COMPUTER KNOWLEDGE –IBPS PO/CLERK—SBI PO/CLERKS—LIC AAO/RBI ASSISTANT /RRB ASSISTANT ..
COMPUTER KNOWLEDGE –IBPS PO/CLERK—SBI PO/CLERKS—LIC AAO/RBI ASSISTANT /RRB
ASSISTANT ..
1. In addition to keying data directly into a database, data entry can also be done from a (an) 1) field 2) table 3) data dictionary 4) input form 5) None of these
2.
A word processor would most likely be used to do which of the following? 1)
Doing a computer search in the media centre 2) Keeping an account of money
spent 3) Maintaining an inventory 4)
Typing a biography 5) None of these
3.
What is the main folder on a storage device called? 1) Interface 2) Root directory 3) Platform 4) Device
driver 5) None of these
4.
In database, a field is a 1) table of information 2) label 3) group of related records 4) category of information 5) None of
these
5.
Computer’s BIOS is stored in 1) ROM 2)
RAM 3) Hard disk 4) Flopy drive 5) None of these
6.
Bootstrap program is a program that 1)
starts the working of a computer 2) terminates the working of a computer 3)
is the middle part of the program 4) Both 1 and 2 5) None of these
7.
You can do transactions on Internet using your bank account. This is called 1)
Banking 2) Online banking 3) Offline
banking 4) Transactions 5) None of these
8.
Which of the following is graphics solution for Word Processor? 1) Clipart 2) Wordart 3) Dropcap 4) All
the above 5) None of these
9.
The command that is used to format a drive through command prompt is 1)
Scandisk 2) X Format 3) Chkdisk 4)
Format 5) None of these
10.
“FIND” option is available under which menu? 1) Tools 2) View 3) File 4) Edit 5) None of these
11.
DSL is an example of 1) Wireless 2)
Broadband 3) Network 4) Slow 5) None of these
12.
A saved document is referred to as 1) Folder 2) Object 3) File 4) Project 5) None of these
13.
A computer that deals with physical quantities is known as 1) Digital Computer 2) Analog Computer 3) Hybrid Computer
4) Mainframe Computer 5) None of these
14.
PDF extension is used for which of the following? 1) MS-Excel 2) Adobe Reader 3) Photoshop 4)
Pagemaker 5) None of these
15.
Since viruses are only a form of software, they primarily infect 1) Data 2)
Hardware 3) Peripherals 4) Programs
5) None of these
16.
What is the other name of LAN card? 1) Modem 2) NIC 3) Network connector 4) Internet card 5) None of these
17.
Which of the following is the name given to devices that make up a computer
that you can see or touch? 1) Print 2) Mouse 3) Hardware 4) Software 5) None of these
18.
A(n)_____contains commands that can be selected. 1) icon 2) button 3) pointer 4) menu 5) None of these
19.
Which of the following is not an image file? 1) TMP 2) BMP 3) GIF 4) JPEG 5) None of these
20.
Which of the following is used to measure the speed of the processor? 1) Unit
2) Processing speed 3) Clock speed
4) Memory 5) None of these
21.
What is a flowchart? 1) It represents process. 2) It represents algorithm. 3) It represents process or algorithm.
4) It represents mathematical subtraction. 5) None of these
22.
Which of the following is used to find a saved document in the computer’s
memory and bring it up on the screen to view? 1) Rerun 2) Reverse 3) Retrieve 4) Return 5) None of these
23.
A computer uses_____ system to process data. 1) kilobyte 2) processing 3) binary 4) representational 5) None
of these
24.
Why is the Caps Lock key referred to as a toggle key? 1) Because it cannot be
used to delete 2) Because it cannot be used for entering number 3) Because it
cannot be used to insert 4) Because its
function goes back and forth every time it is pressed 5) None of these
25.
Which of the following keys launches the ‘Start’ button? 1) Windows 2) Shift 3) Shortcut 4) Esc 5) None of these
26.
Which of the following is a collection of unprocessed items?
1) Memory 2) Information 3) Data 4) Reports 5) None of these
27.
Which command is given to ‘run’ or ‘switch off’ the computer? 1) Ctrl+Alt 2) Ctrl+Alt+Del3) Alt+Del 4)
Alt+Shift+Del 5) None of these
28.
What do we call the keys that change the meaning of what you type? 1) Change
keys 2) Disk space 3) Modifier keys
4) Keyboard 5) None of these
29.
What kind of files do we care about the most? (letters, pictures, memos, etc.) 1) Document files 2) Application files
3) System files 4) User files 5) None of these
30.
In which of the following was artificial intelligence introduced? 1) First
generation 2) Second generation 3) Third generation 4) Fourth generation 5) Fifth generation
31.
What is full form of VLSI? 1) Very Large
Scale Integration 2) Very Large Scale Intranet 3) Very Large Scale Internet
4) Very Large Scale Internetwork 5) None of these
32.
Which of the following is the location to store a file in a drive? 1) File
Folder 2) Version 3) Pad 4) Folder
5) None of these
33.
