0% found this document useful (0 votes)
56 views

Computer Mcqs

This document contains a set of 16 multiple choice questions about computers: 1) The questions cover topics like computer components, memory types, file formats, and other basic computer concepts. 2) The answer key is provided after each question for self-assessment. 3) The questions are designed to test fundamental computer literacy and knowledge of common computer terms, hardware, and software.

Uploaded by

Ankit Jhariya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Computer Mcqs

This document contains a set of 16 multiple choice questions about computers: 1) The questions cover topics like computer components, memory types, file formats, and other basic computer concepts. 2) The answer key is provided after each question for self-assessment. 3) The questions are designed to test fundamental computer literacy and knowledge of common computer terms, hardware, and software.

Uploaded by

Ankit Jhariya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

COMPUTER

MCQ
SET-1
1. Which is considered a direct entry input 3) eight bits/vkB fcV~l
device? 4) sixteen bits/lksyg fcV~l
çR;{k ços'k buiqV fMokbl fdls ekuk tkrk gS\ 5) None of the above/mijksDr esa ls dksbZ ugha
1) Optical scanner/vkWfIVdy LdSuj Ans. (3)
2) Mouse/ekml 5. Which is a secondary memory device?

PP
3) Light pen/ykbV isu
4) Digitizer/fMftVkb”kj
Ekkè;fed eseksjh fMokbl dkSu lk gS\
1) CPU/lhih;w

A
5) All of the above/mijksDr lHkh 2) ALU/,-,y-;w
3) Floppy disk/ÝykWih fMLd

L
Ans. (5)
4) Mouse/ekml

L
2. The daily processing of corrections to

WI
customer accounts best exemplifies the
processing mode of: Ans. (3)
5) None of the above/mijksDr esa ls dksbZ ugha

xzkgdkas ds [kkrksa esa lq/kj dk nSfud çlaLdj.k6.lcls vPNk


Which is the computer memory that does

ER
çlaLdj.k eksM dk mnkgj.k nsrk gS%
1) Batch processing/cSp çlaLdj.k
not forget?
daI;wVj eseksjh dkSu&lh gS tks Hkwyrh ugha gS\

E
2) Real-time processing
okLrfod le; çlaLdj.k

R
3) Interactive processing/baVj,fDVo çlaLdj.k
1) ROM
2) RAM/jSe

A
3) PROM
4) Multi processing/cgq çlaLdj.k 4) All of the above/mijksDr lHkh

Ans.
3.
(1)
C
5) All of the above/mijksDr lHkh
Ans.
Which is a unit of measurement used with 7.
computer systems?
5) None of the above/mijksDr esa ls dksbZ ugha
(1)
The most common binary code in use today
is the 8 bit ASCII code. What do the letters
daI;wVj flLVe ds lkFk fdl eki dh bdkbZ dk mi;ksx fd;k ASCII stand for?
tkrk gS\ vkt dk lcls vke ckbujh dksMASCII
8 fcV dksM gSA
1) Byte/ckbV ASCII ds fy, dkSu ls v{kj [kM+s gSa\
2) Kilobyte/fdyksckbV 1) American Standard Code for
3) Megabyte/esxkckbV International Interchange
4) Gigabyte/xhxkckbV varjkZ"Vªh; baVjpsat ds fy, vesfjdh ekud dksM
5) All of the above/mijksDr lHkh 2) American Standard Code for
Ans. (5) Information Interchange
4. A character is represented in EBCDIC by lwpuk ekud ds fy, vesfjdh ekud dksM
EBCDIC esa ,d pfj=k dk çfrfu/Ro fd;k tkrk gS 3) American Standard Code for
1) one bit/,d fcV Intelligence interchange
2) four bits/pkj fcV~l BaVsfytsal baVjpsat ds fy, vesfjdu LVSaMMZ dksM

1 Computer By_Yatendra Nigam Sir


4) American Scientific Code for 1) System software/flLVe lkWÝVos;j
Information Interchange 2) A microcomputer/,d ekbØks daI;wVj
lwpuk baVjpsat ds fy, vesfjdh oSKkfud dksM 3) Documentation/çys[ku
5) None of the above/mijksDr esa ls dksbZ ugha 4) Applications software/,Yihds'ku lkWÝVos;j
Ans. (2)
5) All of the above/mijksDr lHkh
8. A computer derives its basic strength from
Ans. (4)
,d daI;wVj viuh ewy 'kfDr ls çkIr djrk gS
13. Which of the following is the most powerful
1) Speed/xfr
type of computer?
2) Accuracy/lVhdrk
fuEu esa ls dkSu&lk daI;wVj lcls 'kfDr'kkyh çdkj gS\
3) Memory/eseksjh
1) Super micro/lqij ekbØks
4) all of the above/mijksDr lHkh
5) None of the above/mijksDr esa ls dksbZ ugha 2) Super conductor/lqij daMDVj
Ans. (4) 3) Micro computer/ekbØks daI;wVj
9.

P
A collection of eight bits is called

P
vkB fcV~l dk ,d laxzg dgk tkrk gS
4) Super computer/lqij daI;wVj
5) Mega frame/esxk çQse

A
1) Byte/ckbV Ans. (4)
2) Word/'kCn

L
14. Which of the following people probably has
3) Record/fjdkWMZ

L
the least amount of technical knowledge?

