Computer Awareness

Download as pdf or txt
Download as pdf or txt
You are on page 1of 73

Computer Awareness- Practice (4) A group of SQL statements

Test1 consisting only of write operations.


(5) None of these
1. The basic goal of computer
process is to convert data into…… Answer : 3
(1) information 5. In order for computers to
(2) tables communicate across a network,
(3) files they must be connected through
(4) graphs a(n)………
(5) None of these (1) TCP/IP
Answer : 1 (2) Topology
2. …… Software allows users to (3) Ethernet
perform calculations on rows and (4) Thin client
columns of data. (5) None of these
(1) Word processing
(2) Presentation graphics Answer : 2
(3) Database Management Systems 6. “Buy Now – Pay Now” is
(4) Electronic Spreadsheet commonly used for :
(5) None of these (1) Debit Cards
Answer : 3 (2) Vault Cards
3. The memory resident portion of (3) Credit Cards
the operating system is called the : (4) E-purse
(1) registry (5) None of these
(2) API
(3) CMOS Answer : 1
(4) kernel 7. The ……… , stored on a ROM
(5) None of these chip, is responsible for loading the
operating system from its
Answer : 4 permanent location on the hard
4. Which of the following is a drive into RAM.
transaction? (1) BIOS
(1) A group of SQL statements (2) API
consisting of one read and one (3) device driver
write operation (4) supervisor program
(2) A group of SQL statements (5) display
consisting only of ready
operations. Answer : 1
(3) A group of SQL statements
defining a user-oriented task

1
8. Choices in computers are Answer : 4
referred to as :
(1) options 12. Which of the following is a
(2) exit transaction?
(3) boot (1) A group of SQL statements
(4) folder consisting of one read and one
(5) None of these write operation
(2) A group of SQL statements
Answer : 1 consisting only of ready
operations.
9. The ……… button on the quick (3) A group of SQL statements
access Toolbar allows you to defining a user-oriented task
cancel your recent commands or (4) A group of SQL statements
actions. consisting only of write operations.
(1) Search (5) None of these
(2) Cut
(3) Document Answer : 3
(4) Undo 13. What are the four basis
(5) None of these connecting hardware devices?
(1) Repeater, bridge, router and
Answer : 4 gateway
(2) Repeater, bridge, router and
10. During the boot process, the dell
……… looks for the system files. (3) Repeater, connector, router and
(1) HDD gateway
(2) BIOS (4) Amplifier, bridge, router and
(3) CPU gateway
(4) DVD (5) None of these
(5) CD
Answer : 1
Answer : 2
14. The ……… lists the location
11. Computers gather data, which of files on the disk
means they allow users to…… (1) FAT
data. (2) boot sector
(1) present (3) root folder
(2) store (4) data area
(3) output (5) None of these
(4) input
(5) None of these Answer : 1

2
15. A device operating at the (2) uses client computers to
physical layer is called a : provide copies of software to the
(1) Bridge server to allow server processing.
(2) Router (3) provides a company with the
(3) Repeater capability to downsize from lager
(4) All of the above computer systems and move away
(5) None of these from legacy
systems.
Answer : 3 (4) has server computers that
perform all processing, clients are
16. Number of bits per symbol dumb’ input/ output
used in Baudot code is devices only.
(1) 5 (5) None of these.
(2) 6
(3) 7 Answer : 2
(4) 8
(5) 9 19. To get to the ‘Symbol’ dialog
box, click on the ……… menu and
Answer : 1 choose ‘Symbol’.
(1) Insert
17. All of the following statements (2) Format
concerning windows are true (3) Tools
EXCEPT : (4) Table
(1) windows are an example of a (5) Help
command-driven environment.
(2) windows can be resized and Answer : 1
repositioned on the desktop.
(3) more than one window can be 20. Which is not a data source
open at a time. component?
(4) toolbars and scrollbars are (1) mail merge toolbar
features of windows. (2) header row
(5) None of these. (3) data fields
(4) data records
Answer : 1 (5) All of these
18. A client / server network Answer : 1
……….
(1) has clients that provide
functions such as application
control and shared computation.

