Computer Awareness
Computer Awareness
Computer Awareness
1
8. Choices in computers are Answer : 4
referred to as :
(1) options 12. Which of the following is a
(2) exit transaction?
(3) boot (1) A group of SQL statements
(4) folder consisting of one read and one
(5) None of these write operation
(2) A group of SQL statements
Answer : 1 consisting only of ready
operations.
9. The ……… button on the quick (3) A group of SQL statements
access Toolbar allows you to defining a user-oriented task
cancel your recent commands or (4) A group of SQL statements
actions. consisting only of write operations.
(1) Search (5) None of these
(2) Cut
(3) Document Answer : 3
(4) Undo 13. What are the four basis
(5) None of these connecting hardware devices?
(1) Repeater, bridge, router and
Answer : 4 gateway
(2) Repeater, bridge, router and
10. During the boot process, the dell
……… looks for the system files. (3) Repeater, connector, router and
(1) HDD gateway
(2) BIOS (4) Amplifier, bridge, router and
(3) CPU gateway
(4) DVD (5) None of these
(5) CD
Answer : 1
Answer : 2
14. The ……… lists the location
11. Computers gather data, which of files on the disk
means they allow users to…… (1) FAT
data. (2) boot sector
(1) present (3) root folder
(2) store (4) data area
(3) output (5) None of these
(4) input
(5) None of these Answer : 1
2
15. A device operating at the (2) uses client computers to
physical layer is called a : provide copies of software to the
(1) Bridge server to allow server processing.
(2) Router (3) provides a company with the
(3) Repeater capability to downsize from lager
(4) All of the above computer systems and move away
(5) None of these from legacy
systems.
Answer : 3 (4) has server computers that
perform all processing, clients are
16. Number of bits per symbol dumb’ input/ output
used in Baudot code is devices only.
(1) 5 (5) None of these.
(2) 6
(3) 7 Answer : 2
(4) 8
(5) 9 19. To get to the ‘Symbol’ dialog
box, click on the ……… menu and
Answer : 1 choose ‘Symbol’.
(1) Insert
17. All of the following statements (2) Format
concerning windows are true (3) Tools
EXCEPT : (4) Table
(1) windows are an example of a (5) Help
command-driven environment.
(2) windows can be resized and Answer : 1
repositioned on the desktop.
(3) more than one window can be 20. Which is not a data source
open at a time. component?
(4) toolbars and scrollbars are (1) mail merge toolbar
features of windows. (2) header row
(5) None of these. (3) data fields
(4) data records
Answer : 1 (5) All of these
18. A client / server network Answer : 1
……….
(1) has clients that provide
functions such as application
control and shared computation.
3
Computer Awareness- Practice (2) macro languages
Test 2 (3) object-oriented languages
(4) visual programming languages
(5) None of these
21. Use this when you want to
make all letters capital without Answer : 4
having to use the shift key for each 25. To move a copy of file from
character……… one computer to another over a
(1) shifter communication channel is called?
(2) upper case (1) File transfer
(3) caps lock key (2) File encryption
(4) icon (3) File modification
(5) None of these (4) File copying
(5) None of the above
Answer : 3
Answer : 1
22. When you quickly press and 26. Which of the following is not a
releaes the left mouse button type of hub?
twice, you are : (1) Passive hub
(1) Primary-clicking (2) Inactive hub
(2) pointing (3) Switching hub
(3) Double-clicking (4) Intelligent hub
(4) Secondary-clicking (5) None of these
(5) None of these
Answer : 2
Answer : 3 27. …… allows you to print.
(1) ribbon
23. In Windows XP, if you want to
(2) monitor
see the file size and modified dates
(3) go now
of all files in a folder, the best
(4) Control-P
viewing option is the ……… view.
(5) None of these
(1) List
Answer : 4
(2) Thumbnails
28. Ina synchronous modem, the
(3) Details
receive equilizer is known as
(4) Icon
(1) adaptive equilizer
(5) None of these
(2) impariment equilizer
Answer : 3
(3) statistical equalizer
24. Programming language built
(4) compromise equilizer
into user programs such as Word
(5) None of these
and Excel are known as ………
Answer : 1
(1) 4GLs
4
29. Which of the following is not
the part of standard office suite? Answer : 1
(1) Word Processor 33. Machine language sometimes
(2) Database also referred as :
(3) Image Editor (1) Binary language
(4) File manager (2) High level language
(5) None of these (3) Middle level language
(4) Low level language
Answer : 4 (5) None of these
30. In a document what is the
maximum number of columns that Answer : 1
can be inserted in MS Word 34. When creating a computer
Table? program, the ……… designs the
(1) 35 structure of the program
(2) 15 (1) End user
(3) 63 (2) System Analyst
(4) 65 (3) Programmer
(5) 70 (4) Architect
(5) All of the above
Answer : 3
31. Where does most data go first Answer : 2
with in a computer memory 35. Which is an another name for
hierarchy? functional language
(1) RAM (1) Machine
(2) ROM (2) Application
(3) BIOS (3) Low-level language
(4) CACHE (4) High-level language
(5) None of these (5) None of these
Answer : 1
32. COBOL is an acronym for Answer : 2
……… 36. ……… is data that has been
(1) Common Business Oriented organized or presented in a
Language meaningful fashion.
(2) Computer Business Oriented (1) A process
Language (2) Software
(3) Common Business Operated (3) Storage
Language (4) Information
(4) Common Business Organized (5) None of these
Language
(5) None of these Answer : 4
5
37. Every computer connected to (4) File Transfer Protocol
an intranet or extranet must have a (5) Common gateway interface
distinct
(1) firewall Answer : 5
(2) proxy server
(3) IP address Computer Awareness- Practice
(4) domain name Test 3
(5) None of these
41. The capability of the operating
Answer : 3
system to enable two or more than
38. ……… translates the semantic two programs to execute
instructions developed by simultaneously in a single
programmers into the machine computer system by using a single
language processor is—
(1) Assembler (1) Multiprocessing
(2) Interpreter (2) Multitasking
(3) Loader (3) Multiprogramming
(4) Complier (4) Multiexecution
(5) None of these (5) None of these
Answer : 1 Answer : 2
39. ………is an artificial language 42. Virtual memory is typically
designed to communicate located:
instructions to a computer. (1) on a floppy disk
(1) Programming language (2) in the CPU.
(2) Machine language (3) in a flash card
(3) Software language (4) on the hard drive.
(4) Assembly language (5) None of these
(5) None of these
Answer : 4
Answer : 1 43. This type of software is
40. This is a standard way for a designed for users who want to
Web server to pass a Web user’s customize the programs they use.
request to an application program (1) Shareware
and to receive data back to forward (2) Open-source software
to the user- (3) Freeware
(1) Interrupt request (4) Macros
(2) Forward DNS lookup (5) None of these
(3) Data-Link layer
Answer : 1
6
44. The effect of the ROLLBACK (1) Safe Mode is a special
command in a transaction is the diagnostic mode.
following — (2) Safe Mode loads all
(1) Undo all changes to the data- nonessential icons.
base resulting from the execution (3) Safe Mode allows users to
of the transaction troubleshoot errors.
(2) Undo the effects of the last (4) Safe Mode loads only the most
UPDATE command essential devices.
(3) Restore the content of the (5) None of these
database to its state at the end of
the previous day Answer : 2
(4) Make sure that all changes to
the database are in effect 48. Superscript, subscript, outline,
(5) None of these emboss, engrave are known as :
(1) font styles
Answer : 1 (2) font effects
(3) word art
45. A result of a computer virus (4) text effects
cannot lead to : (5) None of these
(1) Disk Crash
(2) Mother Board Crash Answer : 2
(3) Corruption of program
(4) Deletion of files 49. Changing the appearance of a
(5) None of these document is called
(1) Proofing
Answer : 2 (2) Editing
(3) Formatting
46. The smallest item of useful (4) Correcting
information a computer can (5) All of the above
handle—
(1) bite Answer : 3
(2) byte
(3) bit 50. You can detect spelling and
(4) bait grammar errors by :
(5) None of these (1) Press Shift + F7
(2) Press Ctrl + F7
Answer : 3 (3) Press Alt+ F7
(4) Press F7
47. All of the following are TRUE (5) None of these
of Safe Mode EXCEPT:
Answer : 4
7
51. What kind of memory is both (5) None of these
static and non-volatile?
