0% found this document useful (0 votes)
17 views

Computer Awareness

Computer awareness

Uploaded by

crazytrick0106
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Computer Awareness

Computer awareness

Uploaded by

crazytrick0106
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

TEAM EXAM GENIUS PRESENTS

COMPUTER
AWARENESS

COMPUTER AWARNESS FOR


RRB PO & CLERK MAINS

VISIT: https://examgenius.in/
1) Executing is the process of carrying out commands
2) The rectangular area of the screen that displays a program, data,
and or information is a window.
3) The process of a computer receiving information from a server on
the internet is known as downloading.
4) Disk drive is the part of the computer helps to store information
5) Arithmetic operations include addition, subtraction,
multiplication, and division.
6) Which part of the computer displays the work done ? monitor.
7) A series of instructions that tells a computer what to do and how
to do it is called a program.
8) Hardware is the part of a computer that one can touch and feel.
9) The role of a computer sales representative generally is to
determine a buyer’s needs and match it to the correct hardware
and software.
10) Supercomputers refers to the fastest, biggest and most
expensive computers .
11) The code for a Web page is written using Hypertext Markup
language.
12) The first computers were programmed using Machine language.
13) A filename is a unique name that you give to a file of
information.
14) Smallest unit of a software is called Module
15) Any data or instruction entered into the memory of a computer
is considered as storage.
16) A touchscreen is the kind of input + output device.
17) An error is known as bug.
18) A collection of related information sorted and dealt with as a
unit is a file.
19) Sending an e-mail is similar to writing a letter.
20) IT stands for information technology.
21) The ability to find an individual item in a file immediately direct
access is used.
22) To make a notebook act as a desktop model, the notebook can
be connected to a docking station which is connected to a monitor
and other devices.
23) You can use the tab key to move a cursor across the screen,
indent a paragraph.
24) A collection of related files is called record.
25) Storage that retains its data after the power is turned off is
referred to as non-volatile storage.
26) IT stands for information technology.
27) A menu contains commands that can be selected.
28) Plotter, printer, monitor are the group consists of output
devices.
29) The most important or powerful computer in a typical network
is network server.
30) The primary purpose of software is to turn data into
information.
31) TB is the largest unit of storage.
32) The operating system tells the computer how to use its
components.
33) When cutting and pasting, the item cut is temporarily
stored in clipboard.
34) The blinking symbol on the computer screen is called the
cursor.
35) Magnetic tape is not practical for applications where data
must be quickly recalled because tape is a sequential access
medium.
36) Rows and columns are used to organize data in a spread
sheet.
37) When you are working on documentation on PC, the
document temporarily stored in flash memory.
38) One megabyte equals approximately 1 million bytes.
39) Information travels between components on the
motherboard through buses.
40) RAM refers to the memory in your computer.
41) Internet is an example of connectivity.
42) Testing is the process of finding errors in software code.
43) A syntax contains specific rules and words that express
the logical steps of an algorithm.
44) Changing an existing document is called the editing
documentation.
45) Virtual memory is memory on the hard disk that the CPU
uses as an extended RAM.
46) Computers use the binary number system to store data and
perform calculations.
47) The windows key will launch the start buttons.
48) To move to the beginning of a line of text, press the home key.
49) When sending an e-mail, the subject lines describe the
contents of the message.
50) Tables, paragraphs and indexes work with when formatting
text in word.
51) RAM refers to the memory in your computer.
52) Computer connected to a LAN can share information and or
share peripheral equipments.
53) Utilities can handle most system functions that aren’t
handled directly by the operating system.
54) If you receive an e-mail from someone you don’t know then
you should delete it without opening it.
55) A set of instructions telling the computer what to do is called
program.
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer
system runs and processes information is called operating
system.
58) Device drivers are small, special-purpose programs.
59) Transformation of input into output is performed by the CPU
60) Data going into the computer is called input.
61) Binary choice offer only two options.
62) To indent the first paragraph of your report, you should use
tab key.
63) Fields are distinct item that don’t have much meaning to you
in a given context.
64) A website address is a unique name that identifies a specific
web site on the web.
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such
as word processing is the best definition of a software package.
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next
character will appear is a cursor
69) Highlight and delete is used to remove a paragraph from a
report you had written.
70) Data and time are available on the desktop at taskbar.
71) A tool bar contains buttons and menus that provide quick
access to commonly used commands.
72) For creating a document, you use new command at file
menu.
73) Input device is equipment used to capture information and
commands.
74) A programming language contains specific rules and words
that express the logical steps of an algorithm.
75) One advantage of dial-up internet access is it utilizes existing
telephone security.
76) A directory within a directory is called sub directory
77) Testing is the process of finding errors in software code
78) In Excel, charts are created using chart wizard option
79) Microcomputer hardware consists of three basic categories
of physical equipment system unit input/output, memory
80) Windows is not a common feature of software applications
81) Protecting data by copying it from the original source is
backup
82) Network components are connected to the same cable in
the star topology
83) Two or more computers connected to each other for
sharing information form a network
84) A compute checks the database of user name and
passwords for a match before granting access
85) Computers that are portable and convenient for users who
travel are known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various
computer parts and allows the user to interact with the
computer
88) Each cell in a Microsoft office excel document is referred to
by its cell address, which is the cell’s row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large
scale can be connected using a corporate WAN
91) Most World Wide Web pages contain HTML commands in the
language
92) Icons are graphical objects used to represent commonly used
application
93) UNIX is not owned and licensed by a company
94) In any window, the maximize button, the minimize button and
the close buttons appear on the title bar
95) Dial-up Service is the slowest internet connection service.
96) Storage is the process of copying software programs from
secondary storage media to the hard disk
97) The code for a web page is written using Hyper Text Markup
Language
98) Small application programs that run on a Web page and may
ensure a form is completed properly or provide animation are
known as flash
99) In a relational database, table is a data structure that organizes
the information about a single topic into rows and columns
100) The first computers were programmed using assembly
language
101) When the pointer is positioned on a hyperlink it is shaped like a
hand
102) Booting process checks to ensure the components of the
computer are operating and connected properly
103) Checking the existing files saved on the disk the user
determine what programs are available on a computer
104) Special effect used to introduce slides in a presentation are
called animation
105) Computers send and receive data in the form of digital signals
106) Microsoft office is an application suite
106) A CD-RW disk can be erased and rewritten
107) The two major categories of software include system and
application
108) Windows 95, Windows 98 and Windows NT are known as
operating systems
109) Information on a computer is stored as analog data
110) A spread sheet that works like a calculator for keeping track
of money and making budgets
111) To take information from one source and bring it to your
computer is referred to as download
112) Each box in a spread sheet is called a cell
113) Network components are connected to the same cable in the
bus topology
114) Two or more computers connected to each other for sharing
information form a network
115) A computer checks the database of user names and
passwords for a match before granting access.
