BIOS

    (B) API

    (C) device driver

    (D) supervisor program

    11. The basic input/output system (BIOS) is stored in:

    (A) RAM.

    (B) ROM.

    (C) the CPU.

    (D) the hard drive.

    12. Ensuring that the essential peripheral devices are attached and operational is the ____________

    process.

    (A) configuration

    (B) CMOS

    (C) POST

    (D) ROM

    13. The memory resident portion of the operating system is called the

    (A) registry.

    (B) API.

    (C) CMOS.

    (D) kernel.

    14. Which of the following does NOT occur during the power-on self-test (POST)?

  • 7/29/2019 Computer General Knowledge 2

    21/32

    (A) The ScanDisk utility begins to run.

    (B) The video card and video memory are tested.

    (C) The BIOS identification process occurs.

    (D) Memory chips are checked to ensure they are working properly.

    15. All of the following are TRUE regarding virtual memory EXCEPT

    (A) any amount of RAM can be allocated to virtual memory.

    (B) the setting for the amount of hard drive space to allocate to virtual memory can be

    manually changed.

    (C) this temporary storage is called the swap file (or page file).

    (D) virtual memory is physical space on the hard drive.

    16. The operating system allows users to organize the computers contents in a hierarchical

    structure of directories that include all of the following EXCEPT:

    (A) files.

    (B) folders.

    (D) drives.

    (D) systems.

    17. All of the following statements concerning windows are true EXCEPT

    (A) windows are an example of a command-driven environment.

    (B) windows can be resized and repositioned on the desktop.

    (C) more than one window can be open at a time.

    (D) toolbars and scrollbars are features of windows.

    18. All of the following statements concerning files are true EXCEPT

    (A) A file is a collection of related pieces of information stored together for easy reference.

    (B) Files can be generated from an application.

  • 7/29/2019 Computer General Knowledge 2

    22/32

    (C) Files are stored in RAM.

    (D) Files should be organized in folders.

    19. Using Windows Explorer, a plus (+) sign in front of a folder indicates

    (A) an open folder.

    (B) the folder contains subfolders.

    (C) a text file.

    (D) a graphics file.

    20. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best

    viewing option is the __________ view.

    (A) List

    (B) Thumbnails

    (C) Details

    (D) Icon

    ANSWERS: 1.D 2.B 3.A 4.B 5.C 6.B 7.A 8.B 9.D 10.A 11.B

    12.C 13.D 14.A 15.A 16.D 17.A 18.C 19.B 20.C

    Computer General Knowledge 111. A communication processor that connects dissimilar networks by providing the translationfrom one set of protocol to another is(1) Bridge(2) Gateway(3) Router(4) Modem(5) All of these

    2. Which of the following is a general-purpose programming language, designed by SunMicrosystems, and well suited for use on the Web? (1) VB Script(2) Java Script(3) CSS

    (4) Java(5) None of these

  • 7/29/2019 Computer General Knowledge 2

    23/32

    3. This.............tier processes HTTP protocol, scripting tasks, performs calculations, andprovides access to data.(1) Client(2) Applications/Web server(3) Enterprise server(4) DBA

    (5) None of these

    4. RSA is(1) Symmetric Cryptosystem(2) Asymmetric Cryptosystem(3) Block Cypher(4) Digital Signature(5) None of these

    5. A DVD-RAM is similar to aexcept it has storage capacities up to 5.2 GB. (1) CD-R(2) floppy disk(3) CD-RW

    (4) hard disk(5) None of these

    6. When you are selecting a mouse for a particular computer system, what is the mostimportant consideration?(1) The type of drivers that come with the mouse(2) The length of the mouse cord(3) The type of connector the mouse is equipped with(4) The number of buttons the mouse has(5) None of these

    7. How is power supplied to a low-power USB device? (1) Through a power cable

    (2) From an external power supply(3) Directly from the computer's power supply(4) Through the USB cable(5) None of these

    8. All of the following are basic principles of net works, except(1) each computer must have a network card(2) there must be communications media connecting the network hardware devices(3) there must be at least one connecting device(4) each computer must have software that supports the movement of information(5) None of these

    9. The.data mining technique derives rules from real-world case examples.(1) Rule discover(2) Signal processing(3) Neural nets(4) Case-based reasoning(5) None of these

    10. .are used to identify a user who returns to a Website.(1) Cookies(2) Plug-ins(3) Scripts(4) ASPs(5) None of these

    ANSWERS: 1. (2) 2.(2) 3. (1) 4. (4) 5. (3) 6. (3) 7. (4) 8. (2) 9. (3) 10. (1)

  • 7/29/2019 Computer General Knowledge 2

    24/32

    Computer General Knowledge 121. What is the Super Computer developed in India a) CRAYb) PARAMc) Both (a) and (b)d) None of the above2. Which of the following is different from other a) Internetb) Windowsc) Unixd) Linux3. What is the full form of WWW?a) World Wide Webb) World With Webc) Work Wide Webd) World Wide Wet4. Which of the following Command is required to reboot the computer a) CTRL+ALT+DELb) CTRL+ALT+TABc) CTRL+ALT+SHIFTd) CTRL+SHIFT+DEL5. Select the ODD onea) Operating systemb) Interpreterc) Compilerd) Assembler6. PC stands fora) Practical Computerb) Personal Computerc) Private Computerd) Personal Contact7. The computer code for interchange of information between terminals isa) BCDICb) BCDc) ASCIId) None of the above8. The retrieval of information from the computer is defined asa) Data processingb) Inputc) Outputd) All of the above9. Which one of the following is NOT a computer language?