Ans. (1)
WI
4) file/i+Qkby
5) None of the above/mijksDr esa ls dksbZ ugha
fuEufyf[kr esa ls fdl O;fDr ds ikl laHkor% de ls de
rduhdh Kku gS\
1) Programmer/çksxzkej
10.
R
A BIT represents a

E
,d BIT ,d dk çfrfuf/Ro djrk gS
2) User/mi;ksxdrkZ
3) System analyst/flLVe fo'ys"kd

RE
1) Decimal digit/n'keyo vad
2) Octal digit/v"Vk/kjh vad
3) Binary digit/ckbujh vad
4) Computer operator/daI;wVj vkWijsVj
5) Computer professional/daI;wVj is'ksoj

Ans.
A
4) Hexadecimal digit/gsDlkMsfley vad

C
5) none of these/buesa ls dksbZ ugha
(3)
Ans.
15.
(2)
The Central Processing Unit (CPU)
consists of:
dsaæh; çlaLdj.k bdkbZ (lhih;w) eas fuEufyf[kr 'kkfey gSa
11. Which can read data and convert them to
a form that a computer can use? 1) Input, output and processing
dkSu lk MsVk i<+ ldrk gS vkSj mUgsa ,d ,sls :i esa ifjofrZr buiqV] vkmViqV vkSj çkslsflax
dj ldrk gS ftls daI;wVj mi;ksx dj ldrk gS\ 2) Control unit, primary storage &
1) Logic/rdZ secondary storage
2) Storage/HkaMkj.k fu;a=k.k bdkbZ] çkFkfed HkaMkj.k vkSj ekè;fed HkaM
3) Control/fu;a=k.k 3) Control unit, arithmetic-logic unit,
4) Input device/buiqV fMokbl primary storage
5) Output device/vkmViqV fMokbl fu;a=k.k bdkbZ] vadxf.kr&rdZ bdkbZ] çkFkfed HkaM
Ans. (4) 4) Control unit, processing, and primary
12. Software instruction intended to satisfy a storage
user’s specific processing needs are called fu;a=k.k bdkbZ] çlaLdj.k vkSj çkFkfed HkaMkj.k
mi;ksxdrkZ ds fof'k"V çlaLdj.k vko';drkvksa dks larq"V
5) None of the above/mijksDr esa ls dksbZ ugha
djus ds mí'; ls lkWÝVos;j baLVªD'ku dks dgk tkrk gS
Ans. (3)

2 Computer By_Yatendra Nigam Sir


16. This is the part of the computer system 21. The most important or powerful computer
that one can touch in a typical network.
;g daI;wVj flLVe dk og fgLlk gS ftls dksbZ Nw ldrk gSfof'k"V usVodZ esa lcls egRoiw.kZ ;k 'kfDr'kkyh daI;wVj
1) hardware/gkMZos;j
1) desktop/MsLdVkWi
2) data/MsVk
2) network client/usVodZ DykbaV
3) software/lkWÝVos;j
4) input/buiqV 3) network server/usVodZ loZj
5) None of these/buesa ls dksbZ ugha 4) network station/usVodZ LVs'ku
Ans. (1) 5) None of these/buesa ls dksbZ ugha
17. Reusable optical storage will typically have Ans. (3)
the acronym ___. 22. To access a mainframe or supercomputer,
iqu% ç;ksT; vkWfIVdy HkaMkj.k esa vkerkSj ij---------------------------
users often use a ___
-------------dk laf{kIr uke gksxkA ,d esuçQse ;k lqij daI;wVj dk mi;ksx djus ds fy,]
1) CD/lh-Mh- 2) RW/vkjMCY;w
mi;ksxdrkZ vDlj--------------------------dk mi;ksx djrs gSa

Ans.
3)
5)
(2)
PP
DVD/MhohMh 4) ROM/jkse
None of these/buesa ls dksbZ ugha
1) terminal/VfeZuy
2) node/uksM
18. The
use
A
__________ tells the computer how to

L
its components.
3) desktop/MsLdVkWi
4) handheld/gkFk esa

IL
----------------------daI;wVj dks mlds ?kVdksa dk mi;ksx5)
rjhdk crkrk gSA
1) utility/mi;ksfxrk
Ans. (1)
djus None
dk of these/buesa ls dksbZ ugha

RW
2) network/usVodZ
3) operating system/vkWijsfVax flLVe
23. What data base function allows you to
define the data your database is storing?
D;k MsVk csl i+QaD'ku vkidks ml MsVk dks ifjHkkf"kr dj

EE
4) application program/vkosnu dk;ZØe
5) None of these/buesa ls dksbZ ugha vuqefr nsrk gS ftls vkidk MsVkcsl LVksj dj jgk gS\
1) Definition wizard/ifjHkk"kk tknwxj

R
Ans. (3)
19. A(n)__________is a program that makes the 2) Query Function/Dosjh lekjksg

A
computer easier to use.

C
3) Design view/fM”kkbu ns[ksa
(n)_______,d ,slk çksxzke gS tks daI;wVj dk mi;ksx djuk 4) Data dictionary/MsVk 'kCndks'k
vklku cukrk gSA
1) application/vkosnu
Ans. (4)
5) None of these/bueas ls dksbZ ugha

2) utility/mi;ksfxrk
24. If you wanted to tell the database
3) network/usVodZ
4) operating system/vkWijsfVax flLVe management system that a specific
5) None of these/buesa ls dksbZ ugha attribute contained numbers only, what
Ans. (2) would you need to set?
20. The ‘Difference Analyzer’ was created in ;fn vki MsVkcsl çca/u ç.kkyh dks crkuk pkgrs gSa fd ,d
the early 1920s by __ fof'k"V fo'ks"krk esa dsoy la[;k,¡ gSa] rks vkidks D;k lsV dju
^varj fo'ys"kd* 1920 ds n'kd esa -------------------------}kjk dh
cuk;k
vko';drk gksxh\
x;k FkkA 1) Data category/MsVk Js.kh
1) Peter Norton/ihVj ukWVZu 2) Data type/MsVk çdkj
2) Douglas Knuth/Mxyl uFk
3) Data dictionary/MsVk 'kCndks'k
3) Vannevar Bush/ouusoj cq'k
4) Data definition/MsVk ifjHkk"kk
4) Alan Kay/,yu ds
5) None of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (2)

