Вы находитесь на странице: 1из 14

Ctrl, Shift and Alt are called ..........

keys. A) C) Arrow D) Control


B) Portrait
Landscape Answer & Explanation Answer: D)
A) modifier B) function Control
C) Page D) Print Q:
C) D) Setup View What are the four things needed to
alphanumeric adjustment Answer & Explanation Answer: B) connect to the internet?
Answer & Explanation Answer: A) Portrait
modifier A) telephone
B) modem,
Q: line, modem,
computer, PDA,
Q: Junk e-mail is also called ______ computer, and
and ISP
MS-Word is an example of _____ an ISP
A) Spam B) Spoof
B) A D)
A) An C) Sniffer C) telephone
processing D) Spool computer, ISP,
operating system script line, modem,
device modem, and
computer, and
Answer & Explanation Answer: A) communication
C) PDA
D) An input Spam software
Application Answer & Explanation Answer: D)
device
software Q: computer, ISP, modem, and
Answer & Explanation Answer: C) The computer's processor consists of communication software
Application software the following parts
Q:
Microsoft Word or MS-Word is an A) CPU and B) Hard Disk
In MICR, C stands for...........
Application software developed by Main Memory and Floppy Drive
the company Microsoft. It allows A) Code B) Colour
D) Operating
users to Type and Save documents. C) Control
System and C) Computer D) Character
Q: Unit and ALU
Application Answer & Explanation Answer: D)
A computer cannot "boot" if it does
not have the _____ Answer & Explanation Answer: C) Character
Control Unit and ALU Q:
A) Compiler B) Loader Q: An email account includes a storage
_____are attempts by individuals to area, often called ________
C) Operating D) obtain confidential information from
system Assembler you by falsifying their identity A) mailbox B) hyperlink
Answer & Explanation Answer: C)
Operating system A) Phishing B) Computer D) None of
C) IP address
trips viruses these
Q: Answer & Explanation Answer: A)
C) Phishing D) Spyware mailbox
________ is the process of dividing
scams scams
the disk into tracks and sectors
Answer & Explanation Answer: C) The operating system called UNIX is
B) Phishing scams typically used for_______
A) Tracking
Formatting Q:
The box that contains the central A) Desktop B) Laptop
C) Crashing D) Allotting electronic components of the computers computers
Answer & Explanation Answer: B) computer is the ..............
Formatting C) Super D) All of
A) B) System computers these
Q: Motherboard Unit Answer & Explanation Answer: D) All
What is the Full Form of INTERNET ? of these
C) Peripheral D) RAM Q:
Answer
'Internet' is the shortened form of Answer & Explanation Answer: B) The smallest unit in a digital system
'INTERnational-NETwork' which is System Unit is a.........
the interconnected network of all Q:
The first computer was programmed A) Bit B) Byte
the Web Servers worldwide. It is
often called the 'World Wide Web' using .......
C) Character D) Kilobyte
Q: A) Assembly B) Machine Answer & Explanation Answer: A) Bit
Microsoft Office is an example of language language Q:
a________
Which of the following is an example
C) Spaghetti D) Source of an optical disk?
A) Closed B) Open
code code
source software source software
Answer & Explanation Answer: B) A) Digital B) Magnetic
C) Horizontal D) vertical Machine language versatile disks disks
market software market software Q:
Which key is used in combination C) Memory D) Data bus
Answer & Explanation Answer: C) disks disks
Horizontal market software with another key to perform a
specific task? Answer & Explanation Answer: A)
Q:
Digital versatile disks
By default, your documents print in A) Function B) Spacebar Q:
________ mode
Microcomputer hardware consists of
three basic categories of physical B) D) None of
A) WinZip C) ROM Chip
equipment ____ Shareware and these
and Linux
file sharing Answer & Explanation Answer: C)
B) system ROM Chip
A) Keyboard, D) Instant
unit, C) Microsoft Q:
monitor, hard messaging and
input/output, word and the What characteristic of read-only
drive the Google
memory Google toolbar memory (ROM ) makes it useful?
toolbar
C) system D) system Answer & Explanation Answer: D) B) Data in
unit, unit, primary Instant messaging and the Google A) ROM ROM is non
input/output, storage, toolbar informationcan volatile, that is, it
secondary secondary Q: be easily remains there
storage storage C, BASIC, COBOL, and Java are updated even without
Answer & Explanation Answer: C) examples of ............language electrical power
system unit, input/output, secondary
storage B) D) ROM
A) low-level C) ROM
Q: programming chips are easily
provides very
Vendor-created program swapped
C) computer D) high-level large amounts of
modifications are called ________ between
inexpensive data
Answer & Explanation Answer: D) different brands
storage
B) high-level of computers
A) patches
antiviruses Q: Answer & Explanation Answer: B)
Which of the following are Data in ROM is non volatile, that is, it
C) holes D) fixes advantage of CD-ROM as a storage remains there even without
Answer & Explanation Answer: A) media? electrical power
patches _________ provide expansion
Q: B) CD-ROM
A) CD-ROM capability for a computer system
Which of the following refers to a disks retrieve
is an inexpensive
small, single-site network ? data and A) Sockets B) Slots
way to store
information
large amount of
A) LAN B) DSL more quickly D) None of
data and C) Bytes
than magnetic these
C) RAM D) USB information
disks do Answer & Explanation Answer: B)
