Computer Quiz

Download as pdf or txt
Download as pdf or txt
You are on page 1of 61

1.

Dumb terminals are the terminals that have-


(1) Mouse
(2) Keyboard
(3) Printer
(4) Scanner
(5) None of these.
2. Softwares such as virus, worm, Trojan, horse are the example of ..........
(1) utility
(2) spy ware
(3) firmware
(4) Malware
(5) None of these
3. .......... Makes it possible for shoppers to make purchases using their computers.
(1) e-world
(2) e-commerce
(3) e-spend
(4) e-business
(5) None of these
4. ________ is an invalid type of database key.
1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these
5. Data that is copied from an application is stored in the ...........
(1) driver
(2) terminal
(3) prompt
(4) clipboard
(5) None of these
6. All the deleted files go to _________
(1) Task bar
(2) Tool bar
(3) Status bar
(4) Recycle bin
(5) None of these
7. A/an _________ converts one statement at a time.
(1) Converter
(2) Program
(3) compiler
(4) Interpreter
(5) None of these
8.The person who manages the database of an enterprise known as _________
(1) FBA
(2) DSA
(3) DMA
(4) DBA
(5) None of these
9. _________ is the result produced by a computer.
(1) Data
(2) Memory
(3) Input
Computer Quiz

(3) Input
(4) Output
(5) None of these
10. The program which is used to located & display web pages known as _________
(1) Hyper
(2) HTML
(3) HTTP
(4) Web browser
(5) None of these
11. The amount of time required by a storage device to retrieve data and programs is its _______ .
(1) retrieval speed
(2) capacity
(3) memory
(4) storage
(5) access time
12. A 32-bit-word computer can access _______ bytes at a time.
(1) 4
(2) 8
(3) 16
(4) 32
(5) 30
13. A megabyte is actually equal to _______ kilobytes.
(1) 100
(2) 1000
(3) 1024
(4) 1024 1024
(5) None of these
14. The main memory of a computer must be large enough to contain the active parts of _______ .
(1) the operating system
(2) the applications
(3) input/output storage & working storage
(4) All of these
(5) None of these
15. Which of the following types of memory improves processing by acting as a temporary high-speed holding area
between the memory and the CPU?
(1) RAM
(2) ROM
(3) Cache memory
(4) Flash memory
(5) EPROM
ANSWERS
1. 3
2. 4
3. 2
4. 1
5. 4
6. 4
7. 4
8. 4
9. 4
10. 4
11. 5
12. 1
13. 3
14. 4
15. 3

1. Which of the following work is not done by computer?
(1) Inputting
(2) Processing
(3) Controlling
(4) Understanding
(5) Outputting
2. Full form of BIT ______
(1) Built in tasks
(2) Binary digit
(3) Before instructed task
(4) Before interpreting task
(5) Before initial task
3. Which of the following word is odd one?
(1) Delete
(2) Edit
(3) Copy
(4) Slide show
(5) None of these
4. What is best position of mouse for operating?
(1) Tail is away from user
(2) Tail is front from user
(3) Right hand side
(4) Left hand side
(5) None of these
5. ________ not required translator .
(1) BASIC
(2) High level language
(3) Assembly
(4) C
(5) Machine language
6. Arranged following in descending order
(1) TB, MB, GB, KB
(2) GB, TB, MB, KB
(3) TB, GB, KB, MB
(4) TB, GB, MB, KB
(5) GB, MB, TB, KB
7. Computer RAM is ______
(1) CPU
(2) Computer software
(3) Operating system
(4) ALU
(5) Computer hardware
8. Which of the following is not example of hardware?
(1) Mouse
Computer Quiz

(1) Mouse
(2) Printer
(3) Monitor
(4) Operating system
(5) Scanner
9. Basic component used in 3rd generation computer is _____
(1) Integrated circuits
(2) Microprocessor
(3) Transistor & diodes
(4) Vacuum tubes
(5) None of these
10. Most important part of computer system present in a box. This box is known as _____
(1) software
(2) hardware
(3) input device
(4) system unit
(5) None of these
ANSWERS:
1. 4
2. 2
3. 4
4. 3
5. 5
6. 4
7. 5
8. 4
9. 1
10. 4

1. A data warehouse is which of the following?
(1) Can be updated by the end users
(2) Contains numerous naming conventions and formats
(3) Organized around important subject areas
(4) Contains only current data
(5) None of these
2. ______________ servers store and manage files for network users.
(1) Authentication
(2) Main
(3) Web
(4) File
(5) None of these
3. All of the following are examples of real security and privacy risks Except _____
(1) hackers
(2) spam
(3) viruses
(4) identify theft
(5) None of these
4.___________ terminals (formerly known as cash registers) are often connected to complex inventory and
sales computer systems .
(1) Data
(2) Sales
(3) Query
(4) (Point-of-sale (POS)
(5) None of these
5. The OSI model is divided into _______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
6. System software is the set of programs that enables your computers hardware devices and ______
software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
7. ________ are specially designed computer chips reside inside other devices, such as your car or your
electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
8. The following are all computing devices, except?
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
9. In a ring topology , the computer in possession of the ______ can transmit data.
(1) packet
Computer Quiz

(1) packet
(2) data
(3) access method
(4) token
(5) None of these
10.This part of operating system manages the essential peripherals, such as the keyboard, screen , disk
drives, and parallel and serial ports ____?
(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of these
11.________ Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse
(2) Boot sector
(3) Script
(4) Logic bomb
(5) None of these
12.________ controls the way in which the computer system functions and provides a means : by which users
can interact with the computer
(1) The platform
(2) Application software
(3) Operating system
(4) The motherboard
(5) None of these
13. Servers are computers that provide resources to other computers connected to a ___________?
(1) mainframe
(2) network
(3) supercomputer
(4) client
(5) None of these
14. A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
15. A database management system (DBMS) is a
(1) hardware system used to create , maintain and provide controlled access to a database
(2) hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) software system used to create, maintain, and provide uncontrolled access to a database.
(4) is a collection of programs that enables you to store, modify, and extract information from a database
(5) None of these
ANSWERS:
1.3
2.4
3.2
4.4
5.3
6.4
7.2
8.3
9.4
10.1
11.2
12.3

12.3
13.2
14.3
15.4

1. Which of the following is the example of Toggle Keys?
1) Scroll lock
2) Del Key
3) Page Up Key
4) A to Z
5) None of these
2. The screen which is used for digital Signature?
1) Lighter
2) Digitizer
3) Magnetizer
4) Plotter
5) None of these
3. BCR is used for-
1) Reading vertical lines have different width
2) Converts dots of Pencil / Pen to electronic data
3) Read Bank cheques
4) All 1, 2 & 3 are correct
5) None of these
4. CRT stands for -
1) Cathode relay tube
2) Cathode reflex tube
3) Cathode ray tube
4) Cathode ray tile
5) None of these
5. ROM is -
1) Read only memory
2) non volatile
3) permanent
4) BIOS
5) All 1, 2, 3 & 4 are correct
6. Which memory is known for fastest Processing memory?
1) RAM
2) ROM
3) Cache
4) Virtual
5) None of these
7. Website is a ___
1) Collection of two or more webpages
2) Collection of applications
3) Set of Instruction / rules
4) Collection of programme
5) None of these
8. href is used for__
1) reference name
Computer Quiz