(1) RAM Answer : 2
(2) ROM
(3) BIOS 55. Single party disk relying on the
(4) CACHE disk controller for finding out
(5) PROM which disk has failed is used by :
(1) RAID level 5
Answer : 2 (2) RAID level 2
(3) RAID level 4
(4) RAID level 3
52. A process known as — is used (5) RAID level 1
by large organization to study
trends. Answer : 4
(1) data mining
(2) data selection 56. The sharing of a medium and
(3) POS its path by 2 or more devices is
(4) data conversion called —
(5) None of these (1) Modulation
(2) Encoxing
Answer : 1 (3) Line discipline
(4) Multiplexing
53. A(n) — system is a small, (5) None of these
wireless handheld computer that
scans an item’s tag and pulls up Answer : 4
the current price (and any special
offers) as you shop. 57. What happens when you click
(1) PSS on Insert > Picture > Clip Art
(2) POS (1) It inserts a clipart picture into
(3) inventory document
(4) data mining (2) It lets you choose clipart to
(5) None of these insert into document
(3) It opens Clip Art taskbar
Answer : 1 (4) It insets symbols
54. — cells involve creating a (5) None of these
single cell by combining two or
more selected cells. Answer : 3
(1) Formatting 58. Which of the following does
(2) Merging NOT occur during the power-on
(3) Embedding self-test (POST)?
(4) Splitting
8
(1) The ScanDisk utility begins to (2) hold a program’s data or
run. instructions in virtual memory
(2) The video card and video when it can’t fit in RAM.
memory are tested. (3) prevent thrashing in a
(3) The BIOS identification multitasking environment.
process occurs. (4) allow multiple print jobs to
(4) Memory chips are checked to print their pages out
ensure they are working properly. simultaneously.
(5) None of these (5) None of these
Answer : 1 Answer : 2
9
64. The degree of detail that (4) broadband divide
should be incorporated into a (5) None of these
database depends on what?
(1) Data integrity Answer : 1
(2) The type of database 68. How will you remove all
(3) The user’s perspective formatting added to your
(4) The business practices and documents (such as bold, italics,
policies and underline etc.)
(5) None of these (1) Save
(2) Save as plain text file
Answer : 2 (3) Save as
65. Superscript refers to — (4) All of the above
(1) Characters displayed below the (5) None of these
line of the normal text
(2) Characters displayed above the Answer : 2
line of the normal text 69. With the object-oriented (OO)
(3) Characters displayed vertically approach, an object encapsulates,
centre or — a programmer.
(4) Both (1) and (2) (1) carries out, the details of an
(5) None of these object for
(2) hides, the details of an object
Answer : 2 from
66. A — is an additional set of (3) reveals, the details of an object
commands that the computer to
displays after you make a selection (4) extends, the details of an object
from the main menu : beyond
(1) dialog box (5) None of these
(2) submenu
(3) menu selection Answer : 2
(4) All of the above 70. The ability to recover and read
(5) None of these deleted or damaged files from a
criminal’s computer is an example
Answer : 1 of a law enforcement specialty
67. The difference between people called :
with access to computers and the (1) robotics
Internet and those without this (2) simulation
access is known as the : (3) computer forensics
(1) digital divide (4) animation
(2) Internet divide (5) None of these
(3) Web divide Answer : 3
10
71. Granting an outside (3) Vital Information Recourse
organisation access to Internet web Under System
pages is often implemented using a (4) Virus Information Recourse
(an) : Under Siege
(1) Extranet (5) None of these
(2) Intranet
(3) Internet Answer : 1
(4) Hacker
(5) None of these 75. Data becomes ................ when
Answer : 1 it is presented in a format that
people can understand and use.
(1) processed
72. The purpose of the primary key (2) graphs
in a database is to : (3) information
(1) Unlock the database (4) presentation
(2) Provide a map of the data (5) None of these
(3) Uniquely identify a record
(4) Establish constraints on Answer : 3
database operations
(5) None of the above 76. The term ............. designates
equipment that might be added to a
Answer : 3 computer system to enhance its
functionality.
73. The code that relational (1) digital device
database management Systems use (2) system add-on
to perform their database task is (3) disk pack
referred to as : (4) peripheral device
(1) QBE (5) None of these
(2) SQL
(3) OLAP Answer : 4
(4) Sequel Server 77. ……… is the language that
(5) None of these enable user to access or manipulate
data as organized by appropriate
Answer : 2 data model :
(1) DML
74. VIRUS stands for : (2) SDL
(1) Vital Information Recourse (3) DDL
Under Siege (4) All of the above
(2) Vital Information Reason (5) None of these
Under Siege
Answer : 1
11
78. The user commands that are (1) a low level language
used to interact with a database is (2) machine language
called as : (3) a high level language
(1) Query (4) assembly language
(2) Interaction (5) None of these
(3) Command
(4) Instruction Answer :4
(5) None of these
82. The operating system controls
Answer : 3 access to the processor by
assigning a(n) ……… to each task
79. RAM can be thought of as the requiring the processor’s attention.
......... for the computer’s processor (1) CPU
: (2) slice of time
(1) factory (3) stack
(2) operating room (4) event
(3) waiting room (5) None of these
(4) planning room
(5) None of these Answer :2
12
84. Using Windows Explorer, a 88. To move down a page in a
plus (+) sign in front of a folder document……
indicates : (1) jump
(1) an open folder (2) fly
(2) the folder contains subfolders (3) wriggle
(3) a text file (4) scroll
(4) a graphics file (5) None of these
(5) None of these
Answer :4
Answer :2
89. Compilers can identify:
85. Which of the following (1) syntax errors
position is not available for fonts (2) semantic errors
on MS Word? (3) logical errors
(1) Normal (4) mathematical errors
(2) Raised (5) None of these
(3) Lowered
(4) Centered Answer :1
(5) All are available
90. Which was the first Scientific
Answer :4 Computer Programming
Language?
86. “Buy Now – Pay Later” is (1) COBOL
commonly used for : (2) LISP
(1) Debit Cards (3) ADA
(2) Vault Cards (4) FORTRAN
(3) Credit Cards (5) JAVA
(4) E-purse
(5) None of these Answer : 4
Answer :1
13
92. Flow control in TCP/IP is 96. Shimmer, Sparkle text,
handled using: Blinking Background etc. are
(1) Urgent pointer known as :
(2) Checksum (1) font styles
(3) Acknowledgement number (2) font effects
(4) Variable-size sliding window (3) word art
(5) None of these (4) text effects
(5) None of these
Answer :4
Answer :4
93. This component is required to
process data into information and 97. The horizontal and vertical
consists of integrated circuits . lines on a worksheet are called :
(1) Hard disk (1) cells
(2) RAM (2) sheets
(3) CPU (3) block lines
(4) ROM (4) gridlines
(5) None of these (5) None of these
Answer :3 Answer :4
98. The basic input/output system
94. From which menu you can (BIOS) is stored in:
insert Header and Footer? (1) RAM
(1) Insert Menu (2) ROM
(2) View Menu (3) the CPU
(3) Format menu (4) the hard drive
(4) Tools Menu (5) None of these
(5) Edit Menu
Answer :2
Answer :2 99. Which of the following
features usually applies to data in a
95. Moves the cursor one space to data warehouse?
the right to puts spaces in between (1) Data are often deleted
words…… (2) Most applications consists of
(1) control key transactions
(2) space bar (3) Data are rarely deleted
(3) printer (4) Relatively few records are
(4) mouse processed by applications
(5) None of these (5) None of these
Answer :2
Answer :2
14
100. What type of program (5) None of these
controls the various computer parts
and allows the user interact with Answer :3
the computer ? 104. The feature of Word that
(1) Utility software automatically adjusts the amount
(2) Operating system of space between certain
(3) Word processing software combinations of characters so that
(4) Database program an entire word looks more evenly
(5) None of these spaced. What is that feature
called?
Answer :1 (1) Spacing
(2) Scaling
Computer Awareness- Practice (3) Kerning
Test 6 (4) Positioning
(5) None of these
101. Which of the following is an Answer :3
example of connectivity? 105. Which of the following
(1) data statement is wrong?