Answer & Explanation Answer: A) Slots
LAN C) CD-ROMS Q:
Q: make less errors D) All of The term _____ designates
The process of preparing a floppy than magnetic these equipment that might be added to a
diskette for use is called ________ media computer system to enhance its
Answer & Explanation Answer: A) functionality
A) B) CD-ROM is an inexpensive way to
assembling translating store large amount of data and A) digital B) system
information device add-on
D)
C) parsing Q:
formatting D)
You can use the tab key to ________ C) disk pack
Answer & Explanation Answer: D) peripheral device
formatting A) move a Answer & Explanation Answer: D)
B) indent a
Q: cursor across the peripheral device
paragraph
All of the logic and mathematical screen Q:
calculations done by the computer In the binary Language each letter
happen in/ on the ........ C) move the of the alphabet, each number and
D) both (a)
cursor down the each special character is made up of
and (b)
A) system B) central screen a unique combination of _________
board control unit Answer & Explanation Answer: D)
both (a) and (b) A) eight B) eight
C) central D) mother bytes kilobytes
Q:
processing unit board
A ........ is approximately one billion
Answer & Explanation Answer: C) bytes C) eight
D) eight bits
central processing unit characters
A _______ is a software program A) Megabyte B) Gigabyte Answer & Explanation Answer: D)
used to view Web pages. eight bits
D) None of Q:
C) Terabyte
A) site B) host these Hardware devices that are not part
Answer & Explanation Answer: B) of the main computer system and
C) link D) browser
Gigabyte are often added later to the system
Answer & Explanation Answer: D) Q: are ________
browser The instructions for starting the
Q: computer are housed in _____ A) clip art B) highlight
What are two example of freeware?
A) RAM B) CD-ROM D)
C) execute
peripherals
Answer & Explanation Answer: D) the right job for
peripherals D)
C) utility the user
Q: spreadsheet
software
Which of the following software software D) Software
Answer & Explanation Answer: D) C) The
applications would be the most running with
spreadsheet software software being
appropriate for performing other previously
Q: able to run on
numerical and statistical installed
The _____ controls communications the computer
calculations? software
for the entire computer system Answer & Explanation Answer: D)
B) Document
A) Database A) Software running with other
Processor B)
arithmetic-logic previously installed software
semiconductor
C) Graphic D) Spread unit
Package Sheet The germans calls this the 'spider
C) D) monkey' and the italians call it the
Answer & Explanation Answer: D)
motherboard coprocessor 'snail'.Which symbol is this?
Spread Sheet
Q: Answer & Explanation Answer: C) A) + B) @
Codes consisting of bars or lines of motherboard
varying widths or lengths that are Q: C) $ D) #
computer readable are known as The main job of a CPU is to Answer & Explanation Answer: B) @
____ Q:
B) store
A) carry out Which of the following menu types is
A) An AsCII B) A data/
program also called a drop down menu?
code magnetic tape information for
instructions
future use A) fly-out B) cascading
C) AN OCR D) A Bar
scanner code C) Process C) pop-up D) pull-down
D) both (a)
Answer & Explanation Answer: D) A data and
and (c) Answer & Explanation Answer: D)
Bar code information
pull-down
Q: Answer & Explanation Answer: D) Q:
What is a default file extension for all both (a) and (c) _________ hard drives are
word documents? Q: permanently located inside the
A prescribed set of well-defined system unit and are not designed to
A) TXT B) WRD instructions for solving mathematical be removed, unless they need to be
problems is called ________ repaired or replaced
C) FIL D) DOC
Answer & Explanation Answer: D) A) A A) Static B) Internal
B) A code
DOC compiler
Q: C) External D) Remove
What happens when you boot up a C) A D) An
Answer & Explanation Answer: B)
PC? description algorithm
Internal
Answer & Explanation Answer: D) An Q:
B) Portions algorithm
A) Portions Storage media such as a CD read and
of the operating Q:
of the operating write information using _________
system are A removable magnetic disc that
system are
copied from holds information ______ A) a laser B) magnetic
copied from disk
memory onto beam of red light dots
into memory A) Floppy B) Hard
disk
disk drive C) magnetic D) All of
C) Portions D) Portions strips these
of the operating of the operating C) Monitor D) Portable
Answer & Explanation Answer: A) a
system are system are Answer & Explanation Answer: A) laser beam of red light
compiled emulated Floppy disk Q:
Answer & Explanation Answer: A) Q: Which of the following is a popular
Portions of the operating system are Something which has easily- programming language for
copied from disk into memory understood instructions is said to developing multimedia webpages.
To make the number pad act as a be___
directional arrow, we press A) COBOL B) Java
A) Analog B) Digital
A) Num lock B) Caps lock data data D)
C) BASIC
Assembler
C) Arrow C) Modem D) Watts
D) Shift Answer & Explanation Answer: B)
lock data data
Java
Answer & Explanation Answer: D) Answer & Explanation Answer: A) Q:
Shift Analog data Which of the following is the largest
Q: Q: unit of storage?
Software you can use to create a Compatibility in regard to computers
budget is called _______ refers to ________ A) GB B) KB

