Computer Informatics Chapter 4
Computer Informatics Chapter 4
2. Your operating system will detect and install the appropriate device drivers for this type of
device:
a) Plug and play
b) Plug and go
c) Plug and continue
d) Plug and commence
3. The component which makes a computer to work through commands is called _____.
(a) software
(b) hardware
(c) malware
(d) junkware
4. Software ______.
(a) consumes power through hardware
(b) is inferred through the working of hardware
(c) controls the hardware
(d) all of them
5. The component of computer which is not physically accessible, but can be realized through
its working is called _______.
(a) hardware
(b) software
(c) RAM
(d) port
9. ______ schedules processor time and handles concurrency and parallel processing using
multiple processor cores.
(a) application software
(b) virus
(c) malware
(d) operating system
10. ______ allots memory for each program and frees memory when it is no longer needed for a
program.
(a) application software
(b) virus
(c) malware
(d) operating system
11. The core of the operating system which controls all hardware and application software, but
does not directly interact with the users is called _____ .
(a) kernel
(b) shell
(c) sap
(d) software
12. A layer of application software available for the user to interact with operating system
kernel is called ______ .
(a) kernel
(b) shell
(c) sap
(d) heart
13. After inserting the Windows installation media (like CD, DVD or pen drive), ________ message
is displayed.
(a) Press any key to boot from CD/ DVD ...
(b) Press Ctrl+Alt+Delete
(c) Press left button of mouse
(d) Press centre button of mouse
14. When Windows loads during installation, _____ are to be chosen first.
(a) keyboard layout
(b) language selection for installation
(c) both a & b
(d) neither a nor b
15. When the menu for managing hard disk partitions is displayed, _______ options help to
create, delete and format partitions.
(a) New
(b) Delete
(c) Format
(d) all of them
17. Durign installation of Windows, the computer ______ after copying files, installing features.
(a) reboots
(b) keeps on processing
(c) keeps on beeping
(d) plays music
18. During installation of Windows, user names and passwords are entered ______ the
operating system gets fully ready.
(a) before
(b) after
(c) only after
(d) subsequent to
19. After completing installation of Windows, _______ are to be installed for making the
computer safe and productive.
(a) anti-virus
(b) Office package
(c) Adobe Reader and other application software packages
(d) all of them
22. A term me? that the application software is priced separately from the computer hardware
is called
a) Unbundled
b) Bundled
c) Utility
d) None of these
25. Load address for the first word of the program is called
a) Linker address origin
b) Load address origin
c) Phase library
d) Absolute library
26. A display listing of program options which users can select, is called
a) Icons
b) Options
c) Selection
d) Menu
29. What is the name of the software system which combines many independent functions into
one package?
a) Knowledge based system
b) Multi adjustment
c) Integrated system
d) Expert system
30. What is the name given to the ability of a word processing that fit whole words on any line?
a) Word wrap
b) Clip art
c) Reformatting
d) Micro spacing
31. Some software packages attempt to encode the knowledge and decision rules of human
specialist in order to use them for making their own decisions. By what name are such
packages known?
a) Artificial intelligence package
b) Expert system
c) Expert system shell
d) knowledge based
35. Specialized program that allows the user to utilize in specific application is classified as
a) relative program
b) application programs
c) relative programs
d) replicate programs
38. Process to exit from computer by giving correct instructions such as ‘EXIT’ is classified as
a) log in
b) process out
c) process in
d) log out
1 2 3 4 5 6 7 8
9 10 11 12 13 14 15 16
17 18 19 20 21 22 23 24
25 26 27 28 29 30 31 32
33 34 35 36 37 38 39 40