Search This Blog

Wednesday, October 10, 2018

Computer gk

Q.1 What does EPROM stand for? 

(1) Electric Programmable Read Only Memory 

(2) Erasable Programmable Read Only Memory 

(3) Evaluable Philter Random Optic Memory 

(4) Every Person Requires One Mind 

(5) None of these 

Q.2 What is the full form of ADSL ? 

(1) Automatic Digital Subscriber Line 

(2) Asymmetric Direct Subscriber Line 

(3) Asymmetric Digital Subscriber Line 

(4) Automatic Digital Subscribtion Line 

(5) None of these 

Q.3 Malicious software is known as: 

(1) bad ware 

(2) malware 

(3) malicious ware 

(4) illegal ware 

(5) None of these 

Q.4 Compilers and interpreters are themselves——- 

(1) High-level language 

(2) Codes 

(3) Programs 

(4) Mnemonics 

(5) None of these 

Q.5 The output devices makes it possible to ______. 

(1) Input data 

(2) View or print data 

(3) Store data 

(4) Scan data 

(5) None of these 

Q.6 The blinking symbol on the computer screen is called the— 

(1) Mouse 

(2) Logo 

(3) Hand 

(4) Palm 

(5) Cursor 

Q.7 Phishing and pharming are used for what purpose? 

(1) Web development 

(2) Software programming 

(3) Cybercrime 

(4) Recycling 

(5) Develop new software 

Q.8 What does a key logger log? 

(1) Failed authentication attempts 

(2) System logins 

(3) Keystrokes 

(4) Crashes 

(5) Hit 

Q.9 One megabyte equals approximately— 
(1) 1,000 bits 

(2) 1,000 bytes 

(3) 1 million bytes 

(4) 1 million bits 

(5) 2,000 bytes 

Q.10 How are data organized in a spreadsheet? 

(1) Lines and spaces 

(2) Layers and planes 

(3) Height and width 

(4) Rows and columns 

(5) None of these 

Answers- 

Q-1 (2) 

EPROM- Erasable Programmable Read Only Memory 

Q-2 (3) 

ADSL stands for “Asymmetric Digital Subscriber Line.” which is a method of transferring data over copper telephone lines. 

Q-3 (2) 

Malicious software is known as malware. 

Q-4 (3) 

Compilers and interpreters are themselves programs. 

Q-5 (2) 

The output devices makes it possible to view or print data. 

Q-6 (5) 

The blinking symbol on the computer screen is called the cursor. 

Q-7 (3) 

Cybercrime is criminal activity done using computers and the Internet. 

Q-8 (3) 

A keylogger is a program that records the keystrokes on a computer. 

Q-9 (3) 

One megabyte equals to approximately 1 million bytes. 

Q-10 (4) 

Data are organized in rows and column in spreadsheet.                                

     

Monday, October 8, 2018

Computer gk

Q.1 What is RISC?

(1) Storage Device

(2) Computer Network

(3) Microprocessor

(4) Operating System

(5) None of these

Q.2 The maximum Zoom percentage in MS PowerPoint is________.

(1) 100%

(2) 200%

(3) 400%

(4) 500%

(5) 50%

Q.3 The total set of interlinked hypertext documents worldwide is-

(1) HTTP

(2) Browser

(3) www

(4) B2B

(5) None of these

Q.4 ____________ is the file system used by the operating system to identify the physical locations of files on the hard drive.

(1) RTOS

(2) GIF

(3) FAT

(4) POST

(5) None of these

Q.5 Which symbol is used in Excel to denote exponential numbers?

(1) *

(2) ^

(3) &

(4) $

(5) None of these

Q.6 _______pages are similar to ASP pages in that they are compiled on the server, rather than in a user's Web browser.

(1) JSP

(2) C 

(3) HTML

(4) C++

(5) None of these 

Q.7 An image on a computer screen is made up of a matrix of ______.

(1) Byte

(2) Pixels

(3) Bit

(4) Palette

(5) None of these

Q.8 The most widely used type of database management system is the_______.

(1) Flat database. 

(2) Network database.

(3) Relational database.

(4) Hierarchical database.

(5) None of these

Q.9 Vendor-created program modifications are called-

(1) Patches

(2) Antiviruses

(3) Holes

(4) Fixes

(5) Overlaps 

Q10. The most recent development, Carning's ________________ technology is to save mobile and computing device screens.

(1) Gorilla Glass

(2) Cloud Stack

(3) Google Glass

(4) Samsung Galaxy S4

(5) All

ANSWERS

Q.1 (3) RISC is a microprocessor.

Q.2 (3) Maximum zoom percentage in MS Power Point is 400%. 

Q.3 (3) The total set of interlinked hypertext documents worldwide is www. 

Q.4 (3) FAT- File Allocation Table use for identity the physical location of a file.

Q.5 (2) In excel ^ represents the exponential numbers. 

Q.6 (1) JSP stands for "Java Server Page." This standard was developed by Sun Microsystems as an alternative to Microsoft's active server page (ASP) technology. 

Q.7 (2) A pixel is one of the many tiny dots that make up the representation of a picture in a computer's screen. 

Q.8 (3) The most widely used type of database management system is the Relational database.

Q.9 (4) Vendor-created program modifications are called fixes.

Q.10 (1) The first product to employ Gorilla Glass III, the Samsung Galaxy S4, became available in April 2013.