Computer GK Booster PDF in English
Computer GK Booster PDF in English
COMPUTER ORGANISATION
1. INPUT
This is the process of entering data through input devices and programs into the
computer system.
2. CONTROL UNIT
The process of input, output, processing and storage is performed under the
supervision of a unit called 'Control Unit'. It decides when to start receiving data,
when to stop it, where to store data, etc. It takes care of step-by-step processing
of all operations inside the computer.
3. MEMORY UNIT
Computer is used to store data and instructions.
1.Micro-
processor
2.Memory
3. Basic
Input/Outp
ut System
(BIOS)
5. OUTPUT
This is the process of producing results from the data for getting useful
4.Exp-Slot information.
Expansion
5.Inter-
connecting
MEMORY AND MEMORY UNIT
The computer memory is a temporary storage area. It holds the data and instructions that the
Central Processing Unit (CPU) needs. Before a program can be run, the program is loaded from
some storage medium into the memory. This allows the CPU direct access to the program. Memory
is a need for any computer.
Temporary / Volatile
Volatile memory
It is computer storage that only maintains its data while the device is powered on. RAM
(random access memory) used for primary storage in personal computers as a volatile
memory.
It is a type of computer memory that has the capability to hold saved data even if the power is
turned off. ROM (Read Only Memory) is the example of non-volatile memory.
Primary memory
RAM: RAM (Random Access Memory) is a form of computer data storage. A random-access
device allows stored data to be accessed directly in any random order.It is a volatile memory.
DDR SDRAM: Double data rate synchronous dynamic RAM is just like SDRAM except that is
has higher bandwidth, meaning greater speed. EX- DDR1, DDR2, DDR3, DDR4.
SDRAM: Synchronous dynamic random access memory takes advantage of the burst mode
concept to greatly improve performance.
VRAM: Video RAM, also known as Multiport Dynamic Random Access Memory (MPDRAM),
is a type of RAM used specifically for video adapters or 3-D accelerators.
Types of ROM
The EPROM can be erased by exposing it to ultra-violet light then rewriting. It is also called
ultra violet PROM.
The EEPROM is programmed and erased electrically. In EEPROM, any location can be
selectively erased and programmed. EEPROMs can be erased one byte at a time, rather
than erasing the entire chip.
Cache memory
A cache used by the central processing unit (CPU) of a computer to reduce the average time to
access memory.It is used in between the main memory and CPU.
Virtual memory
Virtual memory combines your computer’s RAM with temporary space on your hard disk. When
RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data
to and from the paging file frees up RAM so your computer can complete its work. It is also called
Extended RAM.
Secondary storage
It is used to store data for backup purpose.
Types of Access:
Sequential access
Direct/Random access
Hard drives, flash drives and almost all other storage devices are direct access. This
means that data stored anywhere on the device can be accessed in an equally short space of
time.
Magnetic tape is a serial access or sequential access device. This means that you have to
wind through it to reach a piece of data that you require.
Device used for storing and retrieving digital information using rapidly rotating disks coated
with magnetic material.Data is read in a random access method.
Solid-state drives actually aren't hard drive in the traditional sense of the term, as there are no
moving parts involved. A traditional hard disk drive (HDD) consists of a spinning disk with a
read/write head on a mechanical arm. An SSD, on the other hand, has an array of semiconductor
memory organized as a disk drive, using integrated circuits (ICs) rather than magnetic or optical
storage media
OPTICAL DISC
In computing, an optical disc drive (ODD) is a disk drive that uses laser light or electromagnetic
waves near the light spectrum as part of the process of reading or writing data to or from optical
disc.
CD (Compact disc)- CD is an Optical Medium. This means that data is written to it, and read
from it using a laser.
DVD (Digital versatile disc):- It is an optical disc like the CD, but with much higher capacity.
There are many different types, but the standard DVD can store about 4.7GB.
BRD (blue ray disc):- Blu-ray Disc is a high-density Optical Disc format similar to DVD.
HVD (holographic versatile disc):- The Holographic Versatile Disc (HVD) is an Optical Disc
Technology, its Storage Capacity upto 6 TB
PRINTER
Impact Printer
• Dot Matrix Printer
Non-Impact Printer
• Line Printer • Ink-Jet Printer
• Daisy Wheel • Laser Printer
• Thermal Printer
Dot Matrix • Special purpose Printer
Dot-matrix printers are now almost extinct. They used a ribbon and made a lot of noise. There
were models with 9 pins and models with 24 pins.
