Вы находитесь на странице: 1из 82

AN EXCLUSIVE E BOOK 

COMPUTER
EXCELLENCE 
For The Promotion Of Senior Managers
/Chief Managers

To The Higher lads ..

Please Contact Me On -
rahulrituraj.centraltrainer@gmail.com

Team CT - Central Trainer Wishes All The


Best In Their 

Future Endeavour !!!!


JOIN CT - CENTRAL TRAINER
https://www.facebook.com/groups/centraltrainer.operations/

Preface

### TRAIN YOUR BRAIN ###


Central Trainer - An Interactive & Interesting Initiative Incepted

To Induce You About All Across Bank & Banking Industry !!!!!!!!

Unfortunately We Don’t Have Space Like SBI , PNB And Other Banks

Which Nurture Its Own Employees By Empowering Them By Serving Readily


Available All Sort Circulars / Policies On App Or Website.

Central Trainer - A Dream Venture Of Mr Rahul Rituraj Who Wish To Keep


His/ Her Colleague Updated On All Fronts Of Bank Or Banking Industry For
Substantial Development Of Our Beloved Bank And Keeping Ourselves
Parallel With SBI / PNB Etc In Terms Knowledge Because Knowledge Is Power
This Platform Will Provide You Following Services :
Synopsised Notes Of Our Official Products / Services / Schemes / Policies Work
Guides
On Subscribed Cent Mail IDs
Monthly Magazine - Latest Updates Of Banking Industry
Exclusive E Books On Various Verticals Of Banking
Dedicated Discussion Forum For Operations On Facebook  - Instahelp On
Bancs Link Based Query On General Banking /Credit/Recovery
Informative Banking Bits

LIKE CT - CENTRAL TRAINER


https://www.facebook.com/groups/centraltrainer.operations/
JOIN CT - CENTRAL TRAINER
https://www.facebook.com/groups/centraltrainer.operations/

RAHUL RITURAJ
AN ENTHUSIASTIC BANKER

CENTRAL BANK OF INDIA

For Any Queries / Feedbacks JOIN CT -


Please Contact Me On - CENTRAL
rahulrituraj.centraltrainer@gmail.com TRAINER 
https://www.facebook.c
  Team CT - Central Trainer
om/groups/centraltraine
An Exclusive E Book Wishes All The Best In r.operations/
For The Promotion Of Their
Senior Managers/ Future Endeavour
Chief Managers
To The Higher lads ...

LIKE CT - CENTRAL
TRAINER
INTERIO
https://www.facebook.com/ctrahulrituraj/
LIKE CT - CENTRAL TRAINER
W https://www.facebook.com/ctrahulrituraj/
CONTENTS
INTRODUCTION

1 Basic of Computer

2 Generations of Computer

Practising Questions
3

4 1000 One liners

5  Computer Awareness

LIKE CT - CENTRAL  TRAINER


https://www.facebook.com/ctrahulrituraj/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

Computer Excellence

INTRODUCTION
A Computer is a general purpose device that can be programmed to
carry out a set of arithmetic or logical operations automatically.
Since a sequence of operations can be readily changed, the computer
can solve more than one kind of problem.
BASIC OF COMPUTER :
The data that is fed into a computer processor received into the
computer by a keyboard or other sources is called Input.
A computer is an electronic device that accepts data from the user
Follow us on facebook:

(input),processes the data by performing calculations and operations


on it and generates the desired Output.
The device which is used with a computer to display or store data is
called Peripherals.
The mechanical, magnetic, electronic and electrical components that
comprises a computer system such as the Central Processing Unit
(CPU), monitor, keyboard, etc. is known as Hardware.
A set of instructions that tells the computer about the tasks to be
performed and how these tasks are to performed, is known as
Software.
An unprocessed collection or representation of raw facts represented
in a manner suitable for communication, interpretation or processing
by humans or by automatic means, is known as Data.
The result of processing, manipulating and organising data in a way
that adds to the knowledge of the person receiving it, is known as
Information.
The smallest unit of information, a computer can understand and
process, is known as Bit. (Called as Binary Number System).
A mainframe computer is a much larger computer that typically fills a
room and may cost many hundreds or thousands of times as much as
a personal computer.
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

COMPUTER ORGANISATION
(HARDWARE DESCRIPTION)
INPUT DEVICES – ACCESS THE DATA
CENTRAL PROCESSING UNIT (CPU) –
PROCESS THE DATA
OUTPUT DEVICES- PRODUCES THE
RESULT
STORAGE DEVICES (RAM) – STORES
THE RESULT

GENERATIONS OF
COMPUTER
First Generation (1940-1956)
FEATURES:
The main features of First Generation are:
� Vacuum tube technology
� Unreliable
� Supported Machine language only
� Very costly
� Slow Input/Output device
� Huge size
� Need of A.C.
� Non-portable
� Consumed lot of electricity
Second Generation (1956-1963)
The main features of Second Generation are:
� Use of transistors
� Reliable as compared to First generation computers
LIKE CT - CENTRAL � Smaller size as compared to First generation
TRAINER computer
� Consumed less electricity as compared to First
generation computers

HTTPS://WWW.FACEBOOK
� Faster than first generation computers
.COM/CTRAHULRITURAJ/ � Still very costly
� A.C. needed
� Support machine and assembly languages
The maximum and minimum
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRAL unsigned number which can be
TRAINER.OPERATIONS stored in a 8 bit word
ROM KEEPS PERMANENT MEMORY is 0 and 255

Third Generation (1964-1971)


The main features of Third Generation are: Fourth Generation (1971-
� IC used -
Present)
� More reliable
The main features of Fourth
� Smaller size
Generation are:
� VLSI technology used
� Generate less heat
� Very cheap
� Faster
� Portable and reliable
� Lesser maintenance
� Use of PC's
� Still costly
� Very small size
� A.C. needed
� Pipeline processing
� Consumed lesser electricity
� No A.C. needed
� Support high-level language -FORTRAN-II TO IV,
� Concept of internet was
COBOL, PASCAL PL/1, BASIC,
ALGOL-68, etc. introduced
� Great developments in the
fields of networks
� Computers became easily
available
Fifth Generation (Present and
Beyond)
The main features of FIFTH
Generation are:
� VLSI technology becomes
ULSI (ultra large scale
integration)
� Parallel processing hardware
were introduced
� Airtificial intelligence was
introduced
� High level languages like c
and c++,java,.net was introduced
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPE
RATIONS

COMPUTER
EXCELLENCE

MICROSOFT
MICROSOFT OFFICE POWER
POINT
Microsoft Office is an office suite of desktop applications,
Microsoft PowerPoint
servers and services for the Microsoft Windows and OS X is a slide show
operating systems. presentation program
It was first announced by Bill Gates of Microsoft on August developed by
Microsoft. PowerPoint
1, 1988 at COMDEX in Las Vegas. presentations consist
MS office primarily includes Word, Excel, PowerPoint, of a number of
individual pages or
Access and Outlook. "slides".
It also includes OneNote, Groove, InfoPath and Publisher. Microsoft PowerPoint's
native file formats are
denoted either by a
.ppt or .pptx file
extension.
PowerPoint provides
three types of
movements:
Entrance, emphasis,
and exit of elements
on a slide itself are
controlled by what
PowerPoint calls
Custom Animations.
Transitions, on the
other hand, are
movements between
slides. These can be
animated in a variety
of ways.
Custom animation can
MS WORD MS EXCEL be used to create
small story boards by
animating pictures to
Microsoft Word is a word Microsoft Excel is a enter, exit or move.
processor developed by spreadsheet application
Microsoft. developed by Microsoft.
It is used for creating, It features calculation,
editing, formatting, storing, graphing tools, pivot tables,
retrieving and printing of a and a macro program.
text document. The intersection of a row and
Microsoft Word's native file column is called a Cell.
formats are denoted either The cell in which we are
by a .doc or .docx file currently working is known
extension. as Active Cell.
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS

One liner mcq


1. Internet's Initial development was supported by :ARPANET
2. World Wide Web was proposed by:Tim Berners Lee
3. What are the uses of the Internet:
Communication
Information Retrieval
Presentation of Information
4. .net domain is used for:Internet Infrastructure and Service Providers
5. URL stands for:Uniform Resource Locator
6. A(n) ______ appearing on a web page opens another document when
clicked: hyperlink
7. Which of the following refers to the rectangular area for displaying information
and running programs? Window
8. ________ is a windows utility program that locates and eliminates unncessary
fragments and rearranges filed and unused disk space to optimize operations?
Disk defragmenter
9. Which of the following refers to too much electricity and may cause a voltage
surge? Spike
10. The software that is used to create text-based documents are referred to as
______? Word processors
11. _________ devices convert human understandable data and programs into a
form that the computer can process? Input
12. Allows users to upload files to an online site so they can be viewed and edited
from another location? Microsoft Outlook
13. What feature adjusts the top and bottom margins so that the text is centered
vertically on the printed page? Vertical justifying
14. Which of these is not a means of personal communication on the internet?
Instanotes
15. What is the overall term for creating editing, formatting, storing, retrieving and
printing a text document? Word processing

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS

One liner mcq


16. Fourth generation mobile technology provides enhanced capabilities allowing
the transfer of both_____ data, including full-motion video, high-speed internet
access, and video conferencing.? voice and non-voice
17. _______ is a form of denial of service attack in which a hostile client
repeatedly sends SYN packets to every port on the server using fake IP
addresses? Cybergamingcrime
18. Which of these is a point and draw device? Mouse
19. A set of rules for telling the computer what operations to perform is called a
programming language
20. A detailed written description of the programming cycle and the program,
along with the test results and a printout of the program is called documentation
21. Forms that are used to organize business data into rows and columns are
called spread sheets
22. In power point, the header and footer button can be found on the insert tab in
what group? Text group
23. A(n) ______ is a set of programs designed to manage the resources of a
computer, including starting the computer, managing programs, managing
memory and coordinating tasks between input and output devices.?
operating system
24. A typical slide in a slide presentation would not include? clip art and audio
clips
25. The PC productivity tool that manipulates data organised in rows and columns
is called a spreadsheet
26. In the absence of parentheses, the order of operation is? exponentiation,
multiplication or division, addition of subtraction
27. To find the Paste Special option, you use the clipboard group on the _______
tab of power point ? Home
28. A(n) _____ program is one that is ready to run and does not need to be
altered in any way.? Executable
29. Usually downloaded into folders that hold temporary internet files, _____ are
written to your computer's hard disk by some of the websites you visit.? cookies

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS

One liner mcq


30. What is the easiest way to change the phrase, revenues, profits, gross margin,
to read revenues, profits, and gross margin? Use the insert mode, position the
cursor before the g in the gross, then type the word and followed by a space
31. A program either talk or music, that is made available in digital format for
automatic download over the internet is called a ? Blog
32. Which power point view displays each slide of the presentation as a thumbnail
and is useful for rearranging slides? Slide sorter
33. Different components on the motherboard of a PC unit are linked together by
sets of parallel electrical conducting lines. What are these lines called? Buses
34. What is the name given to those applications that combine text, sound,
graphics, motion video, and/or animation? Multimedia
35. A USB communication device that supports data encryption for secure
wireless communication for notebook users is called a USB wireless network
adapter
36. A(n) ____ language reflects the way people think mathematically? functional
37. When entering text within a document, the Enter key is normally pressed at
the end of every? Sentence
38. When a real time telephone call between people is made over the Internet
using computers, it is called internet telephony
39. Which of the following is the first step in sizing a window? Point to the title bar
40. Which of the following software could assist someone who cannot use their
hands for computer input? Speech recognition
41. ______ a document means the file is transferred from another computer to
your computer? Really Simple Syndication
42. Which computer memory is used for storing programs and data currently being
processed by the CPU? Internal memory
43. Computers that control processes accept data in a continuous? infinite loop
44. What refers to a set of characters of a particular design? Calligraph
45. ______ is used by public and private enterprises to publish and share financial
information with each other and industry analysis across all computer platforms
and the Internet ? Extensible Business Reporting Language