(2) hard disk (1) Windows XP is an operating
(3) Internet system
(4) power cord (2) Linux is owned and sold by
(5) None of these Microsoft
Answer :3 (3) Photoshop is a graphical design
102. The command used to remove tool by Adobe
text or graphics from a document. (4) Linux is free and open source
The information is then stored on a software
clipboard so you can paste it. (5) None of the above
(1) chop Answer :2
(2) cut 106. A phenomenon in virtual
(3) clip memory schemes in which the
(4) cart away processor spends most of the time
(5) None of these swapping pages rather than
Answer :2 executing instructions is :
103. People, procedures, software, (1)loading
hardware, and data are the five (2) swapping
parts of a(n) : (3) thrashing
(1) competency system (4) aging
(2) computer system (5) digging
(3) information system
(4) software system Answer :3
15
(2) Located on the ten-key pad
107. Give the name of the Linear section of your keyboard.
list in which elements can be (3) Assigned to another task.
added at ends but not in the (4) From the same font family as
middle: the symbol.
(1) Array (5) None of these
(2) Queue
(3) Tree Answer :1
(4) Circular Queue
(5) None of these
111. Which American Computer
Answer :2 Company is called big blue?
(1) Microsoft
108. Flip-flop is the basic structure (2) Compaq Corp
of the device: (3) IBM
(1) Hard disk (4) Tandy Sevenson
(2) Memory (5) Hewlett Packard
(3) Cells
(4) Speakers Answer :3
(5) None of these
112. A dumb terminal has :
Answer :2 (1) An embedded microprocessor
(2) Extensive memory
109. What is a specialized (3) Independent processing
software program that allows input (4) A keyboard and screen
and output devices to (5) None of these
communicate with the rest of the
computer system? Answer :2
(1) Utility driver
(2) Utility program 113. Which of the following is a
(3) Data compression utility software selection criteria?
(4) Device driver (1) Appropriateness
(5) None of these (2) Efficiency
(3) Compatibility
Answer :4 (4) All of the above
(5) None of these
110. When assigning a shortcut Answer :2
key to a symbol, you should
always try to select a key or key 114. Which of the following
combination that is: memories needs refresh?
(1) unassigned
16
(1) SRAM (1) Compiler
(2) DRAM (2) Assembler
(3) ROM (3) Interpreter
(4) All of above (4) Language processor
(5) None of these (5) None of these
Answer :4 Answer :4
Answer :4 Answer :2
17
122. Which type of processing
speed measurement is used 126. Smart Card is :
primarily with supercomputers? (1) Special purpose Cards
(1) Flops (2) Microprocessor Cards
(2) Fractions of second (3) Processing unit contains
(3) Gigahertz memory for storing data
(4) MIPS (4) Processing unit for software
(5) None of these handling
(5) None of these
Answer: 1
123. What is the term associated Answer: 2
with the second part of an e-mail 127. A screen element of MS
address? Word that is usually located below
(1) Local address the title bar that provides
(2) Eight characters long categorized options is :
(3) User name (1) Menu mar
(4) Domain name (2) Tool Bar
(5) None of these (3) Status Bar
(4) All of the above
Answer: 4 (5) None of these
124. Bold, Italic, Regular are
known as : Answer: 1
(1) font styles 128. Which keys can be used
(2) font effects together with other keys for special
(3) word art tasks ?
(4) text effects (1) Insert, Delete
(5) None of these (2) Ctrl, Shift
(3) Left Arrow, Right Arrow
Answer: 1 (4) Page up, Page Down
125. This is a group of servers that (5) None of these
share work and may be able to Answer: 2
back each other up if one server 129. Data related crime does not
fails. incorporate :
(1) Channel bank (1) Data Didling
(2) Cluster (2) Data Spying
(3) Tiger team (3) Data Leakage
(4) Serverless backup (4) Data Mining
(5) Logical unit (5) None of these
Answer: 2 Answer: 4
18
130. ‘DOS’ floppy disk does not Answer: 4
have :
(1) A Boot Record 134. MS-DOS is a ………
(2) A File Allocation Table operating system.
(3) A Root Directory (1) point-and-click
(4) Virtual Memory (2) user-friendly
(5) None of these (3) command-driven
(4) Mac
Answer: 4 (5) None of these
19
138. Artificial Intelligence is
associated with which generation? Answer: 3
(1) First Generation
(2) Second Generation 142. A technique used by codes to
(3) Third Generation convert an analog signal into a
(4) Fifth Generation digital bit stream is known as :
(5) Sixth Generation (1) Pulse code modulation
(2) Pulse stretcher
Answer: 4 (3) Query processing
(4) Queue management
139. Time during which a job is (5) None of these
processed by the computer is :
(1) Delay times Answer: 1
(2) Real time 143. The number of bits that can
(3) Execution time be transmitted over a network in a
(4) Down time certain period of time:
(5) None of these (1) Latency
(2) Delay
Answer: 3 (3) Bandwidth
(4) Baud
140. Which of the following is not (5) None of these
an input device?
(1) OCR Answer: 3
(2) Optical scanners 144. Linux partitions are created
(3) Voice recognition device using the file system:
(4) COM (Computer Output to (1) FAT
Microfilm) (2) FAT32
(5) None of these (3) EXT3
Answer: 4 (4) NTFS
(5) None of these
Computer Awareness- Practice Answer: 3
Test 8 145. Which of the following data
structure is widely used in a
141. In latest generation network model RDBMS?
computers, the instructions are (1) Arrays
executed : (2) trees
(1) Parallel only (3) graphs
(2) Sequentially only (4) stacks
(3) Both sequentially and parallel (5) None of these
(4) All of above Answer: 3
(5) None of these
20
146. The scientist who developed
the idea of the WWW is : 150. Easy to use……
(1) James Gosling (1) user friendly
(2) Tim Berns Lee (2) select
(3) Andrew Tannenbaum (3) helpful
(4) Linus Torvalds (4) ever-ready
(5) Bill Gates (5) None of these
Answer: 2 Answer: 1
21
154. A method of executing two or (2) SATA
more programs concurrently using (3) ATA
the same computer describe: (4) PCI
(1) multi processing (5) None of these
(2) multiprogramming
(3) virtual processing Answer: 1
(4) time sharing
(5) None of these 158. is a language, instead of using
numbers; programmers began
Answer: 2 using English like abbreviations
(Mnemonics) to represent the
155. When you save to ……… elementary operations.
your data will remain intact even (1) Machine language
when the computer is turned off. (2) Mnemonics language
(1) RAM (3) Assembly level language
(2) motherboard (4) High level language
(3) secondary storage device (5) None of the these
(4) primary storage device
(5) None of these Answer: 3
22
Computer Awareness- Practice 164. All of the following are steps
Test 9 involved in the boot process
EXCEPT:
161. Memory, also called random (1) load the operating system into
access memory, or RAM………. RAM.
(1) contains the electronic circuits (2) the power-on self-test.
that cause processing to occur (3) activate the basic input/output
(2) makes the information system (BIOS).
resulting from processing available (4) load application programs.
for use (5) None of these
(3) allows data, programs,
commands, and user responses to Answer: 4
be entered into a computer
(4) consists of electronic 165. A port that allows 8 bits at a
components that store data time to be transmitted
(5) None of these simultaneously is a(n) ……….
(1) dedicated port
Answer: 4 (2) parallel port
(3) SCSI port
162. A ……… represent (4) USB port
approximately one billion memory (5) None of these
locations.
(1) kilobyte Answer: 2
(2) megabyte
(3) gigabyte 166. Which of these terms refers to
(4) terabyte the feature of an OS that allows a
(5) None of these single computer to process the
tasks of several users at different
Answer: 3 stations, in round-robin fashion?
(1) Multiprocessing
163. An interrupt handler is a(n): (2) Multiprogramming
(1) location in memory that keeps (3) Multitasking
track of recently generated (4) Time processing
interrupts. (5) Time-sharing
(2) peripheral device.
(3) utility program. Answer: 5
(4) special numeric code that
indicates the priority of a request 167. A program which helps create
(5) None of these written documents and lets you go
back and make corrections as
Answer: 4 necessary……
23
(1) spreadsheet 171. When you insert a picture and
(2) personal writer adjust the height, Word
(3) word printer automatically adjusts the ………
(4) word processor to maintain the correct proportion.
(5) None of these (1) pixel size
(2) resolution
Answer: 4 (3) screen size
(4) width
168. Screen that comes on when (5) None of these
you turn on your computer that
shows all the icons…… Answer: 4
(1) desktop
(2) face to face 172. Which of the following is
(3) viewer NOT one of the steps in the
(4) view space machine cycle?