Daisy Wheel
Daisy-wheel printers, consist of a circular wheel about 3inches in diameter with arms or spokes.
The character shape is embossed at the outer ends of the spokes. The shape of the printer wheel
resembles the petals of a daisy flower and hence, it is named daisy wheel printer.
Single Tasking Operating System: A single task OS has to deal with the
requests of the single person using the computer at that time.
More expensive than linear bus topologies because of the cost of the
hubs, etc.
BUS TOPOLOGY
Slow
RING TOPOLOGY
Difficult to add and remove devices once the network has been set up.
INTERNET
The Internet is the global system of interconnected computer
networks that use the Internetprotocol suite (TCP/IP) to link billions
of devices worldwide. Unlike online services, which are centrally
controlled, by design, the Internet is decentralized.
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was
an early packet switching network and the first network to implement
the protocol suite TCP/IP.
Intranet
An intranet is a network based on TCP/IP protocols (an internet)
belonging to an organization, usually a corporation, accessible only
by the organization's members, employees, or others with
authorization. Like the Internet itself, intranets are used to share
information. Secure intranets are now the fastest-growing segment
of the Internet because they are much less expensive to build and
manage than private networks based on proprietary protocols.
Extranet
1. Function
2. Control
3. Arrow
4. Space bar
5. None of these
ANS (2)-Control
5. None of these
1. Counter
2. Adder
3. Register
4. Flip flop
ANS (3)-Register
1. Ctrl + T
2. Ctrl + W
3. Ctrl + A
4. Ctrl + Y
5. None of these
ANS (2)-Ctrl + W
1. J.V. Attansoff
2. Bill Gates
3. Seymour Cray
4. Vinton Cerf
5. Charles Babbage
1. Primary memory
2. Control section
3. External memory
4. Cache memory
5. None
Q7.A computer checks the _____ of user names and passwords for a match before granting
access?
1. Website
2. Network
3. Backup file
4. Database
5. None of these
ANS (4)-Database
1. Minicomputer
2. Nano computer
3. Supercomputer
4. Microcomputer
1. ROM only
2. RAM only
4. Memory module
Q10. Press _____ to move the insertion point to the Address box, or to highlight the URL
in the Address box?
1. ALT + D
2. ALT + A
3. SHIFT + TAB
4. TAB + CTRL
5. CTRL + S
ANS (1)-ALT + D
Q11. A (n) ______ appearing on a web page opens another document when clicked?
1. Anchor
2. URL
3. Hyperlink
4. Reference
5. None of these
ANS (3)-Hyperlink
Q12. Which of the following refers to the rectangular area for displaying information and
running programs?
1. Desktop
2. Dialog box
3. Menu
4. Window
5. None of these
ANS (1)-Desktop
1. Chat
2. Instant messaging
3. Instanotes
4. Electronic mail
5. None of these
Q14. Is the layer of a computer system between the hardware and the user program?
1. Operating environment
2. Operating system
3. System environment
4. Utility software
5. Spooler
1. Codes
2. Mnemonics
3. Assembler
ANS (2)-Mnemonics
1. Computer program
2. Algorithm
3. Flowchart
4. Utility programs
1. Display screen
4. Plotter
1. Drum printer
2. Line printer
3. Chain printer
4. Laser printer
1. SRAM
2. DRAM
3. ROM
ANS (2)-DRAM
Q21.Which type of memory is not directly addressable by the CPU and requires special
software called EMS?
1. Extended
2. Expanded
3. Base
4. Conventional
5. None of these
ANS (2)-Expanded
Q22.The original ASCII code used ___________bits of each byte, reserving that last bit for
error checking?
1. 5
2. 6
3. 7
4. 8
5. 10
ANS (3)-7
1. Motorola
2. IBM
3. Intel
4. AMD
5. All of these
ANS (3)-Intel
Q24.A high quality CAD system uses the following for printing drawing and graphs?
2. Digital plotter
3. Line printer
4. Scanner
1. George Boole
2. Herman Hollerith
3. Vonn Neumann
4. Basic Pascal
5. Sun Microsystem
Q26.Can you tell what passes into and out from the computer via its ports__________?