1) reference name
2) portable network
3) transfer image file
4) all 1, 2 & 3 are correct
5) None of these
9. ____ to add some new features from internet to already installed application.
1) Plug-ins
2) Adobe flash player
3) Adobe reader
4) Add-ons
5) None of these
10. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these
11. Who invented world wide web?
1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these
12. URL stands for ____.
1) Uniform Resource Locator
2) Universal resource locator
3) Address bar
4) All 1, 2 & 3 are correct
5) None of these
13. A thing present in real world in physical form is called____.
1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these
14. BUG is -
1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these
15. Which of the following is not a type of key?
1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these
Answers:

Answers:
1. 1
2. 2
3. 1
4. 3
5. 5
6. 3
7. 1
8. 1
9. 1
10. 2
11. 3
12. 1
13. 2
14. 3
15. 5

1. ________ is process of finding errors in software code
(1) Compiling
(2) Debugging
(3) Assembler
(4) All
(5) None of these
2. A (n) ________ uses pictures (called Icons) and menus displayed on the screen to send commands to the
computer system.
(1) command based user interface
(2) GUI
(3) System utility
(4) API
(5) None of these
3. Which of the following places the common data elements in order from smallest to largest ?
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database
(5) None of these
4. The internet is-
(1) a large network of networks
(2) an internal communication system for a business
(3) a communication system for the Indian government
(4) All of these
(5) None of these
5.__________ are lists of commands that appear on the screen.
(1) GUls
(2) Icons
(3) Menus
(4) Windows
(5) None of these
6. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3)File extension is another name for file type
(4) the file extension comes before the dot (.) followed by the file name
(5) None of these
7. Verification of a login name and password Is known as:
(1) configuration
(2) accessibility
(3) Authentication
(4) logging in
(5) None of these
8. Which of the following would most likely NOT be a symptom of a virus?
(1) Existing program files and icons disappear
(2) The CD-ROM stops functioning
(3) The Web browser opens to an unusual home page
(4) Odd messages or images are displayed on the screen
(5) None of these
9. ________ are words that a programming language has set aside for its own use.
(1) Control worlds
Computer Quiz

(1) Control worlds
(2) Reserved words
(3) Control structures
(4) Reserved keys
(5) None of these
10. The standard computer keyboard is configured using the ________ layout.
(1) Dvorak
(2) QWERTY
(3) Control
(4) Dot-matrix
(5) None of these
11. Servers are computers that provide resources to other computers connected to a ____________
(1) mainframe
(2) network
(3) supercomputer
(4) Client
(5) None of these
Answers:
1. 5
2. 2
3. 3
4. 1
5. 3
6. 4
7. 3
8. 2
9. 2
10. 2
11. 2

1. The output quality of a printer is measured by-
(1) Dot per inch
(2) Dot per sq. Inch
(3) Dots printed per unit tune
(4) All of above
(5) None of these
2. In analog computer -
(1) Input is first converted to digital form
(2) Input is never converted to digital form
(3) Output is displayed in digital form
(4) All of above
(5) None of these
3. In latest generation computers, the instructions are executed:
(1) Parallel only
(2) Sequentially only
(3) Both sequentially & parallel
(4) All of above
(5) None of these
4. Who designed the first electronic computer ENIAC?
(1) Van-Neumann
(2) Joseph M. Jacquard
(3) J. Presper Eckert and John W Mauchly
(4) All of above
(5) None of these
5. Who invented the high level language C?
(1) Dennis M. Ritchie
(2) Niklaus Writh
(3) Seymour Papert
(4) Donald Kunth
(5) None of these
6. A Person who designs program, operate and maintain computer equipment refers to-
(1) Console-operator
(2) Programmer
(3) People-ware
(4) System Analyst
(5) None of these
7. when did arch rivals IBM and Apple Computers Inc. decided to join hands?
(1) 1978
(2) 1984
(3)1990
(4) 1991
(5) None of these
8. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
(1) Monitor
(2) Hardware
(3) Robot
(4) Computer
(5) None of these
9. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
(1) Leech
(2) Squid
(3) Slug
(4) Glitch
Computer Quiz

(4) Glitch
(5) None of these
10. Modern Computer are very reliable but they are not
(1) Fast
(2) Powerful
(3) Infallible
(4) Cheap
(5) None of these
11. Most Advanced form of ROM is-
(1) PROM
(2) Cache Memory
(3) EPROM
(4) EEPROM
(5) None of these
12. Laptops was invented by-
(1) Dennis Ritchie
(2) Blaise Pascal
(3) Donald Kunth
(4) Charles Babbage
(5) Adam Osborne
13. Personal computers use a number of chips mounted on a main circuit board. What is the common name for
such boards?
(1) Daughter board
(2) Motherboard
(3) Father board
(4)Breadboard
(5) None of these
14. Granting an outside organization access to internet web pages is often implemented using a(n)-
(1) Extranet
(2) Intranet
(3) Internet
(4) Wirenet
(5) None of these
15. What is meant by a dedicated computer?
(1) Which is used by one person only
(2) Which is assigned one and only one task
(3) Which uses one kind of software
(4) Which is meant for application software
(5) None of these
1. 2
2. 2
3. 3
4. 3
5. 1
6. 3
7. 4
8. 4
9. 4
10. 3
11. 4
12. 5
13. 2
14. 1
15. 2

1. The system unit
(1) Coordinates input and output devices
(2) Is the container that houses electronic components.
(3) Is a combination of hardware and software
(4) Controls and manipulates data
(5) Does the arithmetic operation
2. System software
(1) Is a programming language.
(2) Is a part of a productivity suite
(3) Is a optional from of software.
(4) Computer manage internal resources
(5) Computer manage internal resources
3. Which of the following could be digital input devices for a computers?
(1) Digital camcorder
(2) Microphone
(3) Scanner
(4) All of the above
(5) None of these
4. Which of the following is contained on chips connected to the system board and is a holding area for data
instruction and information? (processed data waiting to be output to secondary storage?
(1) Program
(2) Mouse
(3) Internet
(4) Memory
(5 Modem
5.Microsoft's messenger allows users to
(1) To bypass a browser to surf the web.
(2) Create a blog.
(3) Communicate via direct live communication.
(4) Identify and eliminate spam
(5) Make graphic presentation.
6. Portable computer also known as laptop computer, weighting between 4 and 10 pounds is calls is
(1) General purpose application
(2) Internet
(3) Scanner
(4) Printer
(5) Note book computer
7. The main circuit board of the system unit is the
(1) Computer program
(2) Control unit
(3) Motherboard
(4) RAM
(5) None of these
8. Storage media such as a CD read and write information using
(1) A laser beam of red light.
(2) Magnetic dots.
(3) Magnetic strips
(4) All of these
(5) None of these
Computer Quiz