116) Every component of your computer is either hardware or
software
117) Checking that a pin code number is valid before it is entered
into the system is an example of data validation
118) A compiler translates higher level programs into a machine
language program, which is called object code
119) The ability to find an individual item in a file immediately
direct access
120) Computers connected to a LAN can share information
and/or share peripheral equipment
121) Spam is the other name for unsolicited e-mail
122) Operating system controls the various computer parts
and allows the user to interact with the computer
123) Each cell in a Microsoft Office Excel document is
referred to by its cell address, which is the cell’s row and
column labels
124) Download is the process of copying software
programs from secondary storage media to the hard disk
125) The code for a web page is written using Hypertext
Markup Language
126) Small application programs that run on a web page
and may ensure a form is completed properly or provide
animation are known as Flash
127) A file is a unique name that you give to a file of
information
128) For seeing the output, you use monitor
129) CDs are of round in shape
130) Control key is used in combination with another key to
perform a specific task
131) Scanner will translate images of text, drawings and
photos into digital form
132) CPU is the brain of the computer
133) Something which has easily understood instructions is
said to be user friendly
134) Information on a computer is stored as digital data
135) For creating a document, you use new command at file
menu
136) The programs and data kept in main memory while the
processor is using them.
137) Ctrl + A command is used to select the whole document
138) Sending an e-mail is same as writing a letter.
139) A Website address is a unique name that identifies a specific
website on the web
140) Answer sheets in bank PO’s/Clerk’s examinations are checked
by using Optical Mark Reader
141) Electronic data exchange provides strategic and operational
business opportunity
142) Digital signals used in ISDN have whole number values
143) Assembler is language translation software
144) Manual data can be put into computer by scanner
145) In a bank, after computerization cheques are taken care of by
MICR
146) The banks use MICR device to minimize conversion process
147) Image can be sent over telephone lines by using scanner
148) Microchip elements are unique to a smart card
149) MS-DOS is a single user operating system
150) Basic can be used for scientific and commercial purpose.
151) All computers can execute machine language programs
152) Programs stored in ROM can’t be erased
153) Ethernet is used for high speed telecommunications
154) IP address can change even if the domain name remains
same
155) Each directory entry can be of 32 bytes
156) With the help of Control + Del a letter can be erased in a
word,
157) Disk can keep maximum data
158) FORTRAN is a scientific computer language
159) Computer language COBOL is useful for commercial work
160) COBOL is a high standard language like English
161) In computer the length of a word can be measured by
byte.
162) Byte is the unit of storage medium
163) ROM is not a computer language
164) Oracle is a database software
165) Sequential circuit is full aid
166) Processor is must for computer
167) ROM keeps permanent memory
168) Screen display is called by windows in lotus
169) Pascal is a computer language
170) Expanded form of IBM is International business machine
171) IC chips are made of silicon
172) India’s Silicon Valley situated at Bangalore
173) RAM and ROM are the storage devices of computer
174) DOS is to create relation between hardware and software
175) LOTUS 1-2-3 is software
176) Voice mail is a personal security code for GSM subscribers
177) Tables holds actual data in the database
178) Trojan is a virus
179) Static keys make WEB insecure
180) Video signal needs highest bandwidth
181) Connectivity means communication between systems
182) Controlling is not required for high level language programs
before it is executed
183) 3 out of three rollers are responsible for the movement of
cursor on screen
184) Hardware that adds two numbers is arithmetic logical unit
185) Data accuracy is not done by modem
186) LAN is used for networks setup within a building
187) A data communication system requires terminal device,
communication channel, protocols
188) Most common channel used by networks today is satellite.
189) Run Time is not a type of error
190) A five-digit card attribute used for postal ZIP codes it will
be restored as a numeric data
191) Computer viruses can be attached to an executable
program
192) MS-DOS was the first operating system
193) The smallest space where information on a hard disk is kept
in a cluster
194) An information is processed data
195) Intelligence is not a characteristic of a computer
196) Private key is used to in digital signature
197) Negative numbers can be represented in binary
198) VDU is not an essential part of a computer
199) The printers are line printer, laser, dot matrix
200) Speed of clock of CPU is measured in megahertz
201) Cache is not a secondary storage device
202) Disk can be used to store sequential files and random
files
203) Windows is not an application
204) When taking the output information is produced in
hardcopy and/or softcopy form
205) Control unit’s function is to decode program
instructions
206) The most powerful type of computer amongst the
following is supercomputer
207) GO TO statement is used in C, C++, basic language 208)
File menu is selected to print
209) The name a user assigns to a document is called a
filename
210) A processor is an electronic device that processes data,
converting it into information.
211) Control words are words that a programming language has
set aside for its own use.
212) Monitor and printer are the two types of output devices
213) To access properties of an object, the mouse technique to use is right-
clicking
214) An operating system is a program that makes the computer easier to
use
215) Connections to the internet using a phone line and a modem are called
dial-up connections
216) To access a mainframe or supercomputer, users often use a terminal
217) A flaw in a program that causes it to produce incorrect or inappropriate
results is called a bug
218) A web site address is a unique name that identifies a specific web site
on the web
219) Every component of your computer is either hardware or software
220) To make the number pad act as directional arrows, you press the num
lock key
221) When creating a word-processed document, formatting text involves
the user changing how words on the page appear, both on the screen and in
printed form
222) The ALU performs simple mathematics for the CPU
223) A computer program is a set of keywords, symbols, and a system of
rules for constructing statements by which humans can communicate the
instructions to be executed by a computer
224) The another word for program is software
225) The name of the computer’s brain is CPU
226) A computer is a device that electronically processes data, converting it
to information
227) Laptops are computers that can be carried around easily
228) The secret code that restricts entry to some programs is password
229) The basic goal of computer process is to convert data into information
230) The disk is placed in the CPU in a computer
231) A hard copy of a document is printed on the printer.
234) E-mail is the transmission of messages and files via a
computer network
235) The person who writes and tests computer programs is called
a programmer
236) The information you put into the computer is called data
237) The output devices make it possible to view or print data
238) A chat is a typed conversation that takes place on a computer
239) Hardware includes the computer and all the devices
connected to it that are used to input and output data
240) The most common method of entering text and numerical
data into a computer system is through the use of a keyboard
241) Mouse, keyboard, plotter are the group consist of only input
devices
242) 256 values can be represented by a single byte
243) Transformation of input into output is performed by the CPU
244) Vertical-market applications can handle most system
functions that aren’t handled directly by the operating system
245) Device drivers are small, special-purpose programs
246) LAN refers to a small, single-site network
247) A set of instructions telling the computer what to do is called
program
248) Data going into the computer is called input
249) If you receive an e-mail from someone you don’t know, then
delete it without opening it
250) Two options does a binary choice offer .
251) A collection of programs that controls how you computer
system runs and processes information is called operating system
252) Rows and columns are data organized in a spreadsheet.
255) One megabyte equals approximately 1 million bytes.
256. The first web browser was developed by Tim Berners-Lee and
was called WorldWideWeb.
257. The most commonly used operating system for personal
computers is Windows.
258. The process of copying data from one location to another is
called Data Transfer.
259. An Operating System is a program that manages the
computer's hardware resources.
260. Open Source refers to a program or software that is free to
use and distribute.
261. A Computer Network is a network of interconnected devices
that can communicate with each other.
262. The CPU is the brain of the computer and performs
calculations and logical operations.
