500 Important Computer Questions
500 Important Computer Questions
com
1). What is a popular program for creating documents 5). The world’s first truly platform independent
than that can be read on both a PC and a Macintosh programming language is called ___
computer? a) C++
a) Microsoft Word b) java
b) adobe in design c) visual basic.NET
c) adobe acrobat d) Smalltalk
d) quark xpress e) None of these
e) None of these 6). The most widely used type of database
2). What does dots per inch (DPI) measure? management system is the ___
a) number of bits a) flat database
b) density of the pixels on a computer screen b) network database
c) the density of bits on a disk c) relational database
d) density of graphic files stored on a hard d) hierarchical database
disk e) None of these
e) None of these 7). What is the newest type database, which is well
3). What type of software creates a smaller file that is suited for multimedia applications?
faster to transfer over the internet? a) object-oriented database
a) MPEG b) client/server database
1
www.ibpsguide.in | mock.ibpsguide.in | www.sscexamguide.com
www.ibpsguide.com
d) delete a character below the cursor 21). A ___ is a unique name that you give to a file of
e) None of these information
18). Which process checks to ensure the components a) folder
of the computer and operating are connected b) filename
properly? c) filename extension
a) booking d) device letter
b) processing e) None of these
c) saving 22). For seeing the output, you use
d) editing a) monitor
e) None of these b) keyboard
19). In a relational database, ___ is a data structure c) mouse
that organizes the information about a single topic into d) scanner
rows and columns e) None of these
a) block 23). The ___ manual tells you how to use a software
b) record program.
c) tuple a) documentation
d) table b) programming
e) None of these c) technical
20). How can the user determine what programs are d) user
available on a computer? e) None of these
a) fetching d) painting
b) storing e) None of these
c) executing 57). ___ is processed by the computer into
d) decoding information.
e) None of these a) numbers
53). The ___ key and the ___ key can be used in b) processor
combination with other to perform shortcuts and c) input
special tasks. d) data
a) control, alt e) None of these
b) function, toggle 58). Personal computer can be connected together to
c) delete, insert form a ___
d) caps lock, num lock a) server
e) None of these b) supercomputer
54). The most common input devices are the and the c) enterprise
___ d) network
a) microphone, printer e) None of these
b) scanner, monitor 59). Which of the following is not necessary to be
c) digital camera, speakers considered computer-literate?
d) keyboard, mouse a) The ability to write the instructions that
e) None of these direct a computer
d) parallel b) Simulations
e) both a) and b) c) animatronics
70). How many layers are there in aTCP/IP model? d) Graphics
a) four e) Animations
b) five 74). Step-by-step instructions that run the computer
c) six are
d) seven a) CPUs
e) three b) Programs
c) Solutions
Answer: d) Hardware
61) a) 62) e) 63) c) 64) a) 65) a) 66) d) 67) a) 68) e) Documents
d) 69) b) 70) b) 75). The process of writing computer instructions in a
programming language is known as
71). Which is a secondary memory device? a) Processing
a) Mouse b) Algorithming
b) floppy disk c) coding
c) scanner d) File
d) CPU e) Instructioning
e) ALU 76). Which of the following refers to too much
72). Which of the following is possible with open electricity and may cause a voltage surge?
78). Which of the following is used to write web a) send electronic mail
pages? b) view web pages
a) URL c) connect to servers all around the world
b) HTML d) all of these
c) HTTP e) None of these
d) FTP 83). Which of the following options is concerned with
e) Telnet people related to computing process?
79). _____ is the most important/powerful computer in a) hardware
a typical network. b) humanware
a) Network client c) software
b) Desktop d) firmware
c) Network switch e) None of these
d) Network station 84). Which of the following is considered as both
e) Network server input and output device?
80). Raw, unprocessed facts, including text, numbers, a) printer
images, and sounds, are called b) speaker
a) applets c) modem
b) data d) monitor
c) metaware e) None of these
d) items 85). Which of the following is the second largest unit
b) Vital Information Recourse Under System 166). In processing cheques, which of the following
c) Vital Information Resource Under Secure PO techniques have Indian banks traditionally
d) Vital Information Resource Under Siege followed?
e) Virus Information Resource Under Siege a) VRT
162). Verification of a login name and password is b) OMR
known as ________. c) OCR
a) Configuration d) Barcode
b) Accessibility e) MICR
c) Logging in 167). Windows Explorer is the name of __________.
d) Authentication a) A drive
e) Subscription b) A file manager
163). Microsoft Word is an example of a/an _____. c) A web browser
a) System software d) An internet server
b) Application software e) A network
c) Operating System 168). GUI stands for ________.