9. Which of the following is billiath of a second?
(1) Gigabyte
(2) Terabyte
(3) None second
(4) Microsecond
(5) Transcend
10. Online marketing is the function of which of the following?
(1) purchase section
(2) production department
(3) IT department
(4) Designs section
(5) A collective funcs of all staff
11. Gamepad is an example of
(1) Input device
(2) Output device
(3) Software
(4) Processor
(5 All of these
12. Artificial Intelligence occurred in ____ generation
(1) Fourth
(2) Fifth
(3) Both 1 and 2
(4) Sixth
(5) None of these
13. WORM stands for
(1) Write once read many
(2) Wanted once read memory
(3) Wanted original read memory
(4) Write original read memory
(5) None of these
14. In DOS, REM command use for
(1) To change the file name
(2) To move the file from one place to another place
(3) To delete file and its content.
(4) To delete folder and its subfolder
(5) None of these
15. Meaning of VIRUS
(1) Very important record user searched
(2) Verify interchanged result until source
(3) Vital information resource under siege
(4) Very important resource under search
(5) None of these
ANSWERS
1. 2
2. 4/5
3. 4
4. 4
5. 3
6. 5
7. 3
8. 1
9. 3
10. 3

10. 3
11. 1
12. 2
13. 1
14. 3
15. 3

1.If you wished to highlight, not hide, some information in a worksheet because it met some criteria, what Excel tool would
you use?
1) Table
2) Format
3) Conditional Format
4) Filter
5) None of these
2.What Excel tool allows you to create quickly and automatically summary data from a large data set?
1) Conditional formatting
2) Sorting
3) Pivot tables 4
4) Field lists
5) None of these
3.When creating a custom filer in Excel, which of the following would not be considered a Boolean operator?
1) If
2) And
3) Or
4) Not
5) None of these
4.Which of the following is a good habit to get into when creating a worksheet?
1) Placing titles for columns in the first row of data
2) Using conditional formatting to spot spelling errors
3) Inserting comments in each cell to define that data or type of data
4) Grouping records according to some classification
5) None of these
5.What term is used to describe a collection of information that you can use to build reports or discover facts about an
environment?
1) Database
2) Web site
3) Wiki
4) Relation
5) None of these
6.Microsoft's Access and Corel's Paradox are both examples of which type of software?
1) Network database systems
2) Relational database systems
3) Flat-file database systems
4) Hierarchical database systems
5) None of these
7.What type of graphical model is used to define a database?
1) Flowchart
2) E-R diagram
3) Organizational model
4) Programming model
5) None of these
8.After you develop a model for your database, you should then _____ it before building it.
1) normalize
2) design
3) plan
4) approve
5) None of these
Computer Quiz

9.Which of the following contains information about the structure of a database?
1) Database management system
2) Data dictionary
3) Data repository
4) Data warehouse
5) None of these
10.The rules of a language are called its __________.
1) structure
2) code
3) syntax
4) rigidity
5) None of these
11.A language that can be written on one platform and executed on another platform is said to be __________.
1) portable
2) robust
3) third generation
4) dynamic
5) None of these
12.__________ is Microsofts latest entry into the programming arena.
1) Java
2) .NET
3) Visual Basic
4) Pascal
5) None of these
13.A next-generation Web content development language, __________ typically refers to a suite of technologies that allow
developers to store data in a readable format.
1) HTML
2) XSL
3) XML
4) PHP
5) None of these
14.JavaScript was developed by __________ to run inside of web pages.
1) Microsoft
2) Sun
3) Oracle
4) Netscape
5) None of these
Answers:
1. 3
2. 3
3. 1
4. 1
5. 1
6. 1
7. 2
8. 2
9. 1

9. 1
10. 3
11. 1
12. 2
13. 3
14. 4

1. Which is considered a direct entry input device?
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above.
2. The daily processing of corrections to customer accounts best exemplifies the processing mode of:
1) Batch processing
2) Real-time processing
3) Interactive processing
4) Multi processing
5) All of the above.
3. Which is a unit of measurement used with computer systems?
1) Byte
2) Kilobyte
3) Megabyte
4) Gigabyte
5) All of the above
4.A character is represented in EBCDIC by
1) one bit
2) four bits
3) eight bits
4) sixteen bits
5) None of the above
5.Which is a secondary memory device?
1) CPU
2) ALU
3) Floppy disk
4) Mouse
5) None of the above
6. Which is the computer memory that does not forget?
1) ROM
2) RAM
3) PROM
4) All of the above
5) None of the above
7. The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?
1) American Standard Code for International Interchange
2) American Standard Code for Information Interchange
3) American Standard Code for Intelligence interchange
4) American Scientific Code for Information Interchange
5) None of the above
Computer Quiz

5) None of the above
8. A computer derives its basic strength from
1) Speed
2) Accuracy
3) Memory
4) all of the above
5) None of the above
9. A collection of eight bits is called
1) Byte
2) Word
3) Record
4) file
5) None of the above
10. A BIT represents a
1) Decimal digit
2) Octal digit
3) Binary digit
4) Hexadecimal digit
5) none of these
11.Which can read data and convert them to a form that a computer can use?
1) Logic
2) Storage
3) Control
4) Input device
5) Output device
12.Software instruction intended to satisfy a user's specific processing needs are called
1) System software
2) A microcomputer
3) Documentation
4) Applications software
5) All of the above
13. Which of the following is the most powerful type of computer?
1) Super micro
2) Super conductor
3) Microcomputer
4) Super computer
5) Mega frame
14.Which of the following people probably has the least amount of technical knowledge?
1) Programmer
2) User
3) System analyst
4) Computer operator
5) Computer professional
15.The Central Processing Unit (CPU) consists of:
1) Input, output and processing

1) Input, output and processing
2) Control unit, primary storage & secondary storage
3) Control unit, arithmetic-logic unit, primary storage
4) Control unit, processing, and primary storage
5) None of the above
ANSWERS
1. 5
2. 1
3. 5
4. 3
5. 3
6. 1
7. 2
8. 4
9. 1
10. 3
11. 4
12. 4
13. 4
14. 2
15. 3