  • 7/29/2019 Computer General Knowledge 2

    25/32

    a) MS-Excelb) BASICc) COBOLd) C++10. "C" isa) A letterb) A wordc) A languaged) An alphabet11. Difference Engine invented bya) Charles Babbageb) John McCarthyc) Pascald) Newton12. First generation computer systems useda) Transistorsb) Vacuum Tubesc) Both (a) and (b)d) None of the above13. A byte is made up ofa) Eight bytesb) Eight binary digitsc) Two binary digitsd) Two decimal points14. Doing research by using an on-line database instead of a printed set of similar information

    offers which of the following advantagea) More current informationb) Easier to understandc) Better chartsd) None of the above15. Software programs that allow you to legally copy files and give them away at no cost are

    called which of the followinga) Time sharingb) Public domainc) Sharewared) None of the above

    SWERS: 1. b 2. a 3. a 4. a 5. a 6. b 7. c 8. c 9. a 10. c 11. a 12. b 13.

    B 14. a 15. b

  • 7/29/2019 Computer General Knowledge 2

    26/32

    Computer General Knowledge 131. In a network, the Computer that stores the files and process the data is named as a) Serverb) Terminalc) Modemd) All of the above2. Viruses are called that becausea) They are virusesb) They can copy themselves and spreadc) Both (a) and (b)d) None of the above3. Which of the can't Spread Virusa) An e-mail with attachmentb) A plain text mailc) Downloading files over the webd) None of the above4. There is a new Anti-virus software update available, when it is downloaded to yourComputera) Everydayb) Only in the nightc) When you next switch on your computerd) All of the above5. Numbers are stored and transmitted inside a Computer ina) Binary formb) ASCII code formc) Alphabets formd) Numerical form6. CPU capacity can be measured ina) BPSb) MIPSc) MHzd) MPI7. MPIS stands fora) Million Instructions Per Secondb) Million Instructions Per Seasonc) Monthly Instructions Per Secondd) Million Inputs Per Second8. LAN speeds are measured ina) BPSb) KBPSc) MBPSd) MIPS9. Modem speeds are measured ina) BPSb) KBPSc) MBPSd) MIPS10. BPS stands fora) Bits Per Secondb) Bits Per Seasonc) Bytes Per Second

  • 7/29/2019 Computer General Knowledge 2

    27/32

    d) Bits Per System11. In processing cheques which of the following I/O techniques have Banks traditionallyfollowed?a) OCRb) MICRc) Barcoded) VRT12. What is object of UPS?a) Using for storageb) To increase the speed of a computerc) Provides backup powerd) All of the above13. QWERTY is used with reference toa) Monitorb) Printerc) Keyboardd) Mouse14. "Zipping" a file meansa) Encrypting the messageb) Compressing the messagec) Transfer the messaged) All of the above15. Integrated Circuits (IC) Chips used in Computers are made with a) Goldb) Silverc) Silicond) Copper

    SWERS: 1. a 2. b 3. b 4. c 5. b 6. b 7. a 8. c 9. a 10. a 11. b 12. c 13. c14. b 15. c

    omputer General Knowledge 141. Which of the following is a part of the Central Processing Unit? a. Printerb. Key boardc. Moused. Arithmetic & Logic unite. None of these

    2. CAD stands fora. Computer aided designb. Computer algorithm for designc. Computer application in designd. All of the abovee. None of these

    3. Which of the following printer cannot print graphics?a. Ink-jetb. Daisy Wheelc. Laser

    http://www.blogger.com/email-post.g?blogID=4208664681358891281&postID=7644154502342252293http://www.blogger.com/email-post.g?blogID=4208664681358891281&postID=7644154502342252293
  • 7/29/2019 Computer General Knowledge 2

    28/32

    d. Dot-matrixe. None of these

    4. A program written in machine language is called? a. Assemblerb. Object

    c. Computerd. Machinee. None of these

    5. The father of Modern Computer isa. Charles Babbageb. Von-nuumannc. Danies Ritcheld. Blaise Pascale. None of these

    6. The Word FTP stands fora. File Translate Protocol

    b. File Transit Protocolc. File Transfer protocold. file typing protocole. None of these

    7. The lowest form of Computer language is called a. BASICb. FORTRANc. Machine Languaged. COBOLe. None of these

    8. Best Quality graphics is produced by

    a. Dot Matixb. Laser Printerc. Inkjet Printerd. Plottere. None of these

    9. Memory which forgets every thing when you switch off the power is known as a. Corruptedb. Volatilec. Non-Volatiled. Non-Corruptede.None of these