3 Computer By_Yatendra Nigam Sir


25. What key distinctly identifies a record in 29. What database tool would you use to find
a database table? answers to your questions about data
,d MsVkcsl rkfydk es ,d fjdkWMZ dh D;k [kkl igpku gS\stored in your database?
1) Main key/eq[; daqth vkids MsVkcsl esa laxzghr MsVk ds ckjs esa vkids lokyk
2) Primary key/çkFkfed daqth tokc [kkstus ds fy, vki fdl MsVkcsl Vwy dk mi;ksx
3) Principal key/ç/ku daqth djsaxs\
4) Major key/çeq[k daqth 1) Queries/ç'u
5) None of these/bueas ls dksbZ ugha 2) Tables/VscYl
Ans. (2) 3) Show/fn[kkvks
26. What key links records from one database 4) Q&A/D;w ,aM ,
table to a record or records in another 5) None of these/buesa ls dksbZ ugha
database table? Ans. (1)
,d MsVkcsl Vscy ls fjdkWMZ ;k fdlh vU; MsVkcsl30. Vscy esa
When we describe, or define, the

PP
fjdkWMZ djus ds fy, D;k egRoiw.kZ fyad fjdkWMZ djrs
1) Primary key/çkFkfed dqath
2) Principal key/ç/ku daqth
gSa\
categories
Excel
of information we collect in an
worksheet, what type of table are

A
we creating?
3) Foreign key/fons'kh daqth tc ge o.kZu djrs gSa] ;k ifjHkkf"kr djrs gSa] rks gekjs }kjk

Ans. (3)
I L
4) Link key/fyad daqth

L
5) None of these/buesa ls dksbZ ugha
,Dlsy odZ'khV esa ,df=kr dh tkus okyh lwpuk dh Jsf.k;ksa]
ge fdl çdkj dh rkfydk cuk jgs gSa\
1) Categorization/oxhZdj.k
27.
W
When you link one database table to

R
another database table, what are you
2) Classification/oxhZdj.k
3) Explanation/Li”Vhdj.k

E
creating? 4) List definition/lwph ifjHkk"kk
tc vki ,d MsVkcsl rkfydk dks nwljh MsVkcsl rkfydk ls 5) None of these/buesa ls dksbZ ugha

E
tksM+rs gSa] rks vki D;k cuk jgs gSa\

R
1) Primary link/çkFkfed fyad
Ans. (4)
31. If you wished to limit what you would see

CA
2) Connectivity/dusfDVfoVh
3) Relationships/fj'rs
4) Referential integrity/çklafxd v[kaMrk
5) None of these/buesa ls dksbZ ugha
on an Excel worksheet, what data function
would you use?
;fn vki ,d ,Dlsy odZ'khV ij D;k ns[kuk pkgrs gSa] bls
lhfer djuk pkgrs gSa] rks vki fdl MsVk iQaD'ku dk mi;ksx
Ans. (3) djsaxs\
28. What would you need to establish if you 1) Sort/Øec¼ djsa
wanted to insure that the key in one 2) Filter/fi+QYVj djsa
database table was the same as a key in 3) Conditional format/l'krZ çk:i
another database table? 4) Data analysis/MsVk fo'ys"k.k
;fn vkidks ;g lqfuf'pr djus dh vko';drk gS fd vki 5) None of these/buesa ls dksbZ ugha
D;k lqfuf'pr djuk pkgrs gSa fd ,d MsVkcsl rkfydk esa dqath(2)
Ans.
vU; MsVkcsl rkfydk esa dqath ds leku gS\ 32. If you wished to highlight, not hide, some
1) Top-level grouping/'kh"kZ&Lrjh; lewgu information in a worksheet because it met
2) Connectivity/dusfDVfoVh some criteria, what Excel tool would you
3) Referential integrity/çklafxd v[kaMrk use?
4) Field properties/iQhYM xq.k ;fn vki fdlh dk;Zi=kd esa dqN lwpukvksa dks mtkxj djuk]
5) None of these/bueas ls dksbZ ugha fNikuk ugha pkgrs gSa] D;ksafd ;g dqN ekunaMksa dks iw
Ans. (3) gS] rks vki ,Dlsy Vwy dk D;k mi;ksx djsaxs\

4 Computer By_Yatendra Nigam Sir


1) Table/Vscy 36. What term is used to describe a collection
2) Format/çk:i of information that you can use to build
3) Conditional Format/l’krZ çk:i reports or discover facts about an
4) Filter/fi+QYVj djsa environment?
5) None of these/buesa ls dksbZ ugha lwpuk ds laxzg dk o.kZu djus ds fy, fdl 'kCn dk mi;ksx
Ans. (3) fd;k tkrk gS ftldk mi;ksx vki fjiksVZ cukus ;k i;kZoj.k ds
33. What Excel tool allows you to create ckjs esa rF;ksa dh [kkst djus ds fy, dj ldrs gSa\
quickly and automatically summary data 1) Database/MsVkcsl
from a large data set? 2) Web site/osc lkbV
,Dlsy Vwy vkidks cM+s MsVk lsV ls MsVk dks tYnh 3) vkSj
Wiki/fodh
Lopkfyr :i ls lkjakf'kr djus dh vuqefr nsrk gS\ 4) Relation/laca/
1) Conditional formatting/l'krZ Lo:i.k 5) None of these/bueas ls dksbZ ugha
2) Sorting/Nk¡Vuk Ans. (1)
3) Pivot tables/fioV Vscy

PP
4) Field lists/iQhYM lwph
5) None of these/buesa ls dksbZ ugha
37. Microsoft’s Access and Corel’s Paradox are
both examples of which type of software?
ekbØkslkWÝV dk ,Dlsl vkSj dksjy dk fojks/kHkkl nksuks
Ans.
34.
(3)

L A
When creating a custom filer in Excel,
çdkj ds lkWÝVos;j ds mnkgj.k gSa\
1) Network database systems

L
which of the following would not be

I
usVodZ MsVkcsl flLVe
considered a Boolean operator?
2) Relational database systems
,Dlsy es ,d dLVe iQkbyj cukrs le;] fuEufyf[kr esa ls