Which of the following is the default setting in a cell of Excel sheet? 1) Left–aligned 2) Right–aligned 3)
Centred 4) Justified 5) None of these
34.
Information on a computer is stored as 1) Analog data 2) Digital data 3) Watts data 4) Modem data 5) None of these
35.
Which of the following is used for writing the webpage code? 1) Winzip 2) Hypertext markup language 3) Fifth
generation language 4) Part 5) None of these
36.
FLASH is a 1) Hardware 2) Game 3) RAM
4) EEPROM 5) None of these
37
Which of the following is a must for a computer? 1) Chip 2) Data 3) Mouse 4) Processor 5) None of these
38.
Disk can be used to store 1) Random files 2) Sequential files 3) Both 1 and 2 4) Horizontal files 5)
None of these
39.
How many characters can be typed in a single cell in an Excel sheet? 1) 256 2)
1024 3) 32000 4) 65535 5) None of
these
40.
Whas is the full form of “XP” in Windows-XP? 1) XTRA Power 2) XTREME Programming 3) XTRA Process 4) XTREME Power 5) None of
these
41.
Which key is used to send a digital signature? 1) Public key 2) Private key 3) Digital key 4) Keypad
5) None of these
42.
The group of processors combined together to create a program is referred to as
1) Multiprogramming 2) Multitasking 3)
Multiprocessing 4) Thrashing 5) None of these
43.
Which program searches the fault of any software? 1) Debug 2) Inverse 3) EBCDIC 4) LOG 5) None of these
44.
What is the default paper size of a word document? 1) A4 2) Letter 3) A3 4) Both 2 and 3 5) None of these
45.
A device that is connected to the motherboard is 1) called an adjunct device 2)
called an external device 3) connected by using a ribbon cable 4) called a peripheral device 5) None
of these
46.
Which of the following is used to find an individual item in a file
immediately? 1) File allocation table 2) Sequential access 3) Direct access 4) Directory 5) None of these
47.
In Excel, charts are created using which of the following options? 1) Pivot
table 2) Chart Wizard3) Pie chart 4)
Bar chart 5) None of these
48.
Which device is used to access your computer from another computer or for talk
over phone? 1) CD-Rom Drive 2) Hard Drive 3) RAM 4) Modem 5) None of these
49.
Which of the following is the name of the software which is used for sending or
receiving a message? 1) Telnet 2) Browser 3)
Messenger 4) Operating system 5) None of these
50.
Which of the following software applications would be most appropriate for
performing numerical and statistical calculations? 1) Document Processor 2)
Database 3) Graphics Package 4)
Spreadsheet 5) None of these
51.
Which of the following is the minimum zoom percentage supported by MS Word? 1) 10% 2) 15% 3) 25% 4) 4% 5) None of
these
52.
The default lines to drop for drop cap is 1)
three lines 2) two lines 3) four lines 4) eight lines 5) None of these
53.
The red wavyline in MS Word document indicates 1) spelling errors 2) grammar errors 3) address block 4) All the
above5) None of these
54.
The ascending order of a data hierarchy is 1) bit byte record character
database
2) bit byte field record file
database
3) bit byte record field file database 4) All the above 5) None of
these
55.
Which of the following is a problem of file management system? 1) Lack of data
independence 2) Data redundancy 3) Programme dependence 4) All the above 5) None of these
56.
BASIC, ACGOL and COBOL are the examples of 1) High level language 2) Low level language 3) Middle level
language 4) All the above5) None of these
57.
COBOL was developed by 1) Dennis Ritchie 2)
Grace Hopper 3) John Burden 4) Steve Jobs 5) None of these
58.
How many bits are there in one MB? 1) 220 2) 221 3) 222 4) 219 5) None of these
59.
Which page orientation will you select if you want to print in wide format? 1) Landscape 2) Horizontal 3) Portrait
4) Vertical 5) None of these
60.
Which type of server is responsible for storing files for users on the network?
1) Web server 2) File server 3) Print server 4) Both (2) and (3) 5) Both (1) and (2)
61.
Which network architecture is defined in IEEE 802.3 standard? 1) Token ring 2)
FDDI 3) Fiber 4) Ethernet 5) None of
these
62.
PDA stands for 1) Portable Digital Assistant 2) Personal Digital Assistant 3) Personal Duplex Assistant 4) All
the above5) None of these
63.
Unix operating system was developed by 1) Walter Baatain 2) John Burdeen 3) Ken Thompson 4) All the above5) None
of these
64.
Which of the following is represented by a cluster in hard disk? 1) Group of
sectors 2) Total number of sectors in a
disk 3) Total number of tracks 4) All the above 5) None of these
65.
Comparison of two or more numbers depends on 1) ALU 2) MU 3) CU 4) CPU 5) None of these
66.
In DOS, primary hard disk drive has the drive letter 1) A 2) B 3) C 4) D 5) None of these
67.
Default page size for word document is 1) Legal 2) A4 3) Letter 4) All the above5) None of these
68.
We use ________ shortcut key to insert something in microsoft excel.
1)
ctrl + W 2) ctrl + P 3) Shift + F11
4) Shift + Alt 5) None of these
69.
