Pages

Wednesday 11 April 2012

COMPUTER AWARENESS

CWE  COMPUTER SERIES-10
1. In a network, the Computer that stores the files and process the data is named as
a) Server
b) Terminal
c) Modem
d) All of the above
2. Viruses are called that because
a) They are viruses
b) They can copy themselves and spread
c) Both (a) and (b)
d) None of the above
3. Which of the can't Spread Virus
a) An e-mail with attachment
b) A plain text mail
c) Downloading files over the web
d) None of the above
4. There is a new Anti-virus software update available, when it is downloaded to your Computer
a) Everyday
b) Only in the night
c) When you next switch on your computer
d) All of the above
5. Numbers are stored and transmitted inside a Computer in
a) Binary form
b) ASCII code form
c) Alphabets form
d) Numerical form
6. CPU capacity can be measured in
a) BPS
b) MIPS
c) MHz
d) MPI
7. MPIS stands for
a) Million Instructions Per Second
b) Million Instructions Per Season
c) Monthly Instructions Per Second
d) Million Inputs Per Second
8. LAN speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
9. Modem speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
10. BPS stands for
a) Bits Per Second
b) Bits Per Season
c) Bytes Per Second
d) Bits Per System
11. In processing cheques which of the following I/O techniques have Banks traditionally followed?
a) OCR
b) MICR
c) Barcode
d) VRT
12. What is object of UPS?
a) Using for storage
b) To increase the speed of a computer
c) Provides backup power
d) All of the above
13. QWERTY is used with reference to
a) Monitor
b) Printer
c) Keyboard
d) Mouse
14. "Zipping" a file means
a) Encrypting the message
b) Compressing the message
c) Transfer the message
d) All of the above
15. Integrated Circuits (IC) Chips used in Computers are made with
a) Gold
b) Silver
c) Silicon
d) Copper

ANSWERS:       1. a      2. b     3. b      4. c       5. b      6. b      7. a       8. c       9. a       10. a     11. b 12. c        13. c     14. b          15. c
CWE COMPUTER SERIES-11
1. What is the Super Computer developed in India
a) CRAY
b) PARAM
c) Both (a) and (b)
d) None of the above
2. Which of the following is different from other
a) Internet
b) Windows
c) Unix
d) Linux
3. What is the full form of WWW?
a) World Wide Web
b) World With Web
c) Work Wide Web
d) World Wide Wet
4. Which of the following Command is required to reboot the computer
a) CTRL+ALT+DEL
b) CTRL+ALT+TAB
c) CTRL+ALT+SHIFT
d) CTRL+SHIFT+DEL
5. Select the ODD one
a) Operating system
b) Interpreter
c) Compiler
d) Assembler
6. PC stands for
a) Practical Computer
b) Personal Computer
c) Private Computer
d) Personal Contact
7. The computer code for interchange of information between terminals is
a) BCDIC
b) BCD
c) ASCII
d) None of the above
8. The retrieval of information from the computer is defined as
a) Data processing
b) Input
c) Output
d) All of the above
9. Which one of the following is NOT a computer language?
a) MS-Excel
b) BASIC
c) COBOL
d) C++
10. "C" is
a) A letter
b) A word
c) A language
d) An alphabet
11. Difference Engine invented by
a) Charles Babbage
b) John McCarthy
c) Pascal
d) Newton
12. First generation computer systems used
a) Transistors
b) Vacuum Tubes
c) Both (a) and (b)
d) None of the above
13. A byte is made up of
a) Eight bytes
b) Eight binary digits
c) Two binary digits
d) Two decimal points
14. Doing research by using an on-line database instead of a printed set of similar information offers which of the following advantage
a) More current information
b) Easier to understand
c) Better charts
d) None of the above
15. Software programs that allow you to legally copy files and give them away at no cost are called which of the following
a) Time sharing
b) Public domain
c) Shareware
d) None of the above

ANSWERS:       1. b      2. a       3. a       4. a       5. a       6. b      7. c       8. c       9. a       10. c     11. a 12. b        13. B    14. a          15. b                

CWE  COMPUTER SERIES-12
1. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Bridge
(2) Gateway
(3) Router
(4) Modem
(5) All of these
2. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these
3. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these
4. RSA is—
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these
5. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these
6. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these
7. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these
8. All of the following are basic principles of net works, except—
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
9. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these
10. …………….are used to identify a user who returns to a Website.
(1) Cookies  
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these

ANSWERS:  1. (2)         2.(2)      3. (1)     4. (4)     5. (3)    6. (3)     7. (4)     8. (2)    9. (3)     10. (1) 