1) If/;fn W
fdls cqfy;u vkWijsVj ugha ekuk tk,xk\

R 2) And/vkSj
3)
fjys'kuy MsVkcsl flLVe
Flat-file database systems
3) Or/;k

EE 4) Not/ugha
5) None of these/buesa ls dksbZ ugha 4)
ÝySV&iQkby MsVkcsl flLVe
Hierarchical database systems
inkuqØfer MsVkcsl flLVe
Ans.
35.
(1)

AR
Which of the following is a good habit to
get into when creating a worksheet? Ans. (2)
5) None of these/buesa ls dksbZ ugha

gS\
C
odZ'khV cukrs le; fuEufyf[kr esa ls dkSu lh vPNh

1) Placing titles for columns in the first


row of data
vknr What type of graphical model is used to
38.
define a database?
MsVkcsl dks ifjHkkf"kr djus ds fy, fdl çdkj ds xzkfiQdy
ekWMy dk mi;ksx fd;k tkrk gS\
MsVk dh igyh iafDr esa dkWye ds fy, 'kh"kZd j[kuk 1) Flowchart/ÝykspkVZ
2) Using conditional formatting to spot 2) E-R diagram/bZ&vkj vkjs[k
spelling errors 3) Organizational model/laxBukRed ekWMy
Lisfyax =kqfV;ksa ds fy, l'krZ Li:I.k dk mi;ksx djuk4) Programming model/çksxzkfeax ekWMy
3) Inserting comments in each cell to 5) None of these/buesa ls dksbZ ugha
define that data or type of data Ans. (2)
ml MsVk ;k MsVk ds çdkj dks ifjHkkf"kr djus 39. ds fy,After you develop a model for your
çR;sd lsy esa fVIif.k;ka lfEefyr djukA database, you should then _____ it before
4) Grouping records according to some building it.
classification
vius MsVkcsl ds fy, ,d ekWMy fodflr djus ds ckn]
dqN oxhZdj.k ds vuqlkj fjdkWMZ cukuk vkidks bls cukus ls igys---------------djuk pkfg,A
5) None of these/buesa ls dksbZ ugha
1) normalize/lkekU; djsa
Ans. (1)
2) design/fM”kkbu

5 Computer By_Yatendra Nigam Sir


3) plan/;kstuk 4) Pascal/ikLdy
4) approve/eatwj 5) None of these/buesa ls dksbZ ugha
5) None of these/buesa ls dksbZ ugha Ans. (2)
Ans. (1) 44. A next-generation Web content
40. Which of the following contains development language, __________
information about the structure of a typically refers to a suite of technologies
database? that allow developers to store data in a
fuEufyf[kr esa ls fdlesa MsVkcsl dh lajpuk ds ckjs esa
readable format.
tkudkjh gS\ vxyh ih<+h dh osc lkexzh fodkl Hkk"kk]------------------vk
1) Database management system ij ,slh rduhdks ds ,d lwV dks lanfHkZr djrh gS tks
MsVkcsl çca/u ç.kkyh MsoyilZ dks ,d iBuh; çk:i esa MsVk laxzghr djus dh
2) Data dictionary/MsVk 'kCndks'k vuqefr nsrh gSA
3) Data repository/MsVk fjikWftVjh 1) HTML 2) XSL
4)
5)

PP
Data warehouse/MsVk os;jgkml
None of these/buesa ls dksbZ ugha
3) XML 4) PHP
5) None of these/buesa ls dksbZ ugha

A
Ans. (2) Ans. (3)
41. The rules of a language are called its 45. JavaScript was developed by __________
__________.

ILL to run inside of web pages.


tkokfLØIV
fdlh Hkk"kk ds fu;eksa dks mldk ----------------------dgk tkrk
1) structure/lajpuk
gSA dks osc istksa ds vanj pykus ds fy,----------------
-}kjk fodflr fd;k x;k FkkA

RW
2) code/dksM
3) syntax/okD; jpuk
1) Microsoft/ekbØkslkWÝV
2) Sun/lw;Z

E
4) rigidity/dBksjrk 3) Oracle/vksjsdy
4) Netscape/usVLdsi
Ans. (3)

RE
5) None of these/buesa ls dksbZ ugha

Ans.
5) None of these/buesa ls dksbZ ugha
(4)

A
42. A language that can be written on one
platform and executed on another platform 46. This technology is used to convert XML

C
is said to be __________.
,d Hkk”kk ftls ,d eap ij fy[kk tk ldrk gS vkSj nwljs eap

tkrk gSA
into HTML.
XML dksHTML esa cnyus ds fy, bl rduhd dk
mi;ksx fd;k tkrk gSA
ij fu"ikfnr fd;k tk ldrk gS] mls----------------------------dgk
1) CSS 2) XHTML
1) portable/iksVsZcy 3) PHP 4) XSL
2) robust/etcwt 5) None of these/buesa ls dksbZ ugha
3) third generation/rhljh ih<+h Ans. (4)
4) dynamic/xfr'khy 47. The __________ is a special database that
5) None of these/buesa ls dksbZ ugha holds information about the computer’s
Ans. (1) user, installed programs and hardware
43. __________ is Microsoft’s latest entry into devices.
the programming arena. ---------------------,d fo'ks"k MsVkcsl gS tks daI;wVj ds mi;k
LFkkfir
------------------------çksxzfeax {ks=k esa ekbØkslkWÝV dh uohuredk;ZØeksa
çfof"V vkSj gkMZos;j midj.kksa ds ckjs esa tk
gSA j[krk gSA
1) Java/tkok 1) dynamic link library
2) NET/usV xfr'khy fyad iqLrdky;
3) Visual Basic/fotqvy csfld 2) initialization file/vkjaHkhdj.k i+Qkby