263. A Ransomware is a type of malware that demands payment in
exchange for restoring access to data.
264. The Network Layer of the OSI model is responsible for routing
data between networks.
265. A Relational DB is a type of database that stores data in tables
with rows and columns.
266. The term Multi-Cloud refers to the practice of using multiple
cloud services from different providers.
267) Digital signals used in ISDN have discrete values
268) Assembler is language translation software
269) Manual data can be put into computer by scanner.
270) Bandwidth means channel capacity amount of data following
via cables and measure of speed.
271) Chip can keep maximum data.
272) Debugging is the process of finding errors in software code
273) Time Bomb are viruses that are triggered by the passage of
time or on a certain data
274) Linux is an open source operating system
275) Boot sector viruses are often transmitted by a floppy disk left
in the floppy drive
276) Operating system controls the way in which the computer
system functions and provides a medium by which users can
interact with the computer
277) Servers are computers that provide resources to other
computers connected to a network
278) Field names describe what a data field is
279) You must install router on a network if you want to share a
broadband internet connection
280) A goal of normalization is to minimize the number of
redundancy
281) Programs from the same developer, sold, bundled, together,
that are provide better integration and share common features,
tool box and menus are known as software suits
282) A data ware house is one that organizes important subject
areas
283) URL term identifies a specific computer on the web and the
main page of the entire site
284) A proxy server is used to process client request for web pages
285) When data changes in multiple list and list are not updated,
this causes data inconsistency
286) Granting an outside organization access to internet web pages
is often implemented using a extranet.
287) The code that relational database management systems
use to perform their database task is refer to as SQL
288) URL stands for Uniform resource locator
289) A data base management system is a software system
used to create, maintain and provide controlled access to a
database
290) The two broad categories of software are system and
application.
291) The metal or plastic case that holds all the physical
parts of the computer is known as system unit
292) Data integrity means that the data contained in the
database is accurate and reliable
293) A local area network is a private corporate network
used exclusively by company categories
294) Eight bits equal to one byte
295) A byte can hold one character data
296) A characteristic of a file server is manages files
operations and is shared on a network
298) The development process of computer started in 1617
299) The role of Blaze Pascal in the development of
computer is addition and subtraction of numbers
300) The inventor of computer is Charles Babbage
301) The IBM made the first electronic computer in 1953
302) The silicon based transistor started to made by Gordon
Tin in 1954
303) IBM is a company
304) The personal computer invented in 1981
305) 1 Kilobyte is equal to 1024 bytes
306) LCD means liquid crystal display
307) UPS converts DC voltage into AC voltage
308) The word ZIP means Zicxac Inline Pin
309) With the help of Pal switch we can increase or decrease the
speed of computer’s processing
310) The full form of MICR is magnetic ink character reader
311) Swift networks are used between banks
312) Panda is a virus
313) Boot sector is hardware
314) Debug searches the fault of any software
315) OCR means optical character recognition
316) The total printout of a program is called listing
317) With the help of ZIP we can decrease the size of any programs
318) We can format the hard disk with the help of Booting
319) CANNED is called as readymade software
320) The process of creating third file by mixing two files is called as
mail merging
321) The figures and lines etc. made by computer is called as graphics
322) Each line represents 65 letters in a WordStar
323) Nokia- 7500 is not the example of Micro Processor 324) The first
name of the digital computer is Unvake.
325) The modern computer was invented in 1946
326) The full form of DOS is disk operating system
327) The expanded form of FORTRAN is formula translation 328) The
great revolution came in computer sector in 1960 329) Magnetic tape
is called as Input device of computer
330) The first mechanical computer of Charles Babbage is known as
punch card machine.
331) The IC chip used in computer is generally made in silicon
332) Telephone broadcast is the example of simplex
transmission
333) Optical, Mechanical are the kinds of mouse
334) Control panel is used for increasing and decreasing the
speed of the cursor of mouse
335) The capacity of modern main frame digital computer is
10^12 mbps
336) With the help of Windows Explorer we can know about the
usage and availability of space in computer
337) We use both MS-Word and page maker for making resume
338) Earliest computers that would work with FORTRAN was
second generation
339) Back Ups in database are maintained for to restore the lost
data
340) IDEA is a encryption technique
341) DBRM takes care of storage of data in a database
342) The job of DBMS is to decrease redundancy
343) Digital signatures use encryption for authenticating.
344) OS acts as intermediary agency between user and
hardware
345) Plotters gives the highest quality output
346) ROM is built in memory in computer
347) FLASH is a RAM
348) PRAM is not a RAM
349) FLASH device is used in cell phones
350) Internal storage is same as the primary storage
351) IMAC is name of a machine
352) First generation computers could do batch processing
353) The analytic engine was created by Charles Babbage
354) Voicemail of GSM service provider has the personal security
code for its subscribers
355) Senior manager decided about the division of work with respect
to IT security
356) Encrypting file system of window XP professional operating
system protects the data of a user, even if the computer is shared
between users
357) The .mpeg is the format of a movie file
358) Controlling is NOT required for high level language program
before it is executed
359) A plotter is output device
360) 80286 is a hardware part of microprocessor
361) Top-bottom approach cannot be the measure of network traffic
362) A switching mode power supply is used for converting raw input
363) Spooler can manage the whole printing process
364) Validity routines control procedures can be used to ensure
completeness of data
365) Less expensive than leased line networks is not a characteristic
of virtual private networks (PVN)
366) Program policy framework provides strategic direction to an
organization
367) Cross bar switches have common control
368) Row-level security is the most basic part for database security
369) Voice recognition software cannot be used for converting text
into voice
370) The user account can only be created by the network
administrator
371) IBM-700 belongs to second generation
372) Allocating adequate bandwidth would help her in speeding up
the data transfer over net
373) BCD means binary coded decimal
374) Extended system configuration data is same as BIOS
375) Digitizer is an input device
376) Caramel is the latest platform of Intel Centrio microprocessor
377) RISC is known as storage device
378) NORTON is an anti-virus
379) The system file of an operating system is COM
380) ATMs of bank have real currency
381) A program that converts high level language to machine
language is assembler
382) ‘.txt’ files can be made in notepad, MS word, DOS editor.
383) .Zip is a compressed file
384) Internet is a WAN
385) MP3 technology compresses a sound sequence to one-twelfth
of its original size
386) At a time only one operating system can be at work on a
computer
387) If multiple programs can be executed at the same time, it is
distributed operating system
388) If the operating system provides quick attention, it is real time
operating system
389) Distributed operating system uses network facility
390) FORMAT command in MS-DOS is used for recreating disk
information
391) COPY command in MS-DOS is used to copy one or more files in
disk drive to another, copy from one directory to another directory
392) REN command is Internal command
393) Tim Berners Lee propounded the concept of “World wide web”
394) The memory address sent from the CPU to the main memory
over a set of wires is called address bus
395) MODEM is an electronic device required the computer to
connect to the INTERNET
396) A source program is a program which is to be Transcripted in
machine language
397) Virus in computer relates to program
398) Floppy is not a storage medium in the computer related
hardware
399) DOS floppy disk does not have a boot record
400) The CPU in a computer comprises of Store, arithmetic and
logical unit and control unit
401) In computer parlor a mouse is a screen saver
402) UNIVA is the name of the computer which was first used for
programming and playing of music
403) The IC chips for computer is prepared from silicon
404) Database management systems are comprised of tables that
made up of rows called records and columns called fields
405) Nano is equal to 10^9.