d) Processing device a) Graphical Universal Interference
e) Input device b) Graphic Universal Interface
164). What does the acronym PDF stands for c) Graphical User Interface
________. d) Graphical Unity Interference
a) Portable Documentation File e) Graph Utility Interference
187). A set of step-by-step procedures for 191). Which of the following is false for freeware
accomplishing a task is known as a(n) ________. software?
a) algorithm a) Source code is available
b) hardware program b) Freeware softwares can be redistributed.
c) software bug c) These cannot be modified
d) firmware program d) All of the above
e) None of these e) None of the above
188). Which of the following is not true about RAM? 192). UNICODE is
a) RAM is a temporary storage area a) 8 bit
b) RAM is the same as hard disk storage b) 4 bit
c) RAM is volatile c) 16 bit
d) Information stored in RAM is gone when d) 24 bit
you turn the computer off e) 28 bit
e) None of these 193). In the given URL, http://www.khoj.com, what do
189). The main directory of a disk is called the ‘.com’ means?
________ directory. a) Protocol
a) root b) Domain name
b) sub c) Path
c) folder d) Route
d) network e) None of these
c) A malicious parasite that feeds on your 218). A powerful key that lets you exit a program when
messages and destroys the contents pushed _______.
d) A list of CC or BCC recipients a) Arrow key
e) A friend to whom e-mail is sent regularly b) Spacebar
214). Which of the following is a type of software that c) Escape key
controls the internal operations in the computer and d) Return key
also how the computer works with all its parts? e) None of these
a) Shareware 219). Numbers and formulae entered in a cell are
b) Public domain software called ______.
c) Application software a) Labels
d) Operating System software b) Numeric entries
e) None of these c) Intersection
215). Which of the following is not a function of the d) Text
control unit? e) Fillers
a) Read instruction 220). What is software?
b) Execute instructions a) A type of computer code
c) Interpret instruction b) A computer language
d) Direct operations c) A set of instructions for your computer
e) None of these d) A cover for the computer
216). Software for organizing storage and retrieval of e) None of these
26
www.ibpsguide.in | mock.ibpsguide.in | www.sscexamguide.com
www.ibpsguide.com
d) It conducts a power-on self test or POST b) A pen-shaped device which allows data to
e) None of these be entered through the CRT screen
248). The feature to customize the desktop to display c) A figure which resembles a familiar office
information that can be updated from internet is device
a) Active desktop d) An outdated input device
b) Online desktop e) None of these
c) E-mail 252). The ___________ folder retains copies of
d) Resource Sharing messages that you have started but are not yet ready
e) None of these to send.
249). ___ is a process of sending documents to a a) Inbox
storage where they are temporarily stored and remain b) Outbox
a) Printing c) Drafts
b) Queuing d) Sent Items
c) Waiting Queue e) Address Book
d) Print Spooling 253). The ability of an OS to run more than one
e) None of these application at a time is called
250). Firewall is used in communication network a) multitasking
system to save b) object-oriented programming
a) Unauthorized attack c) multi-user computing
b) Virus attack d) time-sharing
31
www.ibpsguide.in | mock.ibpsguide.in | www.sscexamguide.com
www.ibpsguide.com
incorporates the screen, the keyboard, storage, and 277). A _______ is a set of rules.
processing components into a single portable unit. a) Resource locator
a) notebook b) domain
b) journal c) hypertext
c) diary d) URL
d) briefcase e) Protocol
e) None of these 278). The connection between your computer at
273). Soft copy refers to home and your local ISP is called
a) Printed output a) The last mile
b) Music sounds b) The home stretch
c) Screen output c) The home page
d) Digitizing d) The backbone
e) None of these e) The vital mile
274). Meaningful filename helps in easy file 279). To drop a column that is used as a foreign key,
a) Storing first
b) Accessing a) Drop the primary key
c) Identification b) Drop the table
d) Printing c) Drop the foreign key constraint
e) None of these d) All of these
275). Which of the following controls the manner of e) None of these
289). The PC productivity tool that manipulates data 292).When installing ___________, the user must copy
organized in rows and columns is called a(n) and usually decompress program files from a CD-
a) Spreadsheet ROM or other medium to the hard disk.