(5) None of these (1) Execute
(2) Store
Answer: 1 (3) Decode
(4) Pipelining
169. A place that a user can create (5) None of these
to store files……
(1) cursor Answer: 4
(2) text
(3) folder 173. How many peripheral devices
(4) boot can be connected to a single SCSI
(5) None of these port?
(1) 1
Answer: 3 (2) 8
(3) 16
170. Electronic pens are used with (4) 32
the mouse to write on a slide in (5) 64
which view?
(1) Master Answer: 2
(2) Slide Sorter
(3) Slide Show 174. The four-step process of
(4) Normal fetch, decode, execute, and store is
(5) Print preview called a(n):
(1) machine cycle
Answer: 3 (2) instruction cycle
(3) arithmetic operation
(4) logical operation
24
(5) None of these Answer: 4
25
184. Array is ………
(1) Linear data structure
(2) non-linear data structure
Computer Awareness- Practice (3) simple data structure
Test 10
(4) complex data structure
(5) None of these
181. Which is the part of a
computer that one can touch and Answer: 1
feel ?
185. A computer checks the
(1) Programs
……… of user names and
(2) Software
passwords for a match before
(3) Hardware
granting access.
(4) Output
(1) website
(5) None of these
(2) network
Answer: 3 (3) backup file
(4) database
182. A command to get a file you (5) None of these
worked on from the memory
where it was stored…… Answer: 4
(1) close
186. Which of the following is the
(2) delete
latest version of MS Word?
(3) open
(1) Word 2000
(4) get it
(2) Word 2007
(5) None of these
(3) Word 2010
Answer: 3 (4) Word 2011
(5) Word 2012
183. There are several security
devices used to stop individuals Answer: 3
from exploiting your system.
187. In the online world of
Which of the following is used in
electronic commerce, what do the
conjunction with a firewall?
initials CEM stands for ?
(1) Proxy server
(1) Costly E-Commerce Marketing
(2) Intrusion-detection system
(2) Customer Experience
(3) Terminal server
Management
(4) Web server
(3) Customer Experience
(5) None of these
Misleading
Answer: 1 (4) Cost Estimates are Mind
Boggling
26
(5) None of these of directories that include all of the
following EXCEPT:
Answer: 2 (1) files
188. What type of program (2) folders
controls the various computer parts (3) drives
and allows the user interact with (4) systems
the computer ? (5) None of these
(1) Utility software Answer: 4
(2) Operating system
(3) Word processing software 192. Leaves of which of the
(4) Database program following trees are at the same
(5) None of these level ?
(1) Binary tree
Answer: 1 (2) B-tree
(3) AVL-tree
189. Which of the following (4) Expression tree
transmission systems provide the (5) None of these
highest data rate to in individual
device? Answer: 2
(1) computer bus
(2) telephone lines 193. The transformation of a
(3) voice and mode message into an encoded form is
(4) lease lines known as :
(1) Mnemonics
Answer: 1 (2) Encoding
(3) Encryption
190. The combination of the (4) Decoding
operating system and the processor (5) None of these
is referred to as the computer’s:
(1) CPU Answer: 2
(2) platform
(3) BIOS 194. Firewalls are used to protect
(4) CMOS against………
(5) None of these (1) Unauthorized Attacks
(2) Virus Attacks
Answer: 2 (3) Data Driven Attacks
(4) Fire Attacks
191. The operating system allows (5) All of these
users to organize the computer’s
contents in a hierarchical structure Answer: 1
27
195. Auto correct was originally (5) None of these
designed to replace ……… words
as you type. Answer: 3
(1) Short, repetitive
(2) Grammatically incorrect 199. The definition of thrashing is:
(3) Misspelled (1) swapping data between virtual
(4) Half memory and RAM too frequently.
(5) None of these (2) insufficient hard disk space.
(3) too many processors being
Answer: 3 managed by the operating system.
(4) inaccurate information stored
196. Ensuring that the essential in the registry
peripheral devices are attached and (5) None of these
operational is the ……… process.
(1) configuration Answer: 1
(2) CMOS
(3) POST 200. The primary device that a
(4) ROM computer uses to store
(5) check information……
(1) register
Answer: 3 (2) storehouse
(3) desk
197. The unique signal, generated (4) hard drive
by a device, that tells the operating (5) None of these
system that it is in need of
immediate attention is called an: Answer: 4
(1) action
(2) event. Computer Awareness- Practice
(3) interrupt Test 11
(4) activity
(5) None of these 201. Which of the following is a
disadvantage of machine
Answer: 3
language?
198. Before a package can be used 1) Machine Dependent
in a java program it must be 2) Slower Execution
……… 3) Machine Independent
(1) executed 4) It requires Translation
(2) referenced 5) None of these
(3) imported
(4) declared Answer: 1
28
4) JAVA
202. Android Operating system is 5) PROLOG
an example of which kind of
Source Model? Answer:5
1) Open Source
2) Vertical Market Software 206. AltaVista is a(n)
3) Horizontal Market Software 1) Windows Utility
4) Shareware 2) Search engine
5) None of these 3) Program
4) Antivirus
Answer:1 5) None of these
29
2) Malware 213. Which of the following is an
3) Trojan Horse Object Oriented Programming
4) Cyber crime Language?
5) Identity Theft 1) C
2) Java
Answer: 4 3) C++
4) Both 2 and 3
210. Which of the following 5) Both 1 and 2
generation computers is referred to
an expert system? Answer: 4
1) 2nd
2) 1st 214. The popular name for
3) 4th “Information Super Highway” is:
4) 3rd 1) Intranet
5) 5th 2) Extranet
3) Virtual Private Network
Answer: 5 4) MAN
5) Internet
211). ......... is a set of instructions. Answer: 5
1) Hardware
2) Code 215. Encryption is primarily used
3) Language in:
4) Program 1) Computer Processing
5) All the above 2) File retention
3) Data communication
Answer: 4 4) Data Storage
5) None of these
212. Which of the following is the
keyboard short-cut for permanent Answer: 3
deletion of a file/folder in
windows? 216. The main folder on a storage
1) Del. device is called .....
2) Shift + Del. 1) Root directory
3) Ctrl + Del. 2) Interface
4) Alt + Enter 3) Device driver
5) None of these 4) Platform
5) Main directory
Answer: 2
30
Answer: 1 2) References
3) Review
217. To protect the computer from 4) View
hacker intrusions, ..... must be 5) Layout
installed.
1) Firewall Answer: 3
2) Mailer
3) Script Computer Awareness- Practice
4) Yahoo Messenger Test 12
5) None of these
221. Blu-Ray disk is an example of
Answer: 1
a(n) ....
1) Hard disk
218. Which of the following is
2) Magnetic Disk
used to read handwritten or printed
3) Optical Disk
text to make a digital image that is
4) Output Device
stored in memory?
5) None of these
1) Printer
2) Laser beam Answer:3
3) Scanner
4) Touchpad 222. Which of the following is true
5) None of these about Name box?
1) It appears at the left of the
Answer: 3
formula bar
2) It appears below the menu bar
219. A program designed to
3) It shows the locations of the
destroy data on the computer
active cell.
which can travel to infect other
4) Both 1 and 3
computers is called a .....
5) Both 2 and 3
1) Hurricane
2) Infector Answer:4
3) Disease
4) Virus 223. Which of the following is
5) None known as non volatile memory?
1) Hard Disk
Answer: 4
2) Floppy Disk
3) CD-ROM
220. Thesaurus option is available
4) DVD-ROM
in ..... menu.
5) All the above
1) Page layout
31
Answer: 5 4) Cut
5) Print Preview
224. Auto correct function option
is present in ..... menu of MS Answer: 5
Word.
1) View 228. .... helps create, manipulate
2) Insert and analyze data arranged in rows
3) Format and columns?
4) Tools 1) Application Package
5) Table 2) Word Processing Package
3) Outlining Package
Answer: 4 4) Outline Processors
5) Spreadsheet Package
225. Which of the following is
another name for pre-programmed Answer: 5
formula in Excel?
1) Range 229. A register that keeps track of
2) Graph the next instruction to be executed
3) Function is called a(n):
4) Cell 1) Data Register
5) None of these 2) Instruction Register
3) Action Register
Answer: 3 4) Program Counter
5) None of these
226. ALU works on the
instructions held in ....... Answer: 2
1) Notebook
2) Registers 230. Which of the following is the
3) Notepad feature that keeps track of the right
4) Clipboard margin?