406) In computers RAM is a non-volatile memory
407) Disk and tape drives are commonly used as hard copy
408) When computer is connected to LAN and data is sent across it
for storage/processing is online processing
409) The primary storage unit is also referred to as internal storage
410) Oracle is not an operating system
411) Data are raw facts and figures
412) Holding of all data and instructions to be processed is one of the
functions of storage unit
413) To select the entire row in Excel, click mouse at row heading
414) Database is known as structured data
415) Normal view and outline view notes pane appears in power point
416) The user protection feature of an operating system is required in
multi-user system only
417) In word, Ctrl + Del combination of keys press to delete an entire
word
418) In MS-Word double clicking a word selects the word
419) Word document can be navigated in web layout view
420) In Excel, addressing mode(s) that can be used in a formula is/are
only absolute and relative
421) Note page views can you use to show just the slide and its
contents
422) Hardware that adds two numbers is arithmetic logical unit
423) The computer as a machine and all other physical equipment
associated with it are termed as hardware
424) Plotters are very useful in applications such as computer aided
design
425) Corel DRAW is a graphic package
426) The print to file option creates .prn file
427) The enhanced keyboard contains 101 keys
428) Data processing cycle consists of input cycle, output cycle and
processing cycle
429) Page Setup is not an option of Edit menu
430) Radar chart is used to show a correlation between two data series
431) A computerized business information system includes
hardware, software and data facts
432) Purchase order file is a transaction file
433) A typical computerized business application system will
have both master and transaction file
434) Problem identification is taken first in designing a program
435) The purpose of the EXIT command is to get out of a
condition loop
436) Employees details is a master file for the pay roll system
437) A slow memory can be connected to 8085 by using READY
438) A processor needs software interrupt to obtain system
services which need execution of privileged instructions
439) A CPU has two modes- privileged and non-privileged. In
order to change the mode from the privileged to the non-
privileged, a software interrupt is needed
440) Swap space resides at disk
441) The process of assigning load addressed to the various
parts of the program and adjusting the code and data in the
program to reflect the assigned address is called relocation
442)1 Sector= 4096 bytes
443) Two stacks of size required to implement a queue of size n
444) 1 Floppy = 6, 30,784 bytes or 308 KB
445) Consider a machine with 64 MB physical memory and a 32-
bit virtual address space. If the page size is 4 KB, then size of the
page table is 2 MB
446) Consider a virtual memory system with FIFO page replacement
policy. For an arbitrary page access pattern, increasing the number of
page frames in main memory will always decrease the number of page
faults
447) Consider a scheme R(A, B, C, D) and functional dependencies A-
>B and C-> D. Then the decomposition of R into R1 (AB) and R2 (CD) is
dependency preserving and lossless join
448) Main memory requires a device driver
449) RAM can be divided into 2 types
450) Two friends suitably arrange 4 blocks of different colors to
exchange coded information between them. 4 bits of information is
one exchanging each time
451) Cache memory is a part of main memory
452) The number 43 in 2’s complement representation is 01010101
453) The 8085 microprocessor responds to the presence of an
interrupt by checking the TRAP pin for ‘high’ status at the end of each
instruction fetch
454) All machinery and apparatus of computer is called hardware
455) The number 1024 bytes is the complement representation of 1
Kilo byte
456) System design specifications do not include blueprint showing
the layout of hardware
457) Web pages are uniquely identified using URL
458) The results of arithmetic and logical operations are stored in an
accumulator
459) A compiler breaks the source code into a uniform stream of
tokens by lexical analysis
460) The number of processes that may running at the same time in a
large system can be thousands
461) LET.BAS files are related to Microsoft word utility
462) A command in UNIX can have one or more arguments
463) A hard disk is logically organized according to cylinders
and sectors
464) A frame can include text & graphics, tables & graphics,
graphics
465) All the formatting data for the paragraph is stored in the
paragraph mark
466) The abbreviation CAD stands for computer aided design
467) We can define hypertext definition in notebooks using
Macsyma 2.0
468) The addressing mode(s) that can be used in a formula
is/are absolute, relative and mixed
469) WINDOWS can work in enhanced and standard modes
470) The part of a machine level instruction which tells the
central processor what has to be done is an operation code
471) O-Matrix software packages do not have animation
capabilities
472) In order to paste text form the clipboard in the document
being edited, press the Ctrl-A key
473) A program that converts a high level language program to a
set of instructions that can run on a computer is called a
compiler
474) Faster execution of programs is not an advantage of a
subroutine.
475) First generation of computer period is 1945-1950.
476) IBM built first PC in the year 1981
477) A small computer program embedded within an HTML
document when a user retrieves the web page from a web server
is called an applet
478) Another name for systems implementation is
transformation
479) The central host computer or file server in a star network
maintains control with its connecting devices through polling
480) C++ does not check whether the index value is within scope
481) The browser uses uniform resource locator to connect to
the location or address of internet resources
482) In the centralized computing architecture, the entire file is
downloaded from the host computer to the user’s computer in
response to a request for data
483) An expert system enables one or more users to move and
react to what their senses perceive in a computer simulated
environment
484) Popping or removing an element from an empty stack is
called underflow
485) The ability to combine data and operations on that data in a
single unit is known as polymorphism
486) A router is a device that sites between your internal
network and the internet and limits access into and out of your
network based on your organization’s access policy
487) In C++, private, protected, and public are reserved words
and are called member access specifiers
488) The integration of all kinds of media such as audio, video,
voice, graphics and text into one coherent presentation combined
is called multimedia
489) The derived class can redefine the public member functions
of the base class
490) A technique for searching special databases, called data
warehouses, looking for related information and patterns is called
data mining.
491) Like the quick sort the merge sort uses the divide and conquer
technique to sort a list
492) The use of expert systems technology can greatly reduce the
number of calls routed to a customer service department
493) Building a list in the backward manner, a new node is always
inserted at the beginning of the list
494) Creating a web site is also called web authoring
495) Using the optimization analysis approach, the expert system
starts with a conclusion and tries to verify that the rules, facts, and
conclusion all match. If not, the expert system chooses another
conclusion
496) Both the application program and operating system program
only describes the software
497) Root is one of the items given below is not an item of the menu
bar
498) BACKUP is not an internal command
499) In a disk, each block of data is written into one sector
500) Hard copy is a printed copy of machine output.
501) A cluster represents a group of sectors
502) A computer program that converts an entire program into
machine language at one time is called? Characters
503) In which year, the Microsoft company was founded? 1975
504) What is the personal computer operating system that organizes
and uses a graphic desktop environment? Windows
505) What are Light pen and joystick? Input Devices
506) What is a half byte also called as? Nibble
507) SMPS stands for__? Switched mode Power Supply
508) What do we use to change the appearance and positioning of
text document in MSWord? Formatting
509) A ________ is approximately a million bytes? Megabyte
510) Daisy wheel, Drum, chain etc are the__? Printers
511) XML stands for __? Extensible Markup Language
512) What was the chief component of first generation computer?