1. What kind of programming language is Java?
1) Object-oriented programming language
2) Relational programming language
3) Sixth-generation programming language
4) Database management programming language
5) None of these
2. What type of internet technology sends information to you without you requesting that information?
1) F2b2C
2) Infoware
3) Push
4) Wiki
5) None of these
3. What is the second generation of the Web called?
1) New web
2) Emerging space
3) Second life
4) Web 2.0
5) None of these
4. What type of web technology allows its community members to continuously change the contents on a web
site?
1) Intelligent bots
2) Social networks
3) Wiki
4) Blog
5) None of these
5. What type of web technology provides news that can automatically download right to your desktop?
1) Social network
2) RSS feed
3) Podcast
4) Wiki
5) None of these
6. What type of web technology creates an online community where people can make statements and others
can read and respond to those statements?
1) I-Journal
2) Podcast
3) ASP
4) Blog
5) None of these
7. What type of technology allows you to verbally speak with someone over the Internet?
1) Wiki
2) Social network
3) Ephone
4) VoIP
5) None of these
8. What kind of environment is Facebook or MySpace part of?
1) Wiki
2) Blog
3) Social networking
4) VoIP
5) None of these
9. What term refers to living life through technology?
1) Virtual living
2) E-living
3) Virtual space
Computer Quiz

3) Virtual space
4) E-Society
5) All of above
10.What 3-D environment allows you to speak to someone who is far away but, at the same time, see them as a
holographic image?
1) CAVE
2) Virtual space
3) E-space
4) VoIP
5) All of above
11. What type of technology allows you to use your finger, eye, or voice print to secure your information
resources?
1) Haptics
2) Caves
3) Biometrics
4) RFID
5) All of above
12.In reference to your ethical structure, how much do you identify with the person or persons who will
receive the benefit or suffer the harm is called which of the following?
1) Consequences
2) Relatedness
3) Likelihood of effect
4) Society's opinion
5) none of these
13.Which tracking program records every keystroke you make on the computer?
1) ITrack/ULead
2) eFollow
3) Key logger
4) Stalking software
5) none of these
14.What is a common medium used for thieves to steal others' identities?
1) Telephone
2) Pick pocketing
3) Burglary
4) Email
5) none of these
15.What is it called when you are rerouted from your requested internet site to another, undesired site?
1) Phishing
2) Pharming
3) Redirecting
4) Hijacking
5) None of these
16.What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
1) Spam
2) Phish
3) Cookie
4) Adware
5) None of these
17.What type of monitoring file is commonly used on and accepted from Internet sites?
1) Phishes
2) Smartware
3) Cookies
4) Trojans
5) None of these
18.Ideally, your sense of what is ethical should tell you which of the following?
1) What to do
2) Who to do it to
3) When to do it

3) When to do it
4) Where to do it
5) None of these
19.What type of software secretly collects information about you and your internet habits?
1) Detectware
2) Spam
3) Spyware
4) Pharming
5) All the above
20.In an educational setting, instructors have access to and use a whole host of copyrighted materials. What
allows these individuals to make use of these materials?
1) Patent laws
2) Fair Use Doctrine
3) Intellectual property laws
4) Higher educational board
5) All the above
Answers:
1-1 2-3 3-4 4-3 5-2 6-4 7-4 8-3 9-2 10-1
11-3 12-2 13-3 14-4 15-2 16-4 17-3 18-1 19-3 20-2

1. The..........is the amount of data that a storage device can move from the storage medium to the Computer
per second.
(1) data migration rate
(2) data digitizing rate
(3) data transfer rate
(4) data access rate
(5) None of these
2. Computers manipulate data in many ways, and this manipulation is called.............
(1) upgrading
(2) processing
(3) batching
(4) utilizing
(5) None of these
3. RAM can be thought of as the............for the computer's processor.
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these
4. A name or number used to identify a storage location devices ?
(1) A byte
(2) A record
(3) An address
(4) All of these
(5) None of these
5. The difference between memory and storage is that memory is..........and storage is............
(1) Temporary, permanent
(2) Slow, fast
(3) Permanent, temporary
(4) All of these
(5) None of these
6. The term.........designates equipment that might be added to a computer system to enhance its
functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these
7. Firewalls are used to protect against..........
(1) Unauthorized Attacks
(2) Virus Attacks
(3) Data Driven Attacks
(4) Fire Attacks
(5) All of these
8. When using characters in Windows, what code does Windows use ?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTERN
9. The.............directory is mandatory for every disk.
(1) Root
(2) Base
Computer Quiz

(2) Base
(3) Sub
(4) Case
(5) None of these
10. ..........converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(1) Modem
(2) Router
(3) Gateway
(4) Bridge
(5) All of these
11. The term, 'Hypertext' means
(1) Non-sequential writing
(2) Hypermedia
(3) Text with heavy formatting
(4) Blinking text
(5) None of these
12. After a picture has been taken with a digital camera processed appropriately, actual print of the picture
considered :
(1) data
(2) output
(3) input
(4) the process
(5) None of these
13. Making illegal copies copyrighted software called............
(1) software piracy
(2) browsing
(3) collaboration
(4) electronic distribution
(5) None of these
14. The action of moving a page up or down on the screen is called..........
(1) scrolling
(2) linking
(3) lurking
(4) framing
(5) None of these
Answers:
1-3 2-2 3-3 4-3 5-1 6-4 7-1 8-1 9-1 10-1 11-5 12-2 13-1 14-1

1. These programs allow parents as well as organizations to block out selected sites and set time limits on
Internet access.
(1) plug ins
(2) filters
(3) FTP
(4) DSL
(5) None of these
2. A file that includes predefined settings that can be used to create many common types of presentations is
called a
(1) pattern
(2) model
(3) template
(4) blueprint
(5) None of these
3. A Computer that is on the Network is a _________.
(1) Node
(2) Terminal
(3) Client
(4) Online
(5) None of these
4. Network operating systems from Novell is ________.
(1) NOS
(2) UNIX
(3) NetWare
(4) Solaris
(5) None of these
5. NIC Stands for ________.
(1) Network Interface Card
(2) Network Internal Card
(3) Network Internet Client
(4) Network Input Card
(5) None of these
6. This power protection device includes a battery that providces a few minutes of power.
(1) surge suppressor
(2) line conditioner
(3) generator
(4) UPS
(5 ) None of these
7. SCSI port ( pronounced skuzzy) stands for
(1) System Computer Scanning Interface
(2) Small Computer System Interface
(3) Small Computer System Internet
(4) System Computer, System Interfaced
(5) None of these
8. LPT stands for
(1) Laser Printer
(2) Link Port
(3) Line Printer
(4) Line Port
(5) None of these
9. What does SDLC mean in Networking Protocol?
(1) Software Data Link Control
(2) Synchronous Data Link Control
Computer Quiz

(2) Synchronous Data Link Control
(3) Software development life cycle
(4) Synchronous data development cycle
(5) None of these
10. ADCCP means
(1) Analog Data Code Check Procedure
(2) Active Database Communication Control Program
(3) Application Data Cache Call Procedure
(4) Advanced Data Communication Control Procedure
(5) None of these
Answers:
1-2 2-3 3-1 4-3 5-1 6-4 7-2 8-3 9-2 10-4

