0% found this document useful (0 votes)
82 views

Computer Networking

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views

Computer Networking

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

BEST NOTES TUTORIALS

Makes success your destiny


NOW YOU CAN JOIN THESE COURSES

UGC NET ENGLISH

HISTORY OF ENGLISH LITERATURE

LITERARY TERMS

INDIAN WRITINGS IN ENGLISH

UP TGT, PGT ENGGLISH

UTTARAKHAND LECTURER NOTES

UTTARAKHAND LT TEACHER

TRB ENGLISH

CONTACT: WHATSAPP 7409287156

EMAIL: [email protected]
WE WILL COVER

Computer Part I
1. Ctrl, Shift and Alt are called .......... keys.
A.) Modifier
B.) Function
C.) Alphanumeric
D.) Adjustment
Answer: A

Explanation

 Modifier keys include Alt, Ctrl, Shift and the Windows key.

2. MS-Word is an example of _____

A.) An operating system

B.) A processing device

C.) Application software

D.) An input device

Answer: C

Explanation

 Microsoft Word or MS-Word is an Application software developed by the


company Microsoft.
 It allows users to Type and Save documents.

3. A computer cannot "boot" if it does not have the _____

A.) Compiler

B.) Loader

C.) Operating system

D.) Assembler

Answer: C

Explanation

 An operating system is the system software that handles the software and
hardware resources and provides services for the computer programs.

 SO without an operating system, a computer cannot "boot".

4. ________ is the process of dividing the disk into tracks and sectors

A.) Tracking

B.) Formatting

C.) Crashing
D.) Allotting

Answer: B

Explanation

 The process of dividing the disk into tracks and sectors is called as
formatting.

5. Junk e-mail is also called ______

A.) Spam

B.) Spoof

C.) Sniffer script

D.) Spool

Answer: A

Explanation

 Junk e-mail is also called Spam.

 Sending irrelevant messages or the same message to a large number of users


over the internet for the purpose of advertisement or malicious intent is
called as spamming and that content is called as SPAM or JUNK.
6. _____are attempts by individuals to obtain confidential information from
you by falsifying their identity

A.) Phishing trips

B.) Computer viruses

C.) Phishing scams

D.) Spyware scams

Answer: C

7. Microsoft Office is an example of a

A.) Closed source software

B.) Open source software

C.) Horizontal market software

D.) Vertical market software

Answer: C

Explanation

 Microsoft Office is an example of a Horizontal market software.

 In computers, software is a collection of programs which performs a task.


 Horizontal market software is an application software that is useful in a wide
range of industries.

 Horizontal market software is also known as "productivity software."

 Examples

 Email, Payroll, Operating Systems (OS), Spread sheets, etc.

8. By default, your documents print in ________ mode

A.) Landscape

B.) Portrait

C.) Page Setup

D.) Print View

Answer: B

9. What is the Full Form of INTERNET?

A.) International Network

B.) Intranational Network

C.) National Network


D.) National Work

Answer: A

Explanation

 'Internet' is the shortened form of 'INTERnational-NETwork' which is the


interconnected network of all the Web Servers worldwide.

 It is often called the 'World Wide Web'.

10.Which of the following is a popular programming language for developing


multimedia webpages.

A.) COBOL

B.) Java

C.) BASIC

D.) Assembler

Answer: B

Explanation

 Java is a general-purpose computer-programming language that is


concurrent, class-based, object-oriented, and specifically designed to have as
few implementation dependencies as possible.

 Java is used to develop mobile apps, web apps, desktop apps, games.
11.Storage capacity of magnetic disk depends on

A.) Disk pack in disk surface

B.) Tracks per inch of surface

C.) Bits per inch of tracks

D.) All of the above

Answer: D

Explanation

 Magnetic disk is a kind of data storage device. Storage capacity of magnetic


disk depends on

 Tracks per inch of surface

 Bits per inch of tracks

 Disk pack in disk surface

12.The first computer was programmed using ..