6 Computer By_Yatendra Nigam Sir


3) compiled help module 52. A(n) __________ encapsulates data and
ladfyr lgk;rk ekWMÔwy functionality.
4) Windows Registry/foaMkst jftLVªh A(n)________MsVk vkSj dk;Z{kerk dks ,fUØIV djrk gSA
5) None of these/bueas ls dksbZ ugha 1) structured program/lajfpr dk;ZØe
Ans. (4)
2) selection statement/p;u dFku
48. A(n) __________ converts all the source
3) object/oLrq
code into machine code, creating an
executable file. 4) program/dk;ZØe
A(n)____________lHkh lzksr dksM dks e'khu dksM esa5) None of these/buesa ls dksbZ ugha
ifjofrZr djrk gS] ,d fu"iknu ;ksX; i+Qkby cukrk Ans.
gSA (2)
1) linker/fyadj 53. __________ are text files containing OS
2) compiler/ladyd commands.
3) assembler/dksMkarjd -------------------ikB iQkbysa gSa ftuesa vks,l dekaM~l gSaA
4) interpreter/nqHkkf"k;k

Ans.
5)
(2)
PP
None of these/buesa ls dksbZ ugha
1) Initialization files/çkjafHkd iQkbysa
2) Batch files/cSp i+Qkbysa
3) Executable files/fu"iknu ;ksX; i+Qkbysa
49.

L A
A series of steps that always results in
an answer is the definition of __________. 4) Help files/i+Qkbyksa dh enn djsa
pj.kksa dh ,d J‘a[kyk tks ges’kk ,d mÙkj esa ifj.kke nsrh5) None of these/buesa ls dksbZ ugha

IL
gS]———————dh ifjHkk”kk gSA
1) heuristic/gs;wfjfLVd
Ans. (2)

W
54. The __________ prevents unlawful access
2) flowchart/ÝykspkVZ to voice communications by wire.

ER
3) algorithm/,YxksfjFe
4) pseudo code/Nn~e dksM
————————ok;j }kjk èofu lapkj ds fy, xSjdkuwu
igqap dks jksdrk gSA

Ans. (3)

RE
5) None of these/buesa ls dksbZ ugha 1) Electronic Communications Privacy
Act

A
50. The color of an object is an example of
bysDVªkWfud lapkj xksiuh;rk vf/fu;e
a(n) __________.

C
fdlh oLrq dk jax
a(n)_______dk mnkgj.k gSA
1) attribute/fo'ks"krk
2) detail/foLrkj
3) listing/fyfLVax
2) Freedom of Information Act
lwpuk vf/fu;e dh Lora=krk
3) USA Patriot Act/;w,l, iSfVª;V ,DV
4) Privacy Act of 1974
4) specification/fofunsZ'ku 1974 dk xksiuh;rk vf/fu;e
5) None of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (1) Ans. (1)
51. A(n) __________ file contains information 55. Which of the following will not protect you
in an indexed and cross-linked format.
from spam?
A(n)_________ i+Qkby esa vuqØfer vkSj ØkWl&fyaDM
fuEufyf[kr esa ls dkSu vkidks LiSe ls cpk,xk\
çk:i esa tkudkjh gSA
1) spam blockers/LiSe CykWdlZ
1) executable/fu"iknu ;ksX;
2) initialization/vkajHkhdj.k 2) e-mail rules/bZ&esy fu;e
3) help/enn 3) popup blocker/ikWivi vojks/d
4) library/iqLrdky; 4) filters/fiQYVj
5) None of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (3)

7 Computer By_Yatendra Nigam Sir


56. A __________’s main purpose is to prohibit 60. To recover files from a backup, you perform
unauthorized access to your computer via a __________.
the Internet. cSdvi ls i+Qkbyksa dks iquçkIr djus ds fy,] vki ,d---------
------------------dk eq[; mís'; baVjusV ds ekè;e ls vkids daI;wVj
-------------------djrs gSaA
ij vuf/d'r igq¡p dks jksduk gSA 1) restore/iquLFkkZfir djsa
1) popup blocker/ikWivi CykWdj
2) scan/LdSu
2) firewall/i+Qk;jokWy
3) unerase/vujls
3) spyware blocker/Likbos;j vojks/d
4) copy/dkWih
4) spam assassin/LiSe gR;kjs
5) None of these/buesa ls dksbZ ugha
5) restore file/i+Qkby dks iqulFkkZfir djsa
Ans. (2) Ans. (1)
57. To read the system messages and 61. A __________ is anything that can cause
warnings, access the __________ in harm.
Windows.

PP
----------------igqapsaA
,d--------------------dqN Hkh gS tks uqdlku igqapk ldrk gSA
1) vulnerability/Hks|rk
flLVe lans'k vkSj psrkouh i<+us ds fy,] foaMkst esa---------------
2) phish/fiQ'k

L A
1) system manager/flLVe eSustj
2) control panel/fu;a=k.k d{k
3) Threat/[krjk
4) spoof/LrwiQ

IL
3) event viewer/bZosaV n'kZd
4) message screen/lans'k LØhu
5) All of the above/mijksDr lHkh

W
Ans. (3)
5) None of these/bueas ls dksbZ ugha
62. In the right setting a thief will steal your
Ans.
58.
(3)

ER
To create a copy of files in the event of
information by simply watching what you
type.