b) Presentation mechanism a) Programming software
c) Word processing document b) System hardware
d) Database record manager c) Applications hardware
e) EDI creator d) Applications software
290). In the absence of parentheses, the order of e) None of these
operation is 293).A collection of interrelated files in a computer is
a) Exponentiation, addition or subtraction, a
multiplication or division a) File manager
b) Addition or subtraction, multiplication or b) field
division, exponentiation c) record
c) Multiplication or division, exponentiation, d) database
addition or subtraction e) None of these
d) Exponentiation, multiplication or division, 294).For creating a document, you use __________
addition or subtraction command at File Menu.
e) Addition or subtraction, exponentiation, a) Open
multiplication or division b) Close
c) New
e) Enterprise Retention Planning 316). If you want to locate the hardware address of a
312). A term related to sending data to a satellite is local device, which protocol will you use?
a) downlink a) ARP
b) Modulate b) RAP
c) demodulate c) ICMP
d) uplink d) PING
e) Inter-relate e) PONG
313). What are the four things required to connect to 317). Memory unit is one part of
the Internet? a) Control Unit
a) Telephone line, Modem, computer and b) Central Processing Unit
ISP c) Input Device
b) Modem, Computer, PDA and ISP d) Output device
c) Telephone line, PDA, Modem and e) None of these
Computer 318). A character of information is represented by
d) Computer, ISP, Modem and a(n)
Communication software a) byte
e) Monitor, Keyboard, Mouse and Modem b) bit
314). The process of transferring files from a computer c) field
on the Internet to you computer is called________. d) attribute
a) downloading e) None of these
346). What is the easiest way to change the phrase 349). Video processors consists of _____ and _____,
“revenue, profits, gross margin” to read “revenues, which store and process images.
profits, and gross margin”? a) CPU and VGA
a) Use the insert model, position the cursor b) CPU and memory
before the g in gross, then type the word c) VGA and memory
followed by a space d) VGI and DVI
b) Use the insert mode, position the cursor e) None of these
after the g in gross, then type the word 350). ____ are words that a programming language
followed by a space has set aside for its own use.
c) Use the over type mode, position the a) Control words
cursor before the g in gross, then type the b) Control structures
word followed by a space c) Reserved words
d) Use the over type mode, position the d) Reserved keys
cursor after the g in gross, then type the word e) None of these
followed by a space
e) None of these Answer:
347). A program, either talk or music, that is made 341) a) 342) b) 343) d) 344) b) 345) b) 346) a)
available in digital format for automatic download over 347) e) 348) d) 349) d) 350) c)
the internet is called a
a) Wiki 351). Where are you likely to find an embedded
402). A person who uses his or her expertise to gain a) Photo images, charts and graphs
access to other people’s computer to get information b) Graphs and clip art
illegally or to damage is a __________. c) Clip art and audio clips
a) hacker d) Full-motion video
b) analyst e) Content templates
c) instant messenger 407). A computer-intensive problems runs on a
d) programmer ________.
e) spammer a) Server
403). GUI stands for ________. b) Mainframe
a) Gnutella Universal Interface c) Supercomputer
b) Graphical User Interface d) Super PC
c) Graphic Uninstall/Install e) None of these
d) General Utility Interface 408). A (n) _________ converts and executes one
e) None of these statement at a time.
404). Permanent Memory in computer is called a) compiler
__________. b) interpreter
a) RAM c) converter
b) ROM d) instructions
c) CPU e) None of these
d) CD ROM 409). A program that converts a high-level language
53
www.ibpsguide.in | mock.ibpsguide.in | www.sscexamguide.com
www.ibpsguide.com
e) None of these 485). Which of the following can be used to select the
entire document?
Answers: a) Ctrl + H
471). a) 472). e) 473). d) 474). c) 475). a) 476). b) b) Alt + S
477). b) 478). b) 479). b) 480). b) c) Shift + E
d) Ctrl + A
481). Which of the following places the common data e) Ctrl + K
elements in order from smallest to largest? 486). The buying or selling of goods over the internet
a) Bit, byte, character, record, field, file, is termed as
database a) e - selling
b) Database, file, record, field, character b) e - buying
c) Character, record, field, database, file c) e - business
d) Character, file, record, field, database d) e – commerce
e) Character, field, record, file, database e) e - transaction
482). Specialized programs that assist users in 487). What are the program that block access to
locating information on the web are called ______. selected websites known as ?
a) Web browsers a) Channels
b) Information engines b) Filters
c) Data engines c) Browsers
d) Search engines d) Telnet
For More eBooks for SBI Clerk Prelims Exam 2016 Visit- www.ibpsguide.in
60
www.ibpsguide.in | mock.ibpsguide.in | www.sscexamguide.com