A) word B) It being C) MB D) TB
B) graphics A) The
processing versatile enough Answer & Explanation Answer: D) TB
software software doing
software to handle the job Q:
Which of the following is the storage Answer & Explanation Answer: B)
area within the computer itself interpreter D) Analytical
C) Calculator
which holds data only temporarily as Q: Engine
the computer process instructions? Computer programs are written in a Answer & Explanation Answer: D)
high level programming language, Analytical Engine
A) the hard B) main however the human readable
disk memory version of a program is called Explanation:
_______ Computer was invented by Charles
C) the D) read-only Babbage.
control unit memory B) The First Mechanical
A) Cache
Answer & Explanation Answer: B) Instruction set Computer Designed by Charles
main memory Babbage, a British mathematician
Q: C) Source D) None of was called as Analytical Engine
Programs designed specifically to code these which resembles today's modern
address general purpose applications Answer & Explanation Answer: C) machines between 1833 and 1871.
and special-purpose applications are Source code Q:
called ...... Q: Which type of memory holds only
The unit MIPS is used to measure the the program and data that the CPU is
A) speed of a___. presently processing?
Management B) System
Information Software B) Tape A) CMOS B) ROM
A) Disk drive
System drive
C) RAM D) ASCII
C) C) Printer D) Processor Answer & Explanation Answer: C)
D) None of
Application Answer & Explanation Answer: D) RAM
these
Software Processor Q:
Answer & Explanation Answer: C) The ..... key and the ..... key can be
Application Software Explanation: used in combination with other keys
_______ uses laser technology to MIPS refers millions instruction per to perform shortcuts and special
store large amount of information sec and is used to measure the tasks
speed of Processor.
A) Floppy Q: A) Control, B) Function,
B) CD-ROM
disk Which media have the ability to have Alt Toggle
data/information stored (written) on
C) Hard disk D) ED-ROM C) Caps D) None of
them by users more than once?
Answer & Explanation Answer: B) lock,Num lock these
CD-ROM B) CD-RW Answer & Explanation Answer: A)
A) CD-R disks
Q: disks Control, Alt
A ______ is a computer attached to Q:
the internet that runs a special Web D) Optical When you save to this, your data will
C) Zip disks
server software and can send Web disks remain intact even when the
pages out to other computers over Answer & Explanation Answer: B) computer is turned off ____
the internet. CD-RW disks
Q: B) Mother
B) web A) RAM
A) web client Storage which stores or retains data board
system after power off is called____
C) Secondary D) Primary
D) Web A) Volatile B) Non- storage device storage device
C) web page
server storage volatile storage Answer & Explanation Answer: C)
Answer & Explanation Answer: D) Secondary storage device
Web server C) Q:
D) Direct
Q: Sequential Output devices make it possible to
storage
The ______ is a box that houses the storage
most important parts of a computer Answer & Explanation Answer: B) A) View and B) Scan a
system. Non-volatile storage print a data data
When you cut or copy information it
A) Software B) Hardware gets place in the___________ C) Input a D) Sending a
data data
C) Input D) System B) Mother Answer & Explanation Answer: A)
drive unit A) Clipboard
board View and print a data
Answer & Explanation Answer: D) Q:
System unit D) None of A(n) .......... is a small group of
C) RAM
Q: these computers and peripherals linked
_______ converts and executes one Answer & Explanation Answer: A) together in a small geographic area.
statement at a time Clipboard
Q: A) WAN B) PAN
B) The First Mechanical
A) compiler
interpreter Computer Designed by Charles C) LAN D) CAN
Babbage was called? Answer & Explanation Answer: C)
D) LAN
C) converter
instructions A) Super Q:
B) Abacus
Computer Secondary storage ________
A) does not B) does not C) Worm D) File virus C) instant D)
require constant use magnetic Answer & Explanation Answer: A) messenger programmer
power media Trojan horses Answer & Explanation Answer: B)
Q: hacker
C) consists D) does not PARAM was developed by Q:
of four main store information Most websites have a main page ,
types of devices for later retrieval A) C-DAC B) IIT Kanpur the ______ which acts as a doorway
Answer & Explanation Answer: A) to the rest of the website pages.
does not require constant power C) BARC D) IIT Delhi
Several computers linked to a server Answer & Explanation Answer: A) C- A) Search B) Home
to share programs and storage DAC engine page
space________ Q:
Most application software today C) Browser D) URL
A) Network B) Grouping comes with an interface called Answer & Explanation Answer: B)
Home page
D) A) Graphical B) Character Q:
C) Library Integrated user interface user interface _________ is a process of searching
system bugs in software
Answer & Explanation Answer: A) C) Icon user D) Button
Network interface user interface A) Compiling B) Testing
Q: Answer & Explanation Answer: A)
Digital computers use a ......... system Graphical user interface D)
C) Runnung
to encode date and programs. Any letter, number, or symbol found Debugging
on the keyboard that you can type Answer & Explanation Answer: D)
A) into the computer........... Debugging
B) decimal
semiconductor Q:
A) Output B) Type The "home page" of a website
C) binary D) RAM is....................
Answer & Explanation Answer: C) C) Character D) Print
binary Answer & Explanation Answer: C) A) The first B) The
Q: Character page largest page
A Computer works on a _______ Q:
number system If a new device is attached to a C) The most D) The last
computer, such as printer or colorful page page
A) binary B) octal scanner, its ______ must be installed Answer & Explanation Answer: B)
before the device can be used The largest page
D) A modem ______
C) decimal
hexadecimal A) buffer B) driver
Answer & Explanation Answer: A) A) translates B) translates
binary C) pager D) server analog signals digital signals
Q: Answer & Explanation Answer: B) from a computer from a computer
The symbols used in an assembly driver into digital into analog
language are called ? Q: signals that can signals that can
Which of the following could be travel along travel along
A) B) digital input devices for computers? conventional conventional
Assembler Mnemonics telephone lines telephone lines
A) Digital B)
D) All of the camcorder Microphone C) D)
C) Codes
above demodulates modulates
Answer & Explanation Answer: B) D) All of the digital signals signals an analog
C) Scanner
Mnemonics above from a computer telephone line
Q: Answer & Explanation Answer: D) All Answer & Explanation Answer: B)
OCR stands for of the above translates digital signals from a
Q: computer into analog signals that
A) Optical Inventor of WWW is ______
B) Optical can travel along conventional
Character
CPU Recognition B) telephone lines
Recognition A) Bill Gates
Lee.N.Feyong Q:
C) Optimal D) Other Which motherboard form factor uses
Character Character D) Tim one 20 pin connector?
C) N. Resscl
Rendering Restoration Berners Lee
A) Baby AT B) AT
