0% found this document useful (0 votes)
63 views15 pages

Computer Knowledge Bank Exam Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views15 pages

Computer Knowledge Bank Exam Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

COMPUTER AWARENESS

Question and Answers

BY EDUGEEKS.IN

Here
Download Exciting Materials
1. How many digits are used in a Binary language?
1) It depends on the speed of the processor.
2) One
3) Two
4) It depends on the memory of the computer.
5) None of these

2. A collection of programs that controls how your computer system runs and processes
information is called
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter

3. Computer connected to a LAN (Local Area Network) can


1) Run faster
2) Go online
3) Share information and /or peripheral equipments
4) Send email
5) None of these

4. Information travels between components on the motherboard through

1) Flash memory
2) CMOS
3) Bays
4) Buses
5) Peripherals

5. How are data organised in a spreadsheet?


1) In lines and spaces
2) In layers and planes
3) In height and width
4) In rows and columns
5) None of these

6. The blinking symbol on the computer screen is called the

1) Mouse
2) Logo
3) Hand
4) Palm
5) Cursor

7. Optical storage unit used in modern PC is known as


1) Floppy
2) CD
3) ROM
4) RAM
5) None of these
8. A _____ is also called as the brain of a computer and is responsible for processing data.
1) Motherboard
2) Memory
3) RAM
4) Central Processing Unit (CPU)
5) None of these

9. A ________ is approximately a million bytes.


1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte
5) None of these

10. Word processing, spreadsheet and photo-editing are examples of


1) Application software
2) System software
3) Operating system software
4) Platform software
5) None of these

11. A ________ is approximately one billion bytes.


1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None of these

12. A/n is a set of computer programs used on a computer to help perform a task.
1) Instruction
2) Software
3) Memory
4) Processor
5) None of these

13. A string of eight zeroes and ones is called


1) Megabyte
2) Byte
3) Kilobyte
4) Gigabyte
5) None of these

14. SMPS stands for


1) Switched Mode Power Supply
2) Start Mode Power Supply
3) Store Mode Power Supply
4) Single Mode Power Supply
5) None of these

15. A goal of data mining includes which of the following?


1) To, explain some observed events or conditions
2) To confirm that the data exists
3) To analyse the data for expected relationships
4) To create a new data warehouse
5) None of these

16. URL stands for


1) Universal Research List
2) Universal Resource List
3) Universal Resource Locator
4) Uniform Research Locator
5) None of these

17. A database management system (DBMS) is a


1) Hardware system used to create, maintain and provide controlled access to a database.
2) Hardware system used to create, maintain and provide uncontrolled access to a database.
3) Software system used to create, maintain and provide uncontrolled access to a database.
4) Software system used to create, maintain and provide controlled access to a database.
5) None of these

18. Which of the following is NOT a goal of transaction processing system?


1) To capture, process and store transactions
2) To produce a variety of documents related to routine business activities
3) To reduce manual efforts associated with processing business transactions
4) To produce standard reports used for management decision making
5) None of these

19. A proxy server is used for which of the following?


1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP/IP
5) None of these

20. When data changes in multiple lists and all lists are not updated, this causes
1) Data redundancy
2) Information overload
3) Duplicated data
4) Data inconsistency
5) None of these

21. Physical structure of computer is called


1) Software
2) Hardware
3) Humanware
4) All of these

5) None of these

22. A computer can perform which of the following tasks?


1) Computation
2) Communication
3) Processing
4) All of these
5) None of these

23. CPU stands for


1) Computer Processing Unit
2) Central Processing Unit
3) Both 1) and 2)
4) Communication Processing Unit
5) None of these

24. Which of the following computers represent data as discrete signals?


1) Analog computer
2) Digital computer
3) Both 1) and 2)
4) Digilog computer
5) None of these

25. Which of the following is now available in the form of a PC?


1) Mainframe
2) Microcomputer
3) Minicomputer
4) Both 2) and 3)
5) None of these

26. PARAM is an example of


1) Supercomputer
2) PC
3) Laptop
4) PDA
5) None of these

27. Who developed the 'analytical engine' ?


1) Jacquard Loom
2) Charles Babbage
3) Shannon
4) IBM
5) None of these

28. Granting an outside organisation access to internet web pages is often implemented using
a(n)________.
1) Extranet
2) Intranet
3) Internet
4) Hacker
5) None of these

29. Which of the following terms identifies a specific computer on the web and the main page
of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these

30. The code that relational database management systems use to perform their database task
is referred to as
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these

31. Chip is a common nickname for a (n)


1) Transistor
2) Resistor
3) Integrated circuit
4) Semiconductor
5) None of these

32. The purpose of the primary key in a database is to


1) Unlock the database
2) Provide a map of the data
3) Uniquely identify a record
4) Establish constraints on database operations
5) None of these

33. Which is the best view for getting your thoughts for a presentation out on the computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these

34. The arrangement of elements such as title and subtitle text, pictures, tables etc is called?
1) Layout
2) Presentation
3) Design
4) Scheme
5) None of these

35. A chart can be put as a part of the presentation using


1) Insert => Chart
2) Insert => Pictures => Chart
3) Edit => Chart
4) View Chart
5) None of these

36. Which view in PowerPoint can be used to enter speaker's comments?


1) Normal
2) Slideshow
3) Slide sorter
4) Notes page view
5) None of these

37. The box that is displayed to indicate that the text, pictures or objects are placed in it is
called_______?
1) Placeholder
2) Auto text
3) Text box
4) Word Art
5) None of these

38. Which of the following statements is not true?


1) Holding down the Shift key while you draw an object creates perfect squares, circles and
straight lines.
2) The text in a text box can't be formatted.
3) The drawing toolbar contains tools for drawing shapes, lines, arrows and more.
4) Ctrl+S save the document.
5) None of these

39. __________servers store and manage files for network users.


1) Authentication
2) Main
3) Web
4) File
5) None of these

40. All of the following are examples of real security and privacy risks except
1) Hackers
2) Spam
3) Viruses
4) Identify theft
5) None of these

41. _______terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
l) Data
2) Sales
3) Query
4) Point-of-sale (POS)
5) None of these

42. The OSI model is divided into ________ processes called layers.
l) Five
2) Six
3) Seven
4) Eight
5) None of these

43. System software is a set of programs that enables your computer's hardware devices
And ________ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these

44. Memory, also called as random access memory (RAM),


1) Contains the electronic circuits that cause processing to occur
2) Makes the information resulting from processing available for use
3) Allows data, programs, commands, and user responses to be entered into a computer
4) Consists of electronic components that store data
5) None of these

45. Correcting errors in a program is referred to as


1) Debugging
2) Bugging
3) Rectifying
4) Modifying
5) None of these

46. An assembler is used to translate a program written in


1) A low level language
2) Machine language
3) A high level language
4) Assembly language
5) None of these

47. The capability of an operating system to enable two or more than two programs to
execute simultaneously in a single computer system by using a single processor is called
1) Multiprocessing
2) Multitasking
3) Multiprogramming
4) Multi execution
5) None of these

48. What menu is selected for printing?


l) Edit
2) Special
3) File
4) Tools
5) None of these

49. The name a user assigns to file is called?


1) File name
2) Program
3) Record
4) Data
5) None of these

50. To access properties of an object we use mouse to


1) left-click
2) right-click
3) Drag
4) Drop
5) None of these

51. _________cells involves creating a single cell by combining two or more selected cells.
1) Formatting
2) Merging
3) Embedding
4) Splitting
5) None of these

52. The operating system is the most common type of_________software.


I) Communication
2) Application
3) Systems
4) Word-processing
5) None of these

53. __________is called as a supervisor of computer activities.


1) Memory
2) OS
3) I/O devices
4) CU
5) ALU

54. Repeater works in _______ layer of OSI mode.


1) Application
2) Transport
3) Physical
4) Data link
5) Network

55. ___________are the summarised version of slides that display only titles and main text.
1) Hand-outs
2) Outlines
3) Speaker notes
4) Slide sorter
5) None of these

56. In____________, the cells are referred by their fixed position in the worksheet.
1) Cell referencing
2) Relative referencing
3) Absolute referencing
4) Mixed referencing
5) Fixed referencing

57. Machine code is a


1) High-level language
2) Software language
3) Low-level language
4) Middle-level language
5) Compiler

58. Objects on the slide that hold text are called


1) Object holders
2) Text holders
3) Auto layout
4) Place holders
5) Data holders

59. Bubble memory is only a


1) Sequential access device
2) Direct access device
3) Combination of sequential and direct access devices
4) Interactive device
5) None of these

60. MS Excel contains _______ columns.

1)255
2)254
3)256
4)250
5)253

61. Which of the following is the minimum zoom percentage supported by MS Word?
1) 10%
2) 15%
3) 25%
4) 4%
5) None of these

62. The default lines to drop for drop cap is


1) Three lines
2) Two lines
3) Four lines
4) Eight lines
5) None of these

63. What is the main folder on a storage device called?


1) Interface
2) Root directory
3) Platform
4) Device driver
5) None of these

64. In database, a field is a


1) Table of information
2) Label
3) Group of related records
4) Category of information
5) None of these
65. Computers process data into information by working exclusively with
1) Multimedia
2) Words
3) Characters
4) Numbers
5) None of these

66. The term "bit" is the short form of


1) Megabyte
2) Binary language
3) Binary digit
4) Binary number
5) None of these

67. A picture, map or graphics or image that can be used in a document is known as
l) Clip
2) Object
3) Clip Board
4) Drag Drop
5) None of these

68. The display bar that lists all the open folders and active applications is called
1) Menu bar
2) Toolbar
3) Taskbar
4) Window List
5) None of these

69. Which of the following stores the data temporarily?


1) RAM
2) ROM
3) Floppy disk
4) Hard disk
5) None of these

70. In PowerPoint, is not present in formatting toolbar.


1) Left align
2) Center
3) Justify
4) Right align
5) None of these

71. Backspace key is used to delete characters to the _______ of the cursor.
1) Right
2) Left
3) Both 1) and 2)
4) Centre
5) None of these

72. Protect document option in Word is available on______menu.


1) Insert
2) View
3) Design
4) Review
5) Layout

73. Master files contain data of _______ nature.


1) Temporary
2) Local
3) Permanent
4) Global
5) None of these

74. Which view of the start menu has Turn Off option?
1) Modem view
2) Classic view
3) Advanced view
4) Normal view
5) Both 1) and 2)

75. What are two types of output devices?


1) Monitor and printer
2) Storage disks
3) Keyboard and mouse
4) Windows 2000 and Windows NT
5) None of these

76. A(n)_______is a program that makes the computer easier to use.


1) Operating system
2) Application
3) Utility
4) Network
5) None of these

77. The ________ component is used by the data analyst to create the queries that access the
database.
1) Data extraction
2) End-user query tool
3) End-user presentation tool
4) Data store
5) None of these

78. A (n) __________ allows network users to share a single copy of software which resides
on the network server.
1) Single-user licence agreement
2) Network site licence
3) End-user licence agreement
4) Business software licence
5) None of these

79. IEEE 802.16 standard represents


1) WLAN
2) Ethernet
3) Bluetooth
4) Token ring
5) WiMAX

80. _________is written for those who do not know very much about computer.
1) Version
2) Patch
3) Tutorial
4) FAQ
5) Rectifier

81. In Windows XP, which shortcut is used to cycle through opened items in taskbar?
1) Ctrl + Tab
2) Alt + Tab
3) Ctrl + Esc
4) Alt + Esc
5) None of these

82. Network interface card is housed in


1) Memory
2) CPU
3) Motherboard
4) RAM
5) Hard drive

83. Which transmission mode is used for data communication along telephone lines?
1) Synchronous
2) Parallel
3) Asynchronous
4) Serial
5) Dual

84. Special software to create a job queue is called a


1) Spooler
2) Drive
3) Compiler
4) Interpreter
5) Linkage editor

85. _________command is used to clear the screen.


1) Clear
2) cl screen
3) els
4) clear screen
5) None of these

86. Which multiplexing technique is used in ATM?


1) FDM
2) Synchronous TDM
3) Asynchronous TDM
4) WDM
5) Both 2) and 3)

90. ______File is created in Microsoft Excel.


1) Folder
2) Program
3) Data
4) Instruction
5) Local

91. A Computer that is on the Network is a ……….


(a) Node
(b) Terminal
(c) Client
(d) Online
(e) None of these

92. Network operating systems from Novell is ….……..


(a) NOS
(b) UNIX
(c) NetWare
(d) Solaris
(e) None of these

93. Which of the following statements is/are true?


(a) Cache Memories are bigger than RAM
(b) Cache Memories are smaller than RAM
(c) ROM are faster than RAM
(d) Information in ROM can be written by users
(e) None of these

94. IP Addresses has………..bytes


(a) 2
(b) 4
(c) 8
(d) 16
(e) None of these

95. …………..act as a central transmitter and receiver in wireless local area network

(a) Access Nodes


(b) Access Points
(c) Access Hubs
(d) Access Switch
(e) None of these

96. Many individuals create their own personal sites called Web logs, or………….
(a) Social networks
(b) Blogs
(c) Wikis
(d) Search engines
(e) None of these

97. What does SDLC mean in Networking protocol?


(a) Software Data Link Control
(b) Synchronous Data Link Control
(c) Software Development Life Cycle
(d) Synchronous Data Development Cycle
(e) None of these

98. Spool stands for________


(a) Serial Printer Object Oriented Language
(b) Simultaneous Peripheral Output On-Line
(c) System Protocol Optimization Outliner
(d) Single Program Operating System Operation
(e) None of these

99. Name a network operating system that is specially designed to handle networking
functions
efficiently.
(a) Windows Server 2008
(b) Windows NT
(c) NOS
(d) UNIX
(e) None of these

100. Database…………..are primarily used to enter new records and to make changes to
existing
records.
(a) Reports
(b) Tables
(c) Forms
(d) Queries
(e) None of these

You might also like