Computer Objectives Questions and Answers
Computer Objectives Questions and Answers
A processor
a) is a device that performs a sequence of operations
specified by instructions in memory
b) is the device where information is stored
c) is a sequence of instructions
d) is typically characterized by interactive processing
and time of the CPUs time to allow quick response to
each other
Ans: A
2. Assembler is
a) a program that places programs into memory and
prepares them for execution
b) a program that automate the translation of assembly
language into machine language
c) a program that accepts a program written in a high
level language and produces an object program
d) is a program that appears to execute a source program
if it were machine language
Ans: B
3. A loader is
a) a program that places programs into memory and
prepares them for execution
b) a program that automate the translation of assembly
language into machine language
c) a program that accepts a program written in a high
level language and produces an object program
d) is a program that appears to execute a source program
if it were machine language
Ans: A
4. When a computer is first turned on or restarted, a
special type of absolute loader is executed, called a
a) Compile and Go loader b) Boot loader c) Bootstrap
loader d) Relating loader
Ans: C
5. In an absolute loading scheme, which loader
function(s) is (are) accomplished by programmer
a) Allocation b) Linking c) Both a and b d)
Reallocation
Ans: C
6. The primary job of the operating system of a
computer is to
a) command resources b) manage resources c) provide
utilities d) be user friendly
Ans: B
7. The operating system of a computer serves as a
software interface between the user and
a) hardware b) peripheral c) memory d) screen
Ans: A
8. The term operating system means
a) a set of programs which controls computer working
b) the way a computer operator works
Ans: B
18. Block or Buffer caches are used
a) to improve disk performance b) to handle interrupts
c) to increase the capacity of main memory d) to speed
up main memory read operation
Ans: A
D. Temporary
7. The computer code for the interchange of information
between terminals is
A. ASCII
B. BCD
C. EBCDIC
D. All of the above
A. Terminal
B. Light pen
C. Digitizer
D. Mouse
www.proprofs.com
1. EBCDIC can code upto how man different
characters?
A. A. 256
B. B. 16
C. C. 32
D. D. 64
2. The term gigabyte refers to
A. 1024 bytes
B. 1024 kilobytes
C. 1024 megabytes
D. 1024 gigabytes
3. Programs designed to perform specific tasks is known
as
A. System software
B. Application software
C. Utility programs
D. operating system
4. CAD stands for
A. 1965
B. 1962
C. 1971
D. 1966
6. In which language is source program written?
A. English
B. Symbolic
C. High-Level
A. Cylinder
B. Hub
C. Cluster
D. Surface
9. Which of the following is required when more than
one person uses a central computer at the same time?
A. Indent case
B. Sentence case
C. Toggle case
D. Lower case
2. Which key or key combination will move the
insertion point to the bottom of your document?
A. Ctrl+End
B. PageDown
C. Ctrl+Home
D. End
3. You can delete text by
A. Standard toolbar
B. Formatting toolbar
C. Drawing toolbar
D. WordArt toolbar
A. Save as
B. Save
C. Close
D. All of above
8. Hyperlinks can be created between a Word document
and
A. Microsoft PowerPoint
B. Microsoft Excel
C. Microsoft Access
D. All of above
A. Removable character
B. Non-Printing character
C. Printing Character
D. Hidden character
10. The default page orientation of word document is
A. Landscape
B. Portrait
C. Long sides
D. Double long side
11. The auto complete feature
A. Presents tip box with contents you can insert
by pressing the enter key
B. Checks the style of the documents
C. Checks the readability of the document
D. Checks the spelling in the document
12. The word wrap features
A. Automatically move text to the next line when
necessary
A. Ctrl+Shift+F9 key
B. Shift + F9
C. Ctrl+Alt key
D. None of above
18. Italics allows you to emphasize text by
A. Adding a blinking background.
B. Slanting the text to the left
C. Placing the text above the baseline
D. Slanting the text to the right
19. We can change the line spacing of documents from
using the
A. Ctrl+G keys
B. F5 keys
C. Find And Replace Command on Edit menu
D. Select browser object button
A. Delete text
B. Link text
C. Copy text
D. Move text
29. o view smaller text on the screen you can
A. Standard toolbar
B. Formatting toolbar
C. Drawing toolbar
D. All of the above
24. When you want to view different parts of a
document without moving the insertion point.