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

Practising MCQ
1. In a network, the computer that stores the files and
process the data is named as
a) Server
b) Terminal
c) Modem
d) All of the above
2. Viruses are called that because
a) They are viruses
b) They can copy themselves and spread
c) Both (a) and (b)
d) None of the above
3. Which of the can't spread virus
a) An e-mail with attachment
b) A plain text mail
c) Downloading files over the web
d) None of the above
4. There is a new anti-virus software update available, when
it is downloaded to your computer
a) Everyday
b) Only in the night
c) When you next switch on your computer
d) All of the above
5. Numbers are stored and transmitted inside a computer in
a) Binary form
b) ASCII code form
c) Alphabets form
d) Numerical form
6. CPU capacity can be measured in
a) BPS
b) MIPS
c) MHz
d) MPI
7. MPIS stands for
a) Million Instructions Per Second
b) Million Instructions Per Season
c) Monthly Instructions Per Second
d) Million Inputs Per Second
8. LAN speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
9. Modem speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
10. BPS stands for
a) Bits Per Second
b) Bits Per Season
c) Bytes Per Second
d) Bits Per System

1. a 2. b 3. b 4. c 5. b 6. b 7. a 8. c 9. a 10. a

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

11. In processing cheques which of the following I/O


techniques have banks traditionally followed?
a) OCR
b) MICR
c) Barcode
d) VRT
12. What is object of UPS?
a) Using for storage
b) To increase the speed of a computer
c) Provides backup power
d) All of the above
13. QWERTY is used with reference to
a) Monitor
b) Printer
c) Keyboard
d) Mouse
14. "Zipping" a file means
a) Encrypting the message
b) Compressing the message
c) Transfer the message
d) All of the above
15. Integrated Circuits (IC) chips used in computers are
made with
a) Gold
b) Silver
c) Silicon
d) Coper
16. What is the Super Computer developed in India
a) CRAY
b) PARAM
c) Both (a) and (b)
d) None of the above
17. Which of the following is different from other
a) Internet
b) Windows
c) Unix
d) Linux
18. What is the full form of WWW?
a) World Wide Web
b) World With Web
c) Work Wide Web
d) World Wide Wet
19. Which of the following Command is required to reboot
the computer
a) CTRL+ALT+DEL
b) CTRL+ALT+TAB
c) CTRL+ALT+SHIFT
d) CTRL+SHIFT+DEL
20. Select the ODD one
a) Operating system
b) Interpreter
c) Compiler
d) Assembler

11. b 12. c 13. c 14. b 15. c 16. b 17. a 18. a 19. a  20. a

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
21. PC stands for
a) Practical Computer
b) Personal Computer
c) Private Computer
d) Personal Contact
Upal Ranga
22. The computer code for interchange of information
between terminals is
a) BCDIC
b) BCD
c) ASCII
d) None of the above
23. The retrieval of information from the computer is defined
as
a) Data processing
b) Input
c) Output
d) All of the above
24. Which one of the following is NOT a computer language?
a) MS-Excel
b) BASIC
c) COBOL
d) C++
25. "C" is
a) A letter
b) A word
c) A language
d) An alphabet
26. Difference Engine invented by
a) Charles Babbage
b) John McCarthy
c) Pascal
d) Newton
27. First generation computer systems used
a) Transistors
b) Vacuum Tubes
c) Both (a) and (b)
d) None of the above
28. A byte is made up of
a) Eight bytes
b) Eight binary digits
c) Two binary digits
d) Two decimal points
29. Doing research by using an on-line database instead of a
printed set of similar information offers which of the following
advantage
a) More current information
b) Easier to understand
c) Better charts
d) None of the above
30. Software programs that allow you to legally copy files
and give them away at no cost are called which of the
following
a) Time sharing
b) Public domain
c) Shareware
d) None of the above

21. b 22. c 23. c 24. a 25. c 26. a 27. b 28. b  29. a 30. b
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

31. The term that we use to describe physical components of


the system
a) Hardware b) Input
c) Software
d) None of the above
32. Which of the following is used to indicate the location on
the computer monitor
a) Mouse
b) Cursor
c) Both (a) and (b)
d) None of the above
33. Mr. Saketh needs to design invitation card. What type of
computer program is suitable?
a) MS-Word
b) Desktop Publishing
c) Simulation
d) None of the above
34. Which combination of keys needs to be pressed to make
a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5
35. What process should be used to recall a document saved
previously?
a) Copy
b) Save
c) Retrieve
d) Enter
36. What term applies to a collection of related records in a
database?
a) Field
b) File
c) Both (a) and (b)
d) None of the above
37. How are data organized in a spreadsheet?
a) Rows and Columns
b) Boxes
c) Tables
d) None of the above
38. Which of the following mode we use to deliver e-mail
a) Postal
b) Courier
c) Computer
d) Fax
39. VIRUS stands for
a) Vital Information Recourse Under Siege
b) Vital Information Reason Under Siege
c) Vital Information Recourse Under System
d) Virus Information Recourse Under Siege
40. ------ Is known as unauthorized access into others system
a) Hacking
b) Encryption
c) Decryption
d) None of the above

31. a 32. b 33. b 34. d 35. c 36. b 37.a  38. c 39. a 40. a

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

HARDWARE
1. Where would you find the letters QUERTY?
(1) Mouse (2) Screen
(3) Numeric Keypad (4) Keyboard
(5) None of these
2. How did the computer mouse get its name?
(1) It's cable looks like a tail
(2) Because it squeaks when moved
(3) It has ears
(4) Teeth outside mouth
(5) None of these
3. What are you most likely to use when playing
(1) Touch screen a computer game?
(2) Light pen (3) notepad
(4) Joystick (5) None of these
4. A digitising tablet can be used for?
(1) Tracing diagrams
(2) Printing letters
(3) Reading barcodes
(4) Playing
(5) None of these
5. Which of the following is a pointing device
(1) Hard disk .
(2) CD-ROM drive
(3) Touch screen used for computer input.
(4) RAM
(5) None of these
6. What does a light pen contain?
(1) Refillableink (2) Light sensitive elements
(3) Pencil lead (4) Blue Ink
(5) None of these
7. What would be the best way to move around a 3D
environment?
(1) Use a tracker ball (2) Use a keyboard.
(3) Use a space mouse (4) Use Joystick
(5) None of these
8. What input device can be used for marking
(1) Optical mark reader
(2) Bar code reader
(3) Mouse a multiple choice test?
(4) All of the above
(5) None of these
9. What input device could tell you the price of
(1) Mouse a bar of chocolate?
(2) All of the above
(3) Optical mark reader
(4) Bar code reader
(5) None of these
10. Where would you find a magnetic strip?
(1) Speakers (2) Credit card
(3) Smart card (4) All of the above
(5) None of these

1.(4)  2.(1) 3 -(4) 4.(1) 5-(3) 6-(2) 7-(3) 8.(1) 9-(4) 10.(2)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

11. Hard copy is a term used to describe...?


(1) Printed output
(2) Writing on a hard board
(3) Storing information on the hard disk
(4) All of the above
(5) None of these
12. What do the abbreviations VAB stand for?
(1) Voice activated broadcasting
(2) Visual audio board
(3) Voice answer back
(4) All of the above
(5) None of these
13. What are the individual dots which make up a picture on
the monitor screen called?
(1) Coloured spots
(2) All of the above
(3) Pixies
(4) Pixels
(5) None of these
14. A daisy wheel is a type of...?
(1) None of these
(2) Storage device
(3) Pointing device
(4) All of the above
(5) Printer
15. Factory production lines can be automated using...?
(1) Machine tools
(2) VDUs
(3) Plotters
(4) All of the above
(5) None of these
16. An impact printer creates characters by using...?
(1) An inked ribbon and print head
(2) Electrically charged ink
(3) An ink pen
(4) All of the above
(5) None of these
17. What would you NOT use with a flatbed plotter?
(1) A pen (2) Eraser
(3) Paper (4) All of the above
(5) None of these
18. What would be the best way to move around a 3D
environment?
(1) Electrostatic plotters (2) None of these
(3) Thermal printers (4) All of the above
(5) Robots
19. What do you need for an ink jet printer?
(1) A drum (2) A cartridge
(3) A ribbon (4) All of the above
(5) None of these
20. A laser printer does NOT use?
(1) A photoconductive drum
(2) A print head
(3) A laser beam
(4) All of the above
(5) None of these

11. (1) 12.(3) 13.(4) 14.(5) 15.(2) 16.(1) 17-(3) 18.(5) 19.(2) 20.(1)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

21. The amount of data that a disk may contain known as the disk's...?
(1) Volume (2) Size
(3) All of the above
(4) Storage capacity (5) None of these
22. You can protect a floppy disk.
(1) Read (2) Read and Write
(3) Write (4) All of the above
(5) None of these
23. Information on a hard disk is usually backed-up using a..?
(1) CD-ROM (2) Magnetic tape
(3) Floppy disk (4) All of the above
(5) None of these
24. Magnetic storage devices can represent binary 0 by the absence of...?
(1) A magnetic field
(2) Magnetic tape
(3) Static electricity
(4) All of the above
(5) None of these
25. Magnetic tape is a..?
(1) Random access medium
(2) A parallel access medium
(3) Serial access medium
(4) All of the above
(5) None of these
26. Hard disks can have a storage capacity in the region of...?
(1) 1Gb (2) 1.44Mb (3) 720K
(4) All of the above (5) None of these
27. Formatting a disk results in all the data being...?
(1) Saved to the disk
(2) Copied from the disk
(3) Deleted from the disk
(4) All of the above
(5) None of these
Upal Ranga
28. Which storage device has the largest capacity in Mb's?
(1) A floppy disk
(2) A CD-ROM
(3) Magnetic tape storage
(4) All of the above
(5) None of these
29. Which storage device cannot be erased?
(1) A CD-ROM
(2) None of these
(3) Magnetic tape storage
(4) All of the above-
(5) A floppy disk
30. Where should floppy disks be stored?
(1) By a sunny window
(2) In a drawer
(3) All of the above
(4) By magnet objects
(5) None of these

21. (4) 22.(3) 23.(1) 24.(2) 25.(3) 26.(1) 27.(3) 28.(2) 29.(5) 30-(2)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

31. Who is accredited with developing the architecture of the modern computer?
(1) Sir Clive Sinclair
(2) Bill Gates
(3) All of the above
(4) None of these
(5) John Von Neumann
32. Which bus carries information between processors and peripherals?
(1) Autobus (2) Data bus
(3) Address bus (4) All of the above
(5) None of these
33. Which bus controls the sequencing of read/write operations?
(1) Control bus (2) Address bus
(3) Data bus (4) All of the above
(5) None of these
34. The contents of these chips are lost when the computer is switched off?
(1) RAM chips
(2) ROM chips
(3) DRAM chips
(4) All of the above
(5) None of these
35. What are responsible for storing permanent data and instructions?
(1) RAM chips
(2) All of the above
(3) DRAM chips
(4) ROM chips
(5) None of these
36. Which parts of the computer perform arithmetic calculations?
(1) Registers (2) ALU
(3) Logic bus
(4) All of the above
(5) None of these
37. What are small high speed memory units used for storing temporary results?
(1) All of the above
(2) Registers
(3) Control unit
(4) CPUs
(5) None of these
38. What maintains the status of the last operation carried out by the ALU?
(1) Instruction pointer .
(2) Status register
(3) Accumulator
(4) All of the above
(5) None of these
39. How many bits of information can each memory cell in a computer chip
hold?
(1) 8 bits (2) 1 bit
(3) Obits (4) All of the above
(5) None of these
40. What type of computer chips are said to be volatile?
(1) ROM chips (2) RAM chips
(3) DRAM (4) All of the above
(5) None of these

31 .(5) 32.(2) 33.(1) 34.(1) 35-(4) 36.(2) . 37.(4) 38.(3) 39.(1) 40.(2)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

31. Who is accredited with developing the architecture of the modern computer?
(1) Sir Clive Sinclair
(2) Bill Gates
(3) All of the above
(4) None of these
(5) John Von Neumann
32. Which bus carries information between processors and peripherals?
(1) Autobus (2) Data bus
(3) Address bus (4) All of the above
(5) None of these
33. Which bus controls the sequencing of read/write operations?
(1) Control bus (2) Address bus
(3) Data bus (4) All of the above
(5) None of these
34. The contents of these chips are lost when the computer is switched off?
(1) RAM chips
(2) ROM chips
(3) DRAM chips
(4) All of the above
(5) None of these
35. What are responsible for storing permanent data and instructions?
(1) RAM chips
(2) ROM chips
(3) DRAM chips
(4) All of the above
(5) None of these
36. Which parts of the computer perform arithmetic calculations?
(1) Registers (2) ALU
(3) Logic bus
(4) All of the above
(5) None of these
37. What are small high speed memory units used for storing temporary results?
(1)  CPU
(2) Registers
(3) Control unit
(4) All of the above
(5) None of these
38. What maintains the status of the last operation carried out by the ALU?
(1) Instruction pointer .
(2) Status register
(3) Accumulator
(4) All of the above
(5) None of these
39. How many bits of information can each memory cell in a computer chip
hold?
(1) 8 bits (2) 1 bit
(3) Obits (4) All of the above
(5) None of these
40. What type of computer chips are said to be volatile?
(1) ROM chips (2) RAM chips
(3) DRAM (4) All of the above
(5) None of these

