computer questions with answers

100
Computer Questions With Answers For more question and answers go to http://yoursyllabus.blogspot.com

Upload: letsguru-guru

Post on 07-Nov-2014

3.105 views

Category:

Education


2 download

DESCRIPTION

get free ias pcs exam notes, get previous year papers, computer gk, general knowledge question papers,all classes question papers,cbse syllabus,cbse question papers,icse syllabus,punjab university chandigarh syllabus,all classes syllabus,computer general knowledge,computer gk

TRANSCRIPT

Page 1: Computer questions with answers

Computer Questions With AnswersFor more question and answers go to http://yoursyllabus.blogspot.com

Page 2: Computer questions with answers

All of the following are examples of real security and privacy risks EXCEPT:

A. hackers. B. spam. C. viruses. D. identity theft. Answer: B

Page 3: Computer questions with answers

A process known as ____________ is used by large retailers to study trends.

A. data mining B. data selection C. POS D. data conversion Answer: A

Page 4: Computer questions with answers

. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B

Page 5: Computer questions with answers

A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.

A. PSS B. POS C. inventory D. data mining Answer: A

Page 6: Computer questions with answers

The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:

A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C

Page 7: Computer questions with answers

Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C

Page 8: Computer questions with answers

____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements.

A. POS B. RFID C. PPS D. GPS Answer: B

Page 9: Computer questions with answers

Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A

Page 10: Computer questions with answers

Technology no longer protected by copyright, available to everyone, is considered to be:

A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A

Page 11: Computer questions with answers

. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A

Page 12: Computer questions with answers

____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D

Page 13: Computer questions with answers

. ____________ is data that has been organized or presented in a meaningful fashion.

A. A process B. Software C. Storage D. Information Answer: D

Page 14: Computer questions with answers

. The name for the way that computers manipulate data into information is called:

A. programming. B. processing. C. storing. D. organizing. Answer: B

Page 15: Computer questions with answers

Computers gather data, which means that they allow users to ____________ data.

A. present B. input C. output D. store Answer: B

Page 16: Computer questions with answers

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:

A. data. B. output. C. input. D. the process. Answer: B

Page 17: Computer questions with answers

Computers use the ____________ language to process data

A. processing B. kilobyte C. binary D. representational Answer: C

Page 18: Computer questions with answers

Computers process data into information by working exclusively with:

A. multimedia. B. words. C. characters. D. numbers. Answer: D

Page 19: Computer questions with answers

In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D

Page 20: Computer questions with answers

The term bit is short for:

A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C

Page 21: Computer questions with answers

A string of eight 0s and 1s is called a:

A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B

Page 22: Computer questions with answers

A ____________ is approximately one billion bytes.

A. kilobyte B. bit C. gigabyte D. megabyte Answer: C

Page 23: Computer questions with answers

A ____________ is approximately a million bytes.

A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C

Page 24: Computer questions with answers

____________ is any part of the computer that you can physically touch.

A. Hardware B. A device C. A peripheral D. An application Answer: A

Page 25: Computer questions with answers

The components that process data are located in the:

A. input devices. B. output devices. C. system unit. D. storage component. Answer: C

Page 26: Computer questions with answers

All of the following are examples of input devices EXCEPT a:

A. scanner. B. mouse. C. keyboard. D. printer. Answer: D

Page 27: Computer questions with answers

Which of the following is an example of an input device?

A. scanner B. speaker C. CD D. printer Answer: A

Page 28: Computer questions with answers

All of the following are examples of storage devices EXCEPT:

A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B

Page 29: Computer questions with answers

The ____________, also called the brains of the �computer, is responsible for processing data.

A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D

Page 30: Computer questions with answers

The CPU and memory are located on the:

A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B

Page 31: Computer questions with answers

Word processing, spreadsheet, and photo-editing are examples of:

A. application software. B. system software. C. operating system software. D. platform software. Answer: A

Page 32: Computer questions with answers

____________ is a set of computer programs used on a computer to help perform tasks.

A. An instruction B. Software C. Memory D. A processor Answer: B

Page 33: Computer questions with answers

. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.