1. What is a major feature of the World Wide Web (www) that makes it simple to learn and use?
(1) Data base interface
(2) Graphical text interface
(3) Graphical user interface
(4) Point-to-point protocol
(5) None of the above
2. The device that reconciles the differences between computers and phones is the
(1) LAN
(2) wand reader
(3) TCP/IP
(4) scanner
(5) modem
3. An area of the microprocessor chip used to temporarily store, instructions and data that the processor is
likely to use frequently is termed a(n)
(1) ALU
(2) bus
(3) cache
(4) CPU
(5) flash
4. A Bar Code Reader is an example of a(n) -
(1) processing device
(2) storage device
(3) input device
(4) output device
(5) printer
5. Computer users who are not computer professionals are sometimes called
(1) peripheral users
(2) programmers
(3) librarians
(4) information officers
(5) end-users
6. Desktop are also known as
(1) supercomputers
(2) servers
(3) main frames
(4) personal computers
(5) micro computers
7.______is an example of standard file format for text files.
(1) JPEG (.jpg)
(2) Bitmap (.bmp)
(3) Word (.doc)
(4) Text (.txt)
(5) .xls
8. Which is the high speed memory that adjusts with speed gap between processor and main memory?
(1) Cache
(2) PROM
(3) EPROM
(4) SRAM
(5) None of these
9. Which part of the CPU coordinates the activities of other components of a computer?
(1) Mother board
(2) Coordination board
Computer Quiz

(2) Coordination board
(3) Control unit
(4) Arithmetic logic unit
(5) Memory
10. If your computer keeps rebooting itself, then it is likely that
(1) it has a virus
(2) it does not have enough memory
(3) there is no printer
(4) there has been a power surge
(5) it needs a CD-ROM
11. Which of the following words in only a collection of networks which can be attached altogether?
(1) Virtual private network
(2) LAN
(3) Internet
(4) Extranet
(5) None of these
12. Which of the following statements is true about RAM?
(1) When PC is turn-off then it retains data.
(2) This is a kind of read and write memory.
(3) It includes start-up instructions.
(4) It is a peripheral.
(5) It mean read access memory.
13. Translator, _____used to translate assembly language, is
(1) compiler
(2) interpreter
(3) translation
(4) translator
(5) assembler
14. A program for viewing webpages is called
(1) word processor
(2) spreadsheet
(3) protocol
(4) a browser
(5) database
Answers:
1-3 2-5 3-3 4-3 5-5
6-4 7-4 8-1 9-3 10-1
11-3 12-2 13-5 14-4

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales
computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the
current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
5. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law
enforcement speciality called:
A. robotics.
B. simulation.
C. computer forensics.
D. animationz
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal's
movements.
A. POS
B. RFID
C. PPS
D. GPS
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
Computer Quiz

A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answers:
1-B 2-A 3-B 4-A 5-C 6-C 7-B 8-A 9-B 10-A

Dear readers, keepingthe upcomingSBI Clerk Exam in mind, here is a computer quiz form BankersAdda.
Q1. Which of the following is true about Operating System?
(1) It is an interface between user and the computer.
(2) It manages all resources
(3) It does all Memory management and Process management tasks
(4) All are true
(5) None of these
Q2. BIOS is responsible for
(1) Handling the particulars of input/output operations
(2) Output operations
(3) Input operations
(4) All of the above
(5) None of these
Q3. The overall design, construction, organization and interconnection of the various components of a
computer system is referred as
(1) Computer Architecture
(2) Computer Flowchart
(3) Computer Algorithm
(4) All of the above
(5) None of these
Q4. Cache memory is
(1) Bigger and slower than main storage
(2) Smaller and faster than main storage
(3) Smaller but slower than main memory
(4) Bigger and faster than main memory
(5) None of these
Q5. In MS Excel, If you see a small red triangle in the top right corner of a cell, it means there is something
attached to the cell. What is it?
(1) A comment
(2) An attachment
(3) An error
(4) None of the above
(5) None of these
Q6. What does the XP stand for in Windows XP?
(1) Exponential
(2) Experience
(3) Expertise
(4) Exchange
(5) None of these
Q7. Which printer type is an impact printer?
(1) Page printers
(2) Laser printers
(3) Ink-jet printers
(4) Dot-matrix printers
(5) None of these
Q8. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
Computer Quiz

(5) Reboot
Q9. Linux is a _______
(1) Utility program for peer-to-peer file sharing
(2) Real-time operating system
(3) Network operating system
(4) PDA platform
(5) None of these
Q10. Zip is a _______ file.
(1) Executable File
(2) Compressed File
(3) System File
(4) Combo
(5) None of these
Q11. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
(1) Monitor
(2) Hardware
(3) Robot
(4) Computer
(5) None of these
Q12. To protect a worksheet, you can choose Protection and the Protect Sheet from the .. menu
(1) Edit
(2) Format
(3) Tools
(4) Data
(5) None Of These
Q13. The pattern of printed lines on most products are called-
(1) prices
(2) OCR
(3) scanners
(4) barcodes
(5)None of these
Q14. The main advantage of magnetic disk compared to magnetic tape is
(1) low cost
(2) rigidity
(3) direct access
(4) high packet density
(5) sequential access
Q15. TCP stands for-
(1) Transmit Control Protocol
(2) Time Control Protocol
(3) Travel Control Protocol
(4) Transmission Control Protocol
(5) None Of These
ANSWERS:
1. 4
2. 1
3. 1
4. 2
5. 1
6. 2
7. 4
8. 2
9. 2
10. 2
11. 4

11. 4
12. 5
13. 4
14. 3
15. 4

Q1. The process of a computer receiving information from a server on the Internet is known as
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) Uploading
Q2. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
Q3. is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Q4. The rectangular area of the screen that displays a program, data, and/or information is a
(A) Title Bar
(B) Button
(C) Dialog Box
(D) Window
Q5. The Internet is controlled by -
A) the U.S. government
B) IBM, Intel, and Microsoft
C) no one in particular
D) United Nations
Q6. Entering and editing text can be done most efficiently using a:
A) spreadsheet
B) desktop publishing program
C) typewriter
D) word processing program
Q7. To have a page number and chapter title appear at the bottom of every page, create a:
A) header
B) footer
C) footnote
D) heading at the bottom of the page.
Q8. What is 'C' in the word 'CUI' -
A) Certificate
B) certified
C) character
D) country
Q9. Which one of the following is not a Web Browser?
A) Internet Explorer
B) Mozila Firefox
C) Android OS
Computer Quiz

C) Android OS
D) Google Chrome
Q10. Which of the following is not an example of secondary storage device?
A) Flash Memory
B) RAM
C) HDD
D) CD-RW
ANSWERS:
1. C
2. A
3. C
4. D
5. A
6. D
7. B
8. C
9. C
10. B