31 .(5) 32.(2) 33.(1) 34.(1) 35-(4) 36.(2) . 37.(4) 38.(3) 39.(1) 40.(2)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

41. An example of an embedded system is ...?


(1) A CD-ROM (2) A machine tool
(3) A calculator (4) All of the above
(5) None of these
42. Which computers use single chip processors?
(1) All of the above
(2) Parallel computers
(3) Cray computers
(4) Personal computers
(5) /tone of these
43. Travel agents use this computer system when reserving flights.
(1) Supercomputer
(2) Mainframe computer
(3) Personal computer
(4) All of the above
(5) None of these
44. Which computers are used in the weather forecasting industry?
(1) Super computers
(2) Notebook computers
(3) Jon Von Neumann computer
(4) All of the above
(5) None of these
45. Which computers are connected to many terminals and can multitask?
(1) Minicomputers
(2) LEO 1 computers
(3) All of the above
(4) None of these
(5) Personal computers running MS-DOS
46. Vacuum tube based electronic computers are...?
(1) Second generation
(2) Hoover generation
(3) First generation
(4) All of the above
(5) None of these
47. Which generation of computer was developed from microchips?
(1) Third generation
(2) Second generation
(3) Fourth generation
(4) All of the above
(5) None of these
48. Which generation of computer uses more than one microprocessor?
(1) Second generation
(2) Third generation
(3) None of these
(4) All of the above
(5) Fifth generation
49. Which generation of computer developed using integrated circuits?
(1) Second generation
(2) Fifth generation
(3) Thirtl generation
(4) All of the above
(5) None of these
50. Which of these is actually a very basic computer?
(1) a toaster (2) a stove
(3) a light bulb (4) a calculator
(5) None of these

41. (3) 42.(4) 43.(3) 44.(1) 45.(5) 46.(3) 47.(1) 48.(5) 49.(3) 50.(4)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

51. Imagine that a user has a WORD document open at a workstation and that
workstation is unexpectedly disconnected from the school network and from
the Internet. Where should the user BEST save her work?
(1) USB key (2) P drive
(3) None of these
(4) S drive (5) H drive
52. Computer memory that temporarily stores information is called the ____.
(1) RAM (2) CPU
(3) ROM (4) IBM
(5) None of these
53. The brain of the computer is called the _____.
(1) IBM (2) ROM
(3) RAM (4) CPU
(5) None of these
54. The operating system is also called the ______ between the user and the
computer.
(1) interrelate
(2) interface
(3) interference
(4) intermediate
(5) None of these
55. When installing a peripheral you also usually need to install a _____ .
(1) port (2) server
(3) driver (4) password
(5) None of these
56. Computers use which of the following number systems to store information?
(1) base 4 (2) base 2
(3) base8 (4) base 10
(5) None of these
57. A single binary digit is known as
(1) MB (2) byte
(3) KB (4) bit
(5) None of these
58. Internet Safety relates to__________.
(1) only those who buy products online
(2) only those who sign up for chat rooms
(3) only those who do their banking online
(4) everyone who uses a computer that can conned to the Internet
(5) None of these
59. A file name extension for Word 2007 files is ___.
(1) .gif (2) .txt
(3) .docx (4) .exe
(5) None of these
60. A KB represents____bytes
(1) 8
(2) 1,000,000,000
(3) 1,000,000
(4) 1,000 (5) None of these

51.(5) 52.{1) 53.(4) 54,(2) 55.(3) 56.(2) 57.(4) 58. (2) 59.(3) 60.(4)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

61. How many Bytes in a Megabyte (MB)?


(1) 1,000,000
(2) 1,024,000
(3) 1,048,576
(4) 1,000,024
(5) None of these
62. Which QBasic statement is W'-'rnost evil?
(1) PRINT
(2) LOCATE
(3) GOTO
(4) RANDOMIZE
(5) None of these
63. What does ALU stand for?
(1) Arithmetic Logic Unit
(2) Asymmetrical Localizing Unit
(3) Because his legs are in the way
(4) Awfully Long-winded Unionist
(5) None of these
64. How many pins on a standard DDR RAM Dimm?
(1) 64 (2) 256
(3) 168 (4) 184 '
(5) None of these
65. Which Platform(s) can a Pentium III Processor beused in?
(1) Socket 370 / Socket mPGA 370 / Slot 1
(2) Socket 462 / Slot A /Socket 8
(3) Socket 5 / Socket 7 /Socket 3
(4) Slotl/Slot A/Socket A
(5) None of these
67. If a computer is constantly rebooting itself, what is most
commonly the problem?
(1) Insufficient Power-Supply Unit
(2) Bad Sectors on Hard Drive
(3) Processor Overheating
(4) Defective/Bad Memory
(5) None of these
68. What does the company name 'AMD' stand for?
(1) Always Making Dough
(2) Advanced Micro Devices
(3) Alternating Micron Deficiencies
(4) A Mad Device
(5) None of these
69. How many pins does Ethernet use in the RJ-45
Connection?
(1) 3 (2) 2
(3) 6 (4) 4
(5) None of these
70. What does SSE stand for in Intel's SSE Technology?
(1) Sophisticated Software Enhancer
(2) Streaming Simmd Extensions
(3) Some Stupid Enhancer
(4) Simplistic Software Extensions
(5) None of these

61. (2) 62. (3) 63.(1) 64.(4) 65.(1) 66.(5) 67.(1) 68.(2) 69.(4) 70.(2)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

71. If an 8-bit integer has a maximum of 256 possible values, what is the highest
possible value of a 16 bit integer?
(1) 512 (2) 257
(3) 65536 (4) 65535
(5) None of these
72. What does BASIC stand for?
(1) Basically, it's just your basic computer language, so
they named it BASIC.
(2) Beginner's All-purpose Symbolic Instruction Code
(3) Binary Analysis System Interpretation Commandset
(4) Byte Arranging Software for Improved Coding
(5) None of these
73. What does ASCII stand for? '
(1) Array of Simple Character Iteration Indices
(2) Another Stupid Character Identification Idea
(3) Alternate Source Code Image Improvement
(4) None of these
(5) American Standard Code for Information Interchange
74. The access method used for magnetic tape is_____
(1) Direct
(2) Random
(3) All of the above
(4)Sequential
(5) None of these
75. By .Processing we understand ____
(1) String manipulation only
(2) None of the above
(3) Processing string of only words
(4) Processing string of numbers and special symbols
(5) None of these
76. The difference between memory and storage is that the memory is ___ and
storage is ____
(1) Slow, fast
(2) Temporary, permanent
(3) Permanent, temporary
(4) All of the above
(5) None of these
77. Which of the Following holds the ROM, CPU, RAM and expansion cards "
(1) Hard disk (2) Floppy disk
(3) All of the above
(4) Mother board
(5) None of these
(78) The language that the computer can understand and execute is called ____
(1) System program (2) Application software
(3) Machine language (4) All of the above
(5) None of these
79. Which of the following devices can be used to directly input printed text
(1) MICR (2) OMR
(3) OCR
(4) All of the above
(5) None of these
80. A floppy disk contains
(1) Circular tracks only
(2) Both circular tracks and sectors
(3) Sectors only
(4) All of the above
(5) None of these

71 .(4) 72.(2) 73.(5) 74.(4) 75,(3) 76.(2) 77.(4) 78.(3) 79.(1) 80.(2)
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

81. The errors that can be pointed out by the compiler are
(1) All of the above
(2) Semantic errors
(3) Logical errors
(4) Syntax errors
(5) None of these
82. C is
(1) An assembly language
(2) A machine language
(3) A third generation high level language
(4) All of the above
(5) None of these
83. Third generation computers
(1) Were the first to use built-in error detecting device
(2) Used transistors instead of vaccum tubes
(3) Were the first to use neural network
(4) Integrated circuits
(5) All of the above
84. Which of the following does not represent on I/O device
(1) speaker which beeps
(2) ALU
(3) plotter
(4) joystick
(5) None of these
85. The communication line between the CPU, memory and peripherals is called 
(1) all of these (2) line
(3) media (4) Bus
(5) None of these
86. Memories which can be read only are called..............memories
(1) ROM (2) RAM
(3) PROM (4) EPROM
(5) None of these
87. Example of non-numerical data is
(1) All of the above
(2) Examination score
(3) Bank balance
(4) Employee address
(5) None of these
88. One thousand byte is equal to
(1) Megabyte
(2) Gigabyte
(3) None of these
(4) All of the above
(5) Kilobyte89. The language that the computer . can understand and execute is
called
(1) Application software
(2) Machine language
(3) System program
(4) All of the above
(5) None of these
90. A step by step procedure used to solve a problem is called
(1) Operating system
(2) None of these
(3) Application Program
(4) All of the above
(5) Algorithm

81- (4) 82.(3) 83.(4) 84,{2) 85.(4) 86.(1) 87.(4) 88.(5) 89.(2) 90.(5)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

91. CD-ROM is a
(1) Semiconductor memory
(2) None of these
(3) Magnetic memory
(4) All of the above
(5) Memory register
92. Actual execution of instructions in a computer takes place in ,
(1) Control Unit
(2) ALU
(3) Storage unit
(4) All of the above
(5) None of these
93. Which of the following is used as a primary storage device
(1) Magnetic tape (2) PROM
(3) Floppy disk
(4) None of these
(5) All of the above
94. Information retrieval is faster from
(1) Floppy disk (2) Hard disk
(3) Magnetic tape
(4) All of the above
(5) None of these
95. Operating system is
(1) A collection of software routines
(2) A collection of input-output devices
(3) A collection of hardware components
(4) All of the above
(5) None of these
96. Operating system
(1) Provides a layered, user-friendly interface .
(2) Link a program with the subroutines it references
(3) Enables a programmer to draw a flowchart
(4) All of the above
(5) None of these
97. Execution of two or more programs by a single CPU is known as:
(1) Multiprocessing
(2) Time sharing
(3) Multiprogramming
(4) None of these
(5) All of these
98. Modem stands for
(1) A type of secondary memory
(2) Mainframe operating device memory
(3) Modulator demodulator
(4) All of the above
(5) None of these
99. Typical data transfer rate in LAN are of the order of
(1) Kilo bits per sec
(2) Bits per sec
(3) Mega bits per sec
(4) All of the above
(5) None of these
100. Ethernet uses
(1) Ring topology
(2) Bus topology
(3) Mesh topology
(4) All of the above
(5) None of these

91 .(5) 92.(1) 93.(4) 94.(2) 95.(1) 96.(2) 97.(4) 98.(3) 99.(1) 100.(2)
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
Computer Networks
1. _____terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems.
(1) Point-of-sale (POS)
(2) Data (3) Sales
(4) Query
(5) None of these
2. Smaller and less expensive PC-based servers are replacing ____ in many
businesses.
(1) supercomputers
(2) mainframes
(3) laptops (4) clients
(5) None of these
3. DSL is an example of a(n) _____ connection.
(1) network (2) wireless
(3) slow(4) None of these
(5) broadband
4. A term used to describe interconnected computer configuration is
(1) Micro program sequence
(2) Modulation
(3) Multiprocessing
(4) Multiprogramming
(5) None of these
5. What is required when more than one person uses a central computer at the
same time?
(1) Light pen (2) Mouse
(3) Terminal (4) Digitizer
(5) None of these
6. Multi user systems provided cost savings for small
business because they use a single processing unit to link several
(1) Personal computers
(2) Dumb terminals
(3) Workstations
(4) Mainframes
(5) None of these
7. A dumb terminal has
(1) An embedded micro-proces-
(2) Extensive memory
(3) A keyboard and screen
(4) Independeh I processing
(5) None of these
8. What is the full form of USB as used in computer related activities ?
(1) Universal Serial Bus
(2) Ultra Serial Block
(3) United Service Block
(4) Universal Security Block
(5) None of these
9. A device that connects to a network without the use of cables is said to be—
(1) distributed (2) open source
(3) centralized
(4) wireless
(5) None of these
10. A ___ is a collection of computers and device connected together.
(1) network (2) memory card
(3) protocol
(4) central processing unit
(5) None of these

