Wednesday, 25 June 2014

computer questions

1.    A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called?
(1) Hardware network    (2) Social network (3) LAN  (4) Virtual private network   (5) None of these
2.    The main advantage of magnetic disk compared to magnetic tape is
(1) low cost     (2) rigidity  (3) direct access   (4) high packet density    (5) sequential access
3.    The memory card which is conceptually related to the smart card but is similar to the video disk, is
(1) Master card   (2) Visa card    (3) Optical card    (4) Laser card   (5) Data card
4.    ……… process rearranges file fragments into contiguous files.
(1) folder folding   (2)Defragmentation  (3) Unflagging  (4) Disk scanning    (5) File filling
5.    Recycle Bin enables you to restore a file which was deleted from:
(1) Drive B     (2) Drive C   (3) Drive K     (4) Drive L     (5) None of these
6.    The collection of commands is called:
(1) file          (2) Program   (3) information       (4) data    (5) instruction  
7.    The processing capability of a microcomputer can be enhanced with the help of :
(1) secondary memory   (2) additional processor   (3) expansion card   (4) buffer memory   (5) None of these
8.    ……….determines the appearance of your desktop and controls the performance of your hardware.
(1) Windows Explore   (2) Internet Explorer   (3) Program file   (4) Control Panel    (5) System file
9.    A stand 3.5 floppy disk can hold ----- of data .
(1) 1.44 GB      (2) 1.44MB     (3) 1.44 KB       (4) 1.44B    (5)  All the above
10.  Latest Entry Level Desktop PC  have  at least more than ------ of RAM.
(1) 100bit        (2) 100Byte   (3) 100KB       (4) 100 MB         (5) None of these
11.    The shortcut key to switch between different application is:
(1) Alt+F1       (2) Alt+Tab   (3)Shift +Tab        (4) Ctrl + Tab       (5) None of these
12.    Linux is an example of –
(1) Operating system    (2) Input Device    (3) Output Device    (4) Terminal    (5) None of these 
13.    Which of following terms is associated with high – speed connection?
(1) TCP/IP       (2) Dial-up access   (3) Ethernet       (4) Broadband       (5) None of these
14.    The menu option to delete all the list present in the Recycle Bin is :
(1) Full  Recycle Bin    (2) Restore   (3) Empty Recycle Bin    (4) Fill Delete   (5) None of these
15.    We can save our favourite website in a browser as :
(1) Favourite       (2) save    (3) Bookmark      (4) Both 1& 2     (5) None of these
16.    A computer checks the------ of user names and password for a match before granting access.
(1) website          (2) database    (3)  backup file     (4) network     (5) None of these
17.    What Is E- mail attachment?
(1) A receipt sent by the recipient  (2) A malicious parasite that feeds off of your messages and destroys the contents
(3) A computer file sent along with an email message   (4) Confirmation of received E-mail   (5) None of these
18.    Which of the following phases are present in a software development life cycle?
(1) Coding       (2) Analysis    (3) Design          (4) All of the above           (5) None of these
19.    Which of the following is not a(n) search engine?
(1) Bing           (2) Google      (3) Orkut           (4) Duck Go                        (5) None of these
20.  The kind of  memory that comes from the CPU that is erased when you shut the computer off or exit the program that you were in.
(1) ROM         (2) RAM      (3) CACHE    (4) flash Drive     (5) Hard Drive
21. Which of the following is not an option in the spelling dialog box?
(1) Edit           (2) Ignore     (3) Ignore all     (4) Change           (5) None of these
22.  To copy cell contents using drag and drop, press the
(1)  End key       (2) Shift key           (3) Esc key      (4) All of above           (5) None of these           
23.  What is the keyboard shortcut (button or buttons to be pressed) for creating a chart from the selected cells?
(1) F3        (2) F5                (3) F7            (4) F15       (5) None of these
24.  You can use the formula palette to:
(1) format cells containing numbers   (2) create and edit formulas containing functions  (3) entered assumptions data
 (4) copy a range of cells                      (5) None of these
25. Ctrl, Shift and Alt are called __ keys.
(1) modifier         (2) function         (3) alphanumeric       (4) adjustment            (5)None of these
26. The pattern of printed lines on most products are  called-
(1) prices          (2)OCR                (3) scanners           (4) barcodes                    (5)None of these