Answer & Explanation Answer: A) Answer & Explanation Answer: D)
Optical Character Recognition Tim Berners Lee D) All the
Q: C) ATX
Q: above
What is the name of the virus that A person who used his or her Answer & Explanation Answer: C)
fool a user into downloading and expertise to gain access to other ATX
executing them by pretending to be people's computers to get
useful applications ? information illegally or do damage is Explanation:
a ________ ATX (Advanced Technology
A) Trojan
B) Keylogger A) spammer B) hacker extended) is a motherboard form
horses
factor uses one 20 pin connector.
During Processing data, programs,
ATX is developed by Intel in 1995 to and processed information are held C) SHIFT+C, D) SHIFT+C,
improve on previous de facto temporarily in _________ ALT+V ALT+P
standards like the AT form factor. It Answer & Explanation Answer: A)
was the first major change in A) Secodary CTRL+C, CTRL+V
B) ROM
desktop computer enclosure, stoage Q:
motherboard, and power supply In order to e-mail a Word document
D) None of from within Word _______
design in many years, improving C) RAM
these
standardization and
Answer & Explanation Answer: C) A) Go to B) Save the
interchangeability of parts.
RAM file/Send To/Mail file as an e-mail
Q:
The primary purpose of an operating Recipient attachment
Who is the father of email ?
system is ?
A) Charles B) Ray C) Start
Babbage Tomlinson A) To allow B) To make outlook and D) This is an
people to use the computers easier attach the file impossible
C) Tim D) Paul computer to use while open in operation
Berners Lee Buchheit word
D) To make Answer & Explanation Answer: A) Go
Answer & Explanation Answer: B) C) To keep
the most to file/Send To/Mail Recipient
Ray Tomlinson systems
efficient use of Q:
programmers
the computer Documentation of computer
Explanation: employed
hardware programs is impograms is important
Email inventor Ray Tomlinson dies at
74. Ray Tomlinson, who sent the Answer & Explanation Answer: D) To so that ________
first e-mail, has died. make the most efficient use of the
computer hardware B) other
Q:
A) users can programmers
Delayed payload of some viruses is
Explanation: learn how to use can know how to
also called as _____
The primary purpose of an operating the program maintain the
B) Late - system is to make the most efficient program
A) Bomb
Virus use of the computer hardware.
Q: C) the
C) Time D) Anti-virus A program which helps create programer can
Answer & Explanation Answer: A) written documents and lets you go see why the code
D) all of
Bomb back and make corrections as is written that
above
Q: necesary ______ way while
Windows 95, Windows 98, and hunting for
Windows NT are known as what? A) B) Personal sources of error
Spreadsheet writer Answer & Explanation Answer: D) all
B) domain of above
A) Processor C) Word D) Word
names Q:
printer processor ...... this is the act of copying or
D) operating Answer & Explanation Answer: D) downloading a program from a
C) modems
systems Word processor network and making multiple copies
Answer & Explanation Answer: D) Q: of it
operating systems Storage and memory differ with
Q: respect to which of the following A) Network
B) Plagiarism
A button that makes characters characteristics? piracy
either upper or lower case and
numbers to symbols___ A) Price B) Reliability C) Software D) Site-
piracy Licency piracy
A) Shift B) Ctrl D) All of Answer & Explanation Answer: C)
C) Speed
these Software piracy
D) Back Answer & Explanation Answer: D) All What is "Trend Micro" ?
C) Space bar
space of these
Answer & Explanation Answer: A) Q: B) It is an
A) Name of
Shift Who governs the INTERNET ? electronic
an insect
Q: machine
A CD-ROM disk _______ A) ISOC B) IETF
C) It is anti-
D) All of the D) None
A) cannot be B) has more C) IAB virus software
erased and storage capacity above Answer & Explanation Answer: C) It
rewritten than a CD-R Answer & Explanation Answer: D) All is anti-virus software
of the above
C) holds less Q: Explanation:
D) Can be
data than a You can use ______ to copy selected Q:
written only once
floppy disk text, and ____to paste it in a The command used to remove text
Answer & Explanation Answer: A) document or graphics from a document. The
cannot be erased and rewritten information is then stored on a
Q: A) CTRL+C, B) CTRL+C,
clipboard so you can paste it.
CTRL+V CTRL+P
A) cut B) Chop
phase in a document is to use the first computer so named with first
C) Cart away D) Clip command alphabets of English
Answer & Explanation Answer: A) cut Q:
Q: A) Replace B) Find What is the name for the process
What command is used to count the that is used to convert a series of
total number of lines, words, and C) Lookup D) Search
instructions or programs, written in a
characters contained in a file ? Answer & Explanation Answer: B) high-level language into
Find instructions(or a program) that can
A) wc B) count p What is backup? be run on a computer?
C) wcount D) countw B) Copy to A)
A) Connect B) Compiling
Answer & Explanation Answer: A) wc save a data from Assembling
his network to
original source to
more component
Explanation: other destination C)
D) Uploading
Q: Translating
What is the most common way to C) Filter an
D) Access Answer & Explanation Answer: B)
get a virus in your computers hard old data from
data from tape Compiling
disk? new data
Q:
Answer & Explanation Answer: B) Which of the following virus
A) By Copy to save a data from original
B) By overtake computer system, when it
installing games source to other destination
opening e-mails boots and destroy information ?
from CD ROMs Q:
A........ can operate at high speeds A) System
C) By B) Trojan
and can support hundreds of users infectors
uploading
D) By
pictures from B) C) Stealth D) Boot
sending e-mails A) Micro
mobile to the Mainframe virus infectors
computer
computers computer Answer & Explanation Answer: C)
Answer & Explanation Answer: B) By Stealth virus
opening e-mails C) Super D) Mini
Q:
Q: computer computer
A method of providing virtual
The two types of output devices are Answer & Explanation Answer: B) memory is called _____.
Mainframe computer
A) Monitor B) Floppy Q: A) B)
and Printer disc and CD What is an e-mail? Fragmentation Segmentation
C) Keyboard D) None of B) An online C) De-
A) An D) Paging
and Mouse these area on which a fragmentation
internet
Answer & Explanation Answer: A) user can Answer & Explanation Answer: B)
standard, which
Monitor and Printer converse in Segmentation
aqllow users to
Q: written form Q:
upload and
The difference between a virus and a about any special Information on a computer is stored
download files
self-replicating program which is like subject as _________
a virus is that rather than creating
copies of itself on only one system it C) A) analog B) digital
propagate through computer Transmission of data data
network. What is that called as files and D) A real
_____ messages time typed C) modem D) watts
through conversation data data
A) Keylogger B) Worm computer Answer & Explanation Answer: B)
network digital data
C) Time Answer & Explanation Answer: C) Which of the following is a true
D) Cracker