5) I/O Devices 1) Find and Replace
2) Dragged Right
Answer: 2 3) Ruler
4) Right Justified
227. To see the document before 5) Left Justified
the printout is taken, use .......
1) Insert Table Answer: 4
2) Paste
3) Format Painter
32
231. A network which connects
cities or states is known as:
1) LAN Answer: 3
2) CAN
3) PAN 235. ...... is the storage area for e-
4) VPN mails.
5) MAN 1) Folder
2) Mail box
Answer: 5 3) Directory
4) Hard Disk
232. Which of the following 5) None of these
allows you to insert graphics into a
word document? Answer: 2
1) Callouts
2) Flowcharts 236. Three types of Compact disks
3) Basic Shapes include CD-ROM, CD-R and ......
4) All of the above 1) CD-W
5) None of these 2) CD-RAM
3) CD-DVD
Answer: 4 4) CD-RW
5) None of these
233. An email address consists of:
1) Domain name 2) User name Answer: 4
3) Username followed by
password 237. Collecting personal
4) Domain name followed by user information and effectively posing
name as another individual is known as:
5) Username followed by domain 1) Spooling
name 2) Spoofing
3) Hacking
Answer: 5 4) Identity Theft
5) None of these
234. ERP is an acronym for:
1) Enterprise Retirement Planning Answer: 2
2) Enterprise Relationship
Planning 238. Which of the following
3) Enterprise Resource Planning controls the manner of interaction
4) Enterprise Reorder Planning between the user and the operating
5) None of these system?
1) Language Translator
33
2) Platform 1) Slide show
3) User Interface 2) Slide master
4) Icon 3) Slide sorter
5) None of these 4) Notes Page
5) Design Slide
Answer: 3
34
248. Which among the following
Answer: 3 is the file extension for Word
Documents?
245. Mahesh Babu has his cute 1) .xls
childhood photos in an album 2) .ppt
which might fade out in a couple 3) .docx
of years, which he wants to show it 4) .worddoc
to his fans by uploading it in his 5) None
twitter account. Which of the
following devices can he use to do Answer: 3
that?
1) Keyboard 249. Linux Operating system is an
2) Mouse example of which of the
3) Printer following?
4) Scanner 1) Freeware
5) None of these 2) Open Source Software
3) Shareware
Answer: 4 4) Complimentary
5) None of these
246. Which of the following is not
a social networking site? Answer: 2
1) WAYN
2) Hi 5 250. A device that connects to a
3) Orkut network without the use of a cable
4) Yahoo is said to be:
5) Facebook 1) Distributed
2) Non-Wired
Answer: 4 3) Centralised
4) Open source
247. In the URL 5) Wireless
https://twitter.com, what does 's'
represent in 'https'? Answer: 5
1) Safe
2) System 251. Which of the following
3) Start-up software applications would be
4) Semantic most appropriate for performing
5) Secured Statistical and Numerical
calculations:
Answer: 5 1) Document Processor
2) Graphics Package II
35
3) Power Point Answer: 2
4) Spreadsheet
5) Meta Processor 255. Chiranjeevi sent a mail to
Pavan Kalyan by putting his email
Answer: 4 address in 'Cc' and to Nagababu by
putting his email address in 'Bcc'.
252. Removing and replacing Which of the following is true
devices without turning off the based on the given scenario?
computer is referred to as: 1) Pavan Kalyan can view the
1) Search Engines email address of Chiranjeevi and
2) Operating System Nagababu
3) Software 2) Nagababu can view the email
4) Resource Locators address of Pavan Kalyan &
5) Plug-n-Play Chiranjeevi
3) Pavan Kalyan can view the
Answer: 5 email address of Nagababu only
4) Both 1 and 2
253. Mr. Prashanth has a song 5) None of them is true
sung by him on the desktop, in the
C drive, and also in the D drive. Answer: 2
This scenario in computer
language is generally referred to 256. When data changes in
as: multiple lists and all lists are not
1) Data Redundancy updated, this causes:
2) Multiple Data Places 1) Data Population Problem
3) Various File Places 2) Data Reduction
4) Data Inconsistency 3) Data Induction
5) Data Independent 4) Data Overload
5) Data Inconsistency
Answer: 1
Answer: 5
254. What is a Firewall?
1) A wall to protect against Fire 257. The legal right to use
2) A software to protect from software based on specific
computer hacker intrusions restrictions is granted via a:
3) A software to destroy computer 1) Software privacy policy
4) A wall to make partitions in 2) Software License
computer 3) Software password manager
5) None of these 4) Software log
5) None of these
36
Answer: 2 261. The common name for
Modulator and Demodulator is:
258. Which of the following is not 1) Modem
an operating system? 2) Joiner
1) Windows 2000 3) Networker
2) DOS 4) Connecter
3) Windows 7 5) Mom-dom
4) Mac Os X Lion
5) Google Answer: 1
37
3) Alphabet Coding
Answer: 1 4) Encrography
5) Deptography
265. The justification that aligns
text on both margins of a Answer: 2
document in Word is ......
1) Justify 269. ..... is a type of RAM that
2) Bold stores each bit of data in a separate
3) Centre capacitor within an integrated
4) Right circuit making it an efficient way
5) Balanced to store data in memory.
1) DRAM
Answer: 1 2) PRAM
3) NRAM
266. The Open, Print and Save 4) NORAM
Buttons are all located on the ...... 5) None
1) Status Bar
2) Formatting Toolbar Answer: 1
3) Standard Toolbar
4) Titlebar 270. A computer network that uses
5) Status and Title bars Internet protocol technology to
share information, Operational
Answer: 3 system, within an organization is
usually referred to as
267. SMPS in a computer stands 1) Internet
for? 2) MAN
1) Switched-Mode Power Supply 3) PAN
2) Simple-Mode Power Supply 4) NPN
3) Simple-Mode Power System 5) Intranet
4) Switched-Menu Power Supply Answer: 5
5) None of these
271. What is the symbol for
Answer: 1 attachments in yahoo mail?
1) Envelope
268. The process of transforming 2) Letter A
information using an algorithm to 3) Paper Clip
make it unreadable by anyone is 4) Pen
usually referred to as: 5) None
1) Decryption
2) Encryption
38
Answer: 3 3) Common Business Operated
Language
272. Which of the following 4) Common Business Organized
computers is used in Scientific Language
researches? 5) None of these
1) Super Computers
2) Main Frame Answer: 1
3) Laptop
4) Micro Computers 276. The human readable version
5) None of these of a software program is called:
1) cache
Answer: 1 2) instruction set
3) source code
273. Winzip is an example of : 4) word size
1) Free ware 5) None of these
2) Shareware
3) Open Source Answer: 3
4) Vertical Market Software
5) None 277. Which of the following is not
a programming language with
Answer: 1 Object Oriented Features?
1) COBRA
274. ........... is the science that 2) ABAP
attempts to produce machines that 3) C++
display the same type of 4) C#
intelligence that humans do 5) C
1) Nanoscience
2) Nanotechnology Answer: 5
3) Simulation
4) Artificial intelligence (AI) 278. Which of the following
5) None programming language is favoured
for Artificial Intelligence?