CWE COMPUTER SERIES-13
1. Virtual memory is typically located:
(A) on a floppy disk.
(B) In the CPU.
(C) In a flash card.
(D) On the hard drive.
2. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) Hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) Prevent thrashing in a multitasking environment.
(D) Allow multiple print jobs to print their pages out simultaneously.
3. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) Insufficient hard disk space.
(C) Too many processors being managed by the operating system.
(D) Inaccurate information stored in the registry.
4. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
5. Verification of a login name and password is known as:
(A) configuration.
(B) Accessibility.
(C) Authentication.
(D) Logging in.
6. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) Platform.
(C) BIOS.
(D) CMOS.
7. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
8. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
9. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
10. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
11. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
12. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
13. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
14. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
15. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
16. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
17. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
18. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
19. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
20. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon

ANSWERS:       1.D       2.B       3.A       4.B       5.C       6.B       7.A       8.B       9.D       10.A     11.B    
                        12.C     13.D     14.A     15.A     16.D     17.A     18.C     19.B     20.C

CWE COMPUTER SERIES-14
1. Which of the following is not a type of computer software which can be bought ?
(A) Off-the-shelf
(B) Tailor-made
(C) Custom-developed
(D) Off-the-shelf with alterations
(E) All of these can be purchased
2. You can use………to copy selected text, and ……… to paste it in a document.
(A) CTRL + C, CTRL + V
(B) CTRL + C, CTRL + P
(C) CTRL + S, CTRL + S
(D) SHIFT + C, ALT + P
(E) CTRL + D, CTRL + A
3. Video processors consist of ……… and ……, which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) VGA and VGI
4. The main memory of a computer can also be called—
(A) Primary storage
(B) Internal memory
(C) Primary memory
(D) All of these
(E) None of these
5. Computer software can be defined as—
(A) The computer and its associated equipment
(B) The instructions that tell the computer what to do
(C) Computer components that act to accomplish a goal
(D) An interface between the computer and the network
(E) The interaction between the computer and its database
6. When speaking of computer input and output, input refers to—
(A) Any data processing that occurs from new data input into the computer
(B) Retrieval of data or information that has been input into the computer
(C) Data or information that has been entered into the computer
(D) The transmission of data that has been input into the computer
(E) Both (C) and (D) above
7. A ……… is a set of rules.
(A) Resource locator
(B) Domain
(C) Hypertext
(D) URL
(E) Protocol
8. The connection between your computer at home and your local ISP is called—
(A) The last mile
(B) The home stretch
(C) The home page
(D) The backbone
(E) The vital mile
9. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) System board
(B) Central control unit
(C) Central processing unit
(D) Mother board
(E) Memory
10. The operating system called UNIX is typically used for—
(A) Desktop computers
(B) Laptop computers
(C) Supercomputers
(D) Web servers
(E) All of these
11. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG
(C) FTP
(D) URL
(E) DOC
12. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S
ANSWERS:       1.D       2.A       3.C       4.C       5.B       6.E       7.E       8.C       9.C       10.E     11.B                             12.A
CWE COMPUTER SERIES-15
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
5. A ____________represent approximately one billion memory locations.
(A) Kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
7. The operating system is the most common type of____________software.
(A) Communication
(B) application
(C) system
(D) word-processing
(E) None of these
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) Manage the central processing unit (CPU).
(C) Manage memory and storage.
(D) Enable users to perform a specific task such as document editing.
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) Event.
(C) Interrupt.
(D) Activity.
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) Complimentary metal-oxide conductors (CMOS).
(C) Device drivers.
(D) Bootstrap loaders.
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
19. An interrupt handler is a (n):
(A) location in memory that keeps track of recently generated interrupts.
(B) Peripheral device.
(C) Utility program.
(D) Special numeric code that indicates the priority of a request.
20. A spooler is a (n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) Print job.
(C) Program that coordinates the print jobs that are waiting to print.
(D) Message sent from the printer to the operating system when a print job is completed.