GOTO statement is used in which of the following programming languages? 1) C++ 2) Java 3) C 4) All the above5) None of these
70.
.rar stands for 1) Read and right 2)
Roshal Archieve 3) Right Attributes 4) All the above5) None of these
71.
First general-purpose electric digital computer ENIAC was developed by 1) JP Eckert 2) JW Mauchley 3) John Von
Neumann 4) All the above5) None of these
72.
E-R stands for 1) Equity-Relationship 2)
Entity-Relationship 3) Equal-Relationship 4) All the above5) None of these
73.
In any table, record of any row is called 1) Entity 2) Tuple 3) Field 4) Attribute 5) None of these
74.
Spelling check is performed by which of the following keys? 1) F2 2) F3 3) F5
4) F6 5) F7
75.
Linux is a 1) software 2) operating
system 3) application 4) application software 5) None of these
76.
NIC stands for 1) National Informatics Centre 2) Network Interface Card 3)
National Interface Code 4) Both (1) and
(2) 5) None of these
77.
Shell and kernel is a feature of 1) operating
system 2) application 3) software 4) All the above5) None of these
78.
An example(s) of universal gate is/are 1) NAND 2) NOT 3) NOR 4) Both (1) and (3) 5) None of these
79.
Which of the following is not an example of a search engine? 1) Google 2) Protocol 3) Yahoo 4) Altavista 5)
None of these
80.
Which of the following is one’s complement of the binary number 110010? 1)
111111 2) 001111 3) 010101 4) 001101
5) None of these
81.
Which of the following will come next in the series? 10, 01, 100, 011, 11001,
.... 1) 0101 2) 00110 3) 01101 4)
00101 5) None of these
82.
Which of the following is not a type of error? 1) Logical error 2) Run time
error 3) Syntax error 4) All the above 5)
None of these
83.
Which key is used to search any data in a computer? 1) F1 2) F2 3) F3 4) F4 5) F5
84.
First page of any website is called 1)
home page 2) web page 3) website 4) All the above 5) None of these
85.
In database, SQL stands for 1) Simple Query Language 2) Structure Query Language 3) Structure Question Language 4) All
the above 5) None of these
86.
In which topology, terminals are connected in a circular manner? 1) Ring 2) Star 3) Mesh 4) Bus 5) Tree
87.
.bmp extension is used by 1) MS-Powerpoint 2) MS-Word 3) MS-Excel 4) Paint 5) All the above
88.
Which of the following is/are called flash memory? 1) RAM 2) Pen drive 3) ROM 4) Both 1 and 2 5) Both 2 and 3
89.
An example of web browser is 1) Mozilla 2) Google Chrome 3) Epic 4) Safari 5) All the above
90.
Which of the following is used to click to open any web page? 1) URL 2) Hyperlink 3) Navigation 4) URN 5)
None of these
91.
Which of the following is one of the most business-oriented languages? 1) BASIC
2) COBOL 3) ALGOL 4) FORTRAN 5) None
of these
92.
C language is a 1) High level language 2) High level and low level language 3)
Low level language 4) High level
language with some features of low level language 5) None of these
93.
Which of the following codes needs 7 bits to represent any character? 1) EBCDIC
2) BCD 3) ASCII 4) All the above 5)
None of these
94.
For deleting data permanently, we use 1) Delete 2) Shift + Alt + Delete 3) Shift + Delete 4) Erase 5) All the
above
95.
Integrated circuits are made up of 1) Si
2) Al 3) Mn 4) Mg 5) All the above
96.
WORM stands for 1) Wanted One Read Memory 2)
Write Once Read Many 3) Write Original Read Many 4) All the above 5) None
of these
97.
Which of the following represents the size of a floppy? 1) 3.5 inches 2) 5.25
inches 3) 8.0 inches 4) All the above
5) None of these
98.
Extension of a Word file in MS-Office 2007 is 1) .doc 2) .docx 3) .docxs 4) All the above5) None of these
99.
What is Outlook Express? 1) Scheduler 2)
E-mail Client 3) Address Book 4) All the above 5) None of these
100.Which
of the following is not a correct IP address? 1) 192.28.238.191 2)
193.224.212.225 3) 138.124.256.225
4) 198.225.285.255 5) 224.252.252.251
101.The
common name for the crime of stealing passwords is 1) spooling 2) identity
theft 3) spoofing 4) hacking 5) None
of these
102.Malicious
software is known as 1) hardware 2)
malware 3) malicious ware 4) illegal ware 5) None of these
103.HTML
viruses infect 1) your computer 2) a Web page in the HTML code 3) both a Web
page and the computer that is viewing it 4)
All the above 5) None of these
104.____
is the measurement of things such as fingerprints and retinal scans used for
security access. 1) Biometrics 2)
Bio measurement 3) Computer security 4) Smart weapon machinery 5) None of these
105.The
scrambling of code is known as 1)
encryption 2) firewall 3) scrambling 4) password-proofing 5) None of these
106.Which
is the part of a computer that one can touch and feel? 1) Programs 2) Software 3) Hardware 4) Output 5) None of these
107.Which
of the following moves the cursor one space to the right to puts spaces in
between words? 1) Control key 2) Space
bar 3) Printer 4) Mouse 5) None of these
108.When
your computer stops working suddenly, it is referred to as a 1) crash 2) die 3)
death 4) penalty 5) None of these
109.A
symbol or question on the screen that prompts you to take action and tell the
computer what to do next is called 1) scanner 2) questionnaire 3) prompt and dialog box 4) information
seeker 5) None of these
110.