Bomb Transmission of files and messages statement about Intranet and
Answer & Explanation Answer: B) through computer network Internet ?
Worm Q:
Q: Why ABC computer is called so ? A)
B) They use
In computer short cut keys, F4 key is Encryption is
similar protocol
used to A) Because it necessary
was thought to
A) To display B) Because it D) They use
B) To display be the first C) Speed is
the items in the was developed the same
help computer so slow
active list by Atanasoff and protocol
named with first
Berry
alphabets of Answer & Explanation Answer: D)
C) To display English They use the same protocol
system D) To display Q:
properties dialog desktop C) Both of What is amodem connected to?
box above are the
D) None of
Answer & Explanation Answer: A) To reason to name B) mother
the above A) processor
display the items in the active list the computer board
Q: ABC
The quickest and easiest way in D) phone
Answer & Explanation Answer: A) C) printer
word, to locate a particular word or line
Because it was thought to be the
Q: addressable by the CPU and requires The original ASCII code used
Unsolicited e-mail is called a ______ special software called EMS ? ___________ bits of each byte,
reserving that last bit for error
A) A) Expanded B) Base checking ?
B) Usenet
Newsgroup
C) A) 5 B) 6
D) None
C) Backbane D) Spam Conventional
Answer & Explanation Answer: D) Answer & Explanation Answer: A) C) 7 D) 8
Spam Expanded Answer & Explanation Answer: C) 7
Q: Q: Q:
The combination of operating ______ is the maximum amount of Which of the following memories
system and processor in a computer data that can be stored on a storage needs refresh ?
is reffered to as a computers medium.
________ A) DRAM B) ROM
A) Magnetic B) Optical
B) storage storage D) All of the
A) firmware C) SRAM
specifications above
C) Solid- D) Storage Answer & Explanation Answer: A)
C) minimum state storage capacity DRAM
D) platform
requirements Answer & Explanation Answer: D) Q:
Answer & Explanation Answer: D) Storage capacity Symbolic logic was discovered by
platform Q: ___________
Q: What is e-commerce?
RAM is ____ and ____ A) Herman B) Vonn
B) Buying Hollerith Neumann
A) Buying
B) and selling
A) volatile, and selling C) George D) Sun
nonvolatile, products and
temporary international Boole Microsystem
permanent services not
goods
found in stores Answer & Explanation Answer: C)
C) George Boole
D) volatile,
nonvolatile, C) Buying D) Buying Which of the following refers to the
permanent
temporary and selling and selling fastest, biggest, and most expansive
Answer & Explanation Answer: A) products and products having computer?
volatile, temporary services over the to do with
Q: internet computer A) Personal B) Super
If you are going to a site you use Answer & Explanation Answer: C) computer computer
often, instead of having to type in Buying and selling products and
D) None of
the address every time, you services over the internet C) Laptop
these
should_______ Q:
The function of an assembler is Answer & Explanation Answer: B)
A) Save it as B) Make a ________ Super computer
a file copy of it Q:
A) To B) To How do you display current date and
C) Bookmark D) None of convert basic convert high time in MS Excel ?
it these language into level language
Answer & Explanation Answer: C) machine into machine A) Time () B) Now ()
Bookmark it language language
C) Date () D) Today ()
Q:
A series of instructions that tells a C) To D) To Answer & Explanation Answer: B)
computer what to do and how to do convert assemble convert assemble Now ()
it is called a _______ language into language into Q:
machine high level Hard copy of a document is
A) Program B) Command language language
A) Printed B) Stored in
Answer & Explanation Answer: C) To on printer floppy
C) User
D) Processor convert assemble language into
response
machine language C) Store in D) Store in
Answer & Explanation Answer: A) Q: CD hard disk
Program What does a Browser do?
Q: Answer & Explanation Answer: A)
Which of these is not a means of A) Looks Printed on printer
personal communication on the through B) Reads Q:
internet ? magazines and meterial really Which is NOT a good Web security
books in the fast strategy ?
A) Instant library
B) Chat B) Add demo
messaging
C) It D) It is A) Remove programs, so
C) Electronic D) provides help software used to unnecessary users can test
mail Instanotes menus view web pages compilers and system without
Answer & Explanation Answer: D) interpreters accessing
Answer & Explanation Answer: D) It production data
Instanotes is software used to view web pages
Which type of memory is not directly Q:
Answer & Explanation Answer: A)
D) Restrict Internet Explanation:
C) Limit the access to the Q: RAM is located
users who can Web server keep The common name for the crime of in The central processing unit (CPU),
load software, a minimum stealing passwords is also called a processor, is located
edit or add files number of ports inside the computer case on the
open A) Spoofing B) Surfing motherboard. It is sometimes called
Answer & Explanation Answer: A) the brain of the computer, and its
Remove unnecessary compilers and C) Identity
D) Speeling job is to carry out commands.
interpreters Theft
Q:
Q: Answer & Explanation Answer: A) V-RAM is used for access of the
Expansion cards are inserted into Spoofing following ?
A) Peripheral Explanation: B) Video &
B) Pegs A) Programs
Devices A spoofing attack is a situation in Graphics
which one individual or program
D) The back effectively disguises or mask as C) Text &
C) Slots D) All
of the computer another by falsifying information and Images
Answer & Explanation Answer: C) thereby gaining up an ill-conceived Answer & Explanation Answer: B)
Slots advantage. It may use for stealing Video & Graphics
In computing, the expansion card password or IP addresses.
or board or accessory card is a Q: Explanation:
printed circuit board that can Which Company is the biggest player VRAM or (video RAM), reference to
be inserted into an electrical in the microprocessor industry ? any type of random access memory
connector or expansion slot, on a (RAM) is a dual-ported variant of
computer motherboard, to add A) AMD B) IBM dynamic RAM (DRAM) used to store
functionality to a computer system the framebuffer in graphics
via the expansion bus. C) Motorola D) Intel
adapters.
Q: Answer & Explanation Answer: D) What Does BIOS Stand For
__________ cookies are also known Intel
as transient cookies. Q: A) Backup B) Battery
What is the maximum number of Input Output Integrated
B) Second characters when applying MsgBox System Operating Setup
A) Persistent
party and InputBox ?
Answer D) Better
D) Third C) Basic
C) Session The maximum number of characters Integrated
party Input Output
allowed is 1024 characters. Operating
System
Answer & Explanation Answer: C) Q: System
Session Which is the World's Fastest Answer & Explanation Answer: C)
Q: SUPERCOMPUTER and to which Basic Input Output System
What could cause a Fixed Disk Error? country it belongs ?
Explanation:
A) Slow B) RAM A) JAGUAR -- B) PARAM BIOS in computers stands for Basic
Processor Speed Space - ENGLAND YUVA 2 --- INDIA Input Output System.