(a) Unlock the database
(b) Providea map of the data
(c) Uniquely identifya record
(d) Establish constraints on database operations
(e) None of the above
1. The purpose of the primary key in a database is to
(a) Programming language
(b) Syntax
(c) Programming structure
(d) Logic chart
(e) None of these
2. It contains specific rules and words that express the logical steps of an Algorithm
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these
3. The design of the network is called the network
(a) Hard disk
(b) Cache memory
(c) RAM
(d) Registers
(e) None of these
4. The most frequently used instructions of a computer program are likely to be fetched from
(a) Data dictionary
(b) Data table
(c) Data record
(d) Data field
(e) None of these
5. It contains data descriptions and defines the name,data type, and length of each field in the database
(a) List serves
(b) Webcasts
(c) Blogs
(d) Subject directories
(e) None of these
6 Personal logs or journal entries posted on the Web are known as
(a) Command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above
7. It uses pictures (called icons) and menus displayed on the screen to send commands to the computer system
(a) Documentation
(b) Programming
(c) Technical
(d) User
(e) None of these
8. This manual tells you how to use a software program
Computer Quiz

(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these
9. Which of the following is NOT a type of broadband Internet connection?
(a) Spyware
(b) Adware
(c) Spam
(d) Malware
(e) None of these
10. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as
Answers:
1. c
2. a
3. a
4. b
5. a
6. c
7. b
8. a
9. c
10. d

1. A(n)contains commands that can beselected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
2. An error is also known as
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
3. Arithmetic Operations
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the
other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND,OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
4. Sending an e-mail is similar to
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
5. Promotion in Marketing means
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
6. Microsoft Word is an example of
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
7. Sources of Sales Leads are
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
8. Any data or instruction entered into the memory of a computer is considered as
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Computer Quiz

9. Which part of the computer displays the work done?
(A) RAM
(B) printer
(C) monitor
(D) ROM
(E) None of these
10. One of the methods for Market Monitoring is
(A) to watch TV serials
(B) to discuss with other sales persons
(C) to monitor media outlets
(D) All of these
(E) None of these
Answers
1. (B)
2. (A)
3. (D)
4. (C)
5. (C)
6. (C)
7. (E)
8. (A)
9. (C)
10. (C)

1. If a word is typed that is not in Words dictionary, a____________ wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
2. The____________ button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
3. In Excel, any set of characters containing a letter , hyphen, or space is considered
(A) a formula
(B) text
(C) a name
(D) a title
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
7. The operating system is the most common type of____________ software.
(A) communication
(B) application
(C) system
(D) word-processing
8. When you quickly press and release the left mouse button twice , you are
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
9. The horizontal and vertical lines on a worksheet are called
(A) cells
(B) sheets
(C) block lines
(D) gridlines
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
Computer Quiz

(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
12. During the boot process, the____________ looks for the system files.
(A) CD
(B) BIOS
(C) CPU
(D) DVD
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention
is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Answers:
1 A 11 D
2 D 12 B
3 B 13 C
4 C 14 A
5 C 15 C
6 B
7 C
8 C
9 D
10 D

1. Which generation of computer is still under development?
a. Fourth Generation
b. Fifth Generation
c. Sixth Generation
d. Seventh Generation
2. Artificial Intelligence is associated with which generation?
a. First Generation
b. Second Generation
c. Fifth Generation
d. Sixth Generation
3. Which operation is not performed by computer?
a. Inputting
b. Processing
c. Controlling
d. Understanding
4. Fifth generation computer is also known as
a. Knowledge information processing system
b. Very large scale integration (VLSI)
c. Both of above
d. None of above
5. Central Processing Unit is combination of
a. Control and storage
b. Control and output unit
c. Arithmetic logic and input unit
d. Arithmetic logic and control unit
6. The brain of any computer system is
a. Control Unit
b. Arithmetic Logic Unit
c. Central Processing Unit
d. Storage Unit
7. Pick the one that is used for logical operations or comparisons such as less than equal to or greater than.
a. Arithmetic and Logic Unit
b. Control Unit
c. Both of above
d. None of above
8. Analog computer works on the supply of
a. Continuous electrical pulses
b. Electrical pulses but not continuous
c. Magnetic strength
d. None of the above
9. Digital devices are
a. Digital Clock
b. Automobile speed meter
c. Clock with a dial and two hands
d. All of them
10. The computer that process both analog and digital is called
a. Analog computer
b. Digital computer
c. Hybrid computer
d. Mainframe computer
Computer Quiz

d. Mainframe computer
ANSWERS:
1: b. Fifth Generation
2: c. Fifth Generation
3: d. Understanding
4: a. Knowledge information processing system
5: d. Arithmetic logic and control unit
6: c. Central Processing Unit
7: a. Arithmetic and Logic Unit
8: a. Continuous electrical pulses
9: a. Digital Clock.
10: c. Hybrid Computer

1. Operating System is a common type of _______ software
(a) Word-processing
(b) System
(c) communication
(d) Application
2. OSI model consists of how many layers?
(a) six
(b) seven
(c) eight
(d) nine
3. Ram is built from
(a) Vacuum Tubes
(b) super-conductors
(c) Semi-conductors
(d) Transistors
4. First generation of computers had?
(a) Integrated Circuits
(b) Vaccum Tubes and Magnetic Drum
(c) Magnetic Tape and Transistors
(d) None of these
5. Storage area of a variable is known as
(a) Mouse
(b) Address
(c) Data Type
(d) Password
6. A software that transfers electronic mail messages from one computer to another using Client-Server
Application is
(a) None of these
(b) Both
(c) MTA
(d) MHS
7. A computer having more than one processor is called
(a) Processors
(b) Multiprocessing
(c) Multiprogramming
(d) Multitasking
8. Cpu and Memory are located on the
(a) Expansion Board
(b) Mother Board
(c) Output Device
(d) Storage Device
9. BIOS Stand for
(a) Binary Input/ Binary Output
(b) None of these
(c) Both
(d) Basic Input/ Output System
10. Internet Banking is an example of
(a) Electronic Data Processing (EDP)
Computer Quiz

(a) Electronic Data Processing (EDP)
(b) Electronic Fund Transfer (EFT)
(c) MHS (Message Handling System)
(d) MTA (Message Transfer Agent)
11. Storage place for Documents, Movies, Images and Photographs is
(a) File Sever
(b) Web Sever
(c) Print Server
(d) Application Sever
12. A computer that provides Data Base services to another computer using
(a) Data Base Server
(b) Web Server
(c) Application Server
(d) File Server
13. Broadband is a _______ Connection
(a) Slow
(b) High
(c) Wireless
(d) Wired
14. In which form data is stored in the computer
(a) Octal
(b) Binary
(c) Decimal
(d) HexaDecimal
15. HTTP Stands for ______
(a) Hyper Text Transfer Protocol
(b) Hyper Transfer Text Protocol
(c) Hyper Text Transfer Package
(d) Hyper Transfer Text Package
ANSWERS:
1. b
2. b
3. c
4. b
5. b
6. b
7. b
8. b
9. d
10. b
11. a
12. a
13. d
14. b
15. a