Vacuum tube & Valves
513) Name the Father of Computer Mouse? Douglas Engelbart
514) A program that performs a useful task while simultaneously
allowing destructive acts is __? Trojan Horse
515) The geometric arrangement of devices on the network is
called...........? Topology
516) An error in software or hardware is called a bug. What is the
alternative computer jargon for it? Glitch
517) Unwanted repetitious messages, such as unsolicited bulk e-mail
is known as__? Spam
518) The common name for the crime of stealing passwords is__?
Spoofing
519) BIOS stands for __? Basic Input Output System
520) Who is regarded as Father of “C‘programming language? Dennis
Ritchie
521) Computers manipulate data in many ways, and this manipulation
is called__? Processing
522) Where does most data go first with in a computer memory
hierarchy? RAM
523) Help Menu is available at which button? Start
524) Which file contains permanent data and gets updated during the
processing of transactions? Master File
525) A DVD is an example of an__? Optical Disc
526) Which is most common tool used to restrict access to computer
system? Passwords
527) The technology that stores only essential instructions on a
microprocessor chip and thus enhances its speed is referred as__?
RISC
528) What is called the ordered group of instructions written for
computer- Program
529) In which languages programs are written for computers, which
languages go to them- Programming
529) Fortran is a programming language in which programs are
written for ......... functions- Scientific
530) The basic goal of computer process is to convert data into ___?
Information
531) Where are the CPU and memory located? Motherboard
532) Who is known as the founder of IBM Company? Thomas J.
Watson
533) An image on a computer screen is made up of__? Pixels
534) Full form of MAN? Metropolitan Area Network
535) Which command in DOS can be used to recover accidentally
deleted files? UNDELETE
536) A computer program that converts an entire program into
machine language at one time is called? Characters
537) In which year, the Microsoft company was founded? 1975
538) What is the personal computer operating system that organizes
and uses a graphic desktop environment? Windows
539) What are Light pen and joystick? Input Devices
540) What is a half byte also called as? Nibble
541) SMPS stands for__? Switched mode Power Supply
542) What do we use to change the appearance and positioning of
text document in MSWord? Formatting
543) A ________ is approximately a million bytes? Megabyte
544) Daisy wheel, Drum, chain etc are the__? Printers
545) XML stands for __? Extensible Markup Language
546) What kind of scheme is the HTTP protocol? Request/Response
547) Magnetic disk is an example of__? Secondary Memory
548) What is the meaning of OSI, in terms of computers? Open
system Interconnection
549) Which type of storage device is a BIOS? Primary
550) What is the extension type of the excel 2007 files? .xlsx
551) The digital computer was developed primarily in UK
552) Programs which protect a disk from catching an infection are
called antidotes
553) The first movie with terrific computer animation and graphics
was released in 1982 is Tron
554) An integrated circuit is fabricated on a tiny silicon chip
555) The word size of a microprocessor refers to the amount of
information that can be stored in the byte
556) Daisy-wheel printer cannot print graphics
557) In the IBM PC-AT, the word AT stands for advanced terminology
558) Dedicated computer means which is assigned one and only one
task
559) Real time programming type of computers programming is used
for aero plane ticket reservation system
560) RAM means memory which can be both read and written to
561) Laser printer uses light beam and electro statically sensitive
black powder
562) A program written in machine language is called assembler
563) International business machine was the first company in the
world to build computer for sale
564) PARAM is a parallel computer
565) Data transfer rate in modems is measured in bits per second
566) E-commerce allows companies to conduct business over the
internet
567) Algorithms can handle most system functions that aren’t
handled
directly by the operating system
568) Device drivers are small, special-purpose programs
569) LAN refers to a small, single site network
570) A collection of programs that controls how your computer
system runs and processes information is called operating system
571) When we are working on a document on a PC the document is
temporarily stored in RAM
572) Information travels between components on the motherboard
through buses
573) Microsoft is a vertical market application
574) RAM refers to the memory in your computer
575) Computers connected to a LAN can share information and / or
share equipment
576) Magnetic tape is not practical for applications where data must
be quickly recalled because tape is a sequential access medium
577) In Late 1988 computer viruses land in India for the first time
578) ALU is a part of the CPU
579) In computer technology a compiler means a program, which
translates source program into object program
580) American computer company IBM is called big blue
581) When you boot up a PC — portions of the operating system are
copied from disk into memory
582) The first IBM PC did not have any ROM
583) A separate document form another program sent along with an
E-mail message is known as E-mail attachment
584) A compiler cannot detect logical errors in source programs
585) Throughput, turnaround time, response time are measures of
system performance
586) Kernel is the only art of an operating system that a user cannot
replace or modify
587) A disk worm is an example of optical devices
588) The first private internet service provider in India was Satyam
infoway
589) HIT RATIO is associated with cache performance
590) Abstraction is associated with object oriented technology and
database technology
591) A multithreaded program uses multiple processes
592) Oracle 8i is an example of OORDBMS
593) ALPHA, RIOS, SPARC are examples of RISC Processors
594) A language used to describe the syntax rules is known as meta
language
595) The Pentium processor contains thousands of transistors
596) A floppy disk rotates at 100rpm
597) Ada language is associated with real time processing
598) MS DOS is usually supplied on a cartridge tape
599) Kernel of MS-DOS software resides in ROM
600) The UNIX operating system (available commercially) has been
written in C language
601) The standard protocol (communication rules for exchange of
data) of the internet is TCP/IP
602) DBMS is a simple, fourth generation language used for data
retrieval
603) The storage capacity of a cartridge tape is 400 MB
604) Correcting errors in a program is called debugging
605) A word processor would most likely be used to type a biography
606) Fire fox is a web browser
607) Full form of USB is known as Universal serial bus
608) The quickest and easiest way in Word to locate a particular word
or phrase in a document is to use the find command
609) Computer sends and receives data in the form of digital signals
610) In any window, the maximize button, the minimize button and
the close buttons appear on the title bar
611) A toolbar contains buttons and menus that provide quick access
to commonly used commands
612) Input device is an equipment used to capture information and
commands
613) Most of the commonly available personal computers/laptops
have a keyboard popularly known as QWERTY
614) Junk e-mail is also called spam
615) Checking that a pin code number is valid before it is entered into
the system in an example of data validation
616) Windows 95 and windows 98 and Windows NT are known as
operating systems
617) A program that works like a calculator for keeping track of
money and making budgets is spreadsheet
618) To take information from one source and bring it to your
computer is referred to as download
619) DOC is the default file extension for all word documents
620) .bas, .doc and .htm are examples of extensions
621) Codes consisting of bars or lines of varying widths or lengths
that are computer readable are known as a bar code
622) MS-DOS has better file security system as compared to UNIX
623) A language translator is best described as a system software
624) The most advanced form of ROM is electronically erasable
programmable ROM
625) NFS stands for N/W file system
626) Main protocol used in internet is TCP/IP
627) We can create a simple web page by using front page express
628) The first line/bar on the word window where the name of the
document is displayed is called title bar
629) The clock frequency of a Pentium processor is 50 MHz