A. management B. processing C. utility D. application Answer: D

Page 34: Computer questions with answers

The PC (personal computer) and the Apple Macintosh are examples of two different

A. platforms. B. applications. C. programs. D. storage devices. Answer: A

Page 35: Computer questions with answers

Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.

A. languages B. methods C. CPUs D. storage devices Answer: C

Page 36: Computer questions with answers

Servers are computers that provide resources to other computers connected to a:

A. network. B. mainframe. C. supercomputer. D. client. Answer: A

Page 37: Computer questions with answers

Smaller and less expensive PC-based servers are replacing ____________ in many businesses.

A. supercomputers B. clients C. laptops D. mainframes Answer: D

Page 38: Computer questions with answers

____________ are specially designed computers that perform complex calculations extremely rapidly.

A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B

Page 39: Computer questions with answers

DSL is an example of a(n) ____________ connection.

A. network B. wireless C. slow D. broadband Answer: D

Page 40: Computer questions with answers

The difference between people with access to computers and the Internet and those without this access is known as the:

A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A

Page 41: Computer questions with answers

____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.

A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A

Page 42: Computer questions with answers

Which of the following is the correct order of the four major functions of a computer?

A. Process & Output & Input & Storage

B. Input & Output & Process & Storage

C. Process & Storage & Input & Output

D. Input & Process & Output & Storage

Answer: D

Page 43: Computer questions with answers

____________ bits equal one byte.

A. Eight B. Two C. One thousand D. One million Answer: A

Page 44: Computer questions with answers

The binary language consists of ____________ digit(s).

A. 8 B. 2 C. 1,000 D. 1 Answer: B

Page 45: Computer questions with answers

A byte can hold one ____________ of data.

A. bit B. binary digit C. character D. kilobyte Answer: C

Page 46: Computer questions with answers

____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

A. The platform B. The operating system C. Application software D. The motherboard Answer: B

Page 47: Computer questions with answers

The operating system is the most common type of ____________ software.

A. communication B. application C. system D. word-processing software Answer: C

Page 48: Computer questions with answers

____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.

A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B

Page 49: Computer questions with answers

The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:

A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A

Page 50: Computer questions with answers

The two broad categories of software are:

A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D

Page 51: Computer questions with answers

The metal or plastic case that holds all the physical parts of the computer is the:

A. system unit. B. CPU. C. mainframe. D. platform. Answer: A

Page 52: Computer questions with answers

If a word is typed that is not in Word’s dictionary, a____________way underline appears below the word.

(A) red (B) green (C) blue (D) black (E) None of these Ans : (A)

Page 53: Computer questions with answers

The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.

(A) Search (B) Cut (C) Document (D) Undo (E) None of these Ans : (D)

Page 54: Computer questions with answers

In Excel, any set of characters containing a letter , hyphen, or space is considered—

(A) a formula (B) text (C) a name (D) a title (E) None of these Ans : (B)

Page 55: Computer questions with answers

.____________Software allows users to perform calculations on rows and columns of data.

(A) Word processing (B) Presentation graphics (C) Database Management Systems (D) Electronic Spreadsheet (E) None of these Ans : (C)

Page 56: Computer questions with answers

A ____________represent approximately one billion memory locations.

(A) kilobyte (B) megabyte (C) gigabyte (D) terabyte (E) None of these Ans : (C)

Page 57: Computer questions with answers

____________cells involves creating a single cell by combining two or more selected cells.

(A) Formatting (B) Merging (C) Embedding (D) Splitting (E) None of these Ans : (B)

Page 58: Computer questions with answers

The operating system is the most common type of____________software.

(A) communication (B) application (C) system (D) word-processing (E) None of these Ans : (C)

Page 59: Computer questions with answers

When you quickly press and releaes the left mouse button twice , you are—

(A) Primary-clicking (B) pointing (C) Double-clicking (D) Secondary-clicking (E) None of these Ans : (C)

Page 60: Computer questions with answers

The horizontal and vertical lines on a worksheet are called—

(A) cells (B) sheets (C) block lines (D) gridlines (E) None of these Ans : (D)

Page 61: Computer questions with answers

To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.

