Search This Blog

Tuesday, September 24, 2013

COMPUTER AWARENESS PRACTICE MCQs

1.    The main reason to encrypt a file is?
    a) Reduce its size
    b) Secure it for transmission
    c) Prepare it for backup
    d) Include it in the start-up sequence
    e) None of the above

2.     Which of the following is used to communicate between two computers?
    a) Communication software
    b) Protocol
    c) Communication hardware
    d) All the above including access to Transmission medium
    e) None of the above

3.    The lowest form of computer language is called?
    a) BASIC    
b) FORTRAN
    c) Machine language
    d) COBOL    
e) None

4.    Which of the following is not a Operating system for mobile phones?
    a) Android    
b) Symbian    
c) iOS    
d) Bada
e) All of these are OS for mobile phones

5.    This type of file is created by word processors?
    a) worksheet    
b)document    
c) database    
d)presentation    
e) none of the these

6.    _____allows users to upload files to an online site so they can be viewed and edited from another location?
    a) General-purpose application
    b) Microsoft Outlook
    c) Web-hosted technology    
   d) Office Live  
   e) None of these

7.    Which of these is not a means of personal communication on the internet?
    a) Chat     
   b) Instant messaging
    c) Insta notes
    d) Electronic mail
    e) None of these

8.    When entering text within a document, the enter key is normally pressed at the end of every?
    a) Line    
b) Sentence    
c) Paragraph    
d) Word    
e) File

9.    Which of the following software could assist someone who cannot use their hands for computer input?
    a) Video conferencing
    b) speech recognition
    c) Audio digitizer
    d) Synthesizer
    e) None of these

10. ___ software creates a mirror image of the entire hard disk, including the operating system, applications, files, and data?
    a) Operating system
    b) Backup software
    c) Utility programs
    d) Driver imaging
    e) None of these

11.    If you are going to a site you use often, instead of having to type in the address every time, you should?
    a) Save it as a file
    b) Make a copy of it
    c) Bookmark it        
d) Delete it
    e) None of the above

12.     Outlook Express is a(n)?
    a) Word Processor
    b) Spread Sheet      
c) Email client
    d) Presentation   
e) None of these

13.    A device that provides emergency power to your computer, conditions the voltage, and protects against power out is called a?
    a) PSU = Power Supply Unit
b) USP = Universal Surge Protector    
c) UPPS = Universal Power Protection and Supply     
d) UPS = Uninterruptible Power Supply
    e) None of the above

14.    Which is a graphical represe-ntation of an application?
    a) Windows 95    
    b) Windows Explorer
    c) Icon    
d) Taskbar    
e) None of the above

15. A program that enables you to perform calculations involving rows and columns of numbers is called?
    a) Spreadsheet program
    b) Word processor
    c) Graphics package
    d) Window    
e) None of these

16.     In a network, the most reliable communication is provided by ____ protocol?
    a) FTP     
b) HTTP     
c) TCP
    d) IP          
e) UDP

17.    ____ terminals are often connected to  complex inven-tory and sales computer systems?
    a) Data    
b) Information    
c) Credit Cards      
d) Query
    e) Point-of-Sale (POS)

18.    VOIP is the acronym for?
a)    Voice Oriented Internet Protocol    
b)    Virtual Object Internet Protocol
c)    Voice Over Internet Protocol
d)    Virtual Object Intranet Protocol    
    e) None of these

19.    What type of program controls various computer parts and allows the user to interact with the computer ?
    a) Utility software
    b) Operating system
    c) Word processing software
    d) Database program
    e) None of the above

20.    What is the full form of EPROM?
a)    Erasable Program Read Only Memory
b)    Electrically Programmable  Read Only Memory
c) Erasable Programmable Read  Only Memory
d)    Erasable Progressive  Read Only Memory
e) Erasable Periodic Read Only Memory

21. In MS-Word, a menu item in dim color (gray) indicates that the item is?
    a) Toggle menu
b)    Unavailable for current context
    c) Not much required menu    
d) Over-used menu
    e) None of these

22. _____ is a technique that is used to send more than one call over a single line?
    a) Digitizing    
b) Duplexing    
c) Infrared Transmission    
    d) Streaming    
e) Multiplexing

23.    Which of the following term is not associated with Display Device of the computer?
    a) LCD    
b) LED    
    c) CRT    
d) WAT    
e) TFT    

24.    The fifth generation computer is also known as?
a) Knowledge information processing system
b)    Very Large Scale Integration (VLSI)
    c) Superfast computer    
    d) Both a and b        
    e) None of the these

25.    Universal Product Code (UPC) is a?
    a) Scanner
    b) Hardware Equipment    
    c) Antivirus
    d) Graphics Adapter
    e) Barcode system

26.    Microsoft office is?
    a) Shareware
    b) Public - domain software
    c) Open - source software
    d) A vertical market application
    e) An application suite

27.    The scrambling of code is also known as?
    a) Encryption    
b) Firewall    
c) Encoding
    d) Password - proofing
    e) None of these