630) The input device that is most likely to be used to play computer
games is the joystick
631) The UNIX operating system has been written in C language
632) BIOS of MS-DOS resides in ROM
633) A program type of errors is flagged by compilers
634) A floppy diskette is organized according to tracks and sectors
635) C is a third generation high level language
636) BASIC language is normally used along with an interpreter
637) In UNIX, open files are shared between the parent and the child
638) The unit in CPU or processor, which performs arithmetic and
logical operations is ALU
639) RAM is volatile
640) The result of arithmetic and logical operations is stored in an
accumulator
641) A small amount of memory included in the processor for high
speed access is called cache
642) Token bus is the most popular LAN protocol for bus topology
643) Manipulating data to create information is known as analysis
644) A bus is an electronic track system
645) Bill gates is the chief of Microsoft
646) Excel office assistant can be made to appear by using F1 key and
help menu
647) Alignment buttons are available on formatting toolbar
648) Pico second is 10(to the power of-9)
649) Modem is used for connecting PC using telephone lines
650) E-commerce allows companies to conduct business over the
internet
651) Storage that retains its data after the power is turned off is
referred to as non-volatile storage
652) Virtual memory is memory on the hard disk that the CPU uses as
an extended RAM
653) To move to the beginning of a line of text, press the home key
654) Microsoft is an application suite
655) Booting checks to ensure the components of the computer are
operating and connected properly
656) Control key is used in combination with another key to perform a
specific task
657) The most important or powerful computer in a typical network is
network server
658) To make a notebook act as a desktop model, the notebook can
be connected to a docking station which is connected to a monitor
and other devices
659) Scanner will translate images of text, drawings, and photos into
digital form
660) Information on a computer is stored as digital data
661) Storage unit provide storage for information and instruction
662) Help menu button exist at start
663) Data link layer of OSI reference model provides the service of
error detection and control to the highest layer
664) OMR is used to read choice filled up by the student in common
entrance test
665) Static keys make a network insecure
666) Artificial intelligence can be used in every sphere of life
because of its ability to think like human beings
667) Electronic fund transfer is the exchange of money from one
account to another
668) Format menu in MS Word can be used to change page size and
typeface
669) A network that spreads over cities is WAN
670) In UNIX command “Ctrl + Z” is used to suspend current process
or command
671) Word is the word processor in MS Office
672) Telnet helps in remote login
673) MS Word allows creation of .DOC type of documents by default
674) One of the oldest calculating device was abacus
675) Outlook Express is a e-mail client, scheduler, address book
676) The first generation computers had vacuum tubes and magnetic
drum
677) Office Assistant is an animated character that gives help in
MSOffice
678) Assembly language programs are written using Mnemonics
679) DMA module can communicate with CPU through cycle stealing
680) A stored link to a web page, in order to have a quick and easy
access to it later, is called bookmark
681) Speech recognition use thermal sensors along with infrared rays
for identification
682) Trojan horse are self-replicating malicious code independent of
the action of the user, but slow down the processor on entering a
network
683) Favorites are accessible from the start menu
684) The objective of multiprogramming operating system is to
maximize CPU utilization
685) HUB is layer1 device, central device, dumb device
686) Frame Relay technique uses connection oriented
687) The server on the internet is also known as Host
688) Web site is a collection of HTML documents, graphic files, audio
and video files
689) The first network that initiated the internet was ARPANET
690) In MODEMS a digital signal changes some characteristic of a
carrier wave
691) Generation of PIN in bank ATM would require PIN entered is
encrypted
692) A character that changes its value throughout the program is
called variables
693) A program coded in programming is done by assembling
694) For optical fiber used in point to point transmission, the repeater
spacing is 10-100 km
695) Switching is a method in which multiple communication devices
are connected to one another efficiently
696) A bridge recognizes addresses of layer 3
697) EPROM is permanent storage device
698) “.TIF” extension name stands for tagged image format
699) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
700) MS-Excel is also known as spread sheet
701) B2B type of commerce is characterized by low volume and high
value transactions in banking
702) FDDI access mechanism is similar to that of IEEE 802.5
703) Enter key should be pressed to start a new paragraph in MS Word
704) Main frame is most reliable, robust and has a very high
processing power.
705) Fifth generation computers are knowledge processors
706) Transistors were first used in 2nd generation computers
707) Third generations of computers have On-line real time systems
708) The earliest software was developed using the waterfall model
709) Half duplex transmission techniques let computer to
alternatively send and receive data
710) Multiplexing combines signals from different sources into one
and sends on a faster channel
711) MS-Excel is also known as spread sheet
712) Manchester encoding is used in Ethernet technology
713) The instruction of a program which is currently being executed
are stored in main memory
714) Jon Von Neumann developed stored-program concept
715) Hardware and software are mandatory parts of complete PC
system
716) Firewall is used in PC for security
717) Two rollers are actually responsible for movement of the cursor
in mouse
718) All high level language uses compiler and interpreter
719) In html coding <p> ...... </p> tag is used to display a paragraph
720) DHTML stands for dynamic hypertext markup language
721) The sector size of a floppy disk varies from 128 bytes to 1024
bytes
722) The time between program input and outputs is called execution
time
723) Fiber optics cable supports data rate up to 100 mbps to 2 gbps
724) In Photoshop software we can modify, delete, and edit the image
725) Node to node delivery of the data unit is the responsibility of the
data link layer
726) A scripting language similar to HTML and which runs only on a
browser is java script
727) By RAID technique, data is stored in several disk units by
breaking them into smaller pieces and storing each piece in separate
disk
728) The most popular network protocol whose routing capabilities
provide maximum flexibility in an enterprise wide network is known
as TCP/IP
729) HTTP in URL stands for hypertext transfer protocol
730) Memory allocation at the routine is known as dynamic memory
allocation
731) HTTP protocols are used by internet mail
732) The process of finding and correcting errors in a program is a
process called debugging
733) RDBMS is an acronym for relational database management system
734) Transmission media are usually categorized as guided or unguided
735) In MS-Word the keyboard shortcut F7 used for spelling and
grammar check
736) HTML is basically used to design web-site
737) Web-site is collection of web-pages and Home-page is the very
first page that we see on opening of a web-site
738) A device operating at the physical layer is called a repeater
739) FORTRAN is a mathematically oriented languages used for
scientific problems
740) If we want to convert the text which is in small letters to capital
letters then select the required text and press Shift +F3
741) Datagram packet switching uses the entire capacity of a
dedicated link
742) FDM technique transmits analog signals
743) In a dedicated link, the only traffic is between the two connected
devices
744) WYSIWYG is short for what you see is what you get
745) Left justify is the same as align left
746) Lotus 1-2-3 is a popular DOS based spreadsheet package
747) 65,535 characters can be typed in a single cell in excel
748) Comments put in cells are called cell tip
749) Getting data from a cell located in a different sheet is called
referencing
750) Modems is necessary for multiplexing
751) In MS-Word WYSIWYG stands for what you see is where you get
752) RFC stands for request for comment