A.) Assembly language

B.) Machine language

C.) Spaghetti code

D.) Source code


Answer: B

13.The computer's processor consists of the following parts

A.) CPU and Main Memory

B.) Hard Disk and Floppy Drive

C.) Control Unit and ALU

D.) Operating System and Application

Answer: C

14.A _______ is a software program used to view Web pages.

A.) Site

B.) Host

C.) Link

D.) Browser

Answer: D
15.The First Mechanical Computer Designed by Charles Babbage was called?

A.) Super Computer

B.) Abacus

C.) Calculator

D.) Analytical Engine

Answer: D

Explanation

 Computer was invented by Charles Babbage.

 The First Mechanical Computer Designed by Charles Babbage, a British


mathematician was called as Analytical Engine which resembles today's
modern machines between 1833 and 1871.

16.Which key is used in combination with another key to perform a specific


task?

A.) Function

B.) Spacebar

C.) Arrow

D.) Control
Answer: D

17.The box that contains the central electronic components of the computer is
the..............

A.) Motherboard

B.) System Unit

C.) Peripheral

D.) RAM

Answer: B

18.In MICR, C stands for...........

A.) Code

B.) Colour

C.) Computer

D.) Character

Answer: D
19.Which of the following refers to a small, single-site network ?

A.) LAN

B.) DSL

C.) RAM

D.) USB

Answer: A

20.Where is RAM located?

A.) Mother Board

B.) Expansion Board

C.) External Drive

D.) None

Answer: A

Explanation

 RAM is located in The central processing unit (CPU), also called a


processor, is located inside the computer case on the motherboard.
 It is sometimes called the brain of the computer, and its job is to carry out
commands.

21.The basic operations performed by a computer are

A.) Logical operation

B.) Storage and relative

C.) Arithmetic operation

D.) All the above

Answer: D

Explanation

 The basic operations performed by a computer are Arithmetic operation,


Logical operation and Storage and relative.

22.What characteristic of read-only memory (ROM ) makes it useful?

A.) ROM information can be easily updated

B.) Data in ROM is nonvolatile, that is, it remains there even without
electrical power

C.) ROM provides very large amounts of inexpensive data storage


D.) ROM chips are easily swapped between different brands of computers

Answer: B

23.The smallest unit in a digital system is a.........

A.) Bit

B.) Byte

C.) Character

D.) Kilobyte

Answer: A

24.A ........ is approximately one billion bytes

A.) Megabyte

B.) Gigabyte

C.) Terabyte

D.) None of these

Answer: B
25.Which file starts MS Word?

A.) Word.exe

B.) Msword.exe

C.) Word2003.exe

D.) Winword.exe

Answer: D

26.The term _____ designates equipment that might be added to a computer


system to enhance its functionality

A.) Digital device

B.) System add-on

C.) Disk pack

D.) Peripheral device

Answer: D

27.C, BASIC, COBOL, and Java are examples of ............language


A.) Low-level

B.) Programming

C.) Computer

D.) High-level

Answer: D

28. Vendor-created program modifications are called ________

A.) Patches

B.) Antiviruses

C.) Holes

D.) Fixes

Answer: A

29. Microcomputer hardware consists of three basic categories of physical


equipment ____

A.) Keyboard, monitor, hard drive

B.) System unit, input/output, memory

C.) System unit, input/output, secondary storage


D.) System unit, primary storage, secondary storage

Answer: C

30. Which of the following is an example of an optical disk?

A.) Digital versatile disks

B.) Magnetic disks

C.) Memory disks

D.) Data bus disks

Answer: A

31. Several computers linked to a server to share programs and storage


space________

A.) Network

B.) Grouping

C.) Library

D.) Integrated system


Answer: A

32. The operating system called UNIX is typically used for_______

A.) Desktop computers

B.) Laptop computers

C.) Super computers

D.) All of these

33. Storage which stores or retains data after power off is called____

A.) Volatile storage

B.) Non-volatile storage

C.) Sequential storage

D.) Direct storage

Answer: B

34. Which of the following software applications would be the most appropriate
for performing numerical and statistical calculations?