A. Modifying a version
B. Deleting a version
C. Opening a version
D. None of above
D. Edit it
A. Auto text
B. Text direction
C. Bookmark
D. Auto Summarize
siteforinfotech.com
D) 15, 400
B) Ctrl+E
A) 1, 72
C) Ctrl+M
B) 2, 128
D) None of the above
C) 4, 1800
2. You can Hyperlink the file
D) 1, 1638
D) 15
A) Word Processor
B) Database
C) Image Editor
B) Ctrl+Page UP
D) File Manager
A) 20, 200
B) Ctrl+Shift+Enter
B) 10, 300
C) Ctrl+Enter
C) 10, 500
D) Both A and B
Answers:
1. B) Ctrl+E
2. D) Both A and C
3. D) File Manager
4. C) Status Bar
5. C) 10, 500
6. D) 1, 1638
7. B) 45
8. C) Both of the above
9 D) Form letters, envelopes, mailing labels and
catalog
10 D) Both A and B
1) The default language of Microsoft Word is ...
A. USA English
C. 2 lines
D. 8 lines
B. UK English
6) In which shortcut key use to center the selecting text.
C. Canadian English
A. Ctrl+F
D. Australian English
B. Ctrl+E
2) The default size of header and footer is ...
C. Ctrl+M
A. 0.5 inch
D. Ctrl+D
B. 1 inch
7) You can hyperlink the file ...
C. 0.75 inch
A. Pressing the Ctrl+k
D. 0.25 inch
B. Pressing the Ctrl+Shift+K
3) Ms Word 2007 allows creation of what type of
document by default?
A. WPF
B. TXT
C. DOC
A. characters
D. DOCX
B. symbols
C. formats
C. Ctrl+F6
A. pressing the ctrl+enter
D. Ctrl+F2
B. Pressing ctrl+shift+enter
C. Break command from view menu
D. Both A and B
A. Delete
10) Which would you choose to list synonyms and Auto
correct of a selected word?
B. Back Space
C. Space
A. Tools, spelling
D. All
B. Tools, Language
C. Tools, Options
D. Shift+F7
D. Word Fields
A. Place Holders
B. Pictures
B. Back Space
C. Space
A. Ctrl+F1
D. Home
B. Ctrl+F9
19) B. Cross-reference
20) A. Ctrl+Z
D. 8
5. Which of the following terms is the most closely
related to main memory?
A. Non-volatile
B. Permanent
C. Control unit
D. Temporary *
6. The computer industry uses prefixes of Greek origin
to measure large amounts of data. Which term describes
1024 bytes.
A. Kilobyte
B. Megabyte
C. Gigabyte
D. Terabyte
7. Which kind of storage device can be carried around?
A. Floppy disk
B. Hard disk
C. System cabinet
D. Hard disk drive
8. One nibble is equal to
A. 4 bits
B. 8 bits
C. 6 bits
D. 16 bits
9. In which area of the primary storage section are the
intermediate processing results held temporarily?
http://www.nareshmdr.com.np/ictexams
1. Which of the following is used for manufacturing chips?
A. Control bus
B. Control unit
C. Parity unit
D. Semiconductor
2. Which of the following terms applies to communication
between separate computer systems?