A place that a user can create to store files is called 1) cursor 2) text 3) folder 4) boot 5) None of these
111.Name
the key that will erase information from the computer’s memory and characters
on the screen. 1) Edit 2) Delete key
3) Dummy out 4) Trust key 5) None of these
112.A
program that works like a calculator for keeping track of money and making
budgets. 1) Calculator 2) Spreadsheet
3) Budgeter 4) Financier 5) None of these
113.
The OSI model is divided into _______ processes called layers. 1) five 2) six 3) seven 4) eight 5) None of these
114._____
are specially designed computer chips that reside inside other devices such as
your car or your electronic thermostat. 1) Servers 2) Embedded computers 3) Robotic computers 4) Mainframes 5) None of
these
115.The goal of data mining is 1) to explain some observed event or condition 2) to confirm that
data exists 3) to analyse data for expected relationships 4) to create a new
data warehouse 5) None of these
116.
A database management system (DBMS) is a 1)hardware system used to create,
maintain and provide controlled access to a database. 2)hardware system used to
create, maintain, and provide uncontrolled access to a database. 3)software
system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create,
maintain, and provide controlled access to a database. 5)None of these
117.Which
of the following describes database fields? 1) Structures 2) Field markers 3)
Field definition 4) Field names 5)
None of these
118.A
goal of normalization is to 1) minimize the number of relationships 2) minimize
the number of entities 3) minimize the number of tables 4) minimize the number of redundancy 5) None of these
119.The
code that relational database management systems use to perform their database
task is referred as 1) QBE 2) SQL 3)
OLAP 4) Sequel Server 5) None of these
120.Chip
is a common nickname for a (n) 1) transistor 2) resistor 3) integrated circuit 4)
semiconductor 5) None of these
121.The
most frequently used instructions of a computer program are likely to be
fetched from 1) the hard disk 2) cache
memory 3) RAM 4) registers 5) None of these
122. ------are viruses that are triggered off by
the passage of time or on a certain date. 1) Boot-sector viruses 2) Macro
viruses 3) Time bombs 4) Worms 5)
None of these
123.Which
of the following places the common data elements in order from smallest to
largest? 1) character, file, record, field, database 2) character, record,
field, database, file 3) character,
field, record, file, database 4) bit, byte, character, record, field, file,
database, 5) None of these
124.The
Internet is 1) a large network of
networks 2) an internal communication system for a business 3) a
communication system for the Indian government 4) All the above 5) None of
these
125.Verification
of a login name and password is known as 1) configuration2) accessibility 3) authentication 4) logging in 5) None of these
126.Which
of the following would most likely NOT be a symptom of a virus? 1) Existing
program files and icons disappear. 2)
The CD-ROM stops functioning. 3) The Web browser opens to an unusual home
page. 4) Odd messages or images are displayed on the screen. 5) None of these
127.The
PC and the Apple Macintosh are examples of two different 1) platforms 2) applications 3) programs 4) storage devices 5) None of these
128.
The metal or plastic case that holds all the physical parts of the computer is
the 1) system unit 2) CPU 3)
mainframe 4) platform 5) None of these
129.The
ability to recover and read deleted or damaged files from a criminal’s computer
is an example of a law enforcement specialty called 1) robotics 2) simulation 3) computer forensics 4) animation 5)
None of these
130.______
server stores and manages files for network users. 1) Authentication 2) Main 3) Web 4) File 5) None of these
131.In
a ring topology, the computer in possession of the ____ can transmit data. 1)
packet 2) data 3) access method 4) token 5) None of these
132.When
data changes in multiple lists and all lists are not updated, this causes 1)
data redundancy 2) information overload 3) duplicate data 4) data inconsistency 5) None of these
133.____ are words that a programming language sets aside for its own use.
1) Control words 2) Reserved words
3) Control structures 4) Reserved keys 5) None of these
134. You must instal a(n) ____ on a network if you
want to share a broadband Internet connection. 1) router 2) modem 3) node 4) cable 5) None of these
135.
A dedicated computer is one 1) which is used by one person only. 2) which is assigned one and only one task.
3) which uses one kind of software. 4) which is meant for application software.