Answer: 4 1) ABAP
2) COBOL
275. COBOL is an acronym for 3) LISP
............. 4) JAVA
1) Common Business Oriented 5) C#
Language
2) Computer Business Oriented Answer: 3
Language
279. The quickest and easiest way
39
in Word, to locate a particular recording medium is–
word or phrase in a document 1. Magnetic tape
1) Replace 2. Compact disk
2) Find 3. Hard disk
3) Lookup 4. All of the above
4) Search 5. None of these
5) None of these
Answer: 1
Answer: 2
283. An E-mail protocol for
280. What symbol is present on the storage, manage-ment and change,
number key '2' on the keyboard? especially in corporate offices–
1) ! 1. Message handling service
2) % 2. Postal service’s
3) ^ 3. Data storage
4) @ 4. All of the above
5) * 5. None of these
Answer: 4 Answer: 1
40
transported. 289. A method whereby messages
5. All of the above to be transmitted between
computers are all sent to a central
Answer: 1 computer, which gathers them and
routes them to the appropriate
286. Function of control unit in the destination(s) is known as–
CPU is– 1. Message switching
1. To decode program instructions 2. Message delete
2. To transfer data to primary 3. Message accept
storage 4. All of the above
3. To perform logical operations 5. None of these
4. To store program instructions
5. All of the above Answer: 1
288. A list of options from which a 291. Combining records from two
program user can select anyone in or more ordered files into a single
order to perform a desired action is ordered file is called–
referred as– 1. Menu
1. Menu 2. Merging
2. Index 3. Taking
3. Directory 4. All of the above
4. All of the above 5. None of these
5. None of these
Answer: 1
Answer: 2
292. The ascending order of a data
hierarchy is
41
1. Bit-byte-record-field-file- 4. Minute
database 5. All of the above
2. Byte-bit-field-record-file-
database Answer: 1
3. Byte-bit-record-file-field-
database 296. Alternate facilities of
4. Bit-byte-field-record-file- programs, data files, hardware
database equipments, etc. used in case the
5. All of the above original one is destroyed, lost, or
fail to operate is–
1. Backup
Answer: 2 2. Forehead
3. Delete
293. A LSI chip contains the entire 4. All of the above
CPU of computer except main 5. None of these
memory is called–
1. Microprocessor Answer: 1
2. Hard disk
3. Input device 297. One-thousandth of a second is
4. Output device called–
5. All of the above 1. Microsecond
2. Millisecond
Answer: 4 3. Hour 4. Minute
5. All of the above
294. A storage medium that loses
its contents in the event of power Answer: 1
failure is called–
1. Volatile storage 298. The CPU (central processing
2. Non volatile storage unit) consists of
3. Permanent storage 1. Input, output, and processing
4. All of the above 2. Control unit, primary storage,
5. None of these and secondary storage
3. Control unit, arithmetic-logic
Answer: 1 unit, and primary storage
4. All of the above
295. One-millionth of a second is 5. None of these
referred as–
1. Microsecond Answer: 2
2. Millisecond
3. Hour 299. The product of data
42
processing is– Answer: 1
1. Data
2. Information 303. Multiprogramming is the–
3. Software 1. The inter-leaved execution of
4. Computer two or more different and
5. All of the above independent programs by the same
computer
Answer: 3 2. The execution of single by the
different computers
300. The input device used by 3. The inter-leaved execution of
computer is– two or more different and
1. Motherboard independent programs by the
2. Central processing unit different computers
3. Keyboard 4. All of the above
4. System unit 5. None of these
5. All of the above
Answer: 2
Answer: 2
304. A facility available in an
Computer Awareness- Practice
operating system that allows
Test 16
multiple functions from the same
application package is referred as–
301. The structure of 1. Multi-threading
interconnecting of nodes of 2. Multi-programming
a computer network is referred as– 3. Multi-processing
1. Network topology 2. Internet 4. All of the above
3. Local Area Network 5. None of these
4. Wide Area Network
5. All of the above Answer: 1
43
Answer: 1 Answer: 2
44
312. A number system with a base 1. Modulation
of 8 is referred as– 2. Digitization
1. Binary 3. Multiprocessing
2. Decimal 4. All of the above
3. Octal 5. None of these
4. All of the above
5. None of these Answer: 2
45
4. All of the above 4. All of the above
5. None of these 5. None of these
Answer: 1 Answer: 1
46
Answer: 4 3. Micro second
4. Minute
325. Octal number system has a 5. All of these
base–
1. Two Answer: 1
2. Four
3. Eight 329. Following is of Non-vo a
4. Ten storage device
5. All of the above 1. Magnetic tape
2. Compact disk
Answer: 3 3. Floppy disk
4. All of the above
326. Since input and output 5. None of these
devices are on the edge of the main
processing therefore they are Answer: 1
referred as–
1. Peripheral devices 330. A storage medium that retains
2. Processing devices its contents even in the absence of
3. Personal devices power is referred as–
4. All of the above 1. Non-volatile storage
5. None of these 2. Volatile storage
3. Secondary storage
Answer: 3 4. Primary storage
5. None of these
327. A system changeover method
where complete changeover to the Answer: 4
new system takes place
incrementally over a period of time 331. If a word is typed that is not
is referred as– in Words dictionary, a ___ wavy
1. Phased replacement underline appears below the word.
2. Block replacement (A) red
3. Complete replacement (B) green
4. All of the above (C) blue
5. None of these (D) black
(E) None of these
Answer: 1
Ans (A)
328. One trillionth of a second is–
1. Pico second 332. The _____ button on the
2. Mille second quick access Toolbar allows you to
47
cancel your recent commands or (D) terabyte
actions. (E) None of these
(A) Search
(B) Cut Ans (C)
(C) Document
(D) Undo 336. ______ cells involves
(E) None of these creating a single cell by combining
two or more selected cells.
Ans (D) (A) Formatting
(B) Merging
333. In Excel, any set of characters (C) Embedding
containing a letter , hyphen, or (D) Splitting
space is considered ___ (E) None of these
(A) a formula
(B) text
(C) a name Ans (B)
(D) a title
(E) None of these 337. The operating system is the
most common type of
Ans (B) ______________ software.
(A) communication
334. ________ Software allows (B) application
users to perform calculations on (C) system
rows and columns of data. (D) word-processing
(A) Word processing (E) None of these
(B) Presentation graphics
(C) Database Management Ans (C)
Systems
(D) Electronic Spreadsheet 338. When you quickly press and
(E) None of these releaes the left mouse button twice
, you are ____
Ans (C) (A) Primary-clicking
(B) pointing
(C) Double-clicking
335. A _________ represent (D) Secondary-clicking
approximately one billion memory (E) None of these
locations.
(A) kilobyte Ans (C)
(B) megabyte
(C) gigabyte 339. The horizontal and vertical
48
lines on a worksheet are called ___ ____________ looks for the
(A) cells system files.
(B) sheets A CD
(C) block lines B. BIOS
(D) gridlines C. CPU
(E) None of these D. DVD
49
C utility program.
346. The operating system controls D special numeric code that
access to the processor by indicates the priority of a request.
assigning a(n) ____________ to
each task requiring the processors Answer: D
attention.
A CPU 350. A spooler is a(n):
B slice of time A location in memory that
C stack maintains the contents of a
D event document until it prints out.
B print job.
Answer: B C program that coordinates the
print jobs that are waiting to print.
347. The blocks of code, included D message sent from the printer to
in the operating system, that the operating system when a print
software applications interact with job is completed.
are known as:
A application programming Answer: C
interfaces (APIs).
B complimentary metal-oxide 351. Virtual memory is typically
conductors (CMOS). located:
C device drivers. A on a floppy disk.
D bootstrap loaders. B in the CPU.
C in a flash card.
Answer: A D on the hard drive.
50
B platform.
Answer: B C BIOS.
D CMOS.
353. The definition of thrashing is:
A swapping data between virtual Answer: B
memory and RAM too frequently.
B insufficient hard disk space. 357. The following message
C too many processors being generally means:
managed by the operating system. A a nonsystem floppy has been left
D inaccurate information stored in in the floppy disk drive.
the registry. B the CD drive is not functioning.
C the BIOS is corrupted.
Answer: A D there is a problem loading a
device.
354. All of the following are
TRUE of Safe Mode EXCEPT: Answer: A
A Safe Mode is a special
diagnostic mode. 358. Which of the following is the
B Safe Mode loads all nonessential correct sequence of actions that
icons. takes place during the boot-up
C Safe Mode allows users to process?
troubleshoot errors. A Load operating system ?
D Safe Mode loads only the most Activate BIOS ? Perform POST ?
essential devices. Check configuration settings
B Activate BIOS ? Perform POST
Answer: B ? Load operating system ? Check
configuration settings
355. Verification of a login name C Perform POST ? Load operating
and password is known as: system ? Activate BIOS ? Check
A configuration. configuration settings
B accessibility. D Activate BIOS ? Check
C authentication. configuration settings ? Perform
D logging in. POST ? Load operating system
Answer: C Answer: B
356. The combination of the 359. All of the following are steps
operating system and the processor involved in the boot process
is referred to as the computers: EXCEPT:
A CPU. A load the operating system into
51
RAM. C POST
B the power-on self-test. D ROM
C activate the basic input/output
system (BIOS). Answer: C
D load application programs.
363. The memory resident portion
Answer: D of the operating system is called
the:
360. The ____________, stored on A registry.
a ROM chip, is responsible for B API.
loading the operating system from C CMOS.
its permanent location on the hard D kernel.
drive into RAM.
