COMPUTER KNOWLEDGE -- useful for IBPS CLERKS/PO/SSC/LIC AAO/GIC AAO
Computer
Knowledge
161.
Which is the part of a computer that one
can touch and feel?
a) Programs b) Software c)
Hardware d) Output e) None of these
162.
Computers gather data, which means they
allow users to _____ data.
a) present b) store c) output d) input e)
None of these
163.
The software tools that enable a user to
interact with a computer for specific purposes are known as
a) Hardware b) Networked Software c) Shareware d)
Applications
e) None of these
164.
A _____ shares hardware, software, and data
among authorized users.
a) network b) protocol c) hyperlink d) transmitter e) None of these
165.
Coded entries which are used to gain
access to a computer system are called
a) Entry codes b) Passwords c)
Security commands
d) Code words e) None of these
166.
The part of a computer that coordinates
all its functions is called its
a) ROM program b) system board c)
arithmetic logic unit
d) control unit e) None of these
167.
Which of the following devices translate
data and programs that humans can understand into a form that the computer can
process?
a) Display b) Input c)
Output d) Pointer e) None of these
168.
The amount of time required by a storage
device to retrieve data and programs is its _____.
a) Retrieval speed b) capacity c)
memory d) storage e) access speed
169.
A _____ includes the file name and
possibly a directory or folder.
a) file information packet b) file button c) file directory
d) file specification e) None of these
170.
A(n) _____ is text that you want printed
at the bottom of the page.
a) header b) endnote c) footnote d) footer e)
None of these
171.
PCM is an example of
a) digital to digital b) digital to analog c) analog to analog
d) analog to digital e) None of these
172.
The _____ becomes different shapes
depending on the task you are performing.
a) active tab b) insertion point c) mouse
pointer d) ribbon
e) None of these
173.
For creating a document, you use _____
command at File Menu.
a) Open b)
Close c) New d) Save e) None
of these
174.
What is the equipment used to capture
information and commands?
a) Output device b) Input device c) Storage device
d) Telecommunication device e) None of these
175.
A _____ contains specific rules and
words that express the logical steps of an algorithm.
a) programming language b) programming structure c) syntax
d) logic chart e) None of these
176.
.bas, .doc. and .html are examples of
a) Database b) Extension c) Domain
d) Protocol e) None of these
177.
Saving is the process
a) to copy document from memory to
storage medium
b) to change the content of any document
c) to-change the display or entire
document
d) to develop document by entering text
using keyboard
e) None of these
178. _____
is the process of implementing command.
a) Fetching b) Storing c) Decoding d) Executing e) None of these
179.
Which is not an item of hardware?
a) An MP3 file b) A keyboard c) A
disk drive d) A monitor
e) None of these
180.
To shrink a window to an icon
a) open a group window b) minimise a window c) maximise a window
d) restore a window e) None of these
181.
The process of a computer receiving
information from a server on the Internet is known as
a) acquisition b) pulling c) transferring d) pushing
e) downloading
182.
Any hardware component that allows you
to enter data or instructions into a computer is called a(n)
a) printer b) storage device c) output device d)
system unit
e) input device
183.
The communications device that allows
the computer to access a network is called a _____ card.
a) modem b) video c) sound d) network e) dialog
184.
What does storage unit provide?
a) Place for typing data b) Storage for information and
instruction
c) Place for printing information d) All of the above
e) None of these
185.
An error in a computer program is called
a) Crash b) Power failure c)
Bug d) Virus e) Bugger
186.
The secret code that restricts entry to
some programs is
a) entry-code b) passport c)
password d) access-code e) None of these
187. Which of the following is a Web browser?
a) Paint b) Power Point c)
Firefox d) Word
e) All are Web browsers
188.
What kind of software would you most
likely use to keep track of a billing account?
a) Word processing b) Electronic publishing c) Spreadsheet
a) Word processing b) Electronic publishing c) Spreadsheet
d) Web authoring
e) None of these
189.
Compatibility, with regard to computers,
refers to
a) the software doing the right job for
the user
b) it being
versatile enough to handle the job
c) the software
being able to run on the computer
d) the software
running with only another previously installed software
e) the software
permanently available in the computer
190.
Information stored in RAM is considered
volatile, which means it is
a) stored there permanently
b) not held permanently, only
temporarily.
c) stored when the electricity is shut
off.
d) stored permanently in the CPU device.
e) None of these
191.
Until a computer can recognise
handwriting, an input device must
a) store the information in secondary
storage
b) optimise the information
c) digitise the information
d) show the information on a screen
e) become an output device also
192.
By viewing the properties of the local
hard disk of a computer, the user can find out
a) the amount of space that has been
used up and the remaining free space on the disk.
b) the name of the user viewing the
properties of the disk.
c) nothing useful to the user.
d) the number of programs available in
the computer.
e) None of these
193.
The keyboard shortcut to centralise the
selected text in Word is
a) Ctrl+Esc b) Ctrl+C c)
Alt+C
d) There is no keyboard shortcut for
this operation.
e) Ctr1+E
194.
The technology that stores only the
essential instructions on a microprocessor chip and thus enhances its speed is
referred to as
a) CISC b) RISC c)
CD-ROM d) Wi-Fi e) MISC
195.
The microprocessor of a computer
a) does not understand machine language.
b) understands machine language and
high-level languages.
c) understands only machine language.
d) understands only high-level
languages.
e) understands only assembly language.
196.
A set of choices on the screen is called
a(n)
a) menu b)
reverse video c) action plan d) editor e) template
197.
Which of the following operations is
safe if an e-mail from an unknown sender is received?
a) Open it to
know about the sender and answer it.
b) Delete it
after opening it.
c) Delete it
without opening it.
d) Open it and
try to find who the sender is.
e) None of these
198.
What do you see when you click the right
mouse button?
a) The same effect as the left click b) A special menu c) No effect
d) A mouse cannot be right clicked e) Computer goes to sleep mode
199.
Which is not a basic function of a
computer ?
a) Accept and process data b) Accept input c) Process data
d) Store data e) Scan
text
200.
Which of the following is not a term
pertaining to Email?
a) Power Point b) inbox c) sender d) receiver e) None of these
ANSWERS
161. c 162.
d 163. d 164. a 165. b
166. d 167.
b 168. a 169. d 170.
d
171. d 172.
c 173. c
174. b; To
capture information and command input device is used. For example, key-board
and scanner.
175. a 176.
b 177. a 178. d 179.
a
180. b 181.
e 182. e 183. d 184.
b
185. c 186.
c 187. c 188. c 189. c
190. b 191.
c 192. a 193. e 194. b
195. c 196.
a 197. c 198. b 199.
e 200. a
sept 16 atd
Post a Comment