1. To make the number pad act as directional arrows you press the _______ key.
(1) num lock
(2) caps lock
(3) arrow lock
(4) shift
(5) None of these
2. In the binary language each letter of the alphabet, each number and each special character is made up of a
unique combination of :
(1) eight bytes
(2) eight kilobytes
(3) eight characters
(4) eight bits
(5) None of these
3. To access a mainframe or supercomputer, users often use a :
(1) terminal
(2) node
(3) desktop
(4) handheld
(5) None of these
4. A(n) __________ is text that you want printed at the bottom of the page.
(1) header
(2) endnote
(3) footnote
(4) footer
(5) Non of these
5. ____spreads on network.
(1) Worm
(2) Virus
(3) Trojan Horse
(4) Computer virus
(5) None of these
6. ____ is the encompassing term that involves the use of electronic platforms - intranets, extranets and the
Internet - to conduct a company's business.
(1) e-commerce
(2) e-business
(3) e-governance
(4) e-payment
(5) None of these
7. Which Layer is not present in TCP/IP model?
(1) Application layer
(2) transport layer
(3) Network access layer
(4) session layer
(5) None of these
8. Portrait and Landscape are
(1) Page Orientation
(2) Paper Size
(3) Page Layout
(4) All of above
(5) None of these
9. If you need to change the typeface of a document, which menu will you choose?
(1) Edit
(2) View
(3) Format
Computer Quiz

(3) Format
(4) Tools
(5) None of these
10. Which of the following is not a font style?
(1) Bold
(2) Italics
(3) Regular
(4) Superscript
(5) None of these
11. Which term identifies a specific computer on the web and the main page of the entire site
(1) URL
(2) Web site address
(3) Hyperlink
(4) Domain name
(5) None of these
12. The code that relational database management systems use to perform their database task is referred to as.....
(1) QBE
(2) SQL
(3) OLAP
(4) Sequel Server
(5) None of these
13. Chip is a common nickname for a (n):
(1) transistor
(2) resistor
(3) integrated circuit
(4) semiconductor
(5) None of these
14. The purpose of the primary key in a database is to:
(1) unlock the database
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
15. GUI is used as an interface between-
(1) hardware and software
(2) man and machine
(3) Software and user
(4) All of the above
(5) None of these
ANSWERS :
1. 1 11. 1
2. 4 12. 2
3. 1 13. 3
4. 4 14. 3
5. 1 15. 3
6. 2
7. 4
8. 1
9. 3
10. 4

Q1. Which of the following are three fundamental characteristics that make a computer useful?
(1) Lightweight, inexpensive, and sturdy
(2) Speed, reliability, and storage capability
(3) Durable, connectible, and renewable
(4) all of the above
(5) none of these
Q2. Software used for database management can store data, update it, __________ it, retrieve it, report it,
and print it.
(1) manipulate
(2) download
(3) see
(4) all of the above
(5) none of these
Q3. The process of analyzing large data sets in search of new, previously undiscovered relationships is known
as:
(1) data mining
(2) data marting
(3) data maintenance
(4) data warehousing
(5) none of these
Q4. The basic unit of a work sheet into which you enter data in excel is called a ______________
(1) Tab
(2) cell
(3) box
(4) range
Q5. __________ is the process of dividing the disk into tracks and sectors
(1) tracking
(2) formatting
(3) crashing
(4) allotting
(5) none of these
Q6. In Excel, __________ allows users to bring together copies of workbooks those others users have worked
on independently
(1) Copying
(2) merging
(3) pasting
(4) compiling
(5) none of these
Q7. Mobile commerce is best described as ______
(1) the use of kioske in marketing
(2) transporting products
(3) buying and selling goods/services through wireless handled devices
(4) using notebook PCs in marketing
Q8. Soft copy of a document has the characteristics that it can be:
(1) touched
(2) viewed only
(3) touched and viewed
(4) All of the above
(5) None of the above
Q9. The browser's ________ keeps a list of web pages you have visited during the current session.
(1) history
(2) cache
Computer Quiz

(2) cache
(3) favorites
(4) trail
(5) None of these
Q10. Which application is not typically included in an MS Office suite?
(1) word processor
(2) spreadsheet
(3) antivirus
(4) database
(5) None of these
Q11. Bold, italics and underline are features used in many, programs. To which of the following items can
these features be applied?
(1) files
(2) pictures
(3) text
(4) windows
(5) None of these
Q12. A handheld computer known as a PDA stands for:
(1) personal digital assistant.
(2) personalized digital assistance.
(3) planned digital associate.
(4) practical digitized associate.
(5) None of these
Q13. The primary difference between a LAN and a WAN is the:
(1) distance that the network spans.
(2) size of the servers.
(3) difference in the variety and number of output devices.
(4) power of the terminals.
(5) none of these
Q14. Which of the following is allows you to print?
(1) Ribbon
(2) monitor
(3) go now
(4) Ctrl+P
(5) None of these
Q15. When your computer stops working suddenly, it is refereed as a
(1) Crash
(2) die
(3) death
(4) Penalty
(5) None of these
ANSWERS:
1. 2
2. 1
3. 1
4. 2
5. 2
6. 2
7. 3
8. 2
9. 1
10. 3
11. 3
12. 1
13. 1
14. 4
15. 1

Q1. Diskette and hard disks are
(1) Direct access devices
(2) Sequential access devices
(3) Slower than magnetic tape
(4) Used only in mainframe computers
Q2. The main system board of a computer is called the ..........
(1) integrated circuit
(2) motherboard
(3) processor
(4) microchip
(5) None of these
Q3. On which layer of the OSI model the router configuration reside :-
(1) Transport
(2) Network
(3) Logical link
(4) Physical
Q4. Which of the following is a sequential access device
(1) Hard disk
(2) Optical disk
(3) Tape
(4) Flash memory
Q5. If you change Windows 98 to Windows XP, you are actually performing ...........
(1) Upstart
(2) upgrade
(3) update
(4) patch
(5) None of these
Q6. Fastest type of memory from the following list is
(1) Tape
(2) Semiconductor
(3) Disk
(4) Bubble memory
Q7. C++ is a(n) _________ language
(1) Object Oriented
(2) Procedural
(3) Functional
(4) Imperative
Q8. Using output devices one can ............
(1) input data
(2) store data
(3) scan data
(4) view or print data
(5) None of these
Q9. Which of the following are advantages of CD-ROM as a storage media?
(1) CD-ROM is an inexpensive way to store large, amount of data and information
(2) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(3) CD-ROMs make less errors than magnetic media
(4) All of the above
(5) None of these
Q10. Accumulator is a _______
(1) Hardwired unit
Computer Quiz