28.    A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic media?
    a) plates     
b) disks
    c) relays    
d) memories
    e) platters

29.    Which of the following is the advantage if using a spread-sheet ?
    a)    Calculations can be done automatically     
    b)    Changing data automatically updates calculations
    c) More flexibility
    d) All the above
    e) None of the above

30.    Which of the following memories can be read directly by the computer processor?
    a) Hard Disk    
    b) Main Memory   
c) CD
    d) DVD    
e) None of these

31.    The _______, also called the Web, contains billions of documents?
    a) Word Wide Web
    b) HTTP    
c) Web portal    
d) Domain    
e) None of these

32.    Ctrl, Shift, Alt are called ____ Keys?
    a) Modifier    
b) Function    
c) Alphanumeric
    d) adjustment    
e) Specifier

33.    A mistake in an algorithm that causes incorrect results is called?
    a) Logical error        
b) Syntax error    
c) Machine Error    
    d) Compiler error 
e) None

34.    Magnetic Disk medium uses ___ method for accessing data?
    a) Direct    
b) Serial    
    c) Sequential    
d) Rotational    
e) None

35.    CGI Stands for?
    a) Common Gateway Imaging    
b) Computer Gateway Imaging            
c) Computer Generated Imagery    
d) All the above
    e) None of the above

36.    Firewalls are used to protect against?
    a) Unauthorised attacks
    b) Virus attacks
    c) Data - driven attacks
    d) Fire attacks
    e) None of these

37.    The Software that allows users to surf the internet is called?
    a) Search engine
    b) Internet Service Provider(ISP)
    c) Multimedia    d) Browser
    e) None of these

38.    Following is true for Bandwidth?
a)    The narrow the bandwidth of a communications system the less data it can transmit in a given period of time.
b)    The narrow the bandwidth of a communications system the more data it can transmit in a given period of time.
c)    The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
    d) All of the above
    e) None is true

39.    The following is a communica-tion device (modem) which allows an ordinary telephone to be used with a computer device for data transmission?
    a) Keyboard  
b) Acoustic coupler
    c) Mobile phone
    d) All of the above 
e) None

40. For Creating a document, you use __command from the  file menu?
    a) Open    
b) Close   
c) New    
d) Save     
e) None of the above

Answers
1)  b    2)  d    3)  c    4)  e    5)  b          6)  c    7)  c    8)  c    9)  b    10) b
11) c    12) c    13) d    14) c    15) a   16) c    17) e    18) c    19) b    20) c
21) b    22) e    23) d    24) a    25) e   26) e    27) a    28) e    29) d    30) b
31) a    32) a    33) a    34) a    35) c   36) a    37) d    38) a    39) b    40) c

Friday, September 20, 2013

COMPUTER AWARENESS PRACTICE QUESTIONS

1.    The operating system does all of the following EXCEPT?
1)    provide a way for the user to interact with the computer.
2)    manage the central processing unit (CPU).
3)    manage memory and storage.
4)    enable users to perform a specific task such as document editing.
5) None of these

2.    The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?
    1) simulation     
    2) animation
    3) robotics 
    4) computer forensics
    5) None of these

3.    Allocation of a resources in a time dependent manner to several program simultaneo-usly called?
    1) multi user     
    2) multi tasking
    3) time sharing     
    4) multi sharing
    5) None of these

4.    Which of the following is an example of a binary number?
    1) A1BCD1     
    2) 23456
    3) 005     
    4) 100101
    5) None of these

5.    _____ controls the way in which the computer system functions and provides a means by which users can interact with the computer?
    1) the operating system
    2) the motherboard
    3) the platform
    4) application software
    5) None of these

6.    All of the following statements concerning windows are true EXCEPT?
    1)    windows are an example of a command-driven environment.
    2)    windows can be resized and repositioned on the desktop.
    3)    more than one window can be open at a time.
    4)    toolbars and scrollbars are features of windows.
    5) None of these

7.    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
    1) eight bytes.
    2) eight characters.
    3) eight bits.
    4) eight kilobytes.
   5) None of these

8.    Verification of a login name and password is known as?
    1) configuration     
   2) accessibility
    3) authentication 
   4) logging in
   5) None of these

9.    This type of memory is commonly called temporary or volatile storage?
    1) ROM    
    2) RAM
    3) Flash Memory
    4) Virtual Memory
    5) None of these

10.    Which of the following can be used to select the entire document?
    1) CTRL+A    
    2) ALT+F5
    3) SHIFT+A    
    4) CTRL+K
    5) CTRL+H

11.    The simultaneous processing of two or more programs by multiple processors is?
    1) Multiprogramming
    2) Multitasking 
    3) Time-sharing
    4) Multiprocessing
    5) None of these

12.    The default view in Excel is view?
    1) Work    
    2) Auto
    3) Normal    
    4) Roman
    5) None of these

