Search This Blog

Wednesday, September 19, 2018

Computer gk

Q.1 Video processors consist of _________ and ___________ which store and process images 
(1) CPU and VGA 
(2) CPU and memory 
(3) VGA and memory 
(4) VGI and DVI 
(5) None of these 
Q.2 Disk packs consists of 2 or more —— mounted on a single central shaft. 
(1) Compact Disk 
(2) Optical Disk 
(3) Hard Disk 
(4) All of the above 
(5) Other than these options 
Q.3 ________ Viruses are often transmitted by a floppy disk left in the floppy drive. 
(1) Trojan horse 
(2) Boot sector 
(3) Script 
(4) Logic bomb 
(5) Other than these options 
Q.4 The total set of interlinked hypertext documents worldwide is--------------.
(1) Webpage 
(2) Browser 
(3) WWW 
(4) B2B 
(5) None of these 
Q.5 A table of bits in which each row represents the distinct values of a key- 
(1) Join index 
(2) Bitmap index 
(3) B + Tree 
(4) Hierarchical index 
(5) None of these 
Q.6 Which of the following option is selected for Redo in active word document? 
(1) Ctrl+x 
(2) Ctrl+r 
(3) Ctrl+z 
(4) Ctrl+w 
(5) None of these 
Q.7 Database redesign is not terribly difficult if the--------------. 
(1) Database is structured 
(2) Database has no data 
(3) Database is well-designed 
(4) Database is relatively small 
(5) Database is relatively large 
Q.8 To access properties of an object, the mouse technique to use is ________. 
(1) dragging 
(2) dropping 
(3) ctrl+left-clicking 
(4) shift-clicking 
(5) none of these 
Q.9 Which of the following is a circuit that issue signals at regular intervals 
(1) Circuit card 
(2) Clock 
(3) Circuit board 
(4) Gates 
(5) None of these 
Q.10 An advantage of a distributed word processing network is- 
(1) increased number of reports handled 
(2) less delay in inter-office communications 
(3) greater corporate control over outputs 
(4) All of the above 
(5) None of these 
ANSWERS 
Q.1 (3) Video processors consist of VGA and memory which store and process images. 
Q.2 (3) Disk packs consist of 2 or more hard disks mounted on a single central shaft. 
Q.3 (2) Trojan horse is a program that does not attempt to inject itself into other files. 
Q.4 (5) The total set of interlinked hypertext documents worldwide is called HTTP. 
Q.5 (2) Bitmap index is a table of bits in which each row represents the distinct values of a key. 
Q.6 (5) Ctrl +Y for Redo 
Q.7 (1) Data Base redesign is not terribly difficult if the Database is structured. 
Q.8 (5) To access properties of an object, the mouse technique to use is right-clicking. 
Q.9 (2) Clock issues signals at regular intervals 
Q.10 (2) An advantage of a distributed word processing network less delay in inter-office communications 

No comments:

Post a Comment