27. What is the permanent memory built into your computer called?
(1) RAM           (2) ROM            (3) CPU      (4) CD-ROM       (5) None of these
28. Various applications and documents are represented on the Windows desktop by __.
(1) symbols       (2)labels              (3) graphs          (4) icons      (5) None of these
29.  E-mail addresses separate the user name from the ISP using the __ symbol.
(1) &                (2) @            (3) %             (4) *            (5) None of these
30.  The __ of a system includes the program s or instructions.
(1) hardware       (2) icon       (3) information       (4) software      (5) None of these
31.    Which one of the following allows user to continue to operate computer while printing in progress?
(1) Spooler       (2) job control program     (3) Device manager     (4) trackball     (5) None of these
32.  A microprocessor is generally?
(1) Single Chip SSI        (2) Single chip MSI     (3) Single chip LSI    (4) Both 1 &2   (5) None of these
33.  What is other name of Daisy wheel printer?
(1) Petal printer         (2)  Golf ball printer     (3) Laser printer       (4) Line printer   (5) None of these
34.Optical memory is...............?
(1) Magnetic disk     (2) floppy disk              (3) Pendrive            (4) DVD         (5) None
35.    Which command is used to open (open) dialogue box?
(1) F12              (2) Shift+F12     (3) Alt+F12     (4) Ctrl+F12   (5) none
36.    A program that converts a HLL language program to a set of instructions that can run on a computer is called a?
(1) Assembler          (2) Compiler     (3) debugger             (4) Editor                    (5) none
37.    The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n):
(1)  plotter.              (2) inkjet printer.         (3) laser printer.         (4) dot-matrix printer. (5) none
38.    The insert, caps lock, and num lock keys are all examples of ____________ keys.
(1) Control            (2) Function             (3) Toggle                   (4)  shortcut                (5) Modifier
39.    Which of the following component displays the contents of active cell?
(1) Name box        (2) Formula bar         (3) Menu bar            (4) Status bar              (5) none
40.  The process of identifying specific rows and columns so that so that certain columns and rows are always visible on the screen is
(1) freezing            (2) locking      (3) Selecting               (4)  fixing                (5)  none
41.    Software instruction intended to satisfy a user's specific processing needs are called:
1) System software     2) A microcomputer     3) Documentation   4) Applications software     5) All of the above
42.    The __________ tells the computer how to use its components.
(1) utility              2) network      3) operating system      4) application program             5) None of these
43.    The most important or powerful computer in a typical network.
1) desktop         2) network client   3) network server      4) network station                    5) None of these
44.    To access a mainframe or supercomputer, users often use a ___
1) terminal            2) node        3) desktop            4) handheld                5) None of these
45.    Which of the following contains information about the structure of a database?
1) Database management system  2) Data dictionary  3) Data repository   4) Data warehouse   5) None of these
46.    The rules of a language are called its __________.
1) structure        2) code   3) syntax            4) rigidity      5) None of these
47.    JavaScript was developed by __________ to run inside of web pages.
1) Microsoft        2) Sun     3) Oracle             4) Netscape       5) None of these
48.    A series of steps that always results in an answer is the definition of __________.
1) heuristic     2) flowchart   3) algorithm        4) pseudo code    5) None of these
49.    To create a copy of files in the event of system failure, you create a __________.
1) restore file          2) backup     3) firewall          4) redundancy    5) None of these
50.  If configured correctly, the __________ will prevent interaction with your computer after a specified time period.
1) firewall          2) filter    3) screen saver        4) popup blocker    5) virus
51.    _____________ are words that a programming language has set aside for its own use
(A) Control worlds          (B) Reserved word   (C) Control structures    (D) Reserved key   (E) None of these           
52.    When data changes in multiple lists and all lists are not updated, this causes
(A) data redundancy    (B) information overload (C) duplicate data   (D) data inconsistency (E) None of these             
53.    A Proxy server is used for which of the following?
(A) To provide security against unauthorized users           (B) To process client requests for web pages
(C) To process client requests for database access     (D) To provide TCP/IP     (E) None of these            
54.    ______ describe what are database fields.
