Saturday, 2 December 2017

Computer Awareness-7


1.    Full form of TCP is:
(1) Transmission Control Protocol
(2) Total Control Protocol
(3) Transmission Control Program
(4) Totaling Control Program
(5) None of these


2.    __ provides a common address space and routes the packets of data across the entire internet?
(1) IP                             
(2) TCP
(3) UDP                       
(4) ALU
(5) None of these

3.    Cyberspace is being governed by a system of law and regulation called?
(1) Civil Law                 
(2) Criminal Law
(3) Electronic Law                   
(4) Cyber Law
(5) Cyber Authority

4.    To move to the beginning of a line of text, press __key?
(1) Home                       
(2) Ctrl
(3) Space                       
(4) Enter
(5) None of these

5.    What menu is selected to change the font and style?
(1) Tools                         
(2) File
(3) Format                     
(4) Edit
(5) None of these

6.    The process of starting the computer and loading of operating system programs for execution is known as
(1) initialization             
(2) retrieving
(3) loading                                 
(4) searching
(5) booting

7.    Primary memory is used by the:
(1) user                         
(2) input device
(3) CPU                       
(4) all of these
(5) None of these

8.    In a disk, each block of data is written into -
(1) one sector               
(2) three sector
(3) Two sectors           
(4) Two or more sectors
(5) either two or three sectors:

9.    The Pentium processor contains-
(1) tens of thousands of transistors
(2) hundred thousands of transistors
(3) thousands of transistors
(4) several millions of transistors
(5) hundred transistors

10.  __ was the precursor to internet as we know it today?
(1) ARPANET             
(2) USENET
(3) TELNET                             
(4) DBMS
(5) None of these

11.  Which of the following is not an operating system?
(1) DOS                       
(2) Oracle
(3) Linux                       
(4) Windows
(5) None of these

12.  In word, what combination of keys do you press to delete an entire word?
(1) Ctrl + del                 
(2) Alt + del
(3) Shift + Backspace 
(4) Shift + Alt + del
(5) None of these

13.  Hardware that adds two numbers is:
(1) the control unit       
(2) an internal CPU register
(3) arithmetic Logic Unit 
(4) Browser
(5) None of these

14.  A small amount of memory included in the processor for high speed access id called-
(1) Register                   
(2) Cache
(3) RAM                       
(4) ROM
(5) None of these

15.  A byte represents a group of:
(1) 10 bits                         (2) 40 bits
(3) 16 bits                         (4) 18 bits
(5) 8 bits

Sunday, 29 October 2017

Computer Awareness-6

1. What do we call the HTML codes written in a text editor to make web pages?
(1) Source code
(2) HTML tags
(3) Source elements
(4) Roots
(5) None of these


2. EEPROM permits?
(1) Read Permission only
(2) read and byte erase permission
(3) Read, byte erase and byte write operations
(4) Read, byte erase, byte write and chip erase operations
(5) None of these

3. The process of identifying specific rows and columns so that so that certain columns and rows are always visible on the screen is called:
(1) Freezing
(2) locking
(3) Selecting
(4) fixing
(5)  none

4. Where can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these

5. A microprocessor is generally?
(1) Single chip SSI
(2) Single chip MSI
(3) Single Chip LSI
(4) Both  1and 2 
(5) None of these

6. What is a portion of a document in which you set certain page formatting options?
(1) Page
(2) Document
(3) Section
(4) Page Setup
(5) None

7. XML stands for-
(1) Xtreme Markup Language
(2) Extensible Markup Language
(3) X-Markup Language
(4) Xpensive Markup Language
(5) None of these

8. Lycos is known as-
(1) website
(2) internet radio
(3) search engine
(4) messenger
(5) None of these

9. _____ is when the more power – hungry components such as the monitor and the hard drive are put to idle.
(1) Hibernation
(2) Power down
(3) Standby mode
(4) The Shut down procedure
(5) None of these

10. A human being who writes programs, operate and maintain computer is known as-
(1) live ware
(2) freeware
(3) spyware
(4) shareware
(5) None of these

11. WWW uses ____ protocol.
(1) FTP
(2) HTTP
(3) SMTP
(4) Telnet
(5) None of these

12. .com is related to-
(1) Personal Site
(2) Art
(3) Organization
(4) Commercial Organization
(5) None of these

13. Time – sharing systems require:
(1) a number of terminals connected to a system
(2) memory protection mechanism to prevent a job’s instructions
(3) job status preservation mechanism to preserve a job’s status s
(4) an alarm clock mechanism to send an interrupt
(5) All of the above

14. Computers use the ____language to process data.
(1) processing
(2) kilobyte
(3) binary
(4) representational 
(5) None of these

15. By default, your document will print in __ mode
(1) landscape
(2) portrait
(3) page setup
(4) print view
(5) None of these

16. Track ball is _______.
(1) Programming devices
(2) Pointing device
(3) Output device
(4) Software device
(5) Printing device

17. What is the meaning of page break up –
(1) Page of document is break into small parts.
(2) Next part of the document will be started on the new page.
(3) Page of the document is break in small – 2 sentences.
(4) Page of the document is break into small paragraph
(5) None of these

18. _____ is a procedure that requires users to enter an identification code and a matching password
(1) paging
(2) logging on
(3) time sharing
(4) Multitasking
(5) None of these

19. Antivirus software is an example of.....................
(1) business software
(2) an operating system
(3) a security utility
(4) an office suite
(5) None of these

20. Computer programs ‘ are written in a high-level programming language; however, the human-readable version of a program is called..............
(1) cache
(2) instruction set
(3) source code
(4) word size
(5) None of these