5) None of these
136.The
system unit of a personal computer typically contains all of the following
except 1) Microprocessor 2) Disk controller 3) Serial interface 4) Modem 5) None of these
137.A
small or intelligent device is so called because it contains within it a 1)
Computer 2) Microcomputer 3)
Programmable data 4) Sensor 5) None of these
138.Which
technology is used in compact disks? 1) Mechanical 2) Electrical 3) Electro
Magnetic 4) Laser 5) None of these
139.EPROM
can be used for 1) Erasing the contents of ROM 2) Reconstructing the contents
of ROM 3) Erasing and reconstructing the
contents of ROM 4) Duplicating ROM 5) None of these
140.Algorithm
and Flow Chart help us to 1) Know the memory capacity 2) Identify the base of a
number system 3) Direct the output to a printer 4) Specify the problem completely and clearly 5) None of these
141.Which
of the following is not a valid size of a Floppy Disk? 1) 8” 2) 5 4 1 ” 3) 2 2 1 ” 4) 5 2 1 ” 5)
None of these
142.The
16-bit microprocessor means that it has 1) 16 address lines 2) 16 buses 3) 16 data lines 4) 16 routes 5) None of these
143.Data
going into the computer is called 1) Output 2) Algorithm 3) Input 4) Calculations 5) Flow chart
144.Which
of the following is the fastest memory? 1) DDR RAM 2) DDR2 RAM 3) DDR3 RAM 4)
Swap Memory 5) Buffer Memory
145.Which
protocol is used by the operating system to generate error message like ‘Host
Unreachable’ over a TCP/IP network? 1) HTTP/1.1 2) ICMP 3) PPP 4) ICGM 5) TCP/IP
146.What
does SNMP stand for?
1)
Simple Network Mail Protocol 2) Single Network Mail Protocol 3) Single Network Message
Protocol
4) Simple Network Management Protocol 5) None of these
147.On
a school computer, Lucy learned how to copy programs. A classmate asked her to
copy a program for his home use. Her most ethical response would be which of
the following? 1)I’ll copy it, but you have to promise not to tell anyone. 2)I
don’t know how to copy disks. 3)I can’t
copy it because it will break copyright laws. 4)I’ll copy it for you, but
you can’t copy it for anyone else. 5)None of these
148.Which
of the following is not true? 1) LOGO
stands for Live On Google’s Orkut. 2) BIOS is a system software. 3) GRUB is
a Linux boot loader. 4) Ruby is a web scripting language. 5) LILO is a Linux
boot loader.
149.What
is Mail-Merge? 1)a web based e-mail service with no spam 2)a name of Yahoo!
MINDSET search feature 3)a new virus hoax which can delete data from mail inbox
4)a feature of MS-Word used to create
multiple documents like letters, mailing labels, name tags etc 5)None of
these
150.In
MS-Word, a menu item in dim color (gray) indicates that the menu is? 1) toggle
menu 2) unavailable for current context
3) not much required menu 4) over-used menu 5) None of these
151.Which
of the following can’t be a proper virus detection and prevention tip? 1)Do not
open any file attached to an email unless you know what it is, even if it
appears to come from a dear friend or
someone you know. Some viruses can replicate themselves and spread through email. Better be safe than sorry and confirm that
they really sent it. 2)Do not open any file attached to an email if the subject
line is questionable or unexpected. If the
need to do so is there, always save the file to your hard drive before
doing so. 3)Open chain emails or junk
mail and forward it to others. 4)Do not download any file from strangers.
5)None of these
152._____
temporarily holds program instructions, data and output until they are no
longer needed by the computer. 1) Hard
disk 2) Motherboard3) CD 4) RAM 5)
Floppy disk
153.Which
of the following statements is true about a storage media? 1)Storage media are
non-volatile. 2)Hard disk has a very high access time as compared to RAM (10-20
million ns). 3)Hard disk is very cheap as compared to RAM and large in capacity. 1) Only 1 2) Only 2 3) Both 1 and 3
4)
Both 1 and 2 5) All 1, 2 and 3
154.Basic
Input Output System (BIOS) is necessary for 1) boot-up 2) mouse and keyboard only 3) resolution 4) audio and
video system 5) None of these
155.255.255.0.0
is default mark of 1) Class A networks 2)
Class B networks 3) Class C networks 4) Class D networks 5) None of these
156.SQL
stands for 1) Structured Query Language
2) Solution to Query language 3) Sub Query Language 4) Structural Query Language
5) None of these
157.In
which type of channel messages may flow in two directions but never at the same
time? 1) Full duplex 2) Half duplex
3) Simplex 4) In data com, it is not possible. 5) None of these
158.The
first line of the “C” program contains a/an _____, indicated by # include. 1) preprocessing directive 2)
processing directive 3) main directive 4) new line character 5) None of these
159._____
technology standards have been used in the past, but Ethernet over twisted pair
cabling and Wi-Fi are the two most common technologies currently used to build
LANs. 1) ARCNET, Token Ring 2) CIR
3) X.25 4) VoFR 5) None of these
160.POST
stands for 1) Positive Operating System Test 2) Particle Of Static Transfer 3) Power-On Self-Test 4) Printer Online
Static Test 5) None of these
161.Which
of the following statements is true about Bluetooth? A.Bluetooth is a
proprietary open-wireless-technology standard for exchanging data over short
distances B.Bluetooth uses a radio technology called frequency-hopping spread
spectrum. C.A PC that does not have embedded Bluetooth can be used with a
Bluetooth adapter that will enable the PC to communicate with other Bluetooth
devices. 1) Only A 2) Only B 3) Both A and
C 4) Both B and D 5) All
A, B and C
162.Short
keys for FIND in MS Office Word 2003 are 1) Ctrl + B 2) Alt + Ctrl + A 3) Alt + Y 4) Ctrl + F 5) None of these
163._____
is an electronic spreadsheet. You can use it to organise your data into rows
and columns. You can also use it to perform mathematical calculations quickly. 1) Microsoft Excel 2) Microsoft Word 3)
Microsoft PowerPoint 4) Microsoft Calculator 5) None of these
164. A hard drive consists of spinning ____ made
up of aluminum or ceramic that is coated with magnetic media. 1) plates 2)
disks 3) relays 4) memories 5) platters
165.The
power supply supplies power to every single part in the PC. The power supply is
to convert the 230 VAC into 3.3 V, 5 V and 12 VDC power that the system
requires for the operations. It is commonly known as 1) Simple mode power supply 2) Switch mode power supply 3) Uninterrupted power supply 4)
Invertor 5) Convertor
166.Which
of the following statements is NOT true about a computer? 1)8085 is an example
of 8-bit microprocessor. 2)Software is
used to make computer usable. 3)Based on the microprocessor, systems are
classified as PC-XT and PC-AT. 4)SMPS converts AC (Alternate Current) into DC
(Direct Current). 5)None of these
167.The
Intel 8085 is a/an _____ microprocessor introduced by Intel in the year _____.