A.) Database
B.) Document Processor

C.) Graphic Package

D.) Spread Sheet

Answer: D

35. To make the number pad act as a directional arrow, we press

A.) Num lock

B.) Caps lock

C.) Arrow lock

D.) Shift

Answer: D

36. A computer consists of

A.) Motherboard

B.) Hard disk drive

C.) Central processing unit

D.) All of the above

Answer: D

Explanation
 A computer system consists of a computer case, a power supply unit, a
motherboard, a central processing unit (CPU), main memory, and a hard
disk drive.

 Input devices include a keyboard, mouse, microphone, video camera, and


image scanner.

 Output devices include a monitor, speakers, and a printer.

37. CD-ROM is a semiconductor memory.

A.) TRUE

B.) FALSE

Answer: B

Explanation

 "CD-ROM is a semiconductor memory" is a FALSE statement.

 Compact Disc-Read-Only Memory, a type of optical disk capable of storing


large amounts of data -- up to 1GB, although the most common size is
650MB (megabytes).

 A single CD-ROM has the storage capacity of 700 floppy disks, enough
memory to store about 300,000 text pages.

 Semiconductor memory is a type of semiconductor device tasked with


storing data.
 There are two electronic data storage mediums that we can utilize, magnetic
or optical.

 Magnetic storage

 Stores data in magnetic form.

 Affected by magnetic fields.

 Has high storage capacity.

 Doesn't use a laser to read/write data.

 Magnetic storage devices are; Hard disk , Floppy disk, Magnetic tape
etc.

 Optical storage

 Stores data optically, uses laser to read/write.

 Not affected by magnetic fields.

 Has less storage than a hard disk.

 Data accessing is high, compared to a floppy disc.

 Optical storage devices are; CD-ROM,CD-R, CD-RW, DVD etc.

 There is also volatile memory.

 This is memory that loses its data once power is cut off, while non-volatile
memory retains data even without power.
38. What are the four things needed to connect to the internet?

A.) Telephone line, modem, computer, and an ISP

B.) Modem, computer, PDA, and ISP

C.) Telephone line, modem, computer, and PDA

D.) Computer, ISP, modem, and communication software

Answer: D

39. What is a default file extension for all word documents?

A.) TXT

B.) WRD

C.) FIL

D.) DOC

Answer: D

40. Windows 95, Windows 98, and Windows NT are known as what?

A.) Processor

B.) Domain names

C.) Modems
D.) Operating systems

Answer: D

41. An email account includes a storage area, often called ________

A.) Mailbox

B.) Hyperlink

C.) IP address

D.) None of these

Answer: A

42. All of the logic and mathematical calculations done by the computer happen
in/ on the ........

A.) System board

B.) Central control unit

C.) Central processing unit

D.) Mother board

Answer: C
43. In the binary Language each letter of the alphabet, each number and each
special character is made up of a unique combination of _________

A.) Eight bytes

B.) Eight kilobytes

C.) Eight characters

D.) Eight bits

Answer: D

44. The instructions for starting the computer are housed in _____

A.) RAM

B.) CD-ROM

C.) ROM Chip

D.) None of these

Answer: C
45. Merge cells option can be applied from?

A.) Format Cells dialog box Alignment Tab

B.) Formatting toolbar

C.) Both of above

D.) None of above

Answer: A

Explanation

 Steps for merging cells

 Select which you want to merge

 After selecting right click on that high lightened cells to get format
cells option.

 Click format cells to merge get merge option.

46. Which motherboard form factor uses one 20 pin connector?

A.) Baby AT

B.) AT

C.) ATX

D.) All the above


Answer: C

Explanation

 ATX (Advanced Technology extended) is a motherboard form factor uses


one 20 pin connector.