13.    In Word, you can force a page break?
    1)    By positioning your cursor at the appropriate place and pressing the Fl key
    2)    By positioning your cursor at the appropriate place and pressing Ctrl+Enter
    3)    By using the Insert/ Section Break
    4)    By changing the font size of your document
    5)    None of these

14.    Help Menu is available at which button?
    1) End    
    2) Start
    3) Turn off    
    4) Restart
    5) Reboot

15.    The micro processor was introduced in?
    1) First generation computers
    2) Second generation computers
    3) Third generation computers
    4) Fourth generation computers
    5) None of these

16.    Computers use the__ language to process data?
    1) Processing     
    2) Kilobyte
    3) Binary    
    4) Representational
    5) None of these

17.    Computer process data into information by working exclusively with?
    1) Multimedia     
    2) Words
    3) Characters    
    4) Numbers
    5) None of these

18.    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
    1) Eight bytes 
    2) Eight kilobytes
    3) Eight characters 
    4) Eight bits
    5) Eight terabytes

19.    The term bit is short for?
    1) Megabyte    
    2) Binary language
    3) Binary digit    
    4) Binary number
    5) None of these

20.    A string of eight 0s and 1s is called a?
    1) Megabyte    
    2) Byte
    3) Kilobyte    
    4) Gigabyte
    5) Numbers

21.    A__ is approximately one billion bytes?
    1) Kilobyte     
    2) Bit
    3) Gigabyte    
    4) Megabyte
    5) Terabyte

22.    A__ is approximately a million bytes?
    1) Gigabyte     
    2) Kilobyte
    3) Megabyte    
    4) Terabyte
    5) None of these

23.    __ is any part of the computer that you can physically touch?
    1) Hardware     
   2) Program
    3) An application 
   4) Software
    5) None of these

24.    The components that process data are located in the?
    1) Input devices
    2) Output devices 
    3) System unit
    4) Storage component
    5) None of these

25.    All of the following are exampl es of input devices EXCEPT a?
    1) Scanner     
    2) Mouse
    3) Keyboard    
    4) Printer
    5) None of these

26.    A unit of data storage which is equal to 2 to the 70th power is known as:?
    1) Yottabite    
    2) Zebibyte
    3) Yobibyte    
    4) Petabyte
    5) Terabyte

27.    Which of the following langu-ages were used in the first generation computers?
    1) Machine Language
    2) Assembly language
    3) C-language
    4) High level language
    5) None of these

28. Which of the following options are used to provide guidance to users while they use application in computer?
    1) Software    
    2) Wizard
    3) Wiki    
   4) None of these
    5) All of the above

29.    V-RAM is used for which of the following?
    1) Video and graphics
    2) Text and images
    3) Softwares    
    4) Only text
    5) None of these

30.    SQL (Structured Query Lang-uage) is used for___?
    1) Creating databases and tables
    2)    Creating, Modifying and Querying databases
    3) Modifying databases
    4) None of these
    5) All of the above

31.    __is not a payment card techn-ology?
    1) Magnetic stripe card
    2) Smart card
    3) fleet card
    4)    All of them are payment card technologies.
    5) None of these

32.    ____is also known as electronic check?
    1) Debit card    
    2) Smart card
    3) Credit card    
   4) DD
    5) None of these

33.    Which of the following printer cannot print graphics?
    1) Ink-jet    
    2) Daisy Wheel
    3) Laser    
    4) Dot-matrix
    5) None of these

34.    Best Quality graphics is produced by?  
    1) Dot Matrix    
    2) Laser Printer
    3) Inkjet Printer 
    4) Plotter
    5) All of the above

35.    A___is a bi-stable electronic circuit that has two stable states?
    1) Multivibrator 
    2) Flip-flop
    3) Logic gates    
   4) laten
    5) None of these

36.    DOS stands for?
    1) Disk Operating System
    2) Disk Operating Session
    3) Digital Operating System
    4) Digital Open system
    5) None of these

37.    Which of the following are input devices?
    1) Keyboard    
   2) Mouse
    3) Card reader    
   4) Scanner
    5) All of these

38.    Who is the chief of Miocrosoft?
    1) Babbage    
    2) Bill Gates
    3) Bill Clinton    
    4) Bush
    5) None of these

39.    Examples of output devices are?
    1) Screen    
    2) Printer
    3) Speaker    
    4) All of these
    5) None of these

40. Which of the following is also known as brain of computer?
    1) Control unit
    2) Central Processing unit
    3) Arithmetic and language unit
    4) Monitor    
    5) None of these


Answers
 1) 4        2) 4    3) 3   4) 4    5) 1   6) 1    7) 3    8) 3    9) 2    10) 1
 11) 4    12) 3    13) 2    14) 2   15) 4  16) 3    17) 4    18) 4    19) 3    20) 2
 21) 3    22) 3   23) 1    24) 3    25) 4   26) 2    27) 1    28) 2    29) 1    30) 2
 31) 4    32) 1   33) 2    34) 4    35) 2   36) 1    37) 5    38) 2   39) 4   40) 2