1) 16-bit, 1976 2) 16-bit, 1977 3) 8-bit, 1978 4) 8-bit, 1977 5) 8-bit, 1967
168.Which
of the following is NOT a goal of transaction processing system? 1)Capture,
process and store transactions 2)Produce
a variety of documents related to routine business activities 3)Reduce
manual effort associated with processing business transactions 4)Produce
standard reports used for management decision making 5)None of these
169.Which
of the following is not an example of a virus? 1) Polymorphic 2) Logic
Bombs 3) Worms 4)
Tartan 5) Trojan
170.Timing
and Control unit is a part of a(an) 1)
ALU 2) Processor 3) Memory 4) CMOS
5) BIOS
171._____
is a software that is available for use at no cost or for an optional fee, but
usually with one or more restricted usage rights. 1) Firmware 2) Teachware 3)
Testware 4) Freeware 5) Groupware
172.____
involves checking or logging the data in; checking the data for accuracy;
entering the data into the computer; transforming the data and developing and
documenting a database structure that integrates the various measures. 1) Data
mining 2) Database 3) Data preparation 4) Data structuring 5) Data validation
173.Which
of the following is true for OCR? A)OCR is an improvement over OMR. B)It is the
mechanical or electronic translation of scanned images of handwritten,
typewritten or printed text into machine-encoded text. C)It is widely used to
convert books and documents into electronic files, to computerise a
recordkeeping system in an office or to publish the text on a website. D)OCR
systems require calibration to read a specific font; early versions needed to
be programmed with images of each character, and worked on one font at a time.
1) Only A) 2) Only B) 3) Only A), C) and D) 4) Only B), C) and D) 5) All the above
174. ISP stands for 1) Internet Surfing Provider
2) International Service Provider 3) Indian Service Provider 4) Internet Service Provider 5) Indian
Surfing Provider
175.Every
Web page is stored as a (an) 1)
Hypertext markup language document 2) Web document 3) Hypertext message
language document 4) Hyperlink document 5) Internet explorer document
176._____
is the amount of time a computer will repeat a single character when its key is
held down. 1) Typematic rate 2)
Recycle rate 3) Holding rate 4) Baud rate 5) Typewriter rate
177.Database
that spreads information across different tables while maintaining links
between them is referred as 1)
Relational database 2) Rotational database 3) Database connection 4)
Tabular database 5) None of these.
178.Which
is the first electronic spreadsheet on a microcomputer that helped turn the
Apple II computer into a success and greatly assisted in their widespread
application? 1) Visi Calc 2) Lotus
1-2-3 3) Excel 4) TRS-80 5) None of these
179.____
is a process where an external device can get the attention of the
microprocessor. The process starts from the I/O device and is asynchronous. 1)
Request 2) Control 3) Interrupt 4)
Interaction 5) None of these
180.In
relation to computer which of the following is arranged in proper sequence?
1)Hardware–Assembly language–Machine language- High–level language
2)Hardware–Machine language–High-level language-Assembly Language 3)Machine
language–Assembly language–High-level language–Hardware 4)Hardware–Machine language–Assembly language–High-level language
5)None of these
181.Which
of the following statements is true about a computer language? 1)Machine
languages are the only languages understood by computers. While easily
understood by computers, machine languages are almost impossible for humans to
use because they consist entirely of numbers. 2)An assembly language contains
the same instructions as a machine language, but the instructions and variables
have names instead of being just numbers. 3)Every CPU has its own unique
machine language. 4)1) and 2) are true
5) 1), 2) and 3) are true
182.Which
of the following is NOT a current spreadsheet software? 1) IBM Lotus Symphony
(2007) 2) KSpread 3) ZCubes-Calci 4) GNU
Oleo 5) None of these
183.Database’s
overall structure is maintained in a file called 1) Redolog file 2) Data file 3) Control file 4) Reload file 5) None
of these
184.Which
of the following is not an advantage of a client/server model? 1)A
client/server model allows centralised control of data and centralised
implementation of business rules.