E
system failure, you create a __________.
lgh lsfVax esa ,d pksj vkidh tkudkjh dks pqjkdj ns[ksxk fd
flLVe foiQyrk dh fLFkfr esa i+Qkbyksa dh çfrfyfi cukus ds

AR
fy,] vki ,d---------------------------cukrs gSaA
1) restore file/i+Qkbyksa dks iquLFkkZfir djsa
vki D;k Vkbi djrs gSaA
1) snagging/LuSfxax

C
2) backup/cSdvi
3) firewall/i+Qk;jokWy
4) redundancy/vfrjsd
5) None of these/bueas ls dksbZ ugha
2) spying/tklwlh djuk
3) social engineering/lk'ky bathfu;fjax
4) shoulder surfing/da/s lfiQZax
5) None of these/buesa ls dksbZ ugha
Ans. (2) Ans. (4)
59. If configured correctly, the __________ will 63. __________A hacker contacts you my phone
prevent interaction with your computer or email and attempts to acquire your
after a specified time period. password
;fn lgh rjhds ls dkWfUi+Qxj fd;k x;k gS] rks------------------------
___________A gSdj vkils esjs iQksu ;k bZesy ij laidZ
,d fufnZ"V le; vof/ ds ckn vkids daI;wVj ds lkFk djrk gS vkSj vkidk ikloMZ gkfly djus dk ç;kl djrk gSA
ckrphr dks jksd nsxkA 1) spoofing/LiwfiQax
1) firewall/i+Qk;jokWy
2) phishing/fi+Qf'kax
2) filter/fi+QYVj
3) spamming/LiSfeax
3) screen saver/LØhu lsoj
4) bugging/cfxax
4) popup blocker/ikWivi vojks/d
5) virus/ok;jl 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (2)

8 Computer By_Yatendra Nigam Sir


64. This power protection device includes a 68. Software, such as Explorer and Firefox,
battery that provides a few minutes of are referred to as _____.
power. lkWÝVos;j] tSls ,DlIyksjj vkSj i+Qk;ji+QkWDl] dks------
bl fctyh laj{k.k midj.k esa ,d cSVjh 'kkfey gS tks dqN :i esa lanfHkZr fd;k tkrk gSA
feuVksa dh 'kfDr çnku djrh gSA 1) Systems software/flLVe lkWÝVos;j
1) surge suppressor/o`f¼ nckusokyk ;a=k
2) Utility software/mi;ksfxrk lkWÝVos;j
2) line conditioner/ykbu daMh'kuj
3) Browsers/czkm”kj
3) generator/tujsVj
4) Internet tools/baVjusV midj.k
4) UPS/;wih,l
5) None of these/buesa ls dksbZ ugha
5) None of these/bueas ls dksbZ ugha
Ans. (3)
Ans. (4)
65. A hacker that changes or forges 69. Which following ISP is free?
information in an electronic resource, is ISP fuEufyf[kr esa ls dkSu&lk eqÝr gS\

P
engaging in __________.

P
1)
,d gSdj tks bysDVªkWfud lalk/u esa tkudkjh cnyrk gS ;k2) AOL/,vks,y
CompuServe/dEI;wVl

L A
cukrk gS] ------------------ esa layxz gksrk gSA
1) denial of service/lsok ls oafpr djuk
3) NetZero/usVtsjks
4) MSN/,e,l,u

IL
2) sniffing/lw¡?kuk
3) terrorism/vkradokn
5) None of these/bueasa ls dksbZ ugha
Ans. (3)

W
4) data diddling/MsVk MhMhfyax
5) None of these/bueas ls dksbZ ugha

R
70. When internet data leaves your campus,
it normally goes to a(n) ______ before

E
Ans. (4)
moving toward its destination.

E
66. The __________ of a threat measures its
tc baVjusV MsVk vkids ifjlj dks NksM+ nsrk gS] rks ;g viu
potential impact on a system

AR
ekirk gSA
xarO; dh vksj c<+us ls igys lkekU;%
[krjs dk-------------------,d flLVe ij blds laHkkfor çHkko dks
tkrk gSA
(n)________ij

1) Internet backbone/baVjusV jh<+

C
1) vulnerabilities/Hks|rk
2) countermeasures/çfrokn
3) degree of harm/uqdlku dh fMxzh
4) susceptibility/laosnu'khyrk
2) Network access point/usVodZ ,Dlsl IokbaV
3) Base station/csl LVs'ku
4) Communication system/lapkj ç.kkyh
5) none of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (2)
67. Which of the following identifies a specific 71. MCI and AT&T are examples of which of
web page and its computer on the Web? the following?
fuEufyf[kr esa ls dkSu osc ij ,d fof'k"V osc ist vkSj mlds MCI vkSjAT & T fuEufyf[kr esa ls fdlds mnkgj.k gSa\
daI;wVj dh igpku djrk gS\ 1) Social networks/lkekftd usVodZ
1) Web site/osc lkbV 2) Communications systems/lapkj ç.kkyh
2) Web site address/osc lkbV dk irk 3) Internet service providers
3) URL/;wvkj,y
baVjusV lsok çnkrk
4) Domain Name/Mksesy uke
4) Mobisodes/eksfclksM
5) All of above/mijksDr lHkh
5) None of these/bueas ls dksbZ ugha
Ans. (4)
Ans. (3)

9 Computer By_Yatendra Nigam Sir


72. What type of telecommunications 77. News servers utilize __________ to
hardware allows you to access the web? distribute documents to readers.
fdl çdkj dk nwjlapkj gkMZos;j vkidks osc rd igqapus dh lkekpkj loZj ikBdksa dks nLrkost forfjr djus ds fy,-------
vuqefr nsrk gS\ --------------dk mi;ksx djrs gSaA
1) Browser/czkm”kj 1) NNTP 2) NEWS
2) Modem/eksMse 3) HTTP 4) FTP
3) FTP protocol/,i+QVhih çksVksdkWy 5) None of these/buesa ls dksbZ ugha
4) IRC/vkbZ-vkj-lh- Ans. (1)
5) All of above/mijksDr lHkh 78. Discussion groups may have a __________
Ans. (2) who monitors the postings and enforces
73. E-mail addresses separate the user name the site’s rules.
from the ISP using the __________ symbol ppkZ lewgksa esa ,d------------------gks ldrk gS tks iksfLV
bZ&esy irs--------------------çrhd dk mi;ksx djds mi;ksxdrkZ uke djrk gS vkSj lkbV ds fu;eksa dks ykxw djrk gSA
fuxjkuh
dks vkbZ,lih ls vyx djrs gSa 1) judge/tt
1) &/vkSj
3) %