(1) Hardwired unit
(2) Sequential circuit
(3) Finite state machine
(4) Register
(5) None of these
Q11. A sequence of instructions,in a computer language to get the desired result is known as
(1) Process
(2) Program
(3) Software
(4) None of these
Q12. To make a copy of the current document to disk ........
(1) Use the 'Save' command
(2) This cannot be done
(3) Use the 'duplicate' command
(4) Copy the document
(5) Use the 'save as' command
Q13. Your position in the text is shown by a ..........
(1) Blinker
(2) Cursor
(3) Causer
(4) Pointer
(5) None of these
Q14. A computer program that converts an entire program into machine language at one time is called a/ an ____
(1) interpreter
(2) simulator
(3) compiler
(4) numbers
(5) None of these
Q15. UNIVAC is
(1) Universal Automatic Computer
(2) Universal Array Computer
(3) Unique Automatic Computer
(4) Unvalued Automatic Computer
Q16. The capacity of 3.5 inch floppy disk is
(1) 1.40 MB
(2) 1.44 GB
(3) 1.40 GB
(4) 1.44 MB
Q17. ____________is the ability of a device to "jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these
Q18. Who amongst the following is called the father of modern computing?
(1) Charles Babbage
(2) Hollerith
(3) Gottfried von Leibnitz
(4) Joseph M. jacquard
(5) None of these
Q19. Superscript, subscript, outline, emboss, engrave are known as ______
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these

Q20. Documents converted to .......... can be published to the Web.
(1) .doc file
(2) http
(3) machine language
(4) HTML
(5) none of these
ANSWERS:
1. 1 11. 2
2. 2 12. 5
3. 2 13. 2
4. 3 14. 3
5. 2 15. 1
6. 2 16. 4
7. 1 17. 2
8. 4 18. 1
9. 4 19. 2
10. 4 20. 4

Q1. Mostly which of the following device is used to carry user files?
A. Floppy Disk
B. Hard Disk
C. RAM
D. CDROM
Q2. Which device is used to backup the data?
A. Floppy Disk
B. Tape
C. Network Drive.
D. All of the above
Q3. In order to play and hear sound on a computer, one needs:
A. a sound card and speakers
B. a microphone
C. all of them required
D. none of them required
Q4. Which of the following are the cheapest memory devices in terms of Cost/Bit?
A. Semiconductor memories
B. Magnetic Disks
C. Compact Disks
D. Magnetic Tapes
Q5. Which of the following are the best units of data on an external storage device?
A. Bits
B. Bytes
C. Hertz
D. Clock cycles
Q6. Which of the following have the fastest access time?
A. Semiconductor Memories
B. Magnetic Disks
C. Magnetic Tapes
D. Compact Disks
Q7. Which of the following is a read only memory storage device?
A. Floppy Disk
B. CDROM
C. Hard Disk
D. None of these
Q8. Which of the following is a programming language?
A. Lotus
B. Pascal
C. MS-Excel
D. Netscape
Q9. What is a compiler?
A. A compiler does a conversion line by line as the program is run
B. A compiler converts the whole of a higher level program code into machine code in one step
C. A compiler is a general purpose language providing very efficient execution
D. None of the above
Q10. What is an interpreter?
A. An interpreter does the conversion line by line as the program is run
B. An interpreter is the representation of the system being designed
C. An interpreter is a general purpose language providing very efficient execution
D. None of the above
Computer Quiz

Q11. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits?
A. ANSI
B. ASCII
C. EBCDIC
D. ISO
Q12. A Pixel is
A. A computer program that draws picture
B. A picture stored in secondary memory
C. The smallest resolvable part of a picture
D. None of these
Q13. Which device is used as the standard pointing device in a Graphical User Environment?
A. Keyboard
B. Mouse
C. Joystick
D. Track ball
Q14. Which number system is usually followed in a typical 32-bit computer?
A. 2
B. 10
C. 16
D. 32
Q15. Which number system is usually followed in a typical 32-bit computer?
A. Binary
B. Decimal
C. Hexadecimal
D. Octal
Q16. Which of the following is not an output device?
A. Scanner
B. Printer
C. Flat Screen
D. Touch Screen
Q17. Which of the following devices have a limitation that we can only store information to it but cannot erase or
modify it?
A. Floppy Disk
B. Hard Disk
C. Tape Drive
D. CDROM
Q18. Which technology is used in Compact disks?
A. Mechanical
B. Electrical
C. Electro Magnetic
D. Laser
Q19. Which of the following storage devices can store maximum amount of data?
A. Floppy Disk
B. Hard Disk
C. Compact Disk
D. Magneto Optic Disk
Q20. Which of the following is the largest manufacturer of Hard Disk Drives?
A. IBM
B. Seagate
C. Microsoft
D. 3M
Q21. The programs which are as permanent as hardware and stored in ROM is known as
A. Hardware
B. Software

B. Software
C. Firmware
D. ROM ware
Q22. Memory unit is one part of
A. Input device
B. Control unit
C. Output device
D. Central Processing Unit
Q23.Who built the first Mechanical Calculator
A. Joseph Marie Jacquard
B. John Mauchly
C. Blaise Pascal
D. Howard Aiken
Q24. The earliest calculating devices are
A. Abacus
B. Clock
C. Difference Engine
D. None of these
ANSWERS:
1. A 13. B
2. D 14. A
3. A 15. A
4. C 16. A
5. B 17. D
6. A 18. D
7. B 19. B
8. B 20. B
9. B 21. C
10. A 22. D
11. B 23. C
12. C 24. A

Q1. To save a document in different location use ______.
(1) Save
(2) Save as
(3) Save as web page
(4) All of above
(5) None of these
Q2. The two broad categories of software are:
(1) word processing and spreadsheet.
(2) transaction and application.
(3) Windows and Mac OS.
(4) system and application.
Q3. Personal computers can be connected together to form a_______.
(1) server
(2) supercomputer
(3) network
(4) enterprise
(5) None of these
Q4. A concentric circle on a disk is called a________
(1) cylinder
(2) track
(3) head
(4) sector
(5) none of these
Q5. A computer checks the _____ of user names and passwords for a match before granting access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these
Q6. All of the following are considered to be storage devices EXCEPT_______
(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these
Q7. The standard protocol of the internet is __________
(1) TCP/IP
(2) java
(3) HTML
(4) flash
(5) None of These
Q8. A _____________ is a computer attached to the Internet that runs a special web server software and can send
Web pages out to other computers over the Internet
(1) Web client
(2) Web system
(3) web page
(4) web server
(5) None of these
Q9. After a user has saved and deleted many files, many scattered areas of stored data remain that are too small
to be used efficiently, causing ___________
(1) disorder
(2) turmoil
Computer Quiz

(2) turmoil
(3) disarray
(4) fragmentation
(5) None of these
Q10. Which of the following is the communications protocol that sets the standard used by every computer that
accesses Web - based information?
(1) XML
(2) DML
(3) HTTP
(4) HTML
(5) None of these
ANSWERS:
1. 2
2. 4
3. 3
4. 2
5. 4
6. 2
7. 1
8. 4
9. 4
10. 3

You might also like