A BIOS Answer: D
B API
C device driver 364. Which of the following does
D supervisor program NOT occur during the power-on
self-test ?
Answer: A A The ScanDisk utility begins to
run.
Computer Awareness- Practice B The video card and video
Test 19 memory are tested.
C The BIOS identification process
occurs.
361. The basic input/output system
D Memory chips are checked to
(BIOS) is stored in:
ensure they are working properly.
A RAM.
B ROM.
Answer: A
C the CPU.
D the hard drive.
365. All of the following are
TRUE regarding virtual memory
Answer: B
EXCEPT:
A any amount of RAM can be
362. Ensuring that the essential
allocated to virtual memory.
peripheral devices are attached and
B the setting for the amount of
operational is the ____________
hard drive space to allocate to
process.
virtual memory can be manually
A configuration
changed.
B CMOS
C this temporary storage is called
the swap file (or page file).
52
D virtual memory is physical space C Files are stored in RAM.
on the hard drive. D Files should be organized in
folders.
Answer: A
Answer: C
366. The operating system allows
users to organize the 369. Using Windows Explorer, a
computer’s contents in a plus (+) sign in front of a folder
hierarchical structure of directories indicates:
that include all of the following A an open folder.
EXCEPT: B the folder contains subfolders.
A files. C a text file.
B folders. D a graphics file.
D drives.
D systems. Answer: B
53
retailers to study trends. C. computer forensics.
A. data mining D. animation.
B. data selection
C. POS Answer: C
D. data conversion
376. Which of the following is
Answer: A NOT one of the four major data
processing functions of a
373. ____________terminals computer?
(formerly known as cash registers) A. gathering data
are often connected to complex B. processing data into information
inventory and sales computer C. analyzing the data or
systems. information
A. Data D. storing the data or information
B. Point-of-sale (POS)
C. Sales Answer: C
D. Query
377. ____________ tags, when
Answer: B placed on an animal, can be used
to record and track in a database
374. A(n) ____________ system is all of the animal’s movements.
a small, wireless handheld A. POS
computer that scans an item’s B. RFID
tag and pulls up the current price C. PPS
(and any special offers) as you D. GPS
shop.
A. PSS Answer: B
B. POS
C. inventory 378. Surgeons can perform
D. data mining delicate operations by
manipulating devices through
Answer: A computers instead of manually.
This technology is known as:
375. The ability to recover and A. robotics.
read deleted or damaged files from B. computer forensics.
a criminal’s computer is an C. simulation.
example of a law enforcement D. forecasting.
specialty called:
A. robotics. Answer: A
B. simulation.
54
379. Technology no longer fashion.
protected by copyright, available A. A process
to everyone, is considered to be: B. Software
A. proprietary. C. Storage
B. open. D. Information
C. experimental.
D. in the public domain. Answer: D
55
386. Computers use the
____________ language to 390. A string of eight 0s and 1s
process data. is called a:
A. processing A. megabyte.
B. kilobyte B. byte.
C. binary C. kilobyte.
D. representational D. gigabyte.
Answer: C Answer: B
Answer: C
56
394. The components that computer, is responsible for
process data are located in the: processing data.
A. input devices. A. motherboard
B. output devices. B. memory
C. system unit. C. RAM
D. storage component. D. central processing unit
(CPU)
Answer: C
Answer: D
395. All of the following are
examples of input devices 399. The CPU and memory are
EXCEPT a: located on the:
A. scanner. A. expansion board.
B. mouse. B. motherboard.
C. keyboard. C. storage device.
D. printer. D. output device.
Answer: D Answer: B
57
C. Memory computers connected to a:
D. A processor A. network.
B. mainframe.
Answer: B C. supercomputer.
D. client.
402. System software is the set of
programs that enables your Answer: A
computers hardware devices and
____________ software to work 406. Smaller and less expensive
together. PC-based servers are replacing
A. management ____________ in many
B. processing businesses.
C. utility A. supercomputers
D. application B. clients
C. laptops
Answer: D D. mainframes
58
people with access to computers C. One thousand
and the Internet and those without D. One million
this access is known as the:
A. digital divide. Answer: A
B. Internet divide.
C. Web divide. 413. The binary language consists
D. broadband divide. of ____________ digit(s).
A. 8
Answer: A B. 2
C. 1,000
410. ____________ is the science D. 1
revolving around the use of nano
structures to build devices on an Answer: B
extremely small scale.
A. Nanotechnology 414. A byte can hold one
B. Micro-technology ____________ of data.
C. Computer forensics A. bit
D. Artificial intelligence B. binary digit
C. character
Answer: A D. kilobyte
Answer: D Answer: B
412. ____________ bits equal one 416. The operating system is the
byte. most common type of
A. Eight ____________ software.
B. Two A. communication
B. application
59
C. system computer is the:
D. word-processing software A. system unit.
B. CPU.
Answer: C C. mainframe.
D. platform.
417. ____________ are specially
designed computer chips that Answer: A
reside inside other devices, such as
your car or your electronic Computer Awareness- Practice
thermostat. Test 22
A. Servers
B. Embedded computers
421. The earliest calculating
C. Robotic computers
devices are?
D. Mainframes
a) Clock
b) Difference Engine
Answer: B
c) Abacus
d) Calculator
418. The steps and tasks needed to
process data, such as responses to
questions or clicking an icon, are Answer: c
called:
A. instructions. 422. The basic operations
B. the operating system. performed by a computer are?
C. application software. a) Arithmetic Operations
D. the system unit. b) Logical Operations
c) Storage and relative
Answer: A d) All of the above
419. The two broad categories of Answer: d
software are:
A. word processing and 423. The man who built the first
spreadsheet. Mec-hanical Calculator was?
B. transaction and application. a) Joseph Marie Jacquard
C. Windows and Mac OS. b) John Mauchly
D. system and application. c) Blaise Pascal
d) Harward Ailken
Answer: D
Answer: c
420. The metal or plastic case that
holds all the physical parts of the 424. Punched cards were first
60
introduced by? a) Equation Editor
a) Powers b) Organization Chart
b) Pascal c) Photo Album
c) Jacquard d) All of these
d) Herman Hollerith
Answer: d
Answer: d
429. The first network that planted
425. LSTs(Large Integration) used the seeds of Internet was?
in? a) ARPANET
a) First generation b) NSF net
b) Second generation c) V net
c) Third generation d) I net
d) Fourth generation
Answer: a
Answer: d
430. Abbreviation www in
426. What is MS Word? www.yahoo.com, stands for?
a) A game a) World Word in Wonder
b) An Operating System b) World Wide Web
c) Word Processing Software c) World Web is Widening
d) Typing tutor software d) Wonderful World Web
Answer: c Answer: b
61
by a different color toolbar than Answer: d
other open windows.
b) The window that currently open 436. A dialog box is a one?
c) Both (a) and (b) above a) Which is a sort of on-screen
mentioned from where you can fill in the
d) The window that is last used blanks, make selections from lists
and chose various combinations of
Answer: c options and settings.
b) In which you can connect to
433. A bitmap is? another Internet user and establish
a) Is a format which windows use an audio and video contact using
for desktop wallpaper? Microsoft Word.
b) A graphic file format made up c) In which you can give verbal
of small dots. commands to Microsoft Word
c) A specific kind of bitmap file menu
with the BMP extention. d) All of the above
d) All of the above.
Answer: a
Answer: d
437. A letter, memo, proposal or
434. Which of the following other file that is created using
printers generates character from a Microso-ft Word is called as?
grid? a) Master
a) Inkjet b) Slide
b) Laser c) Document
c) Daisy wheel d) Worksheet
d) Dot matrix
Answer: c
Answer: d
438. The meaning of double-click
435. Close Button? is?
a) When clicked will close the a) Pushing and releasing the main
dialog box, document or program mouse button twice in rapid
displayed in the window. succession when the on-tree mouse
b) Is located at the right top end of pointer is positioned over the
the title bar of most Win-dows. desired item
c) Implies for the small button b) Appearance of an icon
with an X on it c) To take a selection from the
d) All of the above document and move it to the
62
clipboard d) COBOL
d) All of the above
Answer: d
Answer: a
443. For Scientific work the most
popular language is?