PP 2) @
4) *
2) sysop/fllksi
3) narrator/dFkkokpd

Ans. (2)

L A
5) None of these/buesa ls dksbZ ugha 4) censor/lsalj
5) None of these/buesa ls dksbZ ugha

L
74. The mail server as defined in the text uses Ans. (2)

djrk gSA
WI
the __________ protocol 79. A message with replies on a newsgroup is
ikB esa ifjHkkf"kr esy loZj----------------------çksVksdkWy dk mi;ksx
often called a __________.
,d lekpkj lewg ds mÙkj okys lans'k dks vDlj----------------dgk
1) HTTP
3) POP

ER 2) FTP
4) SMTP
5) All of above/mijksDr lHkh
tkrk gSA
1) post/iksLV 2) list/lwph

Ans.
75.
(3)

RE
When sending an e-mail, the __________
3) thread//kxk
4) comment/fVIi.kh djsa
5) All of above/mijksDr lHkh

CA
line describes the contents of the message.

djrh gSA
1) to/dks
Ans.
bZ&esy Hkstrs le;]-----------------ykbu lans'k dh lkexzh
80.
(3)
dkThe
o.kZu
Internet was originally a project for
this government agency.
baVjusV ewy :i ls bl ljdkjh ,tsalh ds fy, ,d ifj;kstuk
2) subject/fo"k;
FkhA
3) contents/lkexzh
1) ARPA 2) NSF
4) CC/lh-lh-
3) NSA 4) FCC
5) All of above/mijksDr lHkh
5) None of these/buesa ls dksbZ ugha
Ans. (2)
Ans. (1)
76. Unsolicited commercial email is commonly
81. A word in a web page that, when clicked,
known as __________.
opens another document.
vokafNr okf.kfT;d bZesy dks vkerkSj ij--------------------ds :i esa
,d osc ist esa ,d 'kCn] ftl ij fDyd fd;k tkrk gS] ,d
tkuk tkrk gSA
vkSj nLrkos”k [ksyrk gSA
1) junk/dckM+
1) anchor/yaxj 2) URL
2) hoaxes/>kals
3) Hyperlink/gkbijfyad
3) spam/LiSe
4) reference/ lanHkZ
4) hypertext/gkbijVsDLV
5) All of above/mijksDr lHkh
5) All of above/mijksDr lHkh
Ans. (3)
Ans. (3)

10 Computer By_Yatendra Nigam Sir


82. A network’s __________ is the central 86. A __________ organizes the web into
structure that connects other portions of categories.
the network. A_______osc dks Jsf.k;ksa esa O;ofLFkr djrk gSA
ds vU;search engine/lpZ batu
,d usVodZ dk-----------------dsaæh; lajpuk gS tks usVodZ 1)
Hkkxksa dks tksM+rk gSA 2) encyclopedia/fo'odks'k
1) trunk/Vªad 3) archive/laxzg
2) backbone/jh<+ dh gM~Mh 4) directory/funsZf'kdk
3) protocol/çksVksdkWy 5) None of these/bueas ls dksbZ ugha
4) server/loZj Ans. (4)
5) None of these/buesa ls dksbZ ugha 87. To match all of the words in your search,
Ans. (2) the Boolean __________ operator should
be used.
83. __________ is the protocol that supports
linking from one web page to another page.
viuh [kkst esa lHkh 'kCnksa dk feyku djus ds fy,] cwfy;u-

PP
fyad djus dk leFkZu djrk gSA
----------------------vkWijsVj dk mi;ksx fd;k tkuk pkfg,A
---------------------og çksVksdkWy gS tks ,d osc ist ls nwljs ist dks
1) and/vkSj
2) or/;k
1) HTML
2) IP

L A 3) xor/,Dlj
4) both/nksuksa
3) HTTP
4) FTP
IL Ans.
5) All of above/mijksDr lHkh
(1)

Ans. (3)

RW
5) All of above/mijksDr lHkh
88. What type of accountants may recommend
controls for an organization’s computer

E
84. You can organize your bookmarks using systems?

E fdl çdkj ds ,dkmaVsaV fdlh laxBu ds daI;wVj flLVe ds


__________.
vki-------------------dk mi;ksx djds vius cqdekdZ O;ofLFkrfy,
dj fu;a=k.k dh fliQkfj'k dj ldrs gSa\

AR
ldrs gSaA
1) structures/lajpuk,a
1) Environment accountant
i;kZoj.k ys[kkdkj

C
2) containers/daVsuj
3) folders/i+QksYMj
4) menus/esuw
5) None of these/buesa ls dksbZ ugha
2) Internal accountant/vkarfjd ys[kkdkj
3) Government accountant
ljdkjh ys[kkdkj
4) Public accountant/lkoZtfud ys[kkdkj
Ans. (3) 5) All of above/mijksDr lHkh
85. The browser’s __________ keeps a list of Ans. (2)
web pages you have visited during the 89. Which IT area is well-established in
current session. Accounting?
czkm”kj dk----------------orZeku l=k ds nkSjku vkids }kjkys[kkadu
ns[ks x, esa dkSu lk vkbZVh {ks=k vPNh rjg ls LFkkfir
osc istksa dh ,d lwph j[krk gSA 1) Multimedia systems/eYVhehfM;k flLVe
1) history/bfrgkl 2) Web development/osc fodkl
2) cache/dS'k 3) Statistical analysis/lkaf[;dh; fo'ys"k.k
3) favorites/ilanhnk 4) Accounting Information Systems
4) trail/fu'kku ys[kk lwpuk ç.kkyh
5) All of the above/mijksDr lHkh 5) None of these/buesa ls dksbZ ugha
Ans. (1) Ans. (4)