C) Incorrect BIOS is a set of computer
D) None C) CRAY-1 --- D) TIANHE 2
CMOS Settings instructions in firmware which
ENGLAND --- CHINA
control input and output operations.
Answer & Explanation Answer: C) Answer & Explanation Answer: D) Q:
Incorrect CMOS Settings TIANHE 2 --- CHINA The two kinds of Main Memory are
Q: Q:
What kind of attempts is made by _________ is a specialized server A) Random B) ROM and
individuals to obtain confidential that enables the client to share and sequential RAM
information from a person by application and data across the
falsifying their identity ? network. C) Primary D) All the
and secondary above
A) Spyware B) Phishing A) Mass
B) File server Answer & Explanation Answer: B)
scams scams Server ROM and RAM
C) Computer C) Data D) Host
D) None Explanation:
viruses Server Server
The main memory is defined as the
Answer & Explanation Answer: B) Answer & Explanation Answer: B) central storage in a computer.
Phishing scams File server (noun) An example of the main
Select the odd term out of the Q: memory is where programs and data
following? Where is RAM located? are kept when the processor is
B) A) Mother B) Expansion actively using them.
A) Internet The main storage region of a
Macintosh OSX Board Board
computer, to which the central
C) Linux D) Windows C) External processor has immediate or direct
Mint 8.1 D) None access is of two kinds. They are ::
Drive
Answer & Explanation Answer: A) RAM -- Random Access Memory
Mother Board ROM -- Read Only Memory.
Q:
Missing Slot Covers on a Computer B) Token C) Plotter D) Screen
A) Ethernet
can cause Ring Answer & Explanation Answer: D)
Screen
B) C) Bus Token D) None
A) Power
Incomplete Path Answer & Explanation Answer: B) Explanation:
Surges
of ESD Token Ring A touch screen is the only device
Q: which works as both an input and an
C) Over Which of the following is NOT a output device among the given
D) EMI
Haeat Software? options. You view the options
Answer & Explanation Answer: C) available to you on the screen
Over Haeat A) Compiler B) Adobe
(output) and you then use your
C) Microsoft finger to touch the option that you
Explanation: D) Drivers have chosen (input).
Office
The slot covers on a computer Hence, Screen is not purely output
reduce the dust build up inside the Answer & Explanation Answer: A)
device.
computer. So the slot covers should Compiler
Q:
be present in proper place.The Which of the following is not an
missing covers can disrupt the Explanation:
Input device?
airflow design of the case and cause A compiler is not a software.
overheating problems. Adobe, Microsoft office and Drivers B)
are all software on a computer. A) Joystick
Q: Headphones
Programs stored in ROM are called Q:
Is DRAM Volatile or Nonvolatile? C) Mouse D) Scanner
A) Hardware B) Firmware Answer Answer & Explanation Answer: B)
DRAM is a Volatile random-access Headphones
C) Freeware D) Software memory (VRAM).
Answer & Explanation Answer: B) Volatile random-access memory Explanation:
Firmware (VRAM) is random-access memory Here Joystick, Mouse and Scanner
that retains its information when are Input devices through which data
Explanation: power is turned on. is given to the computers. But
The programs which are as Examples of volatile memory are Headphones are output devices
permanent as hardware and stored primary storage (typically dynamic through which sound comes as an
in ROM are known as Firmware. RAM, DRAM), and fast CPU cache output from the computer or any
Data stored in ROM can only be memory (typically static RAM, SRAM, devices.
modified slowly, with difficulty, or which is fast but energy-consuming Q:
not at all, so it is mainly used to store and offer lower memory capacity per Computer storage units smallest to
firmware (software that is closely area unit than DRAM). largest?
tied to specific hardware, and Non-volatile random-access memory Answer
unlikely to need frequent updates) (NVRAM) is random-access memory The smallest unit of data storage in a
or application software in plug-in that retains its information when computer is called Bit (Binary Digit).
cartridges. power is turned off. Half a byte (four bits) is called a
Q: Nibble.
What are the four main functions of Examples of non-volatile memory 1 bit (binary digit) = the value of 0 or
a computer? are flash memory (used as secondary 1
memory) and ROM, PROM, EPROM 8 bits = 1 byte
B) and EEPROM memory (used for 1024 bytes = 1 kilobyte
A) Data, Hardware, storing firmware such as BIOS). 1024 kilobytes = 1 megabyte
information, bits software,
1024 megabytes = 1 gigabyte
and bytes modeling and Which of the following is not a 1024 gigabytes = 1 terabyte
operations function of the Control Unit? 1024 terabytes = 1 petabyte
C) Input, D) Learning, Hence, Computer storage units
A) Interpret B) Read
processing, thinking, smallest to largest i.e, in ascending
instructions instructions
output and intelligence and order is
storage virtuosity C) Execute D) Direct 1 bit < 1 byte < 1 KB < 1 MB < 1
instructions operations GB < 1TB < 1 PB.
Answer & Explanation Answer: C)
Q:
Input, processing, output and Answer & Explanation Answer: B)
The flow of information through MIS
storage Read instructions
is
Explanation: Explanation: A) B)
The four main functions of a Control Unit can perform the organization information
computer are :: functions Interpret instructions, dependent dependent
Execute instructions and Direct
1. Input, operations. But Reading instructions C)
D) need
2. Processing, is not a function of the Control Unit. management
dependent
3. Output and Q: dependent
4. Storage Which of the following is not purely Answer & Explanation Answer: D)
Q: output device? need dependent
The popular Access Method for
computer network is A) Printer B) Speaker
Explanation:
The flow of information through MIS The World Wide Web Consortium
- Management Information System is (W3C) is an international community Explanation:
Need dependent. where Member organizations, a full- In MS-Word, the Ruler function helps
The backbone of any organization is time staff, and the public work align the text, graphic, tables or
Information. The information of MIS together to develop Web standards. other elements in your document.
comes from both internal and Led by Web inventor and Director Q:
external sources. Tim Berners-Lee and CEO Jeffrey Size of the primary memory of a pc
Q: Jaffe, W3C's mission is to lead the ranges between
Can character data be stored in Web to its full potential.
computer memory? Q: A) 256 kb to B) 64 kb to
System Study involves 640 kb 256 kb
A) Yes---a B) No---
primitive data computer B) C) 256 kb to D) 2 kb to 8
type is used to memory can only identifying 512 kb kb
A)
store characters store patterns current Answer & Explanation Answer: A)
documenting the
deficiencies and 256 kb to 640 kb
C) Yes--- D) No--- existing system
establishing new
characters are computers can goals Explanation:
stored in special only store Size of the primary memory of a PC
memory numbers C) study of ranges between 256 KB to 640 KB.
D) All the
Answer & Explanation Answer: A) an existing Q:
above
Yes---a primitive data type is used to system A report generator is used to