1.(1) 2.(2) 3.{5) 4.(4) 5.(3) 6.(2) 7-{3) 8-(1) 9-(4) 10-(1)

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
MS-Word
1. What is the extension of Word files?
(1) RL
(2) DOT
(3) DOC
(3) TXT
(5) None of these
2. Which of the following option Is not available in Insert» Picture?
(1) Chart (2) Word Art
(3) Clip Art (4) Graph
(5) None of these
3. To insert a drop cap in one of the paragraph you should access
(1) Insert Menu
(2) Format
(3) Tools
(4) All of above
(5) None of these
4. How many different positions can you set for drop cap?
(1) 1 (2) 2
(3) 4 (4) 6
(5) None of these
5. What is the maximum number of lines you can set for lines to drop box?
(1) 3 (2) 5
(3) 10 (4) 15
(5) None of these
6. Which of the following can NOT be used to create
parallel style column?
(1) Format Tabs
(2) Table Insert Table
(3) Insert Textbox
(4) Format Columns
(5) None of these
7. Which of the following is used to create newspaper style columns?
(1) Format Tabs
(2) Table Insert Table
(3) Insert Textbox
(4) Format Columns
(5) None of these
8. Columns dialog box can be opened from
(1) Format menu Columns submenu
(2) Double click on column space in ruler
(3) Press Alt+ O + C
(4) All of above
(5) None of these
9. You can jump to the next column by
(1) Clicking with your mouse on the next column
(2) Press Alt + Down-arrow
(3) Both of above
(4) Press Alt + Right Arrow
(5) None of these
10. How can you break the current column and start a new
column immediately?
(1) Press Ctrl + Shift + Enter
(2) Press Alt + Enter
(3) Press Ctrl + Enter
(4) Press Alt + Shift + Enter
(5) None of these

1.(3) 2.(4) 3.(2) 4. (2) 5.(3) 6.(4) 7.(4) 8.(4) 9.(3) 10.(1)
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

1000 One Liner


1) The code for a Web page is written using Hypertext Markup
language
2) The first computers were programmed using Machine language
3) A filename is a unique name that you give to a file of information
4) Any data or instruction entered into the memory of a computer is
considered as storage
5) A series of instructions that tells a computer what to do and how
to do it is called a program
6) Hardware is the part of a computer that one can touch and feel .
7) The role of a computer sales representative generally is to
determine a buyer‘s needs and match it to the correct hardware and
software.
8) Supercomputers refers to the fastest, biggest and most
expensive computers
9) Executing is the process of carrying out commands
10) The rectangular area of the screen that displays a program,
data, and or information is a window
11) The process of a computer receiving information from a server
on the internet is known as downloading
12) Disk drive is the part of the computer helps to store information
13) A collection of related information sorted and dealt with as a
unit is a file
14) Sending an e-mail is similar to writing a letter
15) A menu contains commands that can be selected
16) Edit menu is selected to cut, copy and paste
17) The most important or powerful computer in a typical network is
network server
18) The primary purpose of software is to turn data into information
19) The ability to find an individual item in a file immediately direct
access is used.
20) To make a notebook act as a desktop model, the notebook can
be connected to a docking station which is connected to a monitor
and other devices

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

21) You can use the tab key to move a cursor across the screen,
indent a paragraph.
22) A collection of related files is called record.
23) Storage that retains its data after the power is turned off is
referred to as non-volatile storage.
24) Internet is an example of connectivity.
25) Testing is the process of finding errors in software code.
26) A syntax contains specific rules and words that express the
logical steps of an algorithm.
27) Changing an existing document is called the editing
documentation
28) Virtual memory is memory on the hard disk that the CPU uses
as an extended RAM.
29) Computers use the binary number system to store data and
perform calculations.
30) The windows key will launch the start buttons.
31) When sending an e-mail, the subject lines describe the contents
of the message.
32) Tables, paragraphs and indexes work with when formatting text
in word.
33) TB is the largest unit of storage.
34) The operating system tells the computer how to use its
components.
35) When cutting and pasting, the item cut is temporarily stored in
clipboard.
36) The blinking symbol on the computer screen is called the
cursor.
37) Magnetic tape is not practical for applications where data must
be quickly recalled because
tape is a sequential because tape is a sequential access medium.
38) Rows and columns are used to organise data in a spread sheet.
39) When you are working on documentation on PC, the document
temporarily stored in flash memory.
40) One megabyte equals approximately 1 million bytes
.

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

41) Computer connected to a LAN can share information and


or share peripheral equipment
41) Microsoft office is an application suite
42) Utilities can handle most system functions that are not
handled directly by the operating system
43) A set of instructions telling the computer what to do is
called program
44) LAN refers to a small single site network
45) A collection of programs that controls how your
computer system runs and processes information is called
operating system.
46) Device drivers are small, special-purpose programs
47) Transformation of input into output is performed by the
CPU
48) Data going into the computer is called input.
49) Binary choice offer only two options
50) To indent the first paragraph of your report, you should
use tab key
51) Fields are distinct item that don‘t have much meaning to
you in a given context
52) A website address is a unique name that identifies a
specific web site on the web
53) Modem is an example of a telecommunications device
54) A set of computer programs used for a certain function
such as word processing is the
best definition of a software package
55) You can start Microsoft word by using start button
56) A blinking symbol on the screen that shows where the
next character will appear is a cursor
57)Testing is the process of finding errors in software code
58) In Excel, charts are created using chart wizard option

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

59)Microcomputer hardware consists of three basic


categories of physical equipment system unit, input/output,
memory
60) Windows is not a common feature of software
applications
61) A tool bar contains buttons and menus that provide
quick access to commonly used commands
62) For creating a document, you use new command at file
menu Input device is equipment used to capture information
and commands
63) A programming language contains specific rules and
words that express the logical steps of an algorithm
64) One advantage of dial-up internet access is it utilizes
existing telephone security
65) Protecting data by copying it from the original source is
backup
66) Network components are connected to the same cable in
the star topology
67) Two or more computers connected to each other for
sharing information form a network
68) A compute checks the database of user name and
passwords for a match before granting access
69) Computers that are portable and convenient for users
who travel are known as laptops
70) Spam is the term for unsolicited e-mail
71) Utility software type of program controls the various
computer parts and allows the user to interact with the
computer
72) Each cell in a Microsoft office excel document is
referred to by its cell address, which is the cell‘s row and
column labels

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

73)Small application programs that run on a Web page and


may ensure a form is completed properly or provide
animation are known as flash
74) In a relational database, table is a data structure that
organizes the information about a single topic into rows
and columns
75) The first computers were programmed using assembly
language
76) When the pointer is positioned on a hyperlink it is
shaped like a hand
77) Booting process checks to ensure the components of
the computer are operating and connected properly
78) Checking the existing files saved on the disk the user
determine what programs are available on a computer
79) Special effect used to introduce slides in a presentation
are called animation
80) Computers send and receive data in the form of digital
signals
81) Most World Wide Web pages contain HTML commands in
the language
82) Icons are graphical objects used to represent commonly
used application
83) UNIX is not owned and licensed by a company
84) In any window, the maximize button, the minimize
button and the close buttons appear on the title bar
85) Dial-up Service is the slowest internet connection
service
86) Every component of your computer is either hardware or
software
87) Checking that a pin code number is valid before it is
entered into the system is an example of data validation
88) A compiler translates higher level programs into a
machine language program, which is called object code

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

89) The ability to find an individual item in a file


immediately direct access
90) Computers connected to a LAN can share information
and/or share peripheral equipment
91) A CD-RW disk can be erased and rewritten
92) The two major categories of software include system
and application
93) Windows 95, Windows 98 and Windows NT are known as
operating systems
94) Information on a computer is stored as analog data
95) A spread sheet that works like a calculator for keeping
track of money and making budgets
96) To take information from one source and bring it to your
computer is referred to as download
97) Each box in a spread sheet is called a cell
98) Network components are connected to the same cable in
the bus topology
99) Two or more computers connected to each other for
sharing information form a network
100) A computer checks the database of user names and
passwords for a match before granting access.
101) Spam is the other name for unsolicited e-mail
102) Operating system controls the various computer parts
and allows the user to interact with the computer
103) Each cell in a Microsoft Office Excel document is
referred to by its cell address, which is the cell‘s row and
column labels
104) Download is the process of copying software programs
from secondary storage media to
the hard disk

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

105) The code for a web page is written using Hypertext


Markup Language
106) Small application programs that run on a web page and
may ensure a form is completed properly or provide
animation are known as Flash
107) A file is a unique name that you give to a file of
information
108) CDs are of round in shape
0) Control key is used in combination with another key to
perform a specific task
109) Scanner will translate images of text, drawings and
photos into digital form
110) Something which has easily understood instructions is
said to be user friendly
111) Information on a computer is stored as digital data
112) For creating a document, you use new command at file
menu
113) The programs and data kept in main memory while the
processor is using them
114) Ctrl + A command is used to select the whole
document
115) A Website address is a unique name that identifies a
specific website on the web
116) Answer sheets in bank PO‘s/Clerk‘s examinations are
checked by using Optical Mark Reader
117) Electronic data exchange provides strategic and
operational business opportunity
118) Digital signals used in ISDN have whole number values
119) Assembler is language translation software
120) Manual data can be put into computer by scanner
121) In a bank, after computerization cheques are taken
care of by MICR
122) The banks use MICR device to minimize conversion
process
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

123) Image can be sent over telephone lines by using


scanner
124) Microchip elements are unique to a smart card
125) MS-DOS is a single user operating system
126) Basic can be used for scientific and commercial
purpose
127) All computers can execute machine language programs
128) Programs stored in ROM can‘t be erased
129) Ethernet is used for high speed telecommunications
130) IP address can change even if the domain name
remains same
131) Each directory entry can be of 32 bytes
132) With the help of Control + Del a letter can be erased in
a word
133) Disk can keep maximum data
134) FORTRAN is a scientific computer language
135) Computer language COBOL is useful for commercial
work
136) COBOL is a high standard language like English
137) In computer the length of a word can be measured by
byte
138) Byte is the unit of storage medium
139) ROM is not a computer language
140) Oracle is a database software
141) Sequential circuit is full aid
142) Processor is must for computer
143) ROM keeps permanent memory
144) Screen display is called by windows in lotus
Pascal is a computer language
145) Expanded form of IBM is International business
machine
146) IC chips are made of silicon
147) India‘s Silicon Valley situated at Bangalore
148) RAM and ROM are the storage devices of computer
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

149)DOS is to create relation between hardware and


software
150) LOTUS 1-2-3 is software
151) Voice mail is a personal security code for GSM
subscribers
152) Tables holds actual data in the database
153) Trojan is a virus
154) Static keys make WEB insecure
155) Video signal needs highest bandwidth
156) Connectivity means communication between systems
157) Controlling is not required for high level language
programs before it is executed
158) 3 out of three rollers are responsible for the movement
of cursor on screen
159) Hardware that adds two numbers is arithmetic logical
unit
160) Data accuracy is not done by modem
161) LAN is used for networks setup within a building
162) A data communication system requires terminal device,
communication channel, protocols
163) Most common channel used by networks today is
satellite
164) Run Time is not a type of error
165) A five-digit card attribute used for postal ZIP codes it
will be restored as a numeric data
166) Computer viruses can be attached to an executable
program
167) MS-DOS was the first operating system
168) The smallest space where information on a hard disk is
kept in a cluster
169) An information is processed data
170) Intelligence is not a characteristic of a computer
171) Private key is used to spend a digital signature
172) Negative numbers can be represented in binary
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

173)VDU is not an essential part of a computer


174) The printers are line printer, laser, dot matrix
175) Speed of clock of CPU is measured in megahertz
176) Cache is not a secondary storage device
177) Disk can be used to store sequential files and random
files
178) Windows is not an application
179) When taking the output information is produced in
hardcopy and/or softcopy form
180) Control unit‘s function is to decode program
instructions
181) The most powerful type of computer amongst the
following is supercomputer
183) GO TO statement is used in C, C++, basic language
184) File menu is selected to print
185) The name a user assigns to a document is called a
filename
186) A processor is an electronic device that processes
data, converting it into information
187) Control words are words that a programming language
has set aside for its own use
188) Monitor and printer are the two types of output devices
189) To access properties of an object, the mouse
technique to use is right-clicking
190) An operating system is a program that makes the
computer easier to use
191) Connections to the internet using a phone line and a
modem are called dial-up connections
192) To access a mainframe or supercomputer, users often
use a terminal
193) A flaw in a program that causes it to produce incorrect
or inappropriate results is called a bug