ANSWERS:       1.A       2.D       3.B       4.C       5.C       6.B       7.C       8.C       9.D       10.D     11.D
                        12.B     13.C     14.A     15.C     16.B     17.A     18.C     19.D     20.C
CWE COMPUTER SERIES-16
1. The software tools that enable a user to interact with a computer for specific purposes are known as—
(A) Hardware
(B) Networked Software
(C) Shareware
(D) Applications
(E) None of these
2. A………shares hardware, software, and data among authorized users.
(A) network
(B) protocol
(C) hyperlink
(D) transmitter
(E) None of these
3. Computer programs are written in a high-level programming language; however, the   humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
4. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is—
(A) copy and paste
(B) copy, cut and paste
(C) cut, copy and paste
(D) cut and paste
(E) None of these
5. Which of the following is not a function of the control unit ?
(A) Read instructions
(B) Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these
6. Software for organizing storage and retrieval of information is a(n)—
(A) operating system
(B) database
(C) database program
(D) data warehouse
(E) None of these
7. A set of step-by-step procedures for accomplishing a task is known as a(n)—
(A) algorithm
(B) hardware program
(C) software bug
(D) firmware program
(E) None of these
8. Which of the following is not true about RAM ?
(A) RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when you turn the computer off
(E) None of these
9. The main directory of a disk is called the………directory.
(A) Root
(B) Sub
(C) Folder
(D) Network
(E) None of these
10. The physical arrangement of elements on a page is referred to as a document’s……
(A) Features
(B) Format
(C) Pagination
(D) grid
(E) None of these
ANSWERS:       1.D       2.A       3.C       4.D       5.D       6.C       7.A       8.B       9.A       10.B
CWE COMPUTER SERIES-17
1. By using slide………, the characteristics of the fonts of all the slides in presentation, can be changed.
(A) theme
(B) icon
(C) Master
(D) Style
(E) None of these
2. Though several programmers can be opened simultaneously yet only…………programmed can be active.
(A) four
(B) Three
(C) two
(D) One
(E) None of these
3. Straight and Uniform margins on both the sides indicate that there is …………in the document.
(A) full justification
(B) full alignment
(C) left justification
(D) right justification
(E) None of these
4. Among the typical computer programming languages used today, the following is not included in—
(A) C++
(B) JAVA
(C)Visual Basic.NET
(D) Machine language
(E) None of these
5. ………….makes available the commands to righten the software. Instructions are translated step-by-step and executed by the processor so that some objective can be achieved or some problem can be solved.
(A) Software patch
(B) Al language
(C) Presentation language
(D) Programming language
(E) None of these
6. As you create documents, graphs and pictures your computer holds the data in—
(A) Restore file
(B) Backup drive
(C) Clip board
(D) Memory
(E) None of these
7. Which of the following terms is used for the form in which the word will appear on the page ?
(A) Text formatting
(B) Character formatting
(C) Point size
(D) Type face
(E) None of these
8. ……….helps to capture the raw data and enter into the computer system.
(A) CPU
(B) Integrated circuit
(C) Input device
(D) Motherboard
(E) None of these
9.The following are included in the world programme ………….Title Bar, Ribbon, Status Bar, Views, Document workspace.
(A) Window
(B) Browser
(C) Explorer
(D) Website
(E) None of these
ANSWERS:       1.B       2.B       3.A       4.D       5.C       6.D       7.A       8.C       9.A

COMPUTER SERIES-18
 1. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
(A) Viruses
(B) Spam
(C) Portals
(D) Email messages
(E) None of these
2. What is the storage area for e-mail messages called ?
(A) A folder
(B) A directory
(C) A mailbox
(D) The hard disk
(E) None of these
3. A desktop computer is also known as a—
(A) Palm Pilot
(B) PC
(C) Laptop
(D) Mainframe
(E) None of these
4. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
(A) data
(B) information
(C) executable
(D) application
(E) None of these
5. Documents converted to……can be published to the Web.
(A) a.doc file
(B) http
(C) machine language
(D) HTML
(E) None of these
6. If a user needs information instantly available to the CPU, it should be stored—
(A) on a CD
(B) in secondary storage
(C) in the CPU
(D) in RAM
(E) None of these
7. To what temporary area can you store text and other data, and later paste them to another location ?
(A) The clipboard
(B) ROM
(C) CD-ROM
(D) The hard disk
(E) None of these
8. In a spreadsheet, a………is a number you will use in a calculation.
(A) label
(B) cell
(C) field
(D) value
(E) None of these
9. After slide-directed time, if you want to move ahead automatically, click in……check box in transition of this slide group in tab of animations—
(A) Transition timer
(B) Automatically opter
(C) Transition opter
(D) Automatic timer
(E) None of these
10. All are included in removable media except the following—
(A) CD-ROMs
(B) Diskette
(C) DVDs
(D) High disk drive
(E) None of these
11. If you open some menu and then decide that you do not want to select some option, then click the menu title again or press the…… key to layout the menu.
(A) shift
(B) tab
(C) escape
(D) F1
(E) None of these
12. Using the……process, it is easy to change the name of the file.
(A) transforming
(B) crash
(C) renaming
(D) retagging
(E) None of these
13. ………view shows that how will content on printed page, alongwith footer and margin header, appear.
(A) Draft
(B) Full screen reading
(C) Outline
(D) Page layout
(E) None of these
14. Using………, the text can be entered and edited very efficiently.
(A) Spreadsheet
(B) Typewriter
(C) Word processing programme
(D) Desktop publishing programme
(E) None of these