 ATX is developed by Intel in 1995 to improve on previous de facto


standards like the AT form factor.

 It was the first major change in desktop computer enclosure, motherboard,


and power supply design in many years, improving standardization and
interchangeability of parts.

47. Hardware devices that are not part of the main computer system and are
often added later to the system are ________

A.) Clip art

B.) Highlight

C.) Execute

D.) Peripherals

Answer: D
48. The process of preparing a floppy diskette for use is called ________

A.) Assembling

B.) Translating

C.) Parsing

D.) Formatting

Answer: D

Explanation

 Floppy diskette is a storage space as like disc for any important files for
future use.

 The process of preparing a floppy diskette for use is called Formatting.

49. You can use the tab key to ________

A.) Move a cursor across the screen

B.) Indent a paragraph

C.) Move the cursor down the screen

D.) Both (a) and (b)

Answer: D
50. The first completely 64-bit compatible version of Android –

A.) Android 5.0 Lollipop

B.) Android 2.3 Gingerbread

C.) Android 4.0 Ice Cream Sandwich

D.) Android 3.0 Honeycomb

Answer: A

Explanation

 Android 5.0 Lollipop is the first completely 64-bit compatible version of


Android.

51. The _____ controls communications for the entire computer system

A.) Arithmetic-logic unit

B.) Semiconductor

C.) Motherboard

D.) Coprocessor

Answer: C
52. USB is which type of storage device?

A.) Tertiary

B.) Secondary

C.) Primary

D.) Auxillary

Answer: B

Explanation

 USB - Universal Serial Bus is a secondary type of storage device which is


used in all computers, laptops, mobiles.

 It is a plug-and-play portable storage device that uses flash memory and is


lightweight enough to attach to a keychain.

53. _________ provide expansion capability for a computer system

A.) Sockets

B.) Slots

C.) Bytes
D.) None of these

Answer: B

54. What happens when you boot up a PC?

A.) Portions of the operating system are copied from disk into memory

B.) Portions of the operating system are copied from memory onto disk

C.) Portions of the operating system are compiled

D.) Portions of the operating system are emulated

Answer: A

55. What are two example of freeware?

A.) WinZip and Linux

B.) Shareware and file sharing

C.) Microsoft word and the Google toolbar

D.) Instant messaging and the Google toolbar

Answer: D

56. Which of the following are advantage of CD-ROM as a storage media?


A.) CD-ROM is an inexpensive way to store large amount of data and
information

B.) CD-ROM disks retrieve data and information more quickly than
magnetic disks do

C.) CD-ROMS make less errors than magnetic media

D.) All of these

Answer: A

57. Codes consisting of bars or lines of varying widths or lengths that are
computer readable are known as ____

A.) An AsCII code

B.) A magnetic tape

C.) AN OCR scanner

D.) A Bar code

Answer: D

58. The unit MIPS is used to measure the speed of a___.

A.) Disk drive

B.) Tape drive


C.) Printer

D.) Processor

Answer: D

Explanation

 MIPS refers millions instruction per sec and is used to measure the speed of
Processor.

59. A prescribed set of well-defined instructions for solving mathematical


problems is called ________

A.) A compiler

B.) A code

C.) A description

D.) An algorithm

Answer: D

60. Which of the following virus overtake computer system, when it boots and
destroy information?

A.) System infectors

B.) Trojan
C.) Stealth virus

D.) Boot infectors

Answer: C

61. _______ converts and executes one statement at a time

A.) Compiler

B.) Interpreter

C.) Converter

D.) Instructions

Answer: B

62. The primary purpose of an operating system is?

A.) To allow people to use the computer

B.) To make computers easier to use

C.) To keep systems programmers employed

D.) To make the most efficient use of the computer hardware

Answer: D
Explanation

 The primary purpose of an operating system is to make the most efficient


use of the computer hardware.