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

194) A web site address is a unique name that identifies a


specific web site on the web
195) Every component of your computer is either hardware
or software
196) To make the number pad act as directional arrows, you
press the num lock key
197) When creating a word-processed document, formatting
text involves the user changing how words on the page
appear, both on the screen and in printed form
198) The ALU performs simple mathematics for the CPU
199) A computer program is a set of keywords, symbols,
and a system of rules for constructing statements by which
humans can communicate the instructions to be executed
by a computer
200) The another word for program is software
201) The name of the computer‘s brain is CPU
202) A computer is a device that electronically processes
data, converting it to information
203) Laptops are computers that can be carried around
easily
204) The secret code that restricts entry to some programs
is password
205) The basic goal of computer process is to convert data
into information
206) The disk is placed in the CPU in a computer
207) A hard copy of a document is printed on the printer
208) The name that the user gives to a document is referred
to as file name
209) Restarting a computer that is already on is referred to
as warm booting
210) E-mail is the transmission of messages and files via a
computer network
211) The person who writes and tests computer programs is
called a programmer
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

212) The information you put into the computer is called


data
213) The output devices make it possible to view or print
data
214) A chat is a typed conversation that takes place on a
computer
215) Hardware includes the computer and all the devices
connected to it that are used to input and output data
216) The most common method of entering text and
numerical data into a computer system is through the use
of a keyboard
217) Mouse, keyboard, plotter are the group consist of only
input devices
218) 256 values can be represented by a single byte
219) Transformation of input into output is performed by
the CPU
220) Vertical-market applications can handle most system
functions that are not handled directly by the operating
system
221) Device drivers are small, special-purpose programs
222) LAN refers to a small, single-site network
223) A set of instructions telling the computer what to do is
called program
224) Data going into the computer is called input
225) If you receive an e-mail from someone you don‘t know,
then delete it without opening it
226) Two options does a binary choice offer
227) A collection of programs that controls how you
computer system runs and processes information is called
operating system
228) Rows and columns are data organized in a spreadsheet
229) When cutting and pasting, the item cut is temporarily
stored in clipboard

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

230) 4) When you are working on a document on a PC, the


document is temporarily stored in flash memory
231) One megabyte equals approximately 1 million bytes
232) A cluster represents a group of sectors
233) Digital signals used in ISDN have discrete values
234) Assembler is language translation software
235) Manual data can be put into computer by scanner
236) Bandwidth means channel capacity amount of data
following via cables and measure of speed
237) Chip can keep maximum data
238) Debugging is the process of finding errors in software
code
239) Time Bomb are viruses that are triggered by the
passage of time or on a certain data
240) Linux is an open source operating system
241) Boot sector viruses are often transmitted by a floppy
disk left in the floppy drive
242) Operating system controls the way in which the
computer system functions and provides a medium by which
users can interact with the computer
243) Servers are computers that provide resources to other
computers connected to a network
244) Field names describe what a data field is
245) You must install router on a network if you want to
share a broadband internet connection
246) A goal of normalization is to minimize the number of
redundancy
247) Programs from the same developer, sold, bundled,
together, that are provide better integration and share
common features, tool box and menus are known as
software suits
248) A data ware house is one that organizes important
subject areas

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

249) URL term identifies a specific computer on the web


and the main page of the entire site
250) A proxy server is used to process client request for
web pages
251) When data changes in multiple list and list are not
updated, this causes data inconsistency
252) Granting an outside organization access to internet
web pages is often implemented using a extranet
253) The code that relational database management systems
use to perform their database task is refer to as SQL
254) URL stands for Uniform resource locator
255) A data base management system is a software system
used to create, maintain and provide controlled access to a
database
256) The two broad categories of software are system and
application
2571) The metal or plastic case that holds all the physical
parts of the computer is known as system unit
258) Data integrity means that the data contained in the
database is accurate and reliable
259) A local area network is a private corporate network
used exclusively by company categories
260) Eight bits equal to one byte
261) A byte can hold one character data
262) A characteristic of a file server is manages files
operations and is shared on a network
263) The development process of computer started in 1617
264) The role of Blaze Pascal in the development of
computer is addition and subtraction of numbers
265) The inventor of computer is Charles Babbage
266) The IBM made the first electronic computer in 1953
267) The silicon based transistor started to made by Gordon
Tin in 1954

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

268) 1 Kilobyte is equal to 1024 bytes


269) LCD means liquid crystal display
270) UPS converts DC voltage into AC voltage
271) The word ZIP means Zicxac Inline Pin
272) With the help of Pal switch we can increase or
decrease the speed of computer‘s processing
273) The full form of MICR is magnetic ink character reader
274) Swift networks are used between banks
275) Panda is a virus
276) Boot sector is hardware
277) Debug searches the fault of any software
278) OCR means optical character recognition
279) The total printout of a program is called listing
280) With the help of ZIP we can decrease the size of any
programs
281) We can format the hard disk with the help of Booting
282) CANNED is called as readymade software
283) The process of creating third file by mixing two files is
called as mail merging
284) The figures and lines etc. made by computer is called
as graphics
285) Each line represents 65 letters in a WordStar
286) Nokia- 7500 is not the example of Micro Processor
287) The first name of the digital computer is Unvake
288) The modern computer was invented in 1946
289) The full form of DOS is disk operating system
290) The expanded form of FORTRAN is formula translation
291) The great revolution came in computer sector in 1960
292) Magnetic tape is called as Input device of computer
293) IBM is a company
294) The personal computer invented in 1981

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

295)) The first mechanical computer of Charles Babbage is


known as punch card machine
296) The IC chip used in computer is generally made in
silicon
297) Telephone broadcast is the example of simplex
transmission
298) Optical, Mechanical are the kinds of mouse
299) Control panel is used for increasing and decreasing
the speed of the cursor of mouse
300) The capacity of modern main frame digital computer is
10(to the power of -12) mbps
301) With the help of my computer we can know about the
usage and availability of space in computer
302) We use both MS-Word and page maker for making
resume
303) Earliest computers that would work with FORTRAN was
second generation
304) Back Ups in database are maintained for to restore the
lost data
305) IDEA is a encryption technique
306) DBRM takes care of storage of data in a database
307) The job of DBMS is to decrease redundancy
308) Digital signatures use encryption for authenticating
309) OS acts as intermediary agency between user and
hardware
310) Plotters gives the highest quality output
311) ROM is built in memory in computer
312) FLASH is a RAM
313) PRAM is not a RAM
314) FLASH device is used in cell phones
315) Internal storage is same as the primary storage
316) IMAC is name of a machine

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

317) First generation computers could do batch processing


318) The analytic engine was created by Charles Babbage
319) Voicemail of GSM service provider has the personal
security code for its subscribers
320) Senior manager decided about the division of work
with respect to IT security
321) Encrypting file system of window XP professional
operating system protects the data of a user, even if the
computer is shared between users
322) The .mpeg is the format of a movie file
323) Controlling is NOT required for high level language
program before it is executed
324) A plotter is output device
325) 80286 is a hardware part of microprocessor
326) Top-bottom approach can not be the measure of
network traffic
327) A switching mode power supply is used for converting
raw input power to stabilize DC power
328) Spooler can manage the whole printing process
329) Validity routines control procedures can be used to
ensure completeness of data
330) Less expensive than leased line networks is not a
characteristic of virtual private networks (PVN)
331) Program policy framework provides strategic direction
to an organization
332) Cross bar switches have common control
333) Row-level security is the most basic part for database
security
334) Voice recognition software can not be used for
converting text into voice
335) The user account can only be created by the network
administrator
336) IBM-700 belongs to second generation

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

337) Allocating adequate bandwidth would help her in


speeding up the data transfer over net
338) BCD means binary coded decimal
339) Extended system configuration data is same as BIOS
340) Digitizer is an input device
341) Caramel is the latest platform of Intel Centrio
microprocessor
342) RISC is known as storage device
343) NORTON is an anti-virus
344) The system file of an operating system is COM
345) ATMs of bank have real currency
346) A program that converts high level language to
machine language is assembler
347) ‗.txt‘ files can be made in notepad, MS word, DOS
editor
348) .Zip is a compressed file
349) Internet is a WAN
350) MP3 technology compresses a sound sequence to one-
twelfth of its original size
351) At a time only one operating system can be at work on
a computer
352) If multiple programs can be executed at the same time,
it is distributed operating system
353) If the operating system provides quick attention, it is
real time operating system
354) Distributed operating system uses network facility
355) FORMAT command in MS-DOS is used for recreating
disk information
356) COPY command in MS-DOS is used to copy one or more
files in disk drive to another,copy from one directory to
another directory
357) REN command is Internal command
358) Tom Burners-Li propounded the concept of ―World
wide web.
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

359) The memory address sent from the CPU to the main
memory over a set of wires is called address bus
360) MODEM is an electronic device required the computer
to connect to the INTERNET
361) A source program is a program which is to be Tran
scripted in machine language
362) Virus in computer relates to program
363) Floppy is not a storage medium in the computer related
hardware
364) DOS floppy disk does not have a boot record
365) The CPU in a computer comprises of Store, arithmetic
and logical unit and control unit
366) In computer parlor a mouse is a screen saver
367) UNIVAC is the name of the computer which was first
used for programming and playing of music
368) The IC chips for computer is prepared from silicon
369) Database management systems are comprised of tables
that made up of rows called records and columns called
fields
370) Nano is equal to 10(to the power of -9)
371) In computers RAM is a non-volatile memory
372) Disk and tape drives are commonly used as hard copy
373) When computer is connected to LAN and data is sent
across it for storage/processing is online processing
374) The primary storage unit is also referred to as internal
storage
375) Oracle is not an operating system
376) Data are raw facts and figures
377) Holding of all data and instructions to be processed is
one of the functions of storage unit
378) To select the entire row in Excel, click mouse at row
heading
379) Database is known as structured data

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

380)Normal view and outline view notes pane appears in


power point
381) The user protection feature of an operating system is
required in multi-user system only
382) In word, Ctrl + Del combination of keys press to delete
an entire word
383) In MS-Word double clicking a word selects the word
384) Word document can be navigated in web layout view
385) In Excel, addressing mode(s) that can be used in a
formula is/are only absolute and relative
386) Note page views can you use to show just the slide and
its contents
387) Hardware that adds two numbers is arithmetic logical
unit
388) The computer as a machine and all other physical
equipment associated with it are termed as hardware
389) Plotters are very useful in applications such as
computer aided design
390) Corel DRAW is a graphic package
391) The print to file option creates .prn file
392) The enhanced keyboard contains 101 keys
393) Data processing cycle consists of input cycle, output
cycle and processing cycle
394) Page Setup is not an option of Edit menu
395) Radar chart is used to show a correlation between two
data series
396) A computerized business information system includes
hardware, software and data facts
397) Purchase order file is a transaction file
398) A typical computerized business application system
will have both master and transaction file

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

399)Problem identification is taken first in designing a


program
400) The purpose of the EXIT command is to get out of a
condition loop
401) Employees details is a master file for the pay roll
system
402) A slow memory can be connected to 8085 by using
READY
403) A processor needs software interrupt to obtain system
services which need execution of privileged instructions
404) A CPU has two modes- privileged and non-privileged.
In order to change the mode from the privileged to the non-
privileged, a software interrupt is needed
405) Swap space resides at disk
406) The process of assigning load addressed to the
various parts of the program and adjusting the code and
data in the program to reflect the assigned address is
called relocation
407)1 Sector= 4096 bytes
408) Two stacks of size required to implement a queue of
size n
409) 1 Floppy = 6, 30,784 bytes or 308 KB
410) Consider a machine with 64 MB physical memory and a
32-bit virtual address space. If the page size is 4 KB, then
size of the page table is 2 MB
411) Consider a virtual memory system with FIFO page
replacement policy. For an arbitrary page access pattern,
increasing the number of page frames in main memory will
always decrease the number of page faults
412) Consider a scheme R(A, B, C, D) and functional
dependencies A->B and C-> D. Then the decomposition of R
into R1 (AB) and R2 (CD) is dependency preserving and
lossless join
413) Main memory requires a device driver
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