1. Data
2. Bytes
3. Graphics
4. Pictures
5. Information
ANS (1)-Data
Q27.Which type of computers uses the 8-bit code called EBCDIC?
1. Minicomputers
2. Microcomputers
3. Mainframe computers
4. Super computer
5. Desktop
Q28.Computer instructions written with the use of English words instead of binary machine
code is called?
1. Mnemonics
2. Symbolic code
3. Gray codes
4. Opcode
5. Barcode
1. Is a semiconductor memory
2. Memory register
3. Magnetic memory
5. All of these
1. A byte
2. A record
3. An address
4. Data
5. All of above
Q31.What is the default folder used to store incoming email messages called?
1. Mailbox
2. Tempbox
3. Inbox
4. Mybox
5. Drafts
ANS (3)-Inbox
1. Multilingual website
2. Dynamic website
4. Responsive website
5. None of these
1. Router
2. Switch
3. Star
4. Ring
5. Gateway
ANS (5)-Gateway
1. Websites
2. File Systems
3. Protocols
4. Software Programs
5. Internet files
ANS (3)-Protocols
1. Refracting
2. Rounding
3. Flattening
4. Dithering
5. None of these
ANS (4)-Dithering
Current Affair से संवधं िि हमारी बेबसाइट पर हमेशा Update रहिे वािी
महत्वपूर्ण Post –
1. Soft copy
2. Virtual copy
3. Computer copy
4. e-Copy
5. Hard copy
Q37.How can you increase the font size of selected text by one point every time?
1. By pressing Ctrl +]
2. By pressing Ctrl + [
3. By pressing Ctrl +}
4. By pressing Ctrl+{
1. Mouse
2. Logo
3. Hand
4. Palm
5. Cursor
ANS (5)-Cursor
Q39. Main circuit board in a computer?
1. Decoder
2. Highlight
3. Select
4. Mother board
5. Bus
2. Fill it to capacity
5. None of these
Q41.Which of the following may be necessary for you to do after you install new application
software?
2. Do a warm boot
4. Do a cold boot
5. None of these
1. CPU
2. Chipset
3. System clock
4. Connector
5. None of these
ANS (4)-Connector
1. Field
2. Label
3. Matrix
4. Tuple
5. None of these
ANS (1)-Field
1. Network station
2. Network server
3. Network client
4. Desktop
5. None of these
1. Binary
2. Octal
3. Hexa-Decimal
4. Octal
5. None of these
ANS (1)-Binary
1. Andy Rubin
2. Martin Cooper
3. Ericson
4. Steve Jobs
5. None of these
ANS (3)-Ericson
Q47.Devices that let the computer communicate with you are called?
1. Input devices
2. Output devices
3. Type devices
4. Print devices
5. None of these
1. Bait
2. Bit
3. Byte
4. Bite
5. None of these
ANS (2)-Bit
1. Determinate or indeterminate
2. Fixed or unfixed
3. Guided or unguided
4. Neither 1 and 2
1. Pair of wires
3. Coaxial cable
4. Twisted pair
1. Mouse
2. Plotter
3. Touch panel
4. Card punch
5. None of these
ANS (2)-Plotter
1. Computer program
2. Algorithm
3. Flowchart
4. Utility programs
5. None of these
1. Data mining
2. Data selection
3. POS
4. Data conversion
5. None of these
5. None of these
5. None of these
4. To provide TCP/IP
1. Gigabyte
2. Kilobyte
3. Megabyte
4. Terabyte
5. None of these
ANS (3)-Megabyte
1. Cookies
2. Plug-ins
3. Scripts
4. ASPs
5. None of these
ANS (1)-Cookies
1. Interpreting
2. Translating
3. Debugging
4. Compiling
5. None of these
ANS (3)-Debugging
Q60.A device that provides emergency power to your computer, conditions the voltage,
and protects against power surges is called?
1. File
2. Tools
3. Special
4. Edit
5. Styles
ANS (4)-Edit
1. Keyboards
2. Speakers
4. Printers
5. Mouse
ANS (4)-Printers
Q63.Graphics for word processor is known as?