2)
A client/server model increases developer’s productivity. 3)A client/server model is suitable for all applications. 4)A
client/server model decreases developer’s productivity. 5)None of these
185.____
is a method of storing data on two or more hard drives that work in combination
to do the job of a larger drive. 1) DAID 2)
RAID 3) Shadowing 4) Casting 5) MiniSD
186.Which
of the following is FALSE regarding SQL? 1) It can execute queries against a
database. 2) It can retrieve data from a database. 3) It can insert records in
a database. 4) It can update records in a database. 5) It can’t delete records from a database.
187.Which
of the following is not a design principle of BASIC? 1)It is easy for beginners
to use. 2)It is a general-purpose programming language. 3)Allow advanced
features to be added for experts (while keeping the language simple for
beginners). 4)It is not interactive 5)It provides clear and
friendly error messages.
188.C
is a programming language originally developed for developing 1) LINUX
operating system 2) Windows NT 3) Unix
Operating system 4) Mac OS X 5) Windows ME
189.Which
of the following is/are examples of upper layer technologies in the OSI model?
1) TCP 2) HTTP, SSL and NFS 3) IP 4)
Ethernet 5) None of these
190.In
a Batch Processing Operating System, interaction between the user and the
processor is 1) limited 2) not
possible 3) unlimited 4) depends upon user only 5) depends upon amount of work
191.In
case of computer, “JUMPER” is 1) used to
configure the hard disk 2) used to configure the primary memory 3) used to
play computer game 4) a software language 5) machine language
192.Which
of the following statements is true about FAT? 1)The initial version of FAT
designed for 16-bit microprocessors is now referred to as FAT16. 2)FAT file
systems are not found on floppy disks, flash memory cards and digital cameras.
3)FAT was not commonly used on hard disks throughout the DOS and Windows 9x
eras. 4)FAT is a computer file system architecture now widely used on many
computer systems. 5)None of these
193.First
RAM chip was introduced by which of the following? 1) Microsoft 2) Intel 3) Dell 4) HP 5)Apple
194. ------------is a system that pre-dates the
World Wide Web for organising and displaying files on internet servers. 1) HTML
2) SGML 3) Telnet 4) Gopher 5) None
of these
195.A
specialised network device that determines the next network point to which it
can forward a data packet towards the destination of the packet is commonly
known as 1) bridge 2) router 3)
switch 4) hub 5) repeater
196.Which
of the following is a computer network service which allows clients to make
indirect network connections to other network services? 1) Firewall 2) Proxy 3) Network address translator
4) Hub 5) Bridge
197.In
a computer, a hardware and/or software that duplicates the functions of a first computer system in a
different second computer system, so that the behaviour of the second system
closely resembles the behaviour of the first system is known as 1) Stimulator 2) Emulator 3) Scanner 4) Copier 5)
None of these
198.A
_____ is the basic unit of data storage on a hard disk. 1) track 2) sector 3) zone 4) gap 5) None of
these
199.A
method of transferring information directly from a mass storage device such as
hard disk or from adapter card into memory (or vice versa) without information
passing through processor is commonly known as 1) Direct memory access 2) Casting 3) Standard memory access 4)
Directional memory access 5) None of these
200.____
is the portion of the data block (oracle block)
that contains information about the table having rows in this block. 1) Table directory 2) Table row 3)
Table column 4) Header 5) Footer
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
ANSWERS:
1.
4 2. 4 3. 2 4. 3
5.1;
BIOS is ‘Basic Input Output System’. It is stored in computer’s permanent
memory ROM. 6.1; Boot strap is a program which is loaded in BIOS and it is
responsible to start a computer. 7.2; Transactions can be performed on Internet
through online banking
8.1
9.4; Format drive name is used to format
a drive through command prompt.
10.4;
“FIND” option is used to find a particular word or group of words. It is
available under “EDIT” menu.
11.2 12. 3 13. 2
14.2; PDF files can be opened through only PDF
readers such as Adobe Reader.
15.4;
Because programs are software
16.2;
NIC, ie Netowork Interface Card, is another name of LAN card which provides
interface between a computer and a network.
17.3 18. 4
19.1;
“TMP”—It is an extension of temporary file.
20.
3
21.3;
Flowchart is a man-made diagram on paper, to represent algorithm and process
both
22.4
23.
3’ Computer understands only binary system, so it uses binary system to process
data 24.4 25. 1 26. 3 27. 2
28.3;
“Modifier key” is a key which is used to change the meaning what we write.
29.1; Document files are the special type of
files where we can store letters, photos and memories.
30.5;
Artifical intelligence is the feature in which computers behave like human
beings.