414) RAM can be divided into 2 types


415) Two friends suitably arrange 4 blocks of different
colors to exchange coded information between them. 4 bits
of information is one exchanging each time
416) Cache memory is a part of main memory
417) The number 43 in 2‘s complement representation is
01010101
418) The 8085 microprocessor responds to the presence of
an interrupt by checking the TRAP
pin for ‗high‘ status at the end of each instruction fetch
419) All machinery and apparatus of computer is called
hardware
420) The number 1024 bytes is the complement
representation of 1 Kilo byte
421) System design specifications do not include blueprint
showing the layout of hardware
422) Web pages are uniquely identified using URL
423) The results of arithmetic and logical operations are
stored in an accumulator
424) The input device that is closely related to touch screen
is the light pen
425) F2 keys of control center specified below displays
data, toggles browse/edit
426) A compiler breaks the source code into a uniform
stream of tokens by lexical analysis
427) The number of processes that may running at the same
time in a large system can be thousands
428) LET.BAS files are related to Microsoft word utility
430) A command in UNIX can have one or more arguments
431) A hard disk is logically organized according to
cylinders and sectors

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

432)A frame can include text & graphics, tables & graphics,
graphics
433) All the formatting data for the paragraph is stored in
the paragraph mark
434) The abbreviation CAD stands for computer aided
design
435) We can define hypertext definition in notebooks using
Macsyma 2.0
436) The addressing mode(s) that can be used in a formula
is/are- absolute, relative and mixed
437) WINDOWS can work in enhanced and standard modes
438) The part of a machine level instruction which tells the
central processor what has to be done is an operation code
O-Matrix software packages do not have animation
capabilities
439) In order to paste text form the clipboard in the
document being edited, press the Ctrl-A key
440) A program that converts a high level language program
to a set of instructions that can run on
a computer is called a compiler
441) Faster execution of programs is not an advantage of a
subroutine
442) First generation of computer period is 1945-1950
443) IBM built first PC in the year 1981
444) A small computer program embedded within an HTML
document when a user retrieves
the web page from a web server is called an applet
445) Another name for systems implementation is
transformation
446) The central host computer or file server in a star
network maintains control with its
connecting devices through polling

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

447) C++ does not check whether the index value is within
scope
448) The browser uses uniform resource locator to connect
to the location or address of internet resources
449) In the centralized computing architecture, the entire
file is downloaded from the host computer to the user‘s
computer in response to a request for data
450) An expert system enables one or more users to move
and react to what their senses perceive in a computer
simulated environment
451) Popping or removing an element from an empty stack
is called underflow
452) The ability to combine data and operations on that data
in a single unit is known as polymorphism
453) A router is a device that sites between your internal
network and the internet and limits access into and out of
your network based on your organization‘s access policy
454) In C++, private, protected, and public are reserved
words and are called member access specifiers
455) The integration of all kinds of media such as audio,
video, voice, graphics and text into one coherent
presentation combined is called multimedia
456) The derived class can redefine the public member
functions of the base class
457) A technique for searching special databases, called
data warehouses, looking for related information and
patterns is called data mining

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

458) Like the quick sort the merge sort uses the divide and
conquer technique to sort a list
459) The use of expert systems technology can greatly
reduce the number of calls routed to a customer service
department
460) Building a list in the backward manner, a new node is
always inserted at the beginning of the list
461) Creating a web site is also called web authoring
462) Using the optimization analysis approach, the expert
system starts with a conclusion and tries to verify that the
rules, facts, and conclusion all match. If not, the expert
system chooses another conclusion
463) Both the application program and operating system
program only describes the software
464) Root is one of the items given below is not an item of
the menu bar
465) BACKUP is not an internal command
466) In a disk, each block of data is written into one sector
467) Hard copy is a printed copy of machine output
468) A boot strap is a small utilization computer program to
start up in inactive computer
469) CAD is oriented towards software
470) Icons are picture commands
471) IBM company for the first time launched pocket
computers
472) PROM is a computer part
473) Algorithms can handle most system functions that
aren‘t handled directly by the operating system
474) Device drivers are small, special-purpose programs

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

475) LAN refers to a small, single site network


476) A collection of programs that controls how your
computer system runs and processes information is called
operating system
478) When we are working on a document on a PC the
document is temporarily stored in RAM
479) Information travels between components on the
motherboard through buses
480) Microsoft is a vertical market application
481) RAM refers to the memory in your computer
482) Computers connected to a LAN can share information
and / or share equipment
483) Magnetic tape is not practical for applications where
data must be quickly recalled because tape is a sequential
access medium
484) In Late 1988 computer viruses land in India for the first
time
485) ALU is a part of the CPU
486) In computer technology a compiler means a program,
which translates source program into object program
487) American computer company IBM is called big blue
488) The first IBM PC did not have any ROM
489) The digital computer was developed primarily in UK
490) Programs which protect a disk from catching an
infection are called antidotes
491) The first movie with terrific computer animation and
graphics was released in 1982 is Tron
492) An integrated circuit is fabricated on a tiny silicon
chip
493) The word size of a microprocessor refers to the
amount of information that can be stored in the byte

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

494) Daisy-wheel printer cannot print graphics


495) In the IBM PC-AT, the word AT stands for advanced
terminology
496) Dedicated computer means which is assigned one and
only one task
497) Real time programming type of computers
programming is used for aero plane ticket reservation
system
498) RAM means memory which can be both read and write
499) Laser printer uses light beam and electro statically
sensitive black powder
500) The Santa Clara Valley, California is popularly known a
Silicon Valley of America because many silicon chip
manufacturing firms are located there
501) A program written in machine language is called
assembler
502) International business machine was the first company
in the world to build computer for sale
503) PARAM is a parallel computer
504)For communications, wide area networks use special
purpose telephone wires and fiber optic cables and
microwaves
505) Data transfer rate in modems is measured in bits per
second
506) A compiler cannot detect logical errors in source
programs
507) Throughput, turnaround time, response time are
measures of system performance
508) OLTP architecture can handle a limited number of
dimensions whereas OLAP architecture
does not have any limit on the number of dimensions
509) The binary equivalent of (40.125) suffix 10 is
101000.001

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

510) Kernel is the only art of an operating system that a


user cannot replace or modify
511)Symbol signifies a magnetic disk
512) COBOL programming language was initially developed
for consumer electronics goods
513) Running, blocked, ready, terminated are different
states of a process
514) Rational rose is an example of a modeling language
515) A disk worm is an example of optical devices
516) A RAID is a disk array
517) The first private internet service provider in India was
Satyam infoway
518) The maximum and minimum unsigned number which
can be stored in a 8 bit word is 0 and 255
519) Stack is a part of memory
520) HIT RATIO is associated with cache performance
521) Laser printer is a page printer
522) Storage capacity of a disk system depends upon
number of recording surfaces and number of sectors per
track
523) Abstraction is associated with object oriented
technology and database technology
524) The terms opcode and operand are associated with any
high level language
525) Dynamic binding is associated with object oriented
programming
526) The term CHIP, JEWELLARY means a processor with
high capacity
527) A watch point is associated with debugger
528) A multithreaded program uses multiple processes

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

529) In a disk, each block of data is written into two or more


sectors
530) A floppy disk rotates at 100rpm
531) A hard disk has 500 to 1000 tracks or more
532) The storage capacity of a cartridge tape is 400 MB
533) Single density recording is also known as frequency
modulation
534) Printer is not an input device
535) The input device that is most closely related to a touch
screen is the light pen
536) Laser printer generates characters from a grid of pins
537) The liquid crystal display works on the basis of the
relation between polaristion and electric field
538) A COBOL program in source code is not considered to
be system software
539) Firmware stored in a hard disk
540) A compiler breaks the source code into a uniform
stream of tokens by lexical analysis
541) Sorting of a file tasks is not performed by a file utility
program
542) Floppy disk does not generate a hardware interrupt
543) Ada language is associated with real time processing
544) MS DOS is usually supplied on a cartridge tape
645) BREAK is not an internal DOS command
646) Kernel of MS-DOS software resides in ROM
647) The UNIX operating system (available commercially)
has been written in C language
648) MS-DOS has better file security system as compared to
UNIX
649) UNIX is only a multiprogramming system
650) The UNIX operating system uses three files to do the
task mentioned

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

651) The first UNIX operating system, as it was in the


development stage, was written in the assembly language
652) FAST drivers scientific software packages was
developed under contract with NASA
653) LEFT () is not a date function
654) FIF editor is a windows based application
655) Graphics is inserted in frame
656) A language translator is best described as a system
software
657) The specification of a floppy is identified by TPI
658) DISC () is not a database function
659) In opening menu of word star C OPTION should be
selected for protecting a file
660) The most advanced form of ROM is electronically
erasable programmable ROM
661) Secondary storage device is needed to store large
volumes of data and programs that exceed the capacity of
the main memory
662) MORE sends contents of the screen to an output
device
663) NFS stands for N/W file system
664) Main protocol used in internet is TCP/IP
665) We can create a simple web page by using front page
express
666) The first line/bar on the word window where the name
of the document is displayed is called title bar
667) The clock frequency of a Pentium processor is 50 MHz
668) The input device that is most likely to be used to play
computer games is the joystick
669) Linking the program library with main program is not
performed by a file utility program
670) The UNIX operating system has been written in C
language
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

671) BIOS of MS-DOS resides in ROM


672) The sector size of a floppy disk varies from 128 bytes
to 1024 bytes
673) A program type of errors is flagged by compilers
674) A floppy diskette is organized according to tracks and
sectors
675) In word star, the maximum permissible length of
search string is 65
676) C is a third generation high level language
677) A CPU has a 16-bit program counter. This means that
the CPU can address 64 K memory locations
678) STR () is used for converting a numeric into a
character string
679) BASIC language is normally used along with an
interpreter
680) In UNIX, open files are shared between the parent and
the child
681) In spite of the extra power needed for refreshing.
DRAMs are widely used in computers because of its lower
cost relatives to SRAMs
682) PIF editor belongs to Main group
683) SUM () is not a financial function
684) 98/04/12 cannot be used to enter a date
685) Windows is popular because of its being expensive
686) Personal computers currently sold in India have main
memories at an entry level in the range of megabytes
687) The unit in CPU or processor, which performs
arithmetic and logical operations is ALU
688) RAM is volatile
689) The result of arithmetic and logical operations is
stored in an accumulator
690) A small amount of memory included in the processor
for high speed access is called cache

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

691) A bus is an electronic track system


692) A co-processor is used to improve the speed of
mathematical calculations
693) Intel 80286 belongs to third generation
microprocessors
694) A hexadigit can be represented by eight binary bits
695) The number of processes that may running at the same
time in a large system can be thousands
696) FORTRAN is a 3GL
697) Root is not an item of the Menu bar
698) Difficult to do what it projects is not considered to be
a feature of the spreadsheet
699) Bill gates is the chief of Microsoft
700) Excel office assistant can be made to appear by using
F1 key and help menu
701) 9 per page is the max no of showing positioning of per
page handouts
702) Alignment buttons are available on formatting toolbar
703) Pico second is 10(to the power of-9)
704) Logo refers to a computer language
705) The most appropriate command to permanently remove
all records from the current table is Zap
706) The efficient and well designed computerized payroll
system would be on-line real time system
707) The scripts which are designed to receive value from
Web users is CGI script
708) WAIS stands for – wide assumed information section
709) Modem is used for connecting PC using telephone
lines
710) Token bus is the most popular LAN protocol for bus
topology

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

711) Manipulating data to create information is known as analysis


712) A separate document form another program sent along with an E-
mail message is known as E-mail attachment
713) When you boot up a PC — portions of the operating system are
copied from disk into memory
714) Correcting errors in a program is called debugging
715) A word processor would most likely be used to type a biography
716) A database is an organized collection of data about a single entity
717) Fire fox is a web browser
718) Most of the commonly used personal computers/laptops do not
have a command key known as turnover
719) Full form of USB is known as Universal serial bus
720) The quickest and easiest way in Word to locate a particular word or
phrase in a document is to use the find command
721) Computer sends and receives data in the form of digital signals
722) Icons are graphical objects used to represent commonly used
application
723) Most World Wide Web pages contain HTML commands in the
language
724) In any window, the maximize button, the minimize button and the
close buttons appear on the title bar
725) Checking that a pin code number is valid before it is entered into
the system in an example of data validation
726) Windows 95 and windows 98 and Windows NT are known as
operating systems
727) Information on a computer is stored as analog data
728) A program that works like a calculator for keeping track of money
and making budgets is spreadsheet
729) To take information from one source and bring it to your computer
is referred to as download