1. Peripheral
2. Clip art
3. Highlight
4. Execute
5. Image art
1. Updating
2. Upgrading
3. Restructuring
4. Renewing
5. None of above
ANS (1)-Updating
1. Dot
2. Doc
3. Dom
4. Txt
5. Wrd
ANS (2)-Doc
Q66.BISYNC is an abbreviation for?
2. Binary synchronous
3. Binary digit
5. None of these
Q67.If you see a small red triangle in the top right corner of a cell, it means there is
something attached to the cell, what is it?
1 .A comment
2. An attachment
3. An error
5. None of these
1. Malicious Intent
2. Sabotage
3. Accident Errors
4. Espionage Agents
5. None of these
Q70.These type of viruses is often transmitted by a floppy disk left in the floppy drive?
1. Trojan horse
2. Boot sector
3. Script
4. Logic bomb
5. None of these
Q71.Which terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems?
1. Data
2. Point-of-sale (POS)
3. Information
4. Sales
5. Query
1. GPS
2. PPS
3. POS
4. PSS
5. RFID
ANS (5)-RFID
1. Edit
2. File
3. Format
4. View
5. Help
ANS (1)-Edit
1. PROM
2. RAM
3. Cache memory
4. EEPROM
5. None of these
ANS (4)-EEPROM
Q75.Which of the following refers to too much electricity and may cause a voltage surge?
1. Spike
2. Anomaly
3. Shock
4. Virus
5. None of these
ANS (1)-Spike
1. Simplex Channel
4. Hybrid Channel
5. None of these
1. Press Shift + F7
2. Press Ctrl + F7
3. Press Alt+ F7
4. Press F7
5. Press F8
ANS (4)-Press F7
Q78.An integrated circuit is?
1. A complicated circuit
2. An integrating device
5. None of these
Q79.Founder of Google?
3. VA Shiva Ayyadurai
4. Tim Berners-Lee
5. Marc Andreessen
Q80.Founder of Flipkart?
3. Sanjeev Agrawal
1. 163
2. 1638
3. 16038
4. 160038
5. None of above
ANS (2)-1638
1. Spelling suggestions
2. Grammar options
4. All of above
5. None of these
1.32 bits
2.128 bytes
3.64 bits
4.128 bits
5. None of these
1. Session layer
2. Physical layer
4. Application layer
5. Transport layer
1. TCP
2. ARP
3. ICMP
4. BootP
5. None of these
ANS (3)-ICMP
Q86. Where does encryption and decryption of data take place in OSI model?
1. Transport layer
2. Presentation layer
3. Session layer
4. Application layer
5. None of these
2. On network pc
3. On network server
4. On PDA
5. On mainframe
Q88.During the _____ operation, the control unit determines what the program is telling the
computer to do?
1. Fetch
2. Execute
3. Decode
4. Arithmetic
5. None of these
ANS (3)-Decode
1. Chares Babbage
2. Vint Cerf
3. Denis Riche
4. Martin Cooper
5. None of these
1. Ethernet
2. Bluetooth
3. Wi-fi
5. Router
ANS (3)-Wi-Fi
1. Ken Thompson
2. Andy Rubin
3. Linus Torvalds
4. Dennis Ritchie
5. Bill Gates
1. Milli seconds
2. Micro hertz
3. Megabytes or Gigabytes
4. Nanoseconds
5. Megahertz or Gigahertz
2. System File
3. Image file
4. MS Access
5. Animation/movie file
1. Token bus
2. Mesh network
3. MAN
4. Cable Modems
5. Ethernet
ANS (5)-Ethernet
Q95. A spooler is a?
1. Location in memory
2. Print on paper
1. Hard disk
2. Fibre Optical
3. Output device
5. Optical Disc
1. Column
2. Cell
3. Address
4. Attribute
5. Tuples
ANS (2)-Cell
1. LCP
2. HDLC
3. X.25
4. NCP
5. None of these
ANS (1)-LCP
Q99.Time taken for completing a task in computers is known as?
1. Down time
2. Delay time
3. Execution time
4. Latency time
5. Seek time
1. System clock
2. Instruction set
3. IrDA port
4. Data bus
5. None of these
Maths PDF
Reasoning PDF
History PDF
Gepgraphy PDF
Economics PDF
Polity PDF
Science PDF
Computer PDF
Environment PDF
General Hindi PDF
MP GK PDF
UP GK PDF
Rajasthan GK PDF