OBJECTIVE: COMPUTER KNOWLEDGE-- with explanation
1. What does the acronym PDF stand for ?
a) Portable
Documenting Format b)
Portable Documentation File
c) Portable
Documentation Format d)
Portable Document Format
e) Portable
Document File
Exp: d)
PDF stands for Portable Document Format. It is a file format used to present documents
in a manner independent of application software, hardware, and operating
systems. In 1991, Adobe Systems’ co-founder John Warnock outlined a system
called “Camelot” that evolved into PDF.
2. LSI in chip technology stands for
a) Large-Scale
Integration b) Low — Scale
Internet
c) Local — Scale
Integration d)
Large — Scale Internet
e) Low-Scale
Integration
Exp: a)
In computing, LSI stands for Large-Scale Integration. It is the process of integrating
or embedding thousands of transistors on a single silicon semiconductor
microchip. LSI technology was conceived in the mid-1970s; it is no longer in
use. It has been succeeded by very large-scale integration (VLSI) and ultra
large-scale integration (ULSI) technologies.
3. Which
of the following best describes a network in which a company's data and
applications are stored at offsite data centers that are accessed over the Internet?
a) Extranet b) Intranet c)
Virtual Private Network d) Cloud
Computing
e) Local Area
Network
Exp: d)
Cloud computing refers to a form of network in which a company’s data and apps
are stored at offsite data centers that are accessed over the internet. Also known
as on-demand computing, it is a kind of Internet-based computing, where shared
resources, data and information are provided to computers and other devices
on-demand.
4. Which of the following is not a binary
number?
a) 110 b) 1001 c) 100110 d)
233 e) 11101
Exp: d)
In mathematics and digital electronics, a binary number is a number expressed in
the binary numeral system or base-2 numeral system which represents numeric values
using two different symbols: typically 0 (zero) and 1 (one). So 233 is not a binary
number.
5. Micro Processor speed is measured in
a) Megabytes b) bytes c) kilobytes d)
gigabytes e) gigahertz
Exp: e)
The speed of microprocessors, called the clock speed, is measured in megahertz
(MHz) or gigahertz (GHz). Current microprocessor speed is measured in gigahertz
(GHz), or billions of cycles per second. The higher the value, the faster the
microprocessor, with average speeds between 2.0 GHz (slower) and 4.0 GHz (faster).
6. __________
is a computer hardware component that connects a computer to computer network.
a) Networking
Internet Connection b) Newer
Industrial Computer
c) Network
Integration Card d)
Network Internal Card
e) Network
Interface Card
Exp: e)
Network Interface Controller, also known as Network Interface Card, is a computer
hardware component that connects a computer to a computer network. The NIC contains
the electronic circuitry required to communicate using a wired connection
(e.g., Ethernet) or a wireless connection (e.g., WiFi).
7. A hard disk drive consists of several
fixed, rotating disks called
a) Platters b) RAIDs c)
Cylinders d) Plotters e) Mini-disks
Exp: a)
A Hard Disk Drive is a secondary storage, random access, high-capacity,
high-speed device, usually housed in the system unit, that consists of several
rapidly rotating disks called platters on which programs, data, and processed results
are stored. In almost all modern computers, the hard disk is by far the most
important storage medium.
8. Which of the following is the correct
order of the four major functions of a computer?
a) Process,
Storage, Input, Output b)
Input, Process, Output, Storage
c) Process,
Output, Input, Storage d)
Storage, Output, Process, Input
e) Input,
Output, Process, Storage
Exp: b)
A computer is designed for input-output functions which generally include data entry,
data processing, information output and storage. Ultimately, a computer is supposed
to manipulate data and convert this into usable output. So the four functions
of a computer are: Input, Process, Output and Storage.
9. What does the acronym PROM stand for?
a) Programmer
Read Only Memory b)
Programmable Read Only Memory
c) Programmable
Read Once Memory d) Program Read
Only Memory
e) Programmed
Read Only Memory
Exp: b)
PROM stands for Programmable Read-Only Memory. It is a type of ROM (read-only
memory) meaning the data in it is permanent and cannot be changed. PROMs are
used in digital electronic devices to store permanent data.