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

730) Windows is not a common feature of software applications


731) A toolbar contains buttons and menus that provide quick access to
commonly used commands
732) Input device is an equipment used to capture information and
commands
733) Most of the commonly available personal computers/laptops have a
keyboard popularly known as QWERTY
734) Editing a document consists of reading through the document
you‘ve created then—correcting your errors
735) Virtual Box is not a famous operating system
736) Junk e-mail is also called spam
737) DOC is the default file extension for all word documents
738) .bas, .doc and .htm are examples of extensions
739) Codes consisting of bars or lines of varying widths or lengths that
are computer readable are known as a bar code
740) Convenience, speed of delivery, generally and reliability are all
considered as the advantages of e-mail
741) E-commerce allows companies to conduct business over the
internet
742) The most important or powerful computer in a typical network is
network server
743) To make a notebook act as a desktop model, the notebook can be
connected to a docking station which is connected to a monitor and
other devices
744) Storage that retains its data after the power is turned off is referred
to as non-volatile storage
745) Two rollers are actually responsible for movement of the cursor in
mouse
746) In case of a virus getting into computer NORTON will help

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

747) Virtual memory is memory on the hard disk that the CPU uses as
an extended RAM
748) To move to the beginning of a line of text, press the home key
749) When sending and e-mail, the subject line describes the contents
of the message
750) Microsoft is an application suite
751) Information travels between components on the motherboard
through bays
752) One advantage of dial-up internet access is it utilizes existing
telephone security
753) Network components are connected to the same cable in the star
topology
754) Booting checks to ensure the components of the computer are
operating and connected properly
755) Control key is used in combination with another key to perform a
specific task
756) Scanner will translate images of text, drawings, and photos into
digital form
757) Information on a computer is stored as digital data
758) The programs and data kept in main memory while the processor is
using them
759) Storage unit provide storage for information and instruction
760) Help menu button exist at start
761) Microsoft company developed MS Office 2000
762) Charles Babbage is called the father of modern computing
763) Data link layer of OSI reference model provides the service of error
detection and control to the highest layer
764) Optical fiber is not a network
765) OMR is used to read choice filled up by the student in common
entrance test
766) A network that spreads over cities is WAN
767) File Manager is not a part of a standard office suite
768) A topology of computer network means cabling between PCs

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

769) In UNIX command ―Ctrl + Z‖ is used to suspend current process


or command
770) Word is the word processor in MS Office
771) Network layer of an ISO-OSI reference model is for networking
support
772) Telnet helps in remote login
773) MS Word allows creation of .DOC type of documents by default
774) In case of MS-access, the rows of a table correspond to records
775) Record maintenance in database is not a characteristic of E-mail
776) In a SONET system, an add/drop multipliers removes noise from a
signal and can also add/remove headers
777) The WWW standard allows grammars on many different computer
platforms to show the information on a server. Such programmers are
called Web Browsers
778) One of the oldest calculating device was abacus
779) Paint art is not a special program in MS Office
780) Outlook Express is a e-mail client, scheduler, address book
781) The first generation computers had vacuum tubes and magnetic
drum
782) Office Assistant is an animated character that gives help in
MSOffice
783) Alta Vista has been created by research facility of Digital Electronic
corporation of USA
784) We are shifting towards computerization because technologies help
in meeting the business objectives
785) Spiders search engines continuously send out that starts on a
homepage of a server and pursue all links stepwise
786) Static keys make a network insecure
787) Joy Stick is an input device that cannot be used to work in MS
Office

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

788) Format menu in MS Word can be use to change page size and
typeface
789) Assembly language programs are written using Mnemonics
790) DMA module can communicate with CPU through cycle stealing
791) A stored link to a web page, in order to have a quick and easy
access to it later, is called bookmark
792) B2B type of commerce is characterized by low volume and high
value transactions in banking
793) Advanced is not a standard MS Office edition
794) Workstation is single user computer with many features and good
processing power
795) History list is the name of list that stores the URL‘s of web pages
and links visited in past few days
796) FDDI access mechanism is similar to that of IEEE 802.5
797) MS Office 2000 included a full-fledged web designing software are
called FrontPage 2000
798) Macintosh is IBM‘s microcomputer
799) X.21 is physical level standard for X.25
800) Enter key should be pressed to start a new paragraph in MS Word
801) Main frame is most reliable, robust and has a very high processing
power.
802) Formatting of these toolbars allows changing of Fonts and their
sizes
803) The ZZ command is used to quit editor after saving
804) The program supplied by VSNL when you ask for internet
connection for the e-mail access is pine
805) The convenient place to store contact information for quick,
retrieval is address book
806) Digital cash is not a component of an e-wanet
807) For electronic banking, we should ensure the existence and
procedures with regard to identification of customers who become
members electronically
808) Jon Von Neumann developed stored-program concept

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

801) Tour the server room is to be done by the auditor while internet
banking services audit
802) Documentation while developing a software for a Bank is required
for auditing
803) Water supply has not become computerized
804) Concurrency control in distributed database supports multi-user
access
805) Fifth generation computers are knowledge processors
806) Transistors were first used in 2nd generation computers
807) Intelligence is not a characteristic of a computer
808) A camera is an processing machine
809) To protect organization from virus or attacks all mails sent and
received should be monitored, all messages should be encrypted, E-
mails should be used only for official purpose
810) Internet collects millions of people all over the world
811) A computer based information system is a system in which a
computer is used to process data to get information
812) The time between program input and outputs is called execution
time
813) Third generations of computers have On-line real time systems
814) MIME is a compressor that packages different formats into SMTP
compatible type
815) The earliest software was developed using the waterfall model
816) EDI e- commerce system can handle non monetary documents
817) Collection to tracks on a disk forms spindle
818) A disk where number of sectors are fixed is called hard sectored
819) Half duplex transmission techniques let computer to alternatively
send and receive data
820) Multiplexing combines signals from different sources into one and
sends on a faster channel
821) Message switcher chooses correct data path for an incoming
message and forwards it to relevant line

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

822) Trojan horse are self replicating malicious code independent of the
action of the user, but slow down the processor on entering a network
823) Generation of PIN in bank ATM would require PIN entered is
encrypted
824) Availability, integrity, confidentiality is most necessary for data to
be useful
825) Grid is a supercomputer created by networking many small
computers
826) A character that changes its value throughout the program is called
variables
827) A program coded in programming is done by assembling
828) In write mode of file existing text is replaced by new one
829) When an organization gives contract for development of a software,
it has to give data to the service provider. In such cases, the ownership
of data should be with the client/organization that outsource services
830) Under a centralized organization Intranet be an effective
networking tools
831) For optical fiber used in point to point transmission, the repeater
spacing is 10-100 km
832) Favorites are accessible from the start menu
833) Task pre-emption, task priority and semaphores are not needed by
server program from an operation system
834) The objective of multiprogramming operating system is to maximize
CPU utilization
835) The environment provided to ASP is based on Client/server
836) HUB is layer1 device, central device, dumb device
837) The UNIX, echi command is used to display the message or value
of any variable on the screen

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

838) The first network that initiated the internet was ARPANET
839) In MODEMS a digital signal changes some characteristic of a
carrier wave
840) The binary values are represented by two different frequencies in
frequency shift keying
841) Messenger mailbox is present in Netscape communicator
842) Switching is a method in which multiple communication devices are
connected to one another efficiently
843) A bridge recognizes addresses of layer 3
844) EPROM is permanent storage device
845) ―.TIF‖ extension name stands for tagged image format
846) The overhead using BRI is 10 percent of the total data rate
847) In programming languages the key word ―Void‖ means it does not
return any value when finished
848) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
849) FORTRAN is not a programming language
850) The instruction LOAD A is a one address instruction
851) MS-Excel is also known as spread sheet
852) Manchester encoding is used in Ethernet technology
853) QAM is used in high speed modem
854) Frame Relay technique uses connection oriented
855) Bipolar always has a non-zero average amplitude
856) In a SONET system, an add/drop multipliers can remove signals
from a path
857) The server on the internet is also known as Host
858) For multiple branching in ‗C‘ we use switch statement
859) Web site is a collection of HTML documents, graphic files, audio
and video files
Sybase SQL server and Microsoft SQL server 7.0 is not an example of
RDBMS
860) In programming language, Null point is used to tell end of linked list
861) A technique which collects all deleted space onto free storage list
is called garbage collection

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

862) Insulating material is the major factor that makes co axial cable
less susceptible to noise than twisted pair cable
863) A data communication system covering an area the size of a town
or city is MAN
864) Virtual memory system allows the employment of the full address
space
865) The basic circuit of ECL supports the OR-NOR logic
866) Micro instructions are kept in control store
867) In HTML coding no shade attribute of HR tag suppresses the
shading effect and fields a solid line
868) Internet domains are classified by their functions. In that regard
―.com‖ represents commercial
869) HTTP in URL stands for hyper text transfer protocol
870) The ―Nyquist theorem‖ specifies the minimum sampling rate to be
twice the bandwidth of a signal
871) Memory allocation at the routine is known as dynamic memory
allocation
872) In HTML loading, <BR> tag is used for displaying a new line
873) HTTP protocols are used by internet mail
874) A policy on firewalls needs not ensure that it is logically secured
875) The script which is designed to receive value from the web users is
java script
876) GET method and HEAD method is the C91 method of involving a
C91 program
877) Analog switched line telephone service is least expensive
878) A toll used to find a synonym or antonym for a particular word is
thesaurus
879) In C++ coding, Cout<<‖tent‖; is used to display character or strings
or numeric screen
880) In this processing, a number of jobs are put together and executed
as a group batch processing
881) The process of finding and correcting errors in a program is a
process called debugging

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

882) New group that enable you to communicate with other Microsoft
windows user about issues and concerns with your computer
883) Analog-digital conversion type needs sampling of a signal
884) In an optical fiber, the inner core is less dense than the cladding
885) Six types of heading are available in HTML
886) RDBMS is an acronym for relational database management system
887) In MS-Word, page layout view is also known as true WYS/WYG
888) In HTML coding, <UL> (Unordered list) is used to give bullets in
your document
889) Transmission media are usually categorized as guided or unguided
890) A virtual circuit is the physical connection between an end point
and a switch or between two switches
891) Passing of the frame to next station can happen at a token ring
station
892) R-C coupling method is suitable for voltage amplification
893) Normal is not a type of HTML pages
894) In HTML coding <LI> tag is used for denoting items in a list of type
<UL>
895) In MS-Word the keyboard shortcut F7 used for spelling and
grammar check
896) DBMS is not an operating system
897) HTML is basically used to design web-site
898) In HTML coding, Dynamic web-pages are created in advance of the
user‘s request
899) HTML code is always starts with <html> </html>
900) If there are 5 routers and b networks in an internet work using link
state routing, there will be 5 routing tables
901) A scripting language similar to HTML and which runs only on a
browser is java script
902) By RAID technique, data is stored in several disk units by breaking
them into smaller pieces and storing each piece in separate disk

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

903) In time- division circuit switching, delivery of data is delayed


because data must be stored and retrieved from RAM
904) Subnet usually comprises layers 1 & 2, layer 1 through 3 of OSI
model
905) An image in a web-page can be aligned left and right using HTML
coding
906) RFC stands for request for comment
907) Packet filtering firewall and proxy firewall is not a type of firewall
908) Most news reader‘s presents news groups articles in threads
909) The sharing of a medium and its path by two or more devices is
called multiplexing
910) Sending messages, voice, and video and graphics files over digital
communication link is done by the method e-mail
911) In a computer network, a computer that can control a group of other
computers for sharing information as well as hardware utilities is known
as server
912) Telephone number, zip code is defined as a numeric field
913) In shell programming, tr command is used for character translation
914) Cat text>>output would append a file called test to the end of a file
called output
915) In a network with 25 computers, mesh topology would require the
more extensive cabling
916) Dialog control is a function of the presentation layer
917) The program which takes user input, interprets it and takes
necessary action is shell
918) Most appropriate data structure in C to represent linked list is array
919) Menu bar is usually located below that title bar that provides
categorized options
920) Latest version of Microsoft Word is Word XP