    10.The linking of computers with a communication system is called a. Networkingb. Pairingc. Interlockingd. Assemblinge. Sharing

    11.The 16 bit Microprocessor means that it hasa. 16 address linesb. 16 Busesc. 16 Data linesd. 16 routese. None of these

    12. Data going into the computer is called

  • 7/29/2019 Computer General Knowledge 2

    29/32

    a. Outputb. algorithmc. Inputd. Calculationse. flow chart

    13. Which of the following refers to a small, single-site network?a. LANb. DSLc. RAMd. USBe. CPU

    14. Microsoft Office isa. Sharewareb.Public domain softwarec. Open-sourse softwared. A vertical market applicatione. An application suite

    15. How many options does a BINARY choice offera. None of theseb. Onec. Twod. it depends on the amount of memory on the computere. It depends on the speed of the computers processor

    16. A collection of program that controls how your computer system runs and processesinformation is calleda. Operating Systemb. Computerc. Office

    d. Compilere. Interpreter

    17. Computer connected to a LAN (Local Area Network) can a. run fasterb. go on linec. share information and /or share peripheral equipmentd. E-maile. None of these

    18. Information travels between components on the mother board through a. Flash memoryb. CMOS

    c. Baysd. Busese. Peripherals

    19. How are data organized in a spreadsheet? a. Lines & spacesb. Layers & Planesc. Height & Widthd. Rows & Columnse. None

    20. The blinking symbol on the computer screen is called the a. mouse

    b. logoc. hand

  • 7/29/2019 Computer General Knowledge 2

    30/32

    d. palme. cursor

    21. A fault in a computer program which prevents it from working correctly is known as a. Bootb. Bug

    c. Biffd. Strape. None of these

    22. A self replicating program, similar to a virus which was taken from a 1970s science fictionnovel by John Bruner entitled the Shockwave Rider is _________a. Bugb. Vicec. Liced. Worme. None of these

    23. A _______ is a bi-stable electronic circuit that has two stable states.

    a. Multivibratorb. Flip-flopc. Logic gatesd. latene. None of these

    24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known asa. Spamb. Trashc. Calibrid. Couriere. None of these

    25.DOS stands fora. Disk Operating Systemb. Disk operating sessionc. Digital Operating Systemd. Digital Open systeme. None of these

    26. Who is the chief of Miocrosofta. Babbageb. Bill Gatesc. Bill Clintond. Bushe. None of these

    27. Which of the following are input devices. a. Keyboardb. Mousec. Card readerd. Scannere. All of these

    28. Examples of output devices area. Screenb. Printerc. Speaker

    d. All of thesee. None of these

  • 7/29/2019 Computer General Knowledge 2

    31/32

    29. Which of the following is also known as brain of computer a. Control unitb. Central Processing unitc. Arithmatic and language unitd. Monitor

    e. None of these

    30. IBM stands fora. Internal Business Managementb. International Business Managementc. International Business Machinesd. Internal Business Machinese. None of these

    31.___________ translates and executes program at run time line by linea. Compilerb. Interpreterc. Linker

    d. Loadere. None of these

    32. ___________ is an OOP principlea. Structured programmingb. Procedural programmingc. Inheritanced. Linkinge. None of these

    33. COBOL is widely used in _________ applicationsa. Commercialb. Scientific

    c. Spaced. Mathematicale. None of these

    34. RAM stands fora. Random origin moneyb. Random only memoryc. Read only memoryd. Random access memorye. None of these

    35. 1 Byte = ?a. 8 bits

    b. 4 bitsc. 2 bitsd. 9 bitse. None of these

    36. SMPS stands fora. Switched mode Power Suplyb. Start mode power supplyc. Store mode power supplyd. Single mode power supplye. None of these

    37. The device used to carry digital data on analog lines is called as a. Modem

  • 7/29/2019 Computer General Knowledge 2

    32/32

    b. Multiplexerc. Modulatord. Demodulatore. None of these

    38. VDU is also called

    a. Screenb. Monitorc. Both 1 & 2d. printere. None of these

    39. BIOS stands fora. Basic Input Output systemb. Binary Input output systemc. Basic Input Off systemd. all the abovee. None of these

    40. Father of C programming languagea. Dennis Ritchie b. Prof Jhon Kemenyc. Thomas Kurtzd. Bill Gatese. None of these

    ANSWERS

    1. (d) 2. (a) 3. (b) 4. (a) 5. (a)6. (c) 7. (c) 8. (d) 9. (b) 10. (a)

    11. (c) 12. (c) 13. (a) 14. (e) 15. (c)16. (a) 17. (c) 18. (c) 19. (d) 20. (e)21. (b) 22. (d) 23. (b) 24. (a) 25. (a)26. (b) 27. (e) 28. (d) 29. (b) 30. (c)31. (b) 32. (c) 33. (a) 34. (d) 35. (a)36. (a) 37. (a) 38. (c) 39. (a) 40. (a)