A. Computer literacy
B. Power supply
C. Applications software
D. Connectivity
3. Output hardware is often categorized according to
whether it:
A. Cost
B. Power consumption
C. Produces hardcopy or softcopy
D. Can fit on a desktop
4. The original ASCII code used _____ bits of each byte,
A. Light pen
B. Mouse
C. Digitizer
D. Terminal
A. NOR
B. NAND
C. OR
A. 5
B. 6
C. 7
A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM
12. The third generation of computers covers the period:
A. 1971-1982
B. 1982-1994
C. 1959-1964
D. 1965-1971
13. An electronic logic gate whose output is logic 0 only
when all inputs are logic 1 is
D. NOT
14. Which of the following is the expansion of EBCDIC
A. Extended bit comparable to digital interface for
computer
B. Extended bootable computerised digital
infrared calculator
C. Extended binary coded decimal interchange
code
D. Extended binary coded decimal information
code
15. A vertically aligned set of tracks on a disk pack is
known as
A. Cluster
B. Surface
C. Cylinder
D. Panel
16. Which is an electronic device that can store
temporarily a single bit of data.
A. Accumulator
B. Buffer
C. Memory
D. Latch
17. A digital device that processes data is known as
A. Data processor
B. Data entry
C. DBMS
D. Database
18. A Winchester disk is a
A. Disk Stack
B. Removable disk
C. Flexible disk
D. All of the above
19. Which one of the following is the first secondgeneration computer?
A. IBM 7090
B. IBM 801
C. IBM 7070
D. IBM 650
20. Which of the following is not a factor affecting the
processing capability or performance of a PC system?
C. BCD
D. All of the above
1. All of the following are examples of real security and
privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large
retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash
registers) are often connected to complex inventory and
sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless
handheld computer that scans an items tag and pulls
up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged
files from a criminals computer is an example of a
law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major
data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can
be used to record and track in a database all of the
animals movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by
manipulating devices through computers instead of
manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright,
available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and
structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to
produce machines that display the same type of
intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or
presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate
data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow
users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera
and processed appropriately, the actual print of the
picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language to
process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working
exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet,
each number and each special character is made up of a
unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you
can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices
EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input
device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of storage devices
EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the brains of
the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and photo-editing are
examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used
on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables
your computers hardware devices and
____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple
Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different
____________ to process data and different operating
systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other
computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
issue?
A. A virus has infected the system
B. Corrupted BOOT.INI file
C. Corrupt MBR
D. Boot sector corruption
2. A client has been unable to fix corruption of
system files and does not have a backup or an
Automated System Recovery (ASR) disk. Which of
the following is the BEST action to take next?
A. Copy the missing file from another computer and
reboot.
B. Execute a Windows repair from the Windows setup
media.
C. Boot into the Recovery Console and execute
FIXBOOT.
D. Reboot and press the F2 key when prompted.
3. A technician is called for a computer that is not
connecting to the network. Which of the following
would be the MOST common tool used to identify the
issue?
A. Cable tester
B. Multimeter
C. Loop back plugs
D. Crossover cable
4.Which of the following is the BEST solution for
repairing a hard drive that results in the NTLDR is
missing display upon booting?
A. Use recovery console and the fixmbr command.
B. Use recovery console and the bootcfg /rebuild
command.
C. Use recovery console and the fixboot command.
D. Use recovery console and the chkdsk command.
5. A customer reports they are unable to connect to
any computers outside of the office and they are
unable to connect to the Internet. When the
technician runs ipconfig, the customer gets the
following output:
IP address169.254.2.4
Subnet Mask.255.255.0.0
Default Gateway.
Which of the following could be causing the issue?
A. The subnet mask is not correctly configured.
B. The DNS client has not been configured on the
computer.
C. The DHCP client is unable to obtain an IP address
from the DHCP server.
D. The default gateway is not specified.
6. A user reports that their system is starting to run
slower, especially when opening large local files. The
system has sufficient RAM for the users applications,
but the hard drive seems to have higher than normal
activity when opening large files. Which of the
following would be the BEST tool to diagnose and
troubleshoot this problem? (PSC EXAM 2069)
A. Task Manager
B. NTBACKUP
C. FDISK
D. Disk Defragmenter
7. A user states they receive a message Boot device
not found half of the time they boot their system.
Which of the following is the MOST likely cause?