753) Packet filtering firewall and proxy firewall is not a type of firewall
754) The sharing of a medium and its path by two or more devices is
called multiplexing
755) Dialog control is a function of the presentation layer
756) when the text automatically goes onto the next line this is called
word wrap
757) A numeric value can be treated as a label value if it precedes
with apostrophe
758) An excel workbook is a collection of worksheets and charts
759) 601 error code identifies a floppy drive problem
760) The system BIOS and ROM chips are called firmware
761) Menu bar is usually located below that title bar that provides
categorized options
762) RAM provides quickest access to data
763) A computer is an electronic device
764) The most common input device used today is keyboard
765) EDI means electronic data interface
766) Manual data can be put into computer by Scanner
767) The normal way to undo a command by pressing the following
key combinations together CTRL-Z
768) Flow control in OSI model is done by transport layer
769) A user can get files from another compute on the internet by
using FTP
770) The server on the internet is also known as gateway
771) Coaxial cables are good for digital transmission and long
distance transmission
772) Mainframes network where a huge compute does all computing
and front end PCs are dumb terminals
773) OMR is used to read choice filled up by a student in common
entrance tests
774) The term remote with respect to network means machine
located far off
775) In two-tier client server architecture the client is usually fat
client
776) To interconnect two homogenous WAN’s we need a router
777) Co-axial cables provides data rates over 50 mbps
778) The protocol for sharing hypertext information on the world
wide web is HTTP
779) Query is used to answer a question about a database
780) For locating any document on the WWW. There is a unique
address known as URL
781) In C++ programming, the extension of program is .cpp
782) LAN is usually privately owned and links the devices in a single
office, building or campus
783) Netscape navigator is a web-browser
784) Multiplexing involves one path and one channel
785) Table, form, queries, reports, macros, modules are objects in an
access database
786) BCD stands for binary coded decimal
787) A simple protocol used for fetching an e-mail from a mailbox is
POP 3
788) Half duplex data flows in both directions, but any one direction
at the time
789) Ring requires a central controller or hub
790) The OSI model consists of seven layers
791) Before printing a document you should always use print preview
792) Formula bar in an Excel window allows entering values and
formulas
793) For a small web site, one needs to buy space from the ISP
794) An operating system that acts as an intermediary between user
and computer hardware
795) Attair, the world’s first personal computer, was introduced in the
year 1979
796) POST stands for power on self-test
797) Memory is temporary and storage is permanent
798) Computer of computer communication for business
transactions is called EDI
799) Client-server computing is used in Network multi-media
800) Back up of files is taken for security
801) Computer program looking “normal” but containing harmful
code is infected by Trojan horse
802) Private key is used to append a digital signature
803) IMAP (Internet message access protocol) takes care of E-mail at
client side
804) The CPU has control unit, arithmetic-logic unit and primary
storage
805) Software can’t be touched
806) Correction of program is done by debugging
807) File transfer is the function of the application layer
808) A modem performs modulation, demodulation, data
compression
809) 3 1⁄2 is the size of a standard floppy disc
810) When entering in a lot of text in capitals you should use the caps
lock key
811) 1st generation computer is the bulkiest PC
812) E-R diagram represents relationship between entities of system
813) User is technically least sound
814) Microchip is unique to a smartcard
815) Internet was started as network for defence forces of America
816) A program permanently stored in hardware is called firmware
817) Simplex transmission technique permits data flow in only one
direction
818) Files created with Lotus 1-2-3 have an extension 123
819) Virtual memory refers to using a file on the hard disk to simulate
RAM
820) Gateway uses the greatest number of layers in the OSI model
821) UNIVAC is a computer belonging to third generation
822) Macro is used to automate a particular task or a series of tasks
823) Internet is network of networks
824) Plotters are very useful in applications such as computer aided
design
825) BIOS (ROM) is considered firmware
826) A population application of computer networking is the WWW of
newsgroup called Netnews
827) The extension of database file is given by dbf
828) Http protocol is used for WWW
829) Protocol conversion can be handled by gateway
830) Using HTML, Front page, DHTML we can make web-site
831) Usually security in a network is achieved by cryptography
832) PSTN stands for public switched telephone network
833) An input device conceptually similar to mouse is joystick
834) A 8 bit microprocessor must have 8 data lines
835) In OSI model reference, layer 2 lies in between the physical layer
and the network layer
836) Mouse and joystick are graphic input devices
837) Netiquettes are some rules and regulations that have to be
followed by users
838) Web browser is a type of network application software
839) 65535 characters can be typed in a single cell in Excel
840) UNIX is both time sharing and multiprogramming system
841) UNIX has better security for files relative to MS-DOS
842) The UNIX operating system has been written in C language
843) Syntax errors is flagged by compilers
844) PARAM is an example of super computer
845) Mother board holds the ROM, CPU, RAM and expansion cards
846) CD-ROM is as a magnetic memory
847) The binary number system has a base 2
848) GUI is used as an interface between software and user
849) Device drivers are small , special purpose programs
850) LAN refers to a small, single site network
851) One megabyte equals approximately 1 million bytes
852) Magnetic tape is not practical for applications where data must
be quickly recalled because tape is a sequential access medium
853) Plotters give the highest quality output
854) The base of the hexadecimal system is sixteen
855) Display capabilities of monitor are determined by adapter card
856) Integrated Circuits (IC) are introduced and the replacement of
transistors started in third generation computers
857) Fifth generation computing is based on artificial intelligence
858) In first generation computers input was based on punched cards
859) In third generation computers, users interacted through
keyboards and monitors
860) Drum plotter, flat bed plotter, graphic display device is an
output device
861) The time taken to write a word in a memory is known as write
name
862) 1 MB is equivalent to 2 (to the power of 20 bytes)
863) The microprocessor was introduced in fourth generation
computer
864) The electronic circuits / devices used in building the computer
that executes the software is known as hardware
865) High level languages are developed to allow application
programs, which are machine independent
866) The Vacuum tubes are related to first generation computers
867) Mark I was the first computer that used mechanical switches
868) First generation computers relied on machine language to
perform operations, and they only solve one problem at a time
869) In second generation computers transistors replaced vacuum
tubes
870) Assembly language is low-level language
871) The computer’s secondary memory is characterized by low cost
per bit stored
872) ALGOL is a high-level language
873) A high level programming language named after Ada Augusta,
coworker with Charles Babbage is Ada
874) Adder is a logic circuit capable of forming the sum of two or more
quantities
875) PC/AT is an example of Bi-directional keyboard interface
876) 80386 is a 32-bit processor
877) Pentium chip has 64 bit & 32 bit registers
878) To translate the program written in a programming language into
computer ........ language is mandatory- Machine
879) Assembler is a translator which translates assembly language
program into a machine language program
880) Interpreter is a translator which translates high level language
program into a machine language program
881) Machine language programs are machine dependent
882) The programs written in assembly language are machine
independent
883) Collecting personal information and effectively posing as
another individual is known as the crime of__? Identity theft