10. Which of the following is an electronic or
paper log used to track computer activity?
a) Monitor b) Trace route c) Cookie d)
Audit trail e) Weblog
Exp: d)
In accounting, an audit trail is the sequence of paperwork that validates or invalidates
accounting entries. In computing, the term is also used for an electronic or
paper log used to track computer activity. Audit trails are used to record
customer activity in e-commerce and to investigate cybercrimes.
11. The largest unit of storage is
a) byte b) terabyte c) megabyte d) kilobyte e) gigabyte
Exp: b)
Among the given options, Terabyte is the largest unit of storage. It is equal
to 1,000,000,000,000 bytes or 10004 bytes. Gigabyte: 10003 bytes; Megabyte: 10002
bytes; Kilobyte: 10001 bytes, etc.
12. Which
of the following devices sends and receives data over telephone lines to and
from computers?
a) Modem b) Expansion slot c) Printer d)
Speaker e) Sound card
Exp: a)
A modem (Modulator-Demodulator) is a device or program that enables a computer
to transmit data over, for example, telephone or cable lines. Computer information
is stored digitally, whereas information transmitted over telephone lines is
transmitted in the form of analog waves. A modem converts between these two
forms.
13. How many bytes are there in a terabyte?
a) 1000 b) 1 billion c) 1 trillion d)
1 million e) 1 quadrillion
Exp: c)
The terabyte is a multiple of the unit byte for digital information. The prefix
‘tera’ represents the fourth power of 1000, and means 1012 in the International
System of Units (SI). Therefore, one terabyte is equal to 1 trillion bytes or 1,000,000,000,000
bytes or 10004 bytes.
14. Which is a pointing device?
a) Joystick b) Monitor c)
Scanner d) Plotter e) Printer
Exp: a)
The most important pointing devices include Mouse; Trackball; Pointing Stick; Joystick;
Touch Pad; Touch Screen, etc. A joystick consists of a vertical handle or hand-held
stick that is used to control the movement of pointer on the screen; Joystick
is basically used to play video games and in some computer-aided design (CAD)
system.
15. Checking
whether a program functions correctly, and then correcting errors, is known as
a) Decoding b) Error-proofing a program c) Debugging
d) De-erroring e) Default error-checking
Exp: c)
When a programmer checks to see if a program functions correctly and then “corrects
errors, it is known as debugging. It is the art of diagnosing errors in programs
and determining how to correct them. “Bugs” come in a variety of forms,
including coding errors, design errors, complex interactions, poor user interface
designs, and system failures.
16. This
system conversion called __________ involves running the old and new systems simultaneously
before converting completely to the new system.
a) pilot
conversion b) convergent
conversion c) phased conversion
d) direct
conversion e) parallel
conversion
Exp: e)
In parallel conversion, the old and new systems operate simultaneously for a time.
This strategy is seldom used today since it is impractical when both the old and
new systems are online. Besides, it is the most time consuming and costly conversion
process.
17. Programs such as Mozilla Firefox that
serve as navigable windows into web are called
a) Internet b) Networks c) Web browser d)
URL e) Hypertext
Exp: c)
Mozilla Firefox is a free and open-source web browser developed by the Mozilla
Foundation and its subsidiary, the Mozilla Corporation. As of October 2015, Firefox
was the second most popular web browser after Google Chrome.
18. Which of the following protects the system
from hackers?
a) Snort b) Scanner c) Firewall d)
Backup e) Hub
Exp: c)
The firewall helps protect our computer from hackers who might try to gain access
in order to crash it, delete information, or even steal passwords or other sensitive
information. It does so by examining the electronic data coming in to and out
of our computer.
19. What is Linux?
a) Input Device b) Operating System c) Processor d) Storage Device
e) Output Device
Exp: b)
Linux is a Unix-like and mostly POSIX-compliant computer operating system (OS)
assembled under the model of free and open-source software development and
distribution. The development of Linux is one of the most prominent examples of
free and open- source software collaboration.
20. The cell reference for range D20 to H35 in
MS Excel will be
a) D20 + H35 b) D20:H35 c) D20 ; H35 d) D20 - H35
e) D20, H35
Exp: b)
Each cell reference is an address named for the column - row intersection where
the cell is located. D20, for example, is the cell at the intersection of column
D and row 20. A range of cells is identified by a pair of cell references separated
by a colon (:). D20:H35 for example, refers to the rectangular block of cells between
D20 and H35 inclusive.