63. You cannot close MS Word application by

A.) From File menu choose Close submenu

B.) Click X button on title bar

C.) Choosing File menu then Exit submenu

D.) Press Alt + F4

Answer: A

64. When you save to this, your data will remain intact even when the computer
is turned off ____

A.) RAM

B.) Mother board


C.) Secondary storage device

D.) Primary storage device

Answer: C

65. The two major types of computer chips are

A.) Microprocessor

B.) Primary memory

C.) Both A & B

D.) External memory

Answer: C

Explanation

 The two major types of computer chips are Microprocessor and Primary
memory chips.

66. Storage media such as a CD read and write information using _________

A.) A laser beam of red light

B.) Magnetic dots


C.) Magnetic strips

D.) All of these

Answer: A

67. Magnetic disks are the most popular medium for

A.) Sequential access

B.) Direct access

C.) Both A & B

D.) None of the above

Answer: C

Explanation

 A magnetic disk is a storage device that uses a magnetization process to


write, rewrite and access data.

 It is covered with a magnetic coating and stores data in the form of tracks,
spots, and sectors.

 Hard disks, zip disks, and floppy disks are common examples of magnetic
disks.

 Hence, Magnetic disks are the most popular medium for both Direct access
and Sequential access.
68. A removable magnetic disc that holds information ______

A.) Floppy disk

B.) Hard drive

C.) Monitor

D.) Portable

Answer: A

69. _______ uses laser technology to store large amount of information

A.) Floppy disk

B.) CD-ROM

C.) Hard disk

D.) ED-ROM

Answer: B

70. A Computer works on a _______ number system

A.) Binary
B.) Octal

C.) Decimal

D.) Hexadecimal

Answer: A

71. Missing Slot Covers on a Computer can cause

A.) Power Surges

B.) Incomplete Path of ESD

C.) Over Haeat

D.) EMI

Answer: C

Explanation

 The slot covers on a computer reduce the dust build up inside the computer.
So the slot covers should be present in proper place.

 The missing covers can disrupt the airflow design of the case and cause
overheating problems.
72. Which of the following is the storage area within the computer itself which
holds data only temporarily as the computer process instructions?

A.) The hard disk

B.) Main memory

C.) The control unit

D.) Read-only memory

Answer: B

73. A ______ is a computer attached to the internet that runs a special Web
server software and can send Web pages out to other computers over the
internet.

A.) Web client

B.) Web system

C.) Web page

D.) Web server

Answer: D

74. Which of the following is a storage device?


A.) Floppy discs

B.) Hard disk drive

C.) Optical disc

D.) All of the above

Answer: D

Explanation

 All of the above given options are storage devices.

75. In MS-Word, for what does ruler help?

A.) To set indents

B.) To change page margins

C.) To set tabs

D.) All the above

Answer: D

Explanation

 In MS-Word, the Ruler function helps align the text, graphic, tables or other
elements in your document.
76. The default header for a worksheet is

A.) The date and time

B.) User name

C.) Date & Time

D.) None of the above

Answer: D

Explanation

 MS Excel is the widely used worksheet in computer applications.

 We can add what we want in the header and footer of MS Excel sheets.

77. What is the name of the virus that fool a user into downloading and
executing them by pretending to be useful applications?

A.) Trojan horses

B.) Keylogger

C.) Worm

D.) File virus

Answer: A
78. Software you can use to create a budget is called _______

A.) Word processing software

B.) Graphics software

C.) Utility software

D.) Spreadsheet software

Answer: D

79. The ..... key and the ..... key can be used in combination with other keys to
perform shortcuts and special tasks

A.) Control, Alt

B.) Function, Toggle

C.) Caps lock, Num lock

D.) None of these

Answer: A

80. Website address is a unique name that identifies a specific ___ on the web.

A.) Link
B.) Web browser

C.) PDA

D.) Web site

Answer: D

Explanation

 Website address is a unique name that identifies a specific web site on the
web.