3
Computer Awareness- Practice (2) macro languages
Test 2 (3) object-oriented languages
(4) visual programming languages
(5) None of these
21. Use this when you want to
make all letters capital without Answer : 4
having to use the shift key for each 25. To move a copy of file from
character……… one computer to another over a
(1) shifter communication channel is called?
(2) upper case (1) File transfer
(3) caps lock key (2) File encryption
(4) icon (3) File modification
(5) None of these (4) File copying
(5) None of the above
Answer : 3
Answer : 1
22. When you quickly press and 26. Which of the following is not a
releaes the left mouse button type of hub?
twice, you are : (1) Passive hub
(1) Primary-clicking (2) Inactive hub
(2) pointing (3) Switching hub
(3) Double-clicking (4) Intelligent hub
(4) Secondary-clicking (5) None of these
(5) None of these
Answer : 2
Answer : 3 27. …… allows you to print.
(1) ribbon
23. In Windows XP, if you want to
(2) monitor
see the file size and modified dates
(3) go now
of all files in a folder, the best
(4) Control-P
viewing option is the ……… view.
(5) None of these
(1) List
Answer : 4
(2) Thumbnails
28. Ina synchronous modem, the
(3) Details
receive equilizer is known as
(4) Icon
(1) adaptive equilizer
(5) None of these
(2) impariment equilizer
Answer : 3
(3) statistical equalizer
24. Programming language built
(4) compromise equilizer
into user programs such as Word
(5) None of these
and Excel are known as ………
Answer : 1
(1) 4GLs

4
29. Which of the following is not
the part of standard office suite? Answer : 1
(1) Word Processor 33. Machine language sometimes
(2) Database also referred as :
(3) Image Editor (1) Binary language
(4) File manager (2) High level language
(5) None of these (3) Middle level language
(4) Low level language
Answer : 4 (5) None of these
30. In a document what is the
maximum number of columns that Answer : 1
can be inserted in MS Word 34. When creating a computer
Table? program, the ……… designs the
(1) 35 structure of the program
(2) 15 (1) End user
(3) 63 (2) System Analyst
(4) 65 (3) Programmer
(5) 70 (4) Architect
(5) All of the above
Answer : 3
31. Where does most data go first Answer : 2
with in a computer memory 35. Which is an another name for
hierarchy? functional language
(1) RAM (1) Machine
(2) ROM (2) Application
(3) BIOS (3) Low-level language
(4) CACHE (4) High-level language
(5) None of these (5) None of these
Answer : 1
32. COBOL is an acronym for Answer : 2
……… 36. ……… is data that has been
(1) Common Business Oriented organized or presented in a
Language meaningful fashion.
(2) Computer Business Oriented (1) A process
Language (2) Software
(3) Common Business Operated (3) Storage
Language (4) Information
(4) Common Business Organized (5) None of these
Language
(5) None of these Answer : 4

5
37. Every computer connected to (4) File Transfer Protocol
an intranet or extranet must have a (5) Common gateway interface
distinct
(1) firewall Answer : 5
(2) proxy server
(3) IP address Computer Awareness- Practice
(4) domain name Test 3
(5) None of these
41. The capability of the operating
Answer : 3
system to enable two or more than
38. ……… translates the semantic two programs to execute
instructions developed by simultaneously in a single
programmers into the machine computer system by using a single
language processor is—
(1) Assembler (1) Multiprocessing
(2) Interpreter (2) Multitasking
(3) Loader (3) Multiprogramming
(4) Complier (4) Multiexecution
(5) None of these (5) None of these

Answer : 1 Answer : 2
39. ………is an artificial language 42. Virtual memory is typically
designed to communicate located:
instructions to a computer. (1) on a floppy disk
(1) Programming language (2) in the CPU.
(2) Machine language (3) in a flash card
(3) Software language (4) on the hard drive.
(4) Assembly language (5) None of these
(5) None of these
Answer : 4
Answer : 1 43. This type of software is
40. This is a standard way for a designed for users who want to
Web server to pass a Web user’s customize the programs they use.
request to an application program (1) Shareware
and to receive data back to forward (2) Open-source software
to the user- (3) Freeware
(1) Interrupt request (4) Macros
(2) Forward DNS lookup (5) None of these
(3) Data-Link layer
Answer : 1

6
44. The effect of the ROLLBACK (1) Safe Mode is a special
command in a transaction is the diagnostic mode.
following — (2) Safe Mode loads all
(1) Undo all changes to the data- nonessential icons.
base resulting from the execution (3) Safe Mode allows users to
of the transaction troubleshoot errors.
(2) Undo the effects of the last (4) Safe Mode loads only the most
UPDATE command essential devices.
(3) Restore the content of the (5) None of these
database to its state at the end of
the previous day Answer : 2
(4) Make sure that all changes to
the database are in effect 48. Superscript, subscript, outline,
(5) None of these emboss, engrave are known as :
(1) font styles
Answer : 1 (2) font effects
(3) word art
45. A result of a computer virus (4) text effects
cannot lead to : (5) None of these
(1) Disk Crash
(2) Mother Board Crash Answer : 2
(3) Corruption of program
(4) Deletion of files 49. Changing the appearance of a
(5) None of these document is called
(1) Proofing
Answer : 2 (2) Editing
(3) Formatting
46. The smallest item of useful (4) Correcting
information a computer can (5) All of the above
handle—
(1) bite Answer : 3
(2) byte
(3) bit 50. You can detect spelling and
(4) bait grammar errors by :
(5) None of these (1) Press Shift + F7
(2) Press Ctrl + F7
Answer : 3 (3) Press Alt+ F7
(4) Press F7
47. All of the following are TRUE (5) None of these
of Safe Mode EXCEPT:
Answer : 4