ANSWERS:       1.A       2.C       3.B       4.C       5.D       6.B       7.A       8.D       9.B       10.D     11.C                             12.C            13.D     14.D    
COMPUTER SERIES-19
 1. =SUM (B1 : B8) is an example of a—
(A) Function
(B) Formula
(C) Cell address
(D) Value
(E) None of these
2. Which of the following storage media provides sequential access only ?
(A) Floppy disk
(B) Magnetic disk
(C) Magnetic tape
(D) Optical disk
(E) None of these
3. Compilers and translators are one form of—
(A) ROM
(B) RAM
(C) Hard disk
(D) Software
(E) None of these
4. Data representation is based on the………number system, which uses two numbers to represent all data.
(A) binary
(B) biometric
(C) bicentennial
(D) byte
(E) None of these
5. www means—
(A) world wide wonder
(B) world wide wizard
(C) world wide web
(D) wide world web
(E) None of these
6. ………processing is used when a large mail-order company accumulates orders and processes them together in one large set.
(A) Batch
(B) Online
(C) Real-time
(D) Group
(E) None of these
7. What is the difference between a CD-ROM and a CD-RW ?
(A) They are the same—just two different terms used by different manufacturers
(B) A CD-ROM can be written to and a CD-RW cannot
(C) A CD-RW can be written to, but a CD-ROM can only be read from
(D) A CD-ROM holds more information than a CD-RW
(E) None of these
8. Holding the mouse button down while moving an object or text is known as—
(A) Moving
(B) Dragging
(C) Dropping
(D) Highlighting
(E) None of these
9. A………is a collection of data that is stored electronically as a series of records in a table.
(A) Spreadsheet
(B) Presentation
(C) Database
(D) Web page
(E) None of these
10. The………primarily take(s) care of the behind-the-scenes details and manage(s) the hardware.
(A) Operating system
(B) Application software
(C) Peripheral devices
(D) Hard disk
(E) None of these
11. A……is a professionally designed ‘empty’ document that can be adapted to the user’s needs.
(A) File
(B) Guide
(C) Template
(D) User guide file
(E) None of these
12. A group of 8 bits is known as a—
(A) Byte
(B) Kilobyte
(C) Binary digit
(D) Megabit
(E) None of these
 ANSWERS:       1.B       2.B       3.D       4.A       5.C       6.A       7.C       8.B       9.C       10.A     11.C                             12.A
COMPUTER SERIES-20
1.The internet is ..........
1) a large network of networks
2) an internal communication system for a business
3) a communications system for the Indian government
4) All of these
5) None of these
2.Which of the following statements is FALSE concerning file names ?
1) Files may share the same name or the same extension but not both
2) Every file in the same folder must have a unique, name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these
3.Which of the following would most likely NOT be a symptom of a virus ?
1) Existing program files and icons disappear
2) The CD-ROM stops functioning
3) The Web browser opens to an unusual home page
4) Odd messages or images are displayed on the screen
5) None of these
4. What is a back up ?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system u and running in the event of a system crash or failure
4) All of these
5) None of these
5. ............ are lists of commands that appear on the screen
1) GUIs
2) Icons
3) Menus
4) Windows
5) None of these
6. What is the correct association between a hardware component and a computer function?
1) Monitor > input
2) Mouse > input
3) CPU > storage
4) Hard disk > processing
5) None of these
7. What is the function of Drop Cap ?
1) It does not allow capital letters to be used in the documents
2) It makes first letter of each word capital letter in the documents
3) It lets you begin a paragraph with large dropped initial capital letter
4) In automatically starts all paragraphs and sentences with capital letters
5) None of these
8.The errors that can be pointed out by the compiler are :
1) Syntax error
2) Symantic error
3) Logical error
4) Internal error
5) None of these
9. The move to the bottom of a document, press........
1) Auto summarize
2) Home key
3) Ctrl + Home key
4) End key
5) Ctrl + End key
10. By default, your documents print in ..... Mode
1) Landscape
2) Portrait
3) Page setup
4) Print preview
5) None of these
ANSWERS:         1) 1       2) 4       3) 2       4) 4       5) 3       6) 2       7) 3       8) 1       9) 5       10) 2
 COMPUTER SERIES-21
1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) All of the above
2.Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router
2) modem
3) node
4) cable
5) None of these
4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these
5.The design of the network is called the network
1) architecture
2) server
3) transmission
4) type
5) None of these
6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
7.Personal logs or journal entries posted on the Web are known as :
1) listservs
2) Webcasts
3) blogs
4) subject directories
5) None of these
8.Which of the following is NOT a type of broad band internet connection ?
1) Cable
2) DSL
3) Dial-up
4) Satellite
5) None of these
9.Linux is a(n) ........ operating system
1) open-source
2) Microsoft
3) Windows
4) Mac
5) None of these
10.Which of the following places the common data elements in order from smallest to largest
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) Bit, byte, character, record, field, file, database
5) None of these
ANSWERS:       1) 2      2) 4      3) 1       4) 2      5) 1       6) 2       7) 3       8) 3       9) 1       10) 3

No comments:

Post a Comment