81. Programs designed specifically to address general purpose applications and


special-purpose applications are called ......

A.) Management Information System

B.) System Software

C.) Application Software

D.) None of these

Answer: C

82. The Germans calls this the 'spider monkey' and the Italians call it the 'snail'.
Which symbol is this?
A.) +

B.) @

C.) $

D.) #

Answer: B

83. Digital computers use a ......... system to encode date and programs.

A.) Semiconductor

B.) Decimal

C.) Binary

D.) RAM

Answer: C

84. PARAM was developed by

A.) C-DAC

B.) IIT Kanpur

C.) BARC

D.) IIT Delhi

Answer: A
85. Which of the following menu types is also called a drop down menu?

A.) Fly-out

B.) Cascading

C.) Pop-up

D.) Pull-down

Answer: D

86. Something which has easily-understood instructions is said to be___

A.) Analog data

B.) Digital data

C.) Modem data

D.) Watts data

Answer: A

Explanation

87. By default, a real number is treated as a

A.) Integer

B.) Float
C.) Double

D.) Long double

Answer: B

88. Compatibility in regard to computers refers to ________

A.) The software doing the right job for the user

B.) It being versatile enough to handle the job

C.) The software being able to run on the computer

D.) Software running with other previously installed software

Answer: D

89. _________ hard drives are permanently located inside the system unit and
are not designed to be removed, unless they need to be repaired or replaced

A.) Static

B.) Internal

C.) External

D.) Remove
Answer: B

90. Delayed payload of some viruses is also called as _____

A.) Bomb

B.) Late – Virus

C.) Time

D.) Anti-virus

Answer: A

91. Main storage is also called

A.) Memory

B.) Control unit

C.) Accumulator

D.) Register unit

Answer: A

Explanation
 In a computer, the area where the data is stored for the quick access by the
computer's processor is called Main storage or Primary storage or Memory
or RAM.

 Hence, main storage is also called Memory.

92. Which type of memory holds only the program and data that the CPU is
presently processing?

A.) CMOS

B.) ROM

C.) RAM

D.) ASCII

Answer: C

93. Which of the following is the largest unit of storage?

A.) GB

B.) KB

C.) MB
D.) TB

Answer: D

Explanation

 The storage capacity is measured in bytes, kilo bytes, megabytes, giga bytes
and tera bytes.

 The largest unit of storage is Tera bytes.

94. Which of the following is not purely output device?

A.) Printer

B.) Speaker

C.) Plotter

D.) Screen

Answer: D

Explanation

 A touch screen is the only device which works as both an input and an
output device among the given options.

 You view the options available to you on the screen (output) and you then
use your finger to touch the option that you have chosen (input).
 Hence, Screen is not purely output device.

95. Most application software today comes with an interface called

A.) Graphical user interface

B.) Character user interface

C.) Icon user interface

D.) Button user interface

Answer: A

96. The ______ is a box that houses the most important parts of a computer
system.

A.) Software

B.) Hardware

C.) Input drive

D.) System unit

Answer: D
97. Two devices are in network if

A.) A process is running on both devices

B.) PIDs of the processes running of different devices are same

C.) A process in one device is able to exchange information with a


process in another device

D.) All of the above

Answer: C

98. Properly arranged data is called

A.) Information

B.) File

C.) Field

D.) Words

Answer: A

99. Markup tags tell the web browser

A.) How to display the file

B.) How to organise the page


C.) How to display message box on page

D.) None of the above

Answer: A

Explanation

 Markup tags tell the web browser how to display the file.

100. The common name for the crime of stealing passwords is

A.) Spoofing

B.) Surfing

C.) Identity Theft

D.) Speeling

Answer: A

Explanation

 A spoofing attack is a situation in which one individual or program


effectively disguises or mask as another by falsifying information and
thereby gaining up an ill-conceived advantage.

 It may use for stealing password or IP addresses.


THANK YOU

You might also like