Search This Blog

Thursday, July 18, 2013

COMPUTER AWARENESS PRACTICE QUESTIONS

1. The part of a computer that coordinates all its functions is called ________ 
a) ROM program 
b) System Board 
c) Arithmetic logic unit 
d) Control unit 

e) None 

2. A computer cannot boot if it does not have the _____
a) Compiler

b) Loader 
c) Operating System 
d) Assembler

e) None 

3. Any data or instructions entered into the memory of a computer are considered ____ 
a) Storage 

b) Output 
c) Input

d) Information 
e) None of these 


4. A right click on the desktop itself will?
a) Open the display properties dialogue box 
b) Show a context - sensitive menu
c) Open the control panel 
d) Minimize all open applications 
e) None of these 


5. The process of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called? 
a) Duping 

b) Booting 
c) Padding

d) CPS 
e) None of these


6. ___ is known as unauthorized access into others system?
a) Hacking

b) Encryption
c) Decryption

d) trafficking
e) None of these 


7. When creating a computer program, the ___ designs the structure of the program
a) End user 

b) System analyst 
c) Programmer 
d) All of the above 

e) None
 
8. Which commands divides the surface of the blank disk into sector and assign a unique address to each one 
a) Ver 

b) Format 
c) Fat 
d) Chkdsk

 e) None of these 

9. When you turn on the computer, the boot routine will perform this test: 

a) RAM test 
b) Disk drive test 
c) Memory test 
d) Power on self test 

e) None 

10. Which of the following perip-heral devices displays information to a user ?
a) Monitor 

b) Keyboard c) Secondary Storage Devices 
d) Secondary Storage Media 
e) None of these


11. Band width refers to: 
a) The cost of the cable required to implement a WAN
b) The cost of the cable required to implement a LAN
c) The amount of information a peer-to-peer network can store 
d) The amount of information a communication medium can transfer in a given amount of time 
e) None of these


12. If the computer keeps rebooting itself, it is likely that:
a) It is effected with virus 
b) It does not have enough memory 
c) There is no printer 
d) There has been a sudden power rise 
e) It needs a CD-ROM


13. Devices that enter information and let you communicate with the computer are called: 
a) Software 

b) Output Devices
c) Hardware 

d) Input Devices 
e) Input / Output Devices


14. An integrated circuit is ____ 
a) A complicated circuit 
b) An integrating device 
c) Much costlier than a single transistor 
d) Fabricated on a tiny silicon chip 
e) None of the above 


15. The computer connected to a LAN (Local Area Network) can
a) Run faster 

b) Go online 
c) Share information and/or share peripheral equipment 
d) E - Mail

e) None of these 

16. Which device can not be shared in network? 
a) Floppy

 b) Key board 
c) Computer

 d) Printer 
e) Hard Disk 


17. A printer is a type of device used for ____ 
a) Input b) Word processing
c) Processing 

d) Output 
e) None of these
 
18. The basic goal of computer process is to convert data into ____ 
a) Files b) Tables
c) Information 
d) Graphs 
e) None of these

 
19. The name that user gives to a document is referred to as ____ 
a) Document name 

b) File name
c) Name given 
d) Document identity 

e) None 

20. The person who writes and tests computer program is called a ___
a) Programmer 
b) Computer scientist 
c) Software engineer 
d) Project developer 

e) None 

21. DNS is the abbreviation of: 
a) Domain Name Service
b) Domain Name System
c) Direct Network Service
d) Direct Network System
e) None of these


22. Which of the following is not true as regards primary storage? 

a) It is a part of the CPU 
b) It allows very fast access to data 
c) It is relatively more expensive 
d) Information must be transf-erred to primary storage 
e ) None of these 


23. Which of the following is the most powerful type of computer? 

a) Super micro 
b) Super conductor 
c) Micro computer 
d) Super computer 
e) Mega frame 


24. Which of the following isn't a type of computer facility?
a) Decentralized 

b) Centralized 
c) De - distributed 
d) Distributed 

e) None 

Answers
1) d; 2) c; 3) c; 4) a; 5) b; 6) a; 7) b; 8) b; 9) b; 10) a; 

11) d; 12) a; 13) d; 14) d; 15) c; 16) b; 17) d; 18) c; 19) b; 20) a; 
21) b; 22) e; 23) d; 24) c. 

Thursday, July 4, 2013

COMPUTER AWARENESS PRACTICE MCQs

1. The ______ of a system includes the program or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these

3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing 
4) Icon
5) None of these

4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word 
4) Paste
5) None of these

5. Arranging the data in a sequence is known as?
1) Classifying 
2) Searching
3) Sorting
4) Reproducing
5) None of these

6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these

7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these

8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these

9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking 
5) None

10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
5) None

11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these

12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse 
3) RAD
4) CASE 
5) None of these

13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None of these

14. What is the symbol for attachments in yahoo mail :
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None of these

15. To cover files from a backup you perform________ option
1) Scan 
2) Move
3) Copy 
4) Restore
5) None of these

16. The internet began with the development of?
1) Ethernet 
2) Internet
3) USENET
4) Extranet
5) ARPANET

17. Select the odd man out
1) Interpreter 
2) Programmer
3) Operating system
4) Assembler 
5) Utility 

18. The number of pixels displayed on a screen is known as the screen?
1) Resolution
2) Color depth
3) Refresh rate
4) Viewing size
5) None of these

19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these

20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above 
5) None

21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None

Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.