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

921) when the text automatically goes onto the next line this is called
word wrap
922) WYSIWYG is short for what you see is what you get
923) Left justify is the same as align left
933) To put text on the right of the page use the align right button
934) Lotus 1-2-3 is a popular DOS based spreadsheet package
935) 65,535 characters can be typed in a single cell in excel
936) Comments put in cells are called cell tip
937) Getting data from a cell located in a different sheet is called
referencing
938) A numeric value can be treated as a label value if it precedes with
apostrophe
939) Data can be arranged in a worksheet in an easy to understand
manner using auto formatting, applying styles, changing fonts
940) An excel workbook is a collection of worksheets and charts
941) Most manufacturers setup their BIOS to load into upper memory
during the boot process
942) Device drivers loaded in the config.sys file is loaded into the
following memory area: Conventional memory
943) 40ns memory speeds is the fastest
944) System software often uses the ROM BIOS
945) In CMOS setup, if you enable shadowing ROM is copied to RAM
946) Static variables are local to the block in which they are declared.
947) During the normal PC boot process, ROM BIOS is active first
948) During boot-up, the memory test checks and verifies that
contiguous memory is installed
949) 601 error code identifies a floppy drive problem
950) If you get frequent general protection faults, this could indicate
poor quality of memory chips
951) You are looking at a memory module thought to be a DIMM module.
168 pins would be on a DIMM module

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

952) Library management software is for documenting the changes that


are made to program and controlling the version numbers of the
programs
953) Steganography is hiding the data but not necessarily making it
invisible and not easily detectable
954) A computer is an electronic device
955) An online transaction is transaction done via internet
956) Using anti-virus software is preventive measure
957) For security we should consider local data reduction, event
correction low resource utilization
958) OS is not a peripheral of PC
959) The most common input device used today is keyboard
960) The third generation of the computer were in 1965-1971
961) Gateways to allow a network to use the resources of another main
frame is a component of internet
962) Mouse cannot be shared
963) EDI means electronic data interface
964) Mainframes network where a huge compute does all computing and
front end PCs are dumb terminals
965) A modem that cannot be moved from its position is called fixed
modem
966) A device that receives data from slow speed devices, and transmits
it to different locations is called remote concentrator
967) Organization would prefer in house development of software to
ensure that the development adhere to defined quality
968) Actual intelligence is not a feature of PC
969) Network that uses two OSI protocol layers as against three used in
X.25 is a ―frame relay‖
970) Microsoft excel is versatile application and spread sheet program

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

971 The exact format of frame in case of synchronous transmission


depends on whether transmission scheme is either character oriented or
bit oriented
972) RING topology is least affected by addition/remove of a node
973) EX-OR gates recognizes only words that have an odd number of 1
974) To interconnect two homogenous WAN‘s we need a router
975) Co-axial cables provides data rates over 50 mbps
976) The outermost orbit of an atom can have a maximum of 8 electrons
977) The protocol for sharing hypertext information on the world wide
web is HTTP
978) ISDN‘s basic rate interface (BRI) is also known as 2 D + B
979) The mode of data transmission of unshielded twisted pair cable is
full duplex
980) Data accuracy is not done by modem
981) Query is used to answer a question about a database
982) AM and FM are examples of analog to analog modulation
983) Redundancy is the concept of sending extra bits for use in error
detection
984) The physical layer is concerned with transmission of bits over the
physical medium
985) The number of input lines required for a 8 to 1 multiplexes is 8
986) The bar-code (rectangular pattern of lines of varying width and
spaces used for automatic product identification by computer
987) FSK is most affected by noise
988) Stack is a LIFO structure
989) CPU is not an input device of a computer
990) Program of a computer presented as a sequence of instructions in
the form of binary numbers is called machine language
991) For locating any document on the WWW. There is a unique
address known as URL

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

992) Array is linear data structure


993) A T.V. broadcast is an example of simplex transmission
994) Search engine will search its database to find items whose tent
contains all or at least one of the words given to it
995) In UNIX, command ―! $‖ is used to repeat entire less command
line
996) PCM is an example of analog to digital
997) A simple protocol used for fetching an e-mail from a mailbox is
POP 3
998) For a small web site, one needs to buy space from the ISP
999) An operating system that acts as an intermediary between user and
computer hardware
1000) Attair, the world‘s first personal computer, was introduced in the
year 1979
1001) Half duplex data flows in both directions, but any one direction at
the time
1002) Ring requires a central controller or hub
1003) The OSI model consists of seven layers
1004) The main job of one of the following is to allocate CPU to
processes scheduler
1005) 10,500 valid Min & Max zoom sizes in MS office
1006) Before printing a document you should always use print
preview
1007) Excel XP is the latest version of excel
1008) A worksheet can have a maximum of 256 number of
rows
1009) Character is not a valid data type in Excel
1010) Formula bar in an Excel window allows entering values and
formulas
1011) Direct memory access is a technique for transferring data from
main memory to a device without passing it through the CPU

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

Computer Awareness
List of Commonly used Computer Abbreviations
ALGOL- Algorithmic Language
ALU- Arithmetic and Logical Unit
AMD- Advanced Micro Devices
ANSI- American National Standard Institute
BASIC- Beginner's All purpose Symbolic Instruction Code
BCR- Bar Code Reader
BIOS- Basic Input Output System
CD- Compact Disc
CDROM -Compact Disc Read Only Memory
DBMS- Database Management System
DVD- Digital Versatile Disc
DVD- Digital Video Disc
DVDR- DVD-Recordable
DVDROM-DVD-Read Only Memory
DVD- RW DVD-Re Writable
EEPROM- Electronically Erasable Programmable Read only Memory
E-Mail- Electronic Mail
ENIAC- Electronic Numerical Integrated And Computer
EPROM- Erasable Programmable Read Only Memory
FAT- File Allocation Table
FDD- Floppy Disk Drive
FTP- File Transfer Protocol
FORTRAN- Formula Translation
GB- Gigabyte
GUI- Graphical User Interface
GIF- Graphics Interchange Format
HDD- Hard Disk Drive
HTML- Hypertext Markup Language
HTTP- Hypertext Transfer Protocol
IP- Internet Protocol

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

JPEG- Joint Photographic Experts Group


KB- Kilobyte
LAN- Local Area Network
LCD- Liquid Crystal Display
LSI- Large Scale Integration
MAN- Metropolitan Area Network
MB -Megabyte
MBR- Master Boot Record
MICR- Magnetic Ink Character Recognition
MIDI- Music Instrument Digital Interface
MPEG -Motion Pictures (Coding) Experts Group
NIC- Network Interface Card
OCR- Optical Character Reader
OMR- Optical Mark Reader
OOP -Object Oriented Programming
PAN- Personal Area Network
PDA- Personal Digital Assistant
PDF- Portable Document Format
POP- Post Office protocol
POS- Point Of Sales
PPI- Pixels Per Inch
PROM- Programmable Read Only Memory
PSTN- Public Switched Telephone Network
RAM- Random Access Memory
ROM- Read Only Memory
SQL- Structured Query Language
TCP- Transmission Control Protocol
UPS -Uninterruptible Power Supply
URI- Unifrom Resource Identifier
URL- Uniform Resource Locater
USB- Universal Serial Bus
VGA- Video Graphic Array

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

INPUT & OUTPUT DEVICES


� An input device is any peripheral (piece of computer hardware
equipment) used to provide data and control signals to a computer. They
are the devices that feed data into a computer.
Examples of input devices include keyboards, mouse, scanners, digital
cameras and joysticks.
� The keys include the letter keys (0, 1, 2, ..., 9; A, B, Z), which are
generally laid out in the same style as in typewriters are known as
Alphanumeric Keys.
� 'Caps lock' and 'Num lock' keys are called as Toggle Keys because
when pressed, they change their status from one state to another.
� Numeric Keypad is a keypad located on the right hand side of the
keyboard. It consists of digits and mathematical operators.
� A Modifier key is a special key (or combination) on a computer
keyboard that temporarily modifies the normal action of another key
when pressed together. By themselves, modifier keys usually do
nothing; that is, pressing any of the Shift, Alt, or Ctrl keys alone does not
(generally) trigger any action from the computer.
� A Mouse is the most popular input device which is used today for
interactive processing and for the one line entry of data for batch
processing.
Drag and Drop refers to the action of clicking and holding down the
mouse button, while moving the mouse and then releasing the mouse
button.
The first computer mouse was invented by Douglas Engelbart.
� Joystick is the device that moves in all directions and controls the
movement of a pointer.
� A Touch Screen is a type of display screen device that is placed on
the computer monitor to allow direct selection or activation of the
computer when the user touches the screen.
� Light Pen is the pen shaped device, which can sense light and is used
to point at spots on a video screen.

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

� A technology enables a high-speed reading of large quantities of data


and transferring these data to the computer without using a keyboard. It
is referred as Optical Mark Reader (OMR).
It uses a beam of light that is reflected on the paper with marks, to
capture presence and absence of marks.
� MICR reads the characters by examining their shapes in a matrix form
and the information is then passed on to the computer. MICR stands for
Magnetic Ink Character Reader.
It provides a high level of security and is therefore used by the banking
industry for faster processing of the cheques
� It is a machine readable code, which is represented by parallel
vertical lines with varying widths. For reading these bar-coded data, a
device is used, which is known as a Bar Code Reader (BCR)
� Optical Character Recognition (OCR) is used to scan the document
containing text.
It is the mechanical or electronic conversion of scanned or photographed
images of typewritten or printed text into machine-encoded/computer-
readable text.
� A keyboard is a typewriter-style device, which uses an arrangement of
buttons or keys, to act as mechanical levers or electronic switches.
Most of the commonly available personal computers have a keyboard,
popularly known as Qwerty.
� The keys labelled Fl to F12 on the keyboard are called Function Keys.
� An output device is any piece of computer hardware equipment used
to communicate the results of data processing carried out by an
information processing system (such as a computer) which converts the
electronically generated information into human-readable form
� The printed form of output is referred as Hard Copy.
� The form of output displayed on the screen is referred as Soft Copy.

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

� The device that prints information from the computer onto the paper is
Printer.
� Pages Per Minute (PPM) is the unit used to count the speed of the
printer.
� On the basis of technology, printers are categorised into Impact and
Non- Impact Printers.
� Impact printers create an image by using some mechanism to
physically press an inked ribbon against the page, causing the ink to be
deposited on the page in the shape desired.
Examples of Impact Printers are Character Printers and Dot Matrix
Printers.
� Non – Impact Printers do not touch the paper when creating an
image.
Examples of Non - Impact Printers are Inkjet printers, Laser printers,
Solid ink printers, Dye-sublimation, Thermal wax printers, Thermal
autochrome printers.
� A pen based output device, attached to a computer for making vector
graphics, that is, images created by a series of many straight lines is
known as Plotters.
� The number of pixels displayed on a screen is known as Resolution.
� A Monitor is a TV-like display attached to the computer on which the
output can be displayed and viewed. It can either be a monochrome
display or a colour display.
HARDWARE AND SOFTWARE BASICS
� The set of instructions, which control the sequence of operations, are
known as Program. It is a sequence of instructions, written to perform a
specified task with a computer.
� A Software instructs the computer what to do and how to do it. It is a
set of instructions that tells the computer about the tasks to be
performed and how these tasks are to performed.

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/

One or more defects or problems that prevent the software from working
as intended of working at all is a Bug.
� Software that contributes to the control and performance of the
computer system and permits the user to use the system more
conveniently is termed as System Software.
� Antivirus Software is used to scan the hard disk to remove the virus
from them.
� The assembly language program is translated into machine code by a
separate program known as an Assembler.
� A Backup, or the process of backing up, refers to the copying and
archiving of computer data so it may be used to restore the original after
a data loss event. It contains a copy of every program data and system
file on a computer.
� An Operating System controls the way in which the computer system
functions and provides a means by which users can interact with the
computer.
� Loading of the Operating System is known as Booting. Restarting a
computer that is already on, is referred to as Warm Booting.
� Basic Input – Output System (BIOS) is the part of operating system
that manages the essential peripherals such as the keyboard, screen,
disk drives and parallel and serial ports.
� An Integrated Software is a single application that combines major
features of several types of application.
� An Application Software is the program that makes the computer
useful to the users.
� Computer hardware is the collection of physical elements that
constitutes a computer system.
� Computer hardware refers to the physical parts or components of a
computer such as the monitor, mouse, keyboard, computer data storage,
hard drive disk (HDD), system unit (graphic cards, sound cards,
memory, motherboard and chips), etc. all of which are physical objects
that can be touched.

LIKE CT - CENTRAL TRAINER


HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
Please Contact Me On -
rahulrituraj.centraltrainer@gmail.com

Вам также может понравиться