11 Computer By_Yatendra Nigam Sir


90. How do accountants quickly research new 3) message/lans'k
government rules and regulations? 4) instance/mnkgj.k
ys[kkdkj u, ljdkjh fu;eksa vkSj fofu;eksa dk Rofjr vuqla/5) None of these/bueas ls dksbZ ugha
ku dSl djrs gSa\ Ans. (2)
1) With an internal database 94. In a student grading system, Student Last
management systems Name, Student Address, and Final Course
,d vkarfjd MsVkcsl çca/u ç.kkfy;ksa ds lkFk Grade would all be classified as what?
2) Through the Web/osc ds ekè;e ls ,d Nk=k xzsfMax flLVe esa] LVwMsasV ykLV use] LVwM
3) With an external database iQkbuy dkslZ xzsM lHkh dks D;k oxhZd`r fd;k tk,xk\
management systems 1) Inheritance/oa'kkuqØe
,d ckgjh MsVkcsl çca/u ç.kkfy;ksa ds lkFk 2) Information/tkudkjh
4) Through organizational network 3) Encapsulation/,udSIlqys'ku
systems 4) Polymorphism/cgq:irk
5) none of these/buesa ls dksbZ ugha

PP
laxBukRed usVodZ ç.kkfy;ksa ds ekè;e ls
5) All of above/mijksDr lHkh Ans.
95.
(2)
What part of object-oriented technology

A
Ans. (2)
defines superclass and subclass
91. Which computer virus records every

I L
movement you make on your computer?

L
dkSu lk daI;wVj ok;jl vkids daI;wVj ij vkids }kjk fd,
x, gj vkanksyu dks fjdkWMZ djrk gS\
relationships?
oLrq&mUeq[k çks|ksfxdh dk dkSu&lk fgLlk lqijDykl vk
mioxZ fj'rksa dks ifjHkkf"kr djrk gS\
1) Inheritance/oa'kkuqØe

RW
1) Malware Android/eSyos;j ,aMªkWbM
2) Key logger/daqth ydM+gkjk
2) Scalability/LdsysfcfyVh
3) Encapsulation/,ydSIlqys'ku
3) DoS

EE
4) Trapper/Vªsij
5) None of these/buesa ls dksbZ ugha
4) Polymorphism/cgq:irk
5) All of above/mijksDr lHkh

Ans.
92.
(2)

AR
What program would you use to gain
Ans.
96.
(1)
When an object has many forms, it has
_____.

C
administrative rights to someone’s
computer?
fdlh daI;wVj ij ç'kklfud vf/dkj çkIr djus ds fy, vki
fdl dk;ZØe dk mi;ksx djsaxs\
tc fdlh oLrq ds dbZ :i gksrs gSa] rks mlesa---------------------
-----------gksrk gSA
1) Inheritance/oa'kkuqØe
2) Scalability/LdsysfcfyVh
1) Bot 3) Encapsulation/,ydSIlqys'ku
2) Executive Android/dk;Zdkjh ,uMªksbZV 4) Polymorphism/cgq:irk
3) Rootkit/:VfdV 5) All of above/mijksDr lHkh
4) Trojan horse/Vªkstu gkWlZ Ans. (4)
5) none of these/buesa ls dksbZ ugha 97. What programming language model is
Ans. (3) organized around “objects” rather than
93. A remote control that is used to turn on “actions”?
or off some machine is also called a(n) ^^fØ;kvksa** ds ctk; ^^vkWCtsDV~l** ds vklikl fdl çksxzk
_____. ySaXost ekWMy dk vk;kstu fd;k tkrk gS\
fdlh e'khu dks pkyw ;k can djus ds fy, mi;ksx fd, tkus 1) Java/tkok 2) OOB
okys fjeksV daVªksy dks
a (n)__________ Hkh dgk tkrk gSA 3) Perl/iyZ 4) C++
1) class/oxZ 5) All of above/mijksDr lHkh
2) interface/baVji+Qsl Ans. (2)

12 Computer By_Yatendra Nigam Sir


98. What are the instructions called that tell 3) Reduce size of systems being
a system what, how, and when to do developed
something? flLVe ds vkdkj dks de fd;k tk jgk gS
D;k funsZ'k dgk tkrk gS tks ,d ç.kkyh dks crkrk gS fd D;k]4) Merging different systems together
dSls vkSj dc djuk gS\ fofHkUu ç.kkfy;ksa dks ,d lkFk foy; djuk
1) Object-oriented technology approach 5) All of above/mijksDr lHkh
oLrq&mUeq[k çkS|ksfxdh n`f"Vdks.k Ans. (2)
100. What kind of programming language is
2) Object-oriented database
Java?
vkWCtsDV&vksfj,aVsM MsVkcsl
tkok fdl çdkj dh çksxzkfeax Hkk"kk gS\
3) Program/dk;ZØe
1) Object-oriented programming
4) Database management/MsVkcsl çca/u language
5) None of these/bueas ls dksbZ ugha oLrq&mUeq[k çksxzkfeax Hkk"kk
Ans.
99.
(3)

PP
What common technique attempts to save
2) Relational programming language
laca/ijd çksxzkfeax Hkk"kk

A
time and energy by reducing redundant 3) Sixth-generation programming
work in object-oriented programming? language

L
le; vkSj ÅtkZ cpkus ds fy, dkSu&lh lkekU; rduhd dk
ç;kl gS\
4)
NBh ih<+h dh çksxzkfeax Hkk"kk
vkWCtsDV&vksfj,aVsM çksxzkfeax esa vuko';d dk;Z dks de djds

IL Database
Language
management programming

W
1) Reduce lines of programming

R
çksxzkfeax dh ykbuksa dks de djsa 5)
MsVkcsl çca/u çksxzkfeax Hkk"kk
None of these/bueas ls dksbZ ugha

E
2) Reuse of code/dksM dk iqu% mi;ksx

E
Ans. (1)

AR
C

13 Computer By_Yatendra Nigam Sir

You might also like