Search This Blog

Tuesday, July 17, 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops



8. What is the storage area for e-mail messages called ?
(A) A folder
(B) A mailbox
(C) A directory
(D) The hard disk
Answer: A mailbox

9. One advantage of dial-up Internet access is
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) it utilises existing telephone service
Answer: it utilises existing telephone service

10. What is the process of copying software programs from secondary storage media to the hard disk called ?
(A) configuration
(B) download
(C) storage
(D) installation
Answer: installation

11. Which process checks to ensure that the components of the computer are operating and connected properly ?
(A) Booting
(B) Processing
(C) Saving
(D) Editing
Answer: Booting

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
(A) Modem
(B) Software
(C) Scanner
(D) Keyboard
Answer: Scanner

13. An error in a computer program………………
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
Answer: Bug

14. Access-control based on a person's fingerprints is .an example of………………
(A) biometric identification
(B) characteristic identification
(C) characteristic security
(D) fingerprint security
Answer: biometric identification

15. The patterns of printed lines on most products are called………………
(A) prices
(B) striping
(C) scanners
(D) barcodes
Answer: barcodes

16. Most mail programs automatically complete the following two parts in an e-mail ………………
(A) From: and Body :
(B) From: and Date :
(C) From: and To :
(D) From: and Subject :
Answer: From: and Date :

17. The computer's capability of distinguishing spoken words is called ………………
(A) voice analysis
(B) speech acknowledgement
(C) voice recognition
(D) speech interpretation
Answer: voice recognition

18. Which of the following is an advantage of mounting an application on the Web ?
(A) The possibility of 24-houraccess for users
(B) Creating a system that can extend globally
(C) Standardising the design of the interface
(D) All of these
Answer: All of these

19. The first page of a Website is called the ………………
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark
Answer: Homepage

20. ERP is an acronym for ………………
(A) Enterprise Retirement Planning
(B) Enterprise Relationship Planning
(C) Enterprise Resource' Planning
(D) Enterprise Reorder Planning
Answer: Enterprise Resource Planning

21. The software that allows users to surf the Internet is called a/an ………………
(A) Search Engine
(B) Internet Service Provider (ISP)
(C) Multimedia Application
(D) Browser
Answer: Browser

22. The issues that deal with the collection and use of data about individuals is ………………
(A) access
(B) publicity
(C) accuracy
(D) privacy
Answer: privacy

23. A term related to sending data to a satellite is ………………
(A) downlink
(B) modulate
(C) demodulate
(D) uplink
Answer: uplink

24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
(A) hypermedia
(B) hypertext
(C) HTML
(D) URL
Answer: hypertext

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) Internet
(D) metaphysical
Answer: data

Monday, July 16, 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) All of the above

2.Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these

3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router
2) modem
3) node
4) cable
5) None of these

4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these

5.The design of the network is called the network
1) architecture
2) server
3) transmission
4) type
5) None of these

6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

7.Personal logs or journal entries posted on the Web are known as :
1) listservs
2) Webcasts
3) blogs
4) subject directories
5) None of these


8.Which of the following is NOT a type of broad band internet connection ?
1) Cable
2) DSLspan>
3) Dial-up
4) Satellite
5) None of these

9.Linux is a(n) ........ operating system
1) open-source
2) Microsoft
3) Windows
4) Mac
5) None of these

10.Which of the following places the common data elements in order from smallest to largest
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) Bit, byte, character, record, field, file, database
5) None of these
 11. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
(A) Viruses
(B) Spam
(C) Portals
(D) Email messages
(E) None of these

12. What is the storage area for e-mail messages called ?
(A) A folder
(B) A directory
(C) A mailbox
(D) The hard disk
(E) None of these

13. A desktop computer is also known as a—
(A) Palm Pilot
(B) PC
(C) Laptop
(D) Mainframe
(E) None of these

14. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
(A) data
(B) information
(C) executable
(D) application
(E) None of these

15. Documents converted to……can be published to the Web.
(A) a.doc file
(B) http
(C) machine language
(D) HTML
(E) None of these

16. If a user needs information instantly available to the CPU, it should be stored—
(A) on a CD
(B) in secondary storage
(C) in the CPU
(D) in RAM
(E) None of these

17. To what temporary area can you store text and other data, and later paste them to another location ?
(A) The clipboard
(B) ROM
(C) CD-ROM
(D) The hard disk
(E) None of these

18. In a spreadsheet, a………is a number you will use in a calculation.
(A) label
(B) cell
(C) field
(D) value
(E) None of these

19. After slide-directed time, if you want to move ahead automatically, click in……check box in transition of this slide group in tab of animations—
(A) Transition timer
(B) Automatically opter
(C) Transition opter
(D) Automatic timer
(E) None of these

20. All are included in removable media except the following—
(A) CD-ROMs
(B) Diskette
(C) DVDs
(D) High disk drive
(E) None of these

21. If you open some menu and then decide that you do not want to select some option, then click the menu title again or press the…… key to layout the menu.
(A) shift
(B) tab
(C) escape
(D) F1
(E) None of these

22. Using the……process, it is easy to change the name of the file.
(A) transforming
(B) crash
(C) renaming
(D) retagging
(E) None of these

23. ………view shows that how will content on printed page, alongwith footer and margin header, appear.
(A) Draft
(B) Full screen reading
(C) Outline
(D) Page layout
(E) None of these

24. Using………, the text can be entered and edited very efficiently.
(A) Spreadsheet
(B) Typewriter
(C) Word processing programme
(D) Desktop publishing programme
(E) None of these


ANSWERS: 
     1. 2      2. 4      3. 1       4. 2      5. 1       6. 2       7. 3       8. 3       9. 1       10. 3
11.A       1 2.C      13.B       14.C       15.D       16.B       17.A       18.D       1 9.B       20.D     21.C         22.C         23.D    24.D