439. A folder: (A) is an a) PASCAL
organizational tool used to store b) FORTRON
files.(B) is synonymous with c) COBOL
directory, but folder is the newer d) PROLOG
preferred term (C)contains data?
Answer: b
a) A only
b) B only 444. Which is not the portable
c) C only computer?
d) None of the above a) Micro-processor
b) Calculator
Answer: d c) Series Computes
d) Parallel Computers
440. Commercially produced first Answer: d
computer?
a) IBM 445. OBJECT ORIENTED language is?
b) MIPS a) ADA
c) UNIVAC b) PROLOG
c) PASCAL
d) EDSAC
d) FORTRAN
Answer: c Answer: a
63
453. Semi Conductor Memory is known
448. For running WINDOW minimum as?
disk free space required is? a) RAM
a) 8 MB b) ROM
b) 10 MB c) PROM
c) 16 MB d) EPROM
d) 32 MB
Answer: a
Answer: a
454. In which generation computers IC
449. The first graphical web browser have been used?
are? a) First
a) Gopher b) Second
b) WAIS c) Third
c) CERN d) Fourth
d) Mosaic
Answer: c
Answer: d
455. High level language is?
450. The programs used to view web a) Machine Independent
pages are called? b) Machine dependent
a) Clients c) (a) And (b) are true
b) Server d) (a) And (b) are false
c) Browser
d) Programmer Answer: a
64
Answer: a 462. In computer science, by
Informa-tion we mean?
458. TCP is?
a) Any output coming out from
a) Transfer control protocol
b) Transfer control process computer
c) Transmission control protocol b) A report printed by computer
d) Transmission control process c) Processed data put in intelligent
form
Answer: c d) Plural of data
459. Every computer on the Internet is
known as? Answer: c
a) Host 463. Which of the following are
b) Client parts of the CPU?
c) Modem a) Secondary Memory
d) Server b) Control unit
c) Input device
Answer: a
d) Printer
460. Fax machines are used to send
documents through a? Answer: b
a) Telephone line
b) Modems 464. The purpose of an application
c) Co-axial Wire program is to?
d) All of these
a) Meet specific user needs
Answer: a b) Make equivalent run better
c) Allow the operating system to
control resources better
Computer Awareness- Practice d) Convert program written in
Test 24 high-level language to machine
level language
461.The term overflow means? Answer: a
a) An excess of Internal storage
b) An excess of external storage 465. Micro computers are?
c) A situation where record cannot a) 8 bit
fit in to its right place b) 16 bit
d) A device, which controls the c) 32 bit
level of humidity in the computer d) Either 8 or 16 bit
room.
Answer: d
Answer: a
65
466. Computer uses information from you by falsifying
the_________number system to their identity.
store data and perform (A) Phishing
calculations. (B) Computer viruses
(A) binary (C) Spyware scams
(B) octal (D) Viruses
(C) decimal (E) None of the above
(D) hexadecimal
(E) None of these
Ans : (A)
Ans : (A)
470. Part number, part description,
467. A disk's content that is and number of parts ordered are
recorded at the time of examples of__________
manufacture and that cannot be (A) control
changed or erased by the user (B) output
is_______________ (C) processing
(A) Memory-only (D) feedback
(B) Write-only (E) input
(C) Once-only
(D) Run-only
(E) Read-only Ans : (E)
66
(D) multiprocessing are being given for free.
(E) None of these (C) Sharing copyrighted files
without permission breaks
copyright laws.
Ans : (D) (D) It is not unethical because the
files are being given for free.
(E) It is not unethical-anyone can
473. Codes consisting of lines of access a computer
varying widths or lengths that are
computer-readable are known
as____________ Ans : (C)
(A) an ASCII code
(B) a magnetic tape 476. Reusable optical storage will
(C) an OCR scanner typica1ly have the
(D) a bar code acronym__________
(E) None of these (A) CO
(B) DVD
(C) ROM
Ans : (D) (D) RW
(E) ROS
474. To instruct Word to fit the
width of a column to the contents
of a table Ans : (D)
automatically, click the button and
then point to AutoFit Contents. 477. The most common type of
(A) Fit to Form storage devices are__________
(B) Format (A) persistent
(C) Autosize (B) optical
(D) Contents (C) magnetic
(E) AutoFit (D) flash
(E) steel
Ans : (E)
Ans : (D)
475. Why is it unethical to share
copyrighted files with your friends
? 478. A device that connects to a
(A) It is not unethical, because it is network without the use of cables
legal. is said to be_________
(B) It is unethical because the files (A) distributed
(B) free
67
(C) centralized Reasoning
(D) open source Computer Awareness
General Knowledge
(E) None of these
Latest Jobs
Model Papers
English
Ans : (B) Quiz
Ans : (A)
Ans : (C)
482. The basic unit of a worksheet into
which you enter data in Excel is called
Banking Materials
a______________
For Banking Materials Subscribe here
(A) tab
Email:
(B) cell
Today Jobs :
(C) box
Some Modifications In LIC Notification
(D) range
Thursday, May 09, 2013
(E) None of these
home
Ans : (B)
Aptitude
68
Ans : (A)
483. You can keep your personal files / 487.____________.is the process of
folders in____________________ dividing the disk into tracks and sectors.
(A) My folder (A) Tracking
(B) My Documents (B) Formatting
(C) My Files (C) Crashing
(D) My Text (D) Allotting
(E) None of these (E) None of these
484. In Word you can force a page 488. Help Menu is available at which
break____________ button ?
(A) By positioning your cursor at the (A) End
appropriate place and pressing the F1 (B) Staft
key (C) Turnoff
(B) By positioning your cursor at the (D) Restart
appropriate place and pressing (E) Reboot
Ctrl+Enter
(C) By using the Insert/Section Break Ans : (B)
(D) By changing the font size of your
document 489. The contents of____________are
(E) None of these lost when the computer turns off.
(A) storage
Ans : (B) (B) input
(C) output
485. The default view in Excel (D) memory
is___________view. (E) None of these
(A) Work
(B) Auto Ans : (D)
(C) Normal
(D) Roman 490. When you save to this, your data
(E) None of these will remain intact even when the
computer is turned off________
Ans : (C)
(A) RAM
486. The process of transferring files (B) Motherboard
from a computer on the Internet to your (C) Secondary storage device
computer is called___________ (D) Primary storage device
(A) downloading (E) None of these
(B) uploading Ans : (C)
(C) FTP
(D) JPEC 491. A central computer that holds
(E) downsizing collections of data and programs for
69
many PCs, workstations, and other (A) BUS
computers is a(n)_________ (B) CPU
(A) supercomputer (C) USB
(B) minicomputer (D) MIDI
(C) laptop (E) MINI
(D) server
(E) None of these Ans : (C)
70
(B) blue cord (E) Refresh
(C) tower
(D) modem Ans : (E)
(E) None of these
503. This first step in the
Ans : (D)
transaction processing cycle
500. Video processors consist captures business data through
of________and________, which store various modes such as optical
and process images. scanning or at an electronic
(A) CPU and VGA commerce website__________
(B) CPU and memory
(A) Document and report
(C) VGA and memory
(D) VGI and DVI generation
(E) None of these (B) Database maintenance
(C) Transaction processing startup
Ans : (C) (D) Data Entry
(E) None of these
Computer Awareness- Practice
Test 26 Ans : (D)
504. A(n)_____________is a
501. If you want to connect to your
special visual and audio effect
own computer through the Internet
applied in Power-point to text or
from another location, you can
content.
use_________
(A) animation
(A) e-mail
(B) flash
(B) FTP
(C) wipe
(C) instant message
(D) dissolve
(D) Telnet
(E) None of these
(E) None of these
Ans : (A)
Ans : (D)
505. When the pointer is
502. To reload a Web page, press
positioned on a__________it is
the___________.button.
shaped like a hand.
(A) Redo
(A) grammar error
(B) Reload
(B) Formatting error
(C) Restore
(C) Screen Tip
(D) Ctrl
(D) Spelling error
71
(E) hyperlink
509. Which of, the following is a
Ans : (E) storage device that uses rigid,
permanently installed magnetic
506. A______________is the term disks to store
used when a search engine returns data/information__________
a Web page that matches the (A) floppy diskette
search criteria. (B) hard disk
(A) blog (C) permanent disk
(B) hit (D) optical disk
(C) link (E) None of these
(D) view
(E) success Ans : (B)
72
work-books that other users have
worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)
Ans : (D)
73