store characters Answer & Explanation Answer: D) All
the above A) print files
B) data entry
Explanation: on paper
Q: Explanation:
C) update D) All the
Which of the following is not an Q:
files above
Output device? Digitized information can be used by
computers. Answer & Explanation Answer: A)
A) Scanner B) Moniter print files on paper
A) TRUE B) FALSE
C) Printer D) Speakers Explanation:
Answer & Explanation Answer: A) A report generator is a computer
Answer & Explanation Answer: A)
Scanner program whose purpose is to take
TRUE
data from a source such as a
Explanation: database, XML stream or a
Explanation:
Q: spreadsheet, and use it to produce a
TRUE. The computers and electronic
Programs stored in ROM are called document in a format which satisfies
devices use digitized information
a particular human readership.
A) Firmware B) Software which is easily understood by them.
Hence, A report generator is used
Digitization is the process of
to print files on paper.
D) None of converting analog signals or
C) Hardware Q:
above information of any form into a digital
Which protocol does ping use?
Answer & Explanation Answer: A) format that can be understood by
Firmware computer systems or electronic A) ICMP B) TCP
devices. The term is used when
Explanation: converting information, like text, C) BootP D) ARP
ROM stands for read-only-memory. images or voices, and sounds, into Answer & Explanation Answer: A)
It's used to store the start-up binary code. ICMP
instructions for a computer, also Q:
known as the firmware. Which key is used for the last action? Explanation:
Most modern computers use flash- ICMP means Internet Control
A) Ctrl + D B) Alt + Z
based ROM. It is part of the BIOS Message Protocol and is always
chip, which is located on the C) Ctrl + Z D) Alt + D coupled with the IP protocol (There
motherboard. are 2 ICMP variants one for IPv4 and
Answer & Explanation Answer: C)
World Wide Web is being standard one for IPv6.) echo request and echo
Ctrl + Z
by response are the two operation
codes of ICMP used to implement
B) World Explanation:
ping.
A) W3C Wide Web For undo the action or last action
Which technology is used in compact
Standard [Ctrl + Z] is used.
disks?
Q:
C) In MS-Word, for what does ruler B)
D) World A) Laser
Worldwide help? Mechanical
Wide Consortium
corporation
A) to set B) to change D) Electro
Answer & Explanation Answer: A) C) Electrical
indents page margins magnetic
W3C
C) to set D) All the Answer & Explanation Answer: A)
Explanation: tabs above Laser
World Wide Web is being standard
Answer & Explanation Answer: D) All
by W3C. Explanation:
the above
Compact disc (CD) is a digital optical speed refers to the number of pulses
disc data storage format that was co- per second generated by an C) Both of D) None of
developed by Philips and Sony and oscillator that sets the tempo for the above above
released in 1982. processor. Clock speed is usually Answer & Explanation Answer: A)
These are actually made to replace measured in Hertz (Hz). Format Cells dialog box Alignment
floppy disks that were used to store But now-a-days, a pure processor's Tab
files and programs from the performance is measured in MIPS
computer. (Millions of Instructions Per Second). Explanation:
The format was originally developed As here in the question, how a Fifth generation computer is also
to store and play only sound processor's speed is measured is known as
recordings but was later adapted for asked and it is Hertz.
B)
storage of data (CD-ROM). Hence, Processor's speed of a
A) Very Knowledge
These CD's uses Laser technology. computer is measured in Hertz(Hz)
Large Scale information
Q: [MHz, GHz].
Integration (VLSI) processing
Is MS Word an operating system? Q:
system
Which of the following data
A) TRUE B) FALSE structure is linear type? C) Both A & D) None of
B) Binary B the above
Answer & Explanation Answer: B) A) Tree Answer & Explanation Answer: B)
Tree
FALSE Knowledge information processing
C) Queue D) Graph system
Explanation:
Answer & Explanation Answer: C)
False. MS-Word is not an Operating Explanation:
Queue
system. Q:
Microsoft Word or MS-Word is The depth of a complete binary tree
Explanation:
an Application software developed is given by
A data structure is a specialized
by the company Microsoft. It allows
format for organizing and storing
users to Type and Save documents. A) Dn = log 2 B) Dn = log
data. General data structure types
Q: (n+1) 1/2 (n+1)
include the array, the file, the
Where are saved files stored in
record, the table, the tree, and so C) Dn = log D) Dn = log 2
computer ?
on. Any data structure is designed to (n+1) (n-1)
A) Hard disk B) Cache organize data to suit a specific
Answer & Explanation Answer: A) Dn
purpose so that it can be accessed
= log 2 (n+1)
D) Any of and worked with in appropriate
C) RAM
above ways.
Explanation:
Answer & Explanation Answer: A) Linear data structure: A linear data
A complete binary tree is a binary
Hard disk structure traverses the data
tree where all the levels have
elements sequentially, in which only
maximum number of nodes except
Explanation: one data element can directly be
possibly the last level.
Most operating systems reached.
The depth of complete binary tree
store files on a hard disk. Ex: Arrays, Linked Lists, Stack,
of n nodes will be Dn=log 2 (n+1)
Q: Queue, Any type of List all are linear.
where Dn is the height or depth of
The memory unit is one part of Trees like Binary Tree, B Tree or B+
the tree and n is the number of
Tree are examples of non linear data
A) Input B) Central nodes.
structure.
Device Processing Unit Q:
Q:
When a computer prints a report this
The process of encoding refers to
C) Control D) Output output is called
Unit device B) the recall
A) getting A) Soft copy B) Hard copy
Answer & Explanation Answer: B) of information
information into
Central Processing Unit previously C) Printing D) Program
memory.
learned.
Answer & Explanation Answer: B)
Explanation: Hard copy
In a computer, memory is one part C) a clear D) the
of Central processing unit i.e, CPU. memory of an persistence of
emotionally learning over Explanation:
Q: Hard copy is the output which is
Processor's speed of a computer is significant event. time.
printed by the computer.
measured in Answer & Explanation Answer: A)
Q:
getting information into memory.
A) Hertz B) Baud CTRL + ] is used for
Explanation: B) Right
C) MIPS D) BPS Encoding refers to the getting A) Re-do
align text
Answer & Explanation Answer: A) information into memory.
Hertz Q: D) Expand or
C) Increase
Merge cells option can be applied collapse the
Explanation: in font size
from? ribbon
CPU speed is the central factor in a Answer & Explanation Answer: C)
computer's performance. And this A) Format B)
Increase in font size
CPU speed depends on the processor Cells dialog box Formatting
in the CPU chip. In a computer, clock Alignment Tab toolbar
document or somewhere else, it is
Explanation: temporarily stored in clipboard. A) Graphical
B) Graph
CTRL + ] is a computer shortcut and Q: Universal
Use Interface
is used for Increase in font size. CPU speed of a personal computer is Interface