(A) press the left mouse key (B) double-click the right mouse key (C) press the BACKSPACE key (D) press the delete key (E) None of these Ans : (D)

Page 62: Computer questions with answers

The operating system does all of the following EXCEPT:

(A) provide a way for the user to interact with the computer.

(B) manage the central processing unit (CPU).

(C) manage memory and storage. (D) enable users to perform a

specific task such as document editing.

Ans : (D)

Page 63: Computer questions with answers

During the boot process, the____________looks for the system files.

A. CD B. BIOS C. CPU D. DVD Ans : (B)

Page 64: Computer questions with answers

____________ are lists of commands that appear on the screen.

(A) GUIs (B) Icons (C) Menus (D) Windows Ans : (C)

Page 65: Computer questions with answers

____________ is the ability of an operating system to control the activities of multiple programs at the same time.

(A) Multitasking (B) Streamlining (C) Multiuser (D) Simulcasting Ans : (A)

Page 66: Computer questions with answers

The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:

(A) action. (B) event. (C) interrupt. (D) activity. Ans : (C)

Page 67: Computer questions with answers

The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.

(A) CPU (B) slice of time (C) stack (D) event Ans : (B)

Page 68: Computer questions with answers

The blocks of code, included in the operating system, that software applications interact with are known as:

(A) application programming interfaces (APIs).

(B) complimentary metal-oxide conductors (CMOS).

(C) device drivers. (D) bootstrap loaders. Ans : (A)

Page 69: Computer questions with answers

MS-DOS is a ____________ operating system.

(A) point-and-click (B) user-friendly (C) command-driven (D) Mac Ans : (C)

Page 70: Computer questions with answers

An interrupt handler is a(n):

(A) location in memory that keeps track of recently generated interrupts.

(B) peripheral device. (C) utility program. (D) special numeric code that

indicates the priority of a request. Ans : (D)

Page 71: Computer questions with answers

A spooler is a(n):

(A) location in memory that maintains the contents of a document until it prints out.

(B) print job. (C) program that coordinates the print jobs that

are waiting to print. (D) message sent from the printer to the

operating system when a print job is completed. Ans : (C)

Page 72: Computer questions with answers

Virtual memory is typically located:

(A) on a floppy disk. (B) in the CPU. (C) in a flash card. (D) on the hard drive. Ans : (D)

Page 73: Computer questions with answers

The purpose of a swap (or page) file is to:

(A) maintain pages of documents that are being spooled to the printer.

(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.

(C) prevent thrashing in a multitasking environment.

(D) allow multiple print jobs to print their pages out simultaneously.

Ans : (B)

Page 74: Computer questions with answers

The definition of thrashing is:

(A) swapping data between virtual memory and RAM too frequently.

(B) insufficient hard disk space. (C) too many processors being managed by the

operating system. (D) inaccurate information stored in the registry. Ans : (A)

Page 75: Computer questions with answers

All of the following are TRUE of Safe Mode EXCEPT:

(A) Safe Mode is a special diagnostic mode.

(B) Safe Mode loads all nonessential icons. (C) Safe Mode allows users to troubleshoot

errors. (D) Safe Mode loads only the most

essential devices. Ans : (B)

Page 76: Computer questions with answers

Verification of a login name and password is known as:

(A) configuration. (B) accessibility. (C) authentication. (D) logging in. Ans : (C)

Page 77: Computer questions with answers

The combination of the operating system and the processor is referred to as the computer’s:

(A) CPU. (B) platform. (C) BIOS. (D) CMOS. Ans : (B)

Page 78: Computer questions with answers

The following message generally means:

(A) a nonsystem floppy has been left in the floppy disk drive.

(B) the CD drive is not functioning. (C) the BIOS is corrupted. (D) there is a problem loading a

device. Ans : (A)

Page 79: Computer questions with answers

Which of the following is the correct sequence of actions that takes place during the boot-up process?

