Computer Knowledge Bank Exam Notes
Computer Knowledge Bank Exam Notes
BY EDUGEEKS.IN
Here
Download Exciting Materials
1. How many digits are used in a Binary language?
1) It depends on the speed of the processor.
2) One
3) Two
4) It depends on the memory of the computer.
5) None of these
2. A collection of programs that controls how your computer system runs and processes
information is called
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter
1) Flash memory
2) CMOS
3) Bays
4) Buses
5) Peripherals
1) Mouse
2) Logo
3) Hand
4) Palm
5) Cursor
12. A/n is a set of computer programs used on a computer to help perform a task.
1) Instruction
2) Software
3) Memory
4) Processor
5) None of these
20. When data changes in multiple lists and all lists are not updated, this causes
1) Data redundancy
2) Information overload
3) Duplicated data
4) Data inconsistency
5) None of these
5) None of these
28. Granting an outside organisation access to internet web pages is often implemented using
a(n)________.
1) Extranet
2) Intranet
3) Internet
4) Hacker
5) None of these
29. Which of the following terms identifies a specific computer on the web and the main page
of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these
30. The code that relational database management systems use to perform their database task
is referred to as
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these
33. Which is the best view for getting your thoughts for a presentation out on the computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these
34. The arrangement of elements such as title and subtitle text, pictures, tables etc is called?
1) Layout
2) Presentation
3) Design
4) Scheme
5) None of these
37. The box that is displayed to indicate that the text, pictures or objects are placed in it is
called_______?
1) Placeholder
2) Auto text
3) Text box
4) Word Art
5) None of these
40. All of the following are examples of real security and privacy risks except
1) Hackers
2) Spam
3) Viruses
4) Identify theft
5) None of these
41. _______terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
l) Data
2) Sales
3) Query
4) Point-of-sale (POS)
5) None of these
42. The OSI model is divided into ________ processes called layers.
l) Five
2) Six
3) Seven
4) Eight
5) None of these
43. System software is a set of programs that enables your computer's hardware devices
And ________ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these
47. The capability of an operating system to enable two or more than two programs to
execute simultaneously in a single computer system by using a single processor is called
1) Multiprocessing
2) Multitasking
3) Multiprogramming
4) Multi execution
5) None of these
51. _________cells involves creating a single cell by combining two or more selected cells.
1) Formatting
2) Merging
3) Embedding
4) Splitting
5) None of these
55. ___________are the summarised version of slides that display only titles and main text.
1) Hand-outs
2) Outlines
3) Speaker notes
4) Slide sorter
5) None of these
56. In____________, the cells are referred by their fixed position in the worksheet.
1) Cell referencing
2) Relative referencing
3) Absolute referencing
4) Mixed referencing
5) Fixed referencing
1)255
2)254
3)256
4)250
5)253
61. Which of the following is the minimum zoom percentage supported by MS Word?
1) 10%
2) 15%
3) 25%
4) 4%
5) None of these
67. A picture, map or graphics or image that can be used in a document is known as
l) Clip
2) Object
3) Clip Board
4) Drag Drop
5) None of these
68. The display bar that lists all the open folders and active applications is called
1) Menu bar
2) Toolbar
3) Taskbar
4) Window List
5) None of these
71. Backspace key is used to delete characters to the _______ of the cursor.
1) Right
2) Left
3) Both 1) and 2)
4) Centre
5) None of these
74. Which view of the start menu has Turn Off option?
1) Modem view
2) Classic view
3) Advanced view
4) Normal view
5) Both 1) and 2)
77. The ________ component is used by the data analyst to create the queries that access the
database.
1) Data extraction
2) End-user query tool
3) End-user presentation tool
4) Data store
5) None of these
78. A (n) __________ allows network users to share a single copy of software which resides
on the network server.
1) Single-user licence agreement
2) Network site licence
3) End-user licence agreement
4) Business software licence
5) None of these
80. _________is written for those who do not know very much about computer.
1) Version
2) Patch
3) Tutorial
4) FAQ
5) Rectifier
81. In Windows XP, which shortcut is used to cycle through opened items in taskbar?
1) Ctrl + Tab
2) Alt + Tab
3) Ctrl + Esc
4) Alt + Esc
5) None of these
83. Which transmission mode is used for data communication along telephone lines?
1) Synchronous
2) Parallel
3) Asynchronous
4) Serial
5) Dual
95. …………..act as a central transmitter and receiver in wireless local area network
96. Many individuals create their own personal sites called Web logs, or………….
(a) Social networks
(b) Blogs
(c) Wikis
(d) Search engines
(e) None of these
99. Name a network operating system that is specially designed to handle networking
functions
efficiently.
(a) Windows Server 2008
(b) Windows NT
(c) NOS
(d) UNIX
(e) None of these
100. Database…………..are primarily used to enter new records and to make changes to
existing
records.
(a) Reports
(b) Tables
(c) Forms
(d) Queries
(e) None of these