31.1
32. 4 33. 1 34. 2 35. 2
36.3; FLASH memory is based on time memory
that means all data will be lost whenever current is discontinued. So it is
RAM.
37.4
38.3;
Both Sequential and Random files can be stored on a disk.
39.4 40. 2 41.2; Private key is used, because
it is known to user only .
42.3 43. 1 44. 2 45. 4 46.3 47. 2 48. 4
49.3;
We can interchange the messages through Messenger, for example Yahoo Messenger,
gtalk etc.
50.4
51. 1 52. 1 53. 1 54. 2 55. 4 56. 2 57. 2 58. 5 59. 1 60. 4 61. 5 62. 2 63. 3
64. 2 65. 1 66. 3 67. 2 68. 3 69. 3 70. 2 71. 1 72. 2 73. 2 74. 5 75. 2 76. 4
77. 1 78. 4 79. 2 80. 4 81. 2 82. 5 83. 3 84. 1 85. 2 86. 1 87. 4 88. 4 89. 5
90. 2 91. 2 92. 4 93. 3 94. 3 95. 1 96. 2 97. 4 98. 2 99. 2 100. 3 101. 3 102.
2 103. 4 104. 1 105. 1 106. 3 107. 2 108. 5 109. 3 110. 3 111. 2 112. 2 113. 3
114. 2 115. 1 116. 4 117. 4 118. 4 119. 2 120. 3 121. 2 122. 3 123. 3 124. 1
125. 3 126. 2 127. 1 128. 1 129. 3 130. 4 131. 4 132. 4 133. 2 134. 1 135. 2 136.
4 137. 4 138. 4 139. 3 140. 4 141. 2 142. 3 143. 3 144. 5 145. 2 146. 4 147. 3
148. 1 149. 4 150. 2 151. 3
152.
4; RAM is called primary memory of a computer.
153.
5 154. 1
155.2;Class
A’s default mask is 255.0.0.0
Class B’s default mask is 255.255.0.0 Class C’s default mask is
255.255.255.0
156.
1
157.
2; Half duplex is bidirectional connection, with the restriction that data can
travel in one direction at a time.
158.
1 159. 1
160.
3; POST: Power-On Self-Test refers to routines run immediately after power is
applied, by nearly all electronic
devices.
161. 5 162. 4 163. 1 164. 5 165. 2 166. 5 167.
4 168. 2 169. 4 170. 2
171.
4; Freeware (from “free” and “software”) is a computer software that is available
for use at no cost or for an
optional fee, but usually with one or more restricted usage rights.
172.
3 173. 5 174. 4 175. 1 176. 1
177.
1; A relational database stores information across different tables and
connects them with links in the
computer.
178. 1; VisiCalc: It was the first spreadsheet
that combined all essential features of modern spreadsheet applications.
179. 3 180. 4 181. 5 182. 5 183. 3 184. 3
185.
2; RAID (redundant Arrays of Independent Disks) is a method of storing data on
two or more hard drives that work
in combination to do the job of a larger drive. Although RAID can be used to increase performance, it is
most often used to protect critical data on a storage server.
186.
5 187. 4
188.
3; C is a computer programming language developed for general purpose between
1969 and 1973 by Dennis Ritchie at
the Bell Telephone Laboratories for use with the Unix operating system.
189. 2; OSI designates the application,
presentation and session stages of the stack as the upper layers. Generally speaking, software in
these layers performs application-specific functions like data formatting encryption, and connection
management. Examples of upper—layer technologies in the OSI model are HTTP, SSL and NFS.
190.
1; In a batch processing operating system, interaction between the user and the
processor is limited or there is no
interaction at all during the execution of work. Data and programs that need to be processed are bundled and
collected as a ‘batch’ and executed together.
191.
1; Several different connectors and jumpers are used to configure the hard disk
and connect it to the rest of the
system. The number and types of connectors on the hard disk depend on the data interface it uses to connect to the
system, the manufacturer of the drive and any special features that the drive may possess.
192.
5; File Allocation Table (FAT) is a computer file system architecture now
widely used on many computer systems
and most memory cards, such as those used with digital cameras. FAT file systems are commonly found on floppy disks,
flash memory cards, digital cameras and many
other portable devices because of their relative simplicity. FAT was
also commonly used on hard disks
throughout the DOS and Windows 9x eras, but its use on hard drives has declined
since the introduction of Windows XP,
which primarily uses the newer NTFS.The initial version of FAT designed for 16-bit microprocessors is now
referred to as FAT12.
193. 2
194.
4; Gopher is a system that pre-dates the World Wide Web for organising and
displaying files on Internet servers.
A Gopher server presents its contents as a hierarchically structured list of
files. With the ascendance of the
Web, many gopher databases were converted to Web sites which can be more easily accessed via Web search
engines
195.
2
196.
2; Proxy is the computer network service which allows clients to make indirect
network connections to other
network services.
197.
2
198.
2; A sector is the basic unit of data storage on a hard disk. The term “sector”
emanates from a mathematical term
referring to that pie-shaped angular section of a circle.
199. 1 200. 1
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Post a Comment