7
51. What kind of memory is both (5) None of these
static and non-volatile?
(1) RAM Answer : 2
(2) ROM
(3) BIOS 55. Single party disk relying on the
(4) CACHE disk controller for finding out
(5) PROM which disk has failed is used by :
(1) RAID level 5
Answer : 2 (2) RAID level 2
(3) RAID level 4
(4) RAID level 3
52. A process known as — is used (5) RAID level 1
by large organization to study
trends. Answer : 4
(1) data mining
(2) data selection 56. The sharing of a medium and
(3) POS its path by 2 or more devices is
(4) data conversion called —
(5) None of these (1) Modulation
(2) Encoxing
Answer : 1 (3) Line discipline
(4) Multiplexing
53. A(n) — system is a small, (5) None of these
wireless handheld computer that
scans an item’s tag and pulls up Answer : 4
the current price (and any special
offers) as you shop. 57. What happens when you click
(1) PSS on Insert > Picture > Clip Art
(2) POS (1) It inserts a clipart picture into
(3) inventory document
(4) data mining (2) It lets you choose clipart to
(5) None of these insert into document
(3) It opens Clip Art taskbar
Answer : 1 (4) It insets symbols
54. — cells involve creating a (5) None of these
single cell by combining two or
more selected cells. Answer : 3
(1) Formatting 58. Which of the following does
(2) Merging NOT occur during the power-on
(3) Embedding self-test (POST)?
(4) Splitting

8
(1) The ScanDisk utility begins to (2) hold a program’s data or
run. instructions in virtual memory
(2) The video card and video when it can’t fit in RAM.
memory are tested. (3) prevent thrashing in a
(3) The BIOS identification multitasking environment.
process occurs. (4) allow multiple print jobs to
(4) Memory chips are checked to print their pages out
ensure they are working properly. simultaneously.
(5) None of these (5) None of these

Answer : 1 Answer : 2

59. OLE stands for : 62. Software programs that allow


(1) Online Link Embedding you to legally copy files and give
(2) Object Link Export them away at no cost are called
(3) Object Linking and Embedding which of the
(4) Online Link Emulation following :
(5) None of these (1) Time sharing
(2) Public domain
Answer : 3 (3) Shareware
(4) Freeware
60. Which of the following is not (5) None of these
available in Font Spacing?
(1) Normal Answer : 3
(2) Loosely
(3) Condensed 63. Which of the following is NOT
(4) Expanded a goal of Transaction processing
(5) All are available system?
(1) Capture, process and store
Answer : 2 transactions
(2) Produce a variety of documents
related to Routine business
Computer Awareness- Practice activities
Test 4
(3) Reduce manual effort
associated with Processing
61. The purpose of a swap (or business transactions
page) file is to: (4) Produce standard reports used
(1) maintain pages of documents for Management decision making
that are being spooled to the (5) None of the above
printer. Answer : 2

9
64. The degree of detail that (4) broadband divide
should be incorporated into a (5) None of these
database depends on what?
(1) Data integrity Answer : 1
(2) The type of database 68. How will you remove all
(3) The user’s perspective formatting added to your
(4) The business practices and documents (such as bold, italics,
policies and underline etc.)
(5) None of these (1) Save
(2) Save as plain text file
Answer : 2 (3) Save as
65. Superscript refers to — (4) All of the above
(1) Characters displayed below the (5) None of these
line of the normal text
(2) Characters displayed above the Answer : 2
line of the normal text 69. With the object-oriented (OO)
(3) Characters displayed vertically approach, an object encapsulates,
centre or — a programmer.
(4) Both (1) and (2) (1) carries out, the details of an
(5) None of these object for
(2) hides, the details of an object
Answer : 2 from
66. A — is an additional set of (3) reveals, the details of an object
commands that the computer to
displays after you make a selection (4) extends, the details of an object
from the main menu : beyond
(1) dialog box (5) None of these
(2) submenu
(3) menu selection Answer : 2
(4) All of the above 70. The ability to recover and read
(5) None of these deleted or damaged files from a
criminal’s computer is an example
Answer : 1 of a law enforcement specialty
67. The difference between people called :
with access to computers and the (1) robotics
Internet and those without this (2) simulation
access is known as the : (3) computer forensics
(1) digital divide (4) animation
(2) Internet divide (5) None of these
(3) Web divide Answer : 3