21. Which of the following refers to the memory in your computer?
(1) RAM
(2) DSL
(3) USB
(4) LAN
(5) CPU

22. Information travels between components on the motherboard through
(1) Flash memory
(2) CMOS
(3) Bays
(4) Buses
(5) Peripherals

23. UNIVAC is an example of:
(1) 1st generation computer
(2) 2nd generation computer
(3) 3rd generation computer
(4) 4th generation computer
(5) None of these

24. The __ is the ‘Administrative’ section of the computer system :
(1) input unit
(2) control unit
(3) Memory unit
(4) central processing unit
(5) Arithmetic logic unit

25. A series of instructions that tells a computer what to do and how to do it is called a-
(1) Program
(2) command
(3) user response
(4) processor
(5) None of these


Computer Awareness-5

1. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these


2. Who invented world wide web?
1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these

3. URL stands for ____.
1) Uniform Resource Locator
2) Universal resource locator
3) Address bar
4) All 1, 2 & 3 are correct
5) None of these

4. A thing present in real world in physical form is called____.
1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these

5. BUG is -
1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these

6. Which of the following is not a type of key?
1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these

7. If a previously saved file is edited ___?
(1) it cannot be saved again
(2) the changes will automatically be saved in the file
(3) the file will only have to be saved again if it is more than one page in length
(4) its name must be changed
(5) the file must be saved again to store the changes

8. Which of the following converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file?
(1) Compiler
(2) Interpreter
(3) Converter
(4) Instruction
(5) None of these

9.A program that generally has more user-friendly interface than a DBMS is called a ____?
(1) front end
(2) repository
(3) back end
(4) form
(5) None of these

10.When you install new programs on your computer, it is typically added to the ___?
(1) All programs
(2) Select programs
(3) Start programs
(4) Desktop programs
(5) None of these

11. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3) File extension is another name for file type
(4) The file extension comes before the dot (.) followed by the file name
(5) None of these

12. Which of the following is the key function of a firewall?
(1) Monitoring
(2) Deleting
(3) Record
(4) Copying
(5) Moving

13. Programming language built into user programs such as Word and Excel are known as____?
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these

14. In MS Word Key F12 opens ____?
(1) Save dialog box  
(2) print dialog box 
(3) New dialog box   
(4) Save as dialog  
(5) none

15. What is gutter margin?
(1) Margin that is added to the left margin when printing
(2) Margin that is added to right margin when printing
(3) Margin that is added to the binding side of page when printing
(4) Margin that is added to the outside of the page when printing
(5) None of these


Computer Awareness-4

1. The vast network of computers that connects millions of people all over the world is called.
(1)LAN
(2)web
(3)hypertext
(4)internet
(5)None of these


2. The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods of its ancestors is
(1) generalization
(2) inheritance
(3) encapsulation
(4) information hiding
(5) None of these

3. The software component of an expert system that draws conclusions is the.
(1)user interface
(2)database
(3)inference engine
(4)1/0 controller
(5)model base

4. The attributes and methods for each object are stored in.
(1) an object instance
(2) an object connection
(3) an assembly structure
(4) an object repository
(5) None of these

5. An E-R diagram is a graphic method of presenting
(1) primary keys and their relationships
(2) primary keys and their relationships to instances
(3) entity classes and their relationships
(4) entity classes and their relationships to primary keys
(5) None of the above

6. The OCR is used for the preparation of
(1) electricity bills
(2) insurance premium
(3) telephone bills
(4) All of these
(5) None of these

7. Speed of line printer is limited by the speed of
(1) paper movements
(2) cartridge used
(3) length of paper
(4) All of these
(5) None of these

8. In laser printers, printing is achieved by deflecting laser beam on to surface of a drum
(1) magnetized
(2) photosensitive
(3) magnetic
(4) Either (1)or (2)
(5) None of these

9. Resolution of laser printer is specified in terms of
(1) DPI
(2) LPM
(3) CPM
(4) PPM
(5) None of these

10. What are the units used to count the speed of a printer?
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these

11. The binary equivalent of decimal number 98 is
(1) 1110001
(2) 1110100
(3) 1100010
(4) 1111001
(5) None of these

12. The product of two binary numbers (1011) and (1001) is
(1) 1100011
(2) 1010100
(3) 1011001
(4) 100110
(5) None of these

13. A byte represents a group of
(1) 10 bits
(2) 40 bits
(3) 8 bits.
(4) 22 bits
(5) None of these

14. A hexadigit can be represented by

(1) three binary (consecutive) bits
(2) four binary (consecutive) bits
(3) eight binary (consecutive) bits
(4) sixteen binary (consecutive) bits
(5) None of the above

15. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits?
(1) ANSI
(2) ASCII
(3) EBCDIC
(4) ISO
(5) None of these

16. Which of the following statements in regard to directories is false?
(1) Directories with files can be deleted
(2) Directories cannot be renamed
(3) The root directory is always at the highest level
(4) Directories can exist inside directories
(5) None of the above

17. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports_____
(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of these

18. MS-DOS is usually supplied on a
(1) hard disk
(2) cartridge tape
(3) CD ROM
(4) floppy disk or diskettes
(5) None of these

19. Which one of the following is not a DOS prompt ?
(1) C >
(2) B >
(3) A >
(4) ENTER
(5) None of these.

20. Which one of the following is not an internal DOS command?
(1) BACKUP
(2) COPY
(3) CLS
(4) BREAK
(5) None of these