A) 1 MIPS B) 100 KIPS C) Graphical D) Graphical


Shortcuts :
Unique Interface User Interface
Re-do ---- Ctrl + Y
C) 32 KIPS D) 32 MIPS Answer & Explanation Answer: D)
Right align text ---- Ctrl + R
Expand or collapse the ribbon ---- Answer & Explanation Answer: C) 32 Graphical User Interface
Ctrl + F1 KIPS
Q: Explanation:
Excel displays the current cell Explanation: GUI stands for Graphical User
address in the Instructions per second (IPS) is a Interface.
measure of a computer's processor A Graphical User Interface is a
A) Title Bar B) Name Box speed. CPU speed of a personal computer interface that allows users
computer is 32 KIPS (Kilo to interact with a device through
D) Formula Instructions per second). graphical elements such as pictures
C) Status Bar
bar Main storage is also called and animations, as opposed to text-
Answer & Explanation Answer: B) based commands.
Name Box B) Control Q:
A) Memory
unit The computer that process both
Explanation: analog and digital is called
C) D) Register
Q:
Accumulator unit B)
Which of the following is an example A) Hybrid
of system software? Answer & Explanation Answer: A) Mainframe
computer
Memory computer
A) Microsoft In a computer, the area where the
B) Calculator C) Digital D) Analog
word data is stored for the quick access by
the computer's processor is called computer computer
C) Operating Main storage or Primary storage or Answer & Explanation Answer: A)
D) RAM
system Memory or RAM. Hybrid computer
Answer & Explanation Answer: C) Hence, main storage is also called
Operating system Memory. Explanation:
Q: The computer that process both
Explanation: What is an error in a program called analog and digital is called Hybrid
In a brief, the system software is the computer.
interface between the hardware and A) Power fail B) Crash Q:
user applications. System software is What is 16 bit?
C) Virus D) Bug
a type of computer program that is Answer
designed to run a computer’s Answer & Explanation Answer: D) Anything larger and the computer
hardware and application programs. Bug would need to break the number
Examples : OS, System utilities, BIOS Explanation: into smaller pieces.
like mouse, keyboard, hard disc, In computer technology, a coding 16-bit is a computer hardware device
Device drivers, Assembler,... error in a computer program is called or software program capable of
Q: a bug. transferring 16 bits of data at a time.
The clipboard Q: Today, 16-bit hardware and software
Magnetic disks are the most popular has been replaced by 32-bit and 64-
B) is a medium for bit alternatives, which give the
A) is a Cache feature that computer more memory to work
memory stores user A) B) Direct
Sequential access access with; increasing overall performance.
information For example, early computer
C) Both A & D) None of processors (e.g., 8088 and 80286)
C) is used to
D) is a B the above were 16-bit processors, meaning
temporarily
feature that Answer & Explanation Answer: C) they were capable of working with
store, items that
saves file Both A & B 16-bit binary numbers (decimal
has been cut or
temporarily number up to 65,535).
copied
Explanation: Q:
Answer & Explanation Answer: C) is The basic operations performed by a
used to temporarily store, items that A magnetic disk is a storage device
that uses a magnetization process to computer are
has been cut or copied
write, rewrite and access data. It is A) Logical B) Storage
Explanation: covered with a magnetic coating and operation and relative
A clipboard is a temporary storage stores data in the form of tracks,
area for items that the user wants to spots, and sectors. Hard disks, zip C)
disks, and floppy disks are common D) All the
cut or copy from one place to Arithmetic
examples of magnetic disks. above
another. operation
For example, in a word processor Hence, Magnetic disks are the most Answer & Explanation Answer: D) All
application, the user might want to popular medium for both Direct the above
cut text from one part of a document access and Sequential access.
and paste it in another part of the Q: Explanation:
GUI stands for
The basic operations performed by a
computer are Arithmetic
operation, Logical operation
and Storage and relative.
Q:
Memory is made up of

A) Large B) Set of
number of cells wires

C) Set of D) None of
circuits the above
Answer & Explanation Answer: A)
Large number of cells

Explanation:
In computing, memory refers to the
computer hardware integrated
circuits that store information for
immediate use in a computer.
Most semiconductor memory is
organized into memory cells or
bistable flip-flops, each storing one
bit (0 or 1).

The intersection of a column and a


row

A) Cell B) Menu

C) Key D) Field
Answer & Explanation Answer: A)
Cell

Explanation:
The intersection of a column and a
row in a spread sheet is called as a
cell or a bon

Вам также может понравиться