10
71. Granting an outside (3) Vital Information Recourse
organisation access to Internet web Under System
pages is often implemented using a (4) Virus Information Recourse
(an) : Under Siege
(1) Extranet (5) None of these
(2) Intranet
(3) Internet Answer : 1
(4) Hacker
(5) None of these 75. Data becomes ................ when
Answer : 1 it is presented in a format that
people can understand and use.
(1) processed
72. The purpose of the primary key (2) graphs
in a database is to : (3) information
(1) Unlock the database (4) presentation
(2) Provide a map of the data (5) None of these
(3) Uniquely identify a record
(4) Establish constraints on Answer : 3
database operations
(5) None of the above 76. The term ............. designates
equipment that might be added to a
Answer : 3 computer system to enhance its
functionality.
73. The code that relational (1) digital device
database management Systems use (2) system add-on
to perform their database task is (3) disk pack
referred to as : (4) peripheral device
(1) QBE (5) None of these
(2) SQL
(3) OLAP Answer : 4
(4) Sequel Server 77. ……… is the language that
(5) None of these enable user to access or manipulate
data as organized by appropriate
Answer : 2 data model :
(1) DML
74. VIRUS stands for : (2) SDL
(1) Vital Information Recourse (3) DDL
Under Siege (4) All of the above
(2) Vital Information Reason (5) None of these
Under Siege
Answer : 1

11
78. The user commands that are (1) a low level language
used to interact with a database is (2) machine language
called as : (3) a high level language
(1) Query (4) assembly language
(2) Interaction (5) None of these
(3) Command
(4) Instruction Answer :4
(5) None of these
82. The operating system controls
Answer : 3 access to the processor by
assigning a(n) ……… to each task
79. RAM can be thought of as the requiring the processor’s attention.
......... for the computer’s processor (1) CPU
: (2) slice of time
(1) factory (3) stack
(2) operating room (4) event
(3) waiting room (5) None of these
(4) planning room
(5) None of these Answer :2

Answer : 3 83. Which of the following is the


correct sequence of actions that
80. ……… is computer software takes place during the boot-up
designed to operate the computer process?
hardware and to provide platform (1) Load operating system -
for running application software : Activate BIOS-Perform POST-
(1) Application software Check configuration settings
(2) System software (2) Activate BIOS-Perform POST-
(3) Software Load operating system-Check
(4) Operating system configuration settings
(5) None of these (3) Perform POST - Load
operating system - Activate BIOS -
Answer : 2 Check configuration settings
(4) Activate BIOS - Check
Computer Awareness- Practice configuration settings - Perform
Test 5 POST -Load operating system
(5) None of these
81. An assembler is used to
Answer :2
translate a program written
in………

12
84. Using Windows Explorer, a 88. To move down a page in a
plus (+) sign in front of a folder document……
indicates : (1) jump
(1) an open folder (2) fly
(2) the folder contains subfolders (3) wriggle
(3) a text file (4) scroll
(4) a graphics file (5) None of these
(5) None of these
Answer :4
Answer :2
89. Compilers can identify:
85. Which of the following (1) syntax errors
position is not available for fonts (2) semantic errors
on MS Word? (3) logical errors
(1) Normal (4) mathematical errors
(2) Raised (5) None of these
(3) Lowered
(4) Centered Answer :1
(5) All are available
90. Which was the first Scientific
Answer :4 Computer Programming
Language?
86. “Buy Now – Pay Later” is (1) COBOL
commonly used for : (2) LISP
(1) Debit Cards (3) ADA
(2) Vault Cards (4) FORTRAN
(3) Credit Cards (5) JAVA
(4) E-purse
(5) None of these Answer : 4

Answer :3 91. A hard copy of a document is



87. The different styles of lettering (1) stored in the hard disk
in a word processing program…… (2) stored on a floppy
(1) font (3) stored on a CD
(2) calligraphy (4) printed on the paper
(3) writing (5) None of these
(4) manuscript
(5) None of these Answer :4

Answer :1

13
92. Flow control in TCP/IP is 96. Shimmer, Sparkle text,
handled using: Blinking Background etc. are
(1) Urgent pointer known as :
(2) Checksum (1) font styles
(3) Acknowledgement number (2