21. The digital telecommunications term ISDN
is an abbreviation for
a) International
Service Digital Network b) Integrated
Standard Digital Networks
c) Internet
Services Data Network d)
Interactive Standard Dynamic Networks
e) Integrated
Services Digital Network
Exp: e)
ISDN stands for Integrated Services for Digital Network. It is a set of communication
standards for simultaneous digital transmission of voice, video, data, and
other network services over the traditional circuits of the public switched telephone
network. It integrates speech and data on the same lines, adding features that were
not available in the classic telephone system.
22. Verification of login name and password is
known as
a) Logging in b) Alienation c) Certification d) Authentication
e) Configuration
Exp: d)
Authentication is the act of confirming the truth of an attribute of a single
piece of claimed true by an entity. It involves the prevention of unauthorized access
to computer systems. Authentication takes a variety of forms, ranging from
verifying account credentials (using, amongst other things, a login name and
password) to physical identity verification.
23. If
You change Windows 98 operating system to Windows XP, you are performing a(n)
a)
push up b) patch c) upgrade d) update e)
pull down
Exp: c)
In computing and consumer electronics an upgrade is generally a replacement of
hardware, software or firmware with a newer or better version, in order to
bring the system up to date or to improve its characteristics. Changing older
operating system is an example of upgrade.
24. While
using MS Word, which key deletes text before, or to the left of, the insertion point?
a) Escape b) Delete c)
Backspace d) Page down e) Page up
Exp: c)
In MS Word, the Backspace key erases the text to the left of the insertion
point one character at a time. The Delete key (located below the insert key)
erases the text to the right of the insertion point.
25. The minimum number of rows and columns in
MS Word document is
a) 1 and 2 b) 1 and 1 c) 2 and 2 d) 2
and 1 e) 3 and 3
Exp: b)
The minimum number of rows and columns in MS Word document is 1 and 1. It only
has to have 1 cell. Rows are horizontal cells; columns are vertical cells. So naturally,
a Word document has 1 row and 1 column.
26. VoIP stands for
a) Voice over
Internet Protocol b) Visual Object Integration
Program
c) Virtual
Object Integration Program d)
Virtual object integration Protocol
e) Voice Object
Integration Program
Exp: a)
VoIP stands for Voice over Internet Protocol. It is a category of hardware and software
that enables people to use the Internet as the transmission medium for voice
calls by sending voice data in packets using IP rather than by traditional circuit
transmissions of the PSTN.
27. Which
of the following place the common data elements in order from smallest to largest?
a) Character,
Record, Field, Database, File
b) Character,
File, Record, Field, Database
c) Character,
Record, Field, File, Database
d) Character, Field,
Record, File, Database
e) Database, File,
Record, Field, Character
Exp: d) Data are logically organized into:
1. Bits (characters);
2. Fields;
3. Records;
4. Files;
5. Databases.
The
correct order is Database > File > Record > Field > Byte > Bit
(Character). Data hierarchy refers to the systematic organization of data,
often in a hierarchical form.
28. Which of the following is not an output
device in computer organisation?
a) Plotter b) Speaker c) Scanner d)
Monitor e) Printer
Exp: c)
In computing, an image scanner is a device that optically scans images, printed
text, handwriting, or an object, and converts it to a digital image. It is an input
device used for direct data entry from the source document into the computer system.
It converts the document image into digital form so that it can be fed into the
computer.
29. The process of writing computer instructions
in a programming language is known as Z,
a) Algorithming b) Processing c) File d)
Instructioning
e) Coding
Exp: e)
The process of writing computer instructions in a programming language is known
as coding. From the program in its human readable form of source coda, a compiler
can derive machine code - a form consisting of instructions that the computer
can directly execute. Alternatively, a computer program in may be executed with
the aid of an interpreter.
30. Which language is directly understood by
the computer without translation program?
a) High level
language b) Low level language c) Middle level language
d) Assembly language e) Machine language
Exp: e)
Machine language, or machine code, is the only language that is directly understood
by the computer, and it does not need to be translated. All instructions use
binary notation and are written as a string of 1s and 0s. Technically speaking,
this is the only language computer hardware understands.
Post a Comment