884) The amount of vertical space between lines of text in a
document is called__? Line Spacing
885) A computer cannot ‘boot’ if it does not have the__? Operating
system
886) What is the other name for programmed chip? LSIC
887) A normal CD- ROM usually can store up to _____data? 680 MB
888) What does DMA stand for? Direct Memory Access
889) Full form of LAN? Local Area Network
890) ASCII stands for__? American Standard Code for Information
Interchange
891) When did arch rivals IBM and Apple Computers Inc. decide to
join hands? 1991
892) What kind of memory is both static and non -volatile? ROM
893) A computer system runs millions of cycles per second so that
speed is measured in MHz
894) Heat sink is the metal device that draws heat away from an
electronic device
895) Intensity of sound is called amplitude
896) A single zero bit is called starting bit
897) PnP stands for plug and play
898) A computers system’s clock speed is measured as frequency
899) Data on a floppy disk is recorded in rings called tracks
900) In a spreadsheet a cell is defined as the intersection of a row
and column
901) Document file is created by word processing programs
902) The mouse device drivers, if loaded in the config.sys file, its
typically called mouse.sys
903) Modem is a modulator-demodulator system
904) Windows is GUI
905) TIF stands for tagged image format
906) The first network that initiated the internet is ARPANET
907) The virus is a software program
908) The display technology used by monitor is CRT
909) On a LAN each personal computer is called workstations
910) Magnetic drives such as floppy and hard disk drives operate by
electro magnetism
911) Clock timing is used to determine that start and end of each bit
cell
912) Latency is the average time that it takes for a sector to be a
available after the heads
913) Each sector is having 512 bytes
914) DDD means digital diagnostic disk
915) CD ROM’s are single sided
916) The storage capacity of a CDROM is 650 MB
917) Operating system often called as kernel
918) IPC stands for inter process communication
919) Many programming errors are detected by the hardware
920) The most important aspect of job scheduling is the ability to
multiprogramming
921) EDO stands for external data organizer
922) A typical buffer for a CD-ROM drives 156 K
923) ROM is a primary storage device
924) The process of loading and starting up DOS is called booting
925) The Dos Prompt is mainly C:\>
926) C:\>ver is used for displaying current version name
927) CIO (Chief information officer): The senior executive in a
company responsible for information management and for delivering
IT services
928) “FIFO” stands for first in first out
929) A connection less protocol is more dynamic
930) The throughput is a measure of work for processor
931) COBOL stands for common business oriented language
932) Reset button is used to do cool booting
933) Mostly used date format in computer is MM-DD-YY
934) Reservation of train ticket uses real time mode of processing
935) Universal building blocks of a computer system are NAND & NOR
936) F1 key is pressed for help in FOXPRO
937) One Giga byte = 1024 mega bytes
938) Collaborative software: Groupware, such as Lotus Notes or
Microsoft Exchange
939) Computer-Aided design: Refers to any computer-enabled
method of design also called computer-assisted design.
940) Computer Crime: The act of stealing, cheating or otherwise
defrauding an organization with the use of a computer
941) Cyber café: Café offering internet browsing facility
942) Cryptography: Method used to protect privacy and security on
the internet
943) Digital signature: Encrypted signature used for providing security
for the messages/data transferred through the internet
944) Download: Process of transferring a file system from one system
to another.
945) E-commerce: Business transactions conducted over extranets or
the internet
946) Electronic data interchange (EDI): Electronic transmission or
documents through point to point connections using a set of standard
forms, message and data elements, this can be via leased lines
privatenetworks or the internet
947) In a computer, most processing takes place in__? CPU
948) In which type of computer, data are represented as discrete
signals? Digital Computer
949) Scientific Name of Computer? Sillico sapiens
950) Computers, combine both measuring and counting, are called__?
Hybrid Computer
951) What is FORTRAN? Formula Translation
952) Disk Mirroring: The data is written on two or more hard disks
simultaneously over the same channel
953) Disk Duple Xing: The data is written on two or more hard disks
simultaneously over the different channel
954) Dumb Terminals: Hardware configuration consisting of a
keyboard and monitor that is capable of sending and receiving
information but has no memory or processing capabilities.
955) Who developed the first electronic computer? J.V. Atansoff
956) Which programming languages are classified as low level
languages? Assembly Language
957) The first graphical web browser is__? Mosaic
958) First page of Website is termed as__? Homepage
959) IBM stands for__? International Business Machines
960) The scrambling of code is known as__? Encryption
961) The first computers were programmed using__? Machine
Language
962) A fault in a computer program which prevents it from working
correctly is known as? Bug
963) When a computer is switched on, the booting process
performs__? Power on self-test
964) What translates and executes program at run time line by line?
Interpreter
965) What converts an entire program into machine language?
Compiler
966) Who is the father of personal computer? Edward Robert
967) Office LANS, which are scattered geographically on large scale,
can be connected by the use of corporate? WAN (wide area network)
968) To move a copy of file from one computer to another over a
communication channel is called? File Transfer
969) Large transaction processing systems in automated organisations
use__? Batch Processing
970) MICR stands for__? ‘Magnetic Ink Character Recognition
971) Name of 1st electronic computer? ENIAC
972) No. of different characters in ASCII coding system? 1024
973) MSIC stands for _? Medium Scale Integrated Circuits
974) EEPROM stands for__? Electronic Erasable Programmable Read-
only Memory
975) What is the software frequently utilized by end users called (like
Word, PowerPoint)? Application Software
976) Unit of measurement of the output quality of a printer? Dot per
sq. inch
977) Switching device of fifth generation computer is__? VLSI
978) The unit KIPS is used to measure the speed of __? Processor
979) DOS stands for__? Disk Operating System
980) What is a joy stick primarily in computers used for? Computer
Gaming
981) In 1999, the Melissa virus was a widely publicized__? E-mail virus
982) Which of the following commands is given to reboot the
computer? Ctrl+Alt+Del
983) Which command is used to select the whole document? Ctrl + A
984) COBOL is an acronym for__? Common Business Oriented Language
985) The ability of an OS to run more than one application at a time is
called? Multitasking
986) What is the functional key to display save-as box? F12
987) Full form of NOS? Network Operating system
988) Something which has easily understood instructions is said to
be..........? Analog Data
989) What is correcting errors in a program called? Debugging
990) BCD is __? Binary Coded Decimal
991) What type of virus uses computer hosts to reproduce itself? Worm
992) SMTP, FTP and DNS are applications of the ____ layer?
Application
993) A modem is connected to a__? Telephone Line
994) Refresh Rate of monitor is measured in? Hertz
995) The basic goal of computer process is to convert data into ___?
Information
996) Where are the CPU and memory located? Motherboard
997) Who is known as the founder of IBM Company? Thomas J.
Watson
998) An image on a computer screen is made up of__? Pixels
999) Full form of MAN? Metropolitan Area Network
1000) Which command in DOS can be used to recover accidentally
deleted files? UNDELETE
1001) C ++ is a ........ Programming language- modular
1002) What is called a group of commands written in a phased manner
to solve a problem or perform a task – algorithm
1003) What is made by displaying an algorithm in the form of a
diagram – Flowchart
1004) If full flowchart is not available on one page, it is added by
which shape’s coordinator with the second page- arrow
1005) Which figure is used in a flowchart for decision- Diamond
1006) E-mail accounts have storage areas often called – mailboxes
1007) The inventors and promoters of www- Tim burners Lee
1008) Websites are a group of HTML document.

You might also like