A. A dead CMOS battery
B. The OS is not installed on the hard drive
C. A faulty RAM
D. A faulty HDD connection
8. A user reports they can no longer change the web
browser home page. Which of the following is MOST
likely the problem?
A. They are using the wrong WEP key.
B. They have been infected with malware.
C. They have lost Internet connectivity.
D. They need to update their network device drivers.
9. A technician needs to check which ports are open
in the Windows Firewall. Which of the following will
allow the technician to view these settings?
A. netsh firewall show logging
B. ipconfig /all
C. netsh firewall show state
D. arp -a
10. Which of the following are methods to
automatically update the antivirus application? A.
Establish rules in the email scheduling program to
perform updates.
B. Select Update Now from the program options.
C. Use the Automatic Update feature built into the
application.
D. Use Windows Update.
11. A remote user is attempting to install a new
external storage device on their computer. The user
reports they only have one port open on the back of
the device and the port is similar to the USB port
their mouse is connected to. The port has a bevel on
one side and is slightly larger than the USB port.
Which of the following connector types is MOST
likely being described?
A. IEEE 1394
B. USB 2.0
C. PCMCIA
D. Parallel
12. A customer reports that their newly purchased
Windows Vista Home Premium notebook is unable
to see other computers in their home office. Which of
the following is the MOST likely cause?
A. The Windows Defender service is turned on.
B. The Network Location Type is Work.
C. The Network Location Type is Private.
D. The Network Location Type is Public.
13. A Windows XP system locks up after the GUI
starts to load. The system will start in Safe Mode.
The Event Viewer reports that a driver failed to load.
Which of the following methods would help diagnose
the problem?
A. Enable boot logging. In Safe Mode, read the
ntbtlog.txt file.
B. In Safe Mode, run the sigverif utility.
www.indiabix.com
1. Which of the following languages is more suited to a
structured program?
A.PL/1
B. FORTRAN
C. BASIC
D.PASCAL
E. None of the above
option: D
2. A computer assisted method for the recording and
analyzing of existing or hypothetical systems is
A.Data transmission
B. Data flow
C. Data capture
D.Data processing
E. None of the above
option: B
The brain of any computer system is
A.ALU
B. Memory
C. CPU
D.Control unit
E. None of the above
option: C
4. What difference does the 5th generation computer
have from other generation computers?
A.Technological advancement
B. Scientific code
C. Object Oriented Programming
D.All of the above
E. None of the above
option: A
option: B
6. The tracks on a disk which can be accessed without
repositioning the R/W heads is
A.Surface
B. Cylinder
C. Cluster
D.All of the above
E. None of the above
option: B
7. Which of the following is the 1's complement of 10?
A.01
B. 110
C. 11
D.10
E. None of the above
option: A
8. A section of code to which control is transferred when
a processor is interrupted is known as
A.M
B. SVC
C. IP
D.MDR
E. None of the above
option: A
9. Which part interprets program instructions and initiate
control operations.
A.Input
B. Storage unit
C. Logic unit
D.Control unit
E. None of the above
option: D
10. The binary system uses powers of
A.2
B. 10
C. 8
D.16
E. None of the above
option: A
11. A computer program that converts assembly
language to machine language is
A.Compiler
B. Interpreter
C. Assembler
D.Comparator
E. None of the above
option: C
12. The time required for the fetching and execution of
one simple machine instruction is
A.Delay time
B. CPU cycle
C. Real time
D.Seek time
E. None of the above
option: B
13. The time for which a piece of equipment operates is
called
A.Seek time
B. Effective time
C. Access time
D.Real time
E. None of the above
option: B
14. Binary numbers need more places for counting
because
A.They are always big numbers
B. Any no. of 0's can be added in front of them
C. Binary base is small
D.0's and l's have to be properly spaced apart
E. None of the above
option: C
15. Which access method is used for obtaining a record
from a cassette tape?
A.Direct
B. Sequential
C. Random
D.All of the above
E. None of the above
option: B