(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings

(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings

(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings

(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system

Ans : (B)

Page 80: Computer questions with answers

All of the following are steps involved in the boot process EXCEPT:

(A) load the operating system into RAM.

(B) the power-on self-test. (C) activate the basic input/output

system (BIOS). (D) load application programs. Ans : (D)

Page 81: Computer questions with answers

The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.

(A) BIOS (B) API (C) device driver (D) supervisor program Ans : (A)

Page 82: Computer questions with answers

The basic input/output system (BIOS) is stored in:

(A) RAM. (B) ROM. (C) the CPU. (D) the hard drive. Ans : (B)

Page 83: Computer questions with answers

Ensuring that the essential peripheral devices are attached and operational is the ____________ process.

(A) configuration (B) CMOS (C) POST (D) ROM Ans : (C)

Page 84: Computer questions with answers

The memory resident portion of the operating system is called the—

(A) registry. (B) API. (C) CMOS. (D) kernel. Ans : (D)

Page 85: Computer questions with answers

Which of the following does NOT occur during the power-on self-test (POST)?

(A) The ScanDisk utility begins to run. (B) The video card and video memory are

tested. (C) The BIOS identification process occurs. (D) Memory chips are checked to ensure

they are working properly. Ans : (A)

Page 86: Computer questions with answers

. All of the following are TRUE regarding virtual memory EXCEPT—

(A) any amount of RAM can be allocated to virtual memory.

(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.

(C) this temporary storage is called the swap file (or page file).

(D) virtual memory is physical space on the hard drive.

Ans : (A)

Page 87: Computer questions with answers

The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:

(A) files. (B) folders. (C) drives. (D) systems. Ans : (D)

Page 88: Computer questions with answers

All of the following statements concerning windows are true EXCEPT—

(A) windows are an example of a command-driven environment.

(B) windows can be resized and repositioned on the desktop.

(C) more than one window can be open at a time.

(D) toolbars and scrollbars are features of windows.

Ans : (A)

Page 89: Computer questions with answers

All of the following statements concerning files are true EXCEPT—

(A) A file is a collection of related pieces of information stored together for easy reference.

(B) Files can be generated from an application.

(C) Files are stored in RAM. (D) Files should be organized in folders. Ans : (C)

Page 90: Computer questions with answers

Using Windows Explorer, a plus (+) sign in front of a folder indicates—

(A) an open folder. (B) the folder contains subfolders. (C) a text file. (D) a graphics file. Ans : (B)

Page 91: Computer questions with answers

In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.

(A) List (B) Thumbnails (C) Details (D) Icon Ans : (C)

Page 92: Computer questions with answers

All of the following are examples of real security and privacy risks Except.

(A) hackers (B) spam (C) viruses (D) identify theft

Page 93: Computer questions with answers

The OSI model is divided into_______ processes called layers.

(A) five (B) six (C) seven (D) eight

Page 94: Computer questions with answers

Servers are computers that provide resources to other computers connected to a

(A) mainframe (B)Network (C) supercomputer (D) client

Page 95: Computer questions with answers

URL stands for.....

(A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator (D) Uniform Research Locator

Page 96: Computer questions with answers

You must install a __________ on a network if you want to share a broadband Internet.

(A) Router (B) modem (C) node (D) cable

Page 97: Computer questions with answers

Chip is a common nickname for a

(A) transistor (B) resistor (C)Integrated circuit (D) semiconductor

Page 98: Computer questions with answers

The design of the network is called the network:

(A) Architecture (B) server (C) transmission (D) type

Page 99: Computer questions with answers

Personal logs or journal entries posted on the Web are known as

(A) Podcast (B) Webcasts (C) Blogs (D) subject directories

Page 100: Computer questions with answers

What is a backup?

(A) Restoring the information backup (B) An exact copy of a system's

information (C) The ability to get a system up

and running in the event of a system crash or failure

(D) All of these