(A) Structures        (B) Field markers  (C) Field definition     (D) Field names     (E) None of these
55.    A goal of normalization is to __________
(A) minimize the number of relationships  (B) minimize the number of entities (C) minimize the number of tables
(D) minimize the number of redundancy    (E) None of these            
56.    Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet        (B) intranet             (C) internet                  (D) hacker     (E) None of these            
57.    The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk      (B) cache memory    (C) RAM    (D) registers    (E) None of these
58.    ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses    (B) Macro viruses   (C) Time bombs     (D) Worms  (E) None of these            
59.   A process known as ____________ is used by large retailers to study trends.
(A) data mining      (B) data selection     (C) POS           (D) data conversion     (E)  None of these       
60.  __________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A)Data           (B)Point-of-sale (POS)      (C)Sales       (D) Query        (E) None of these
61.    Data are followed to be transmitted in only one direction in a:
(a) Simplex channel       (b) Dumb channel  (c) Half-duplex channel  (d) Full- duplex channel  (e) None of these
62.   Which of the following feature is related to virtual circuit?
(a)    Connection oriented   (b)    Each packet sent is routed independently of its predecessors
(c)    Successive packets may follow different routes  (d)    Congestion control is difficult   (e)    None of these
63.  PMTLR is acronym for ______
(a)    Page Memory Table with Limit Register   (b)    Page Map Table Limit Register)   (c)     Both (a) and (b)(
d)    Page Memory Table Limit Register            (e)    None of these
64.  The greatest negative number which can be stored in computer that has 8-bits work length and use 2’s complement arithmetic is
(a) -256          (b) -255                       (c)-128         (d) -127                (e) None of these
65.   Which is the feature of IBS (Integrated Banking Systems)?
(a)Multi Currency      (b) Multi Entity    (c) Multi Brach      (d) Bulk Transaction Entry   (e) All of the above
66.      OSPF means
(a)     Open shortest path first protocol  (b)    Open shortest path finite protocol  (c)    Open slotted path first protocol
(d)   Open source path first protocol      (e)    None of these
67.      Binding the same name to multiple operations whose signatures differ in number or types of arguments?
(a) Overloading       (b) Origin class    (c) Object model         (d) Package   (e) None of these
68.      ___________performs relocation function?
(a) Absolute loader       (b) Direct linking loader   (c) Relocating loader   (d) Linkage editor   (e) None of these
69.      Segmentation _______
(a)    Is a memory management scheme that supports user view of memory  (b)    Logical address space is collection of segments  (c)    Logical address consists of two tuple < segment-number, offset  (d)    All of the above  (e)    None
70.   In OSI network architecture the routing is performed by:
(a) Network layer         (b) Data link layer  (c) Transport layer        (d) Session layer   (e) None of these
71. A linear list of elements in which deletion can be done from one end and insertion can take place only at the end
(a) Stacks       (b) Trees  (c) Queues        (d) Branch     (e) None of these
72.   The ACCEPT command in SQL?
(a)    Creates a customized prompt when accepting user input
(b) Explicitly defines a NUMBER or DATE data type variable   
(c)    Hides user input for security reasons      (d)    All of the above    (e)    None of these
73.   For tree , which of the following list traversing through the entire list is not necessary
(a) Circular list       (b) singly linked list   (c) Doubly linked list     (d) both (b) and (c)    (e) None of these
74.   The maximum no of nodes on level 5 of a binary tree.
(a) 32         (b) 64         (c) 31    (d) 63             (e) None of these
75.   Synchronous protocols
(a)    Transmit characters one at a time  (b)    Allow faster transmission than asynchronous protocols
(c)    Are generally used by personal computers   (d)    All of the above    (e)    None of these
76.   How many fields are required to represent a header node of a graph?
(a) 3           (b) 2            (c) 4    (d) 5                 (e) None of these
77.   Pick entity set from the following.
(a)    All vendors supplying to an organization   (b)    Vendors and organizations they supply 
(c)    Vendors and transporters     (d)    A vendor supplying to many organizations     (e)    None of these
78.   SLIP (Serial Line IP)
(a)    It does error detection and correction    (b)    It does not do any error detection or correction 
(c)    Both (a) & (b)               (d)    Neither (a) or (b)       (e)    None of these
79.   Which of the following communications service provides messages preparation and transmission facilities
 (a)Teletex       (b) Fax         (c) X.400     (d) All of the above                  (e) None of these
80.   The least expensive OCR units can read
(a)    Hand printed number  (b)    Machine printed number  (c)    Marks    (d)    Handwriting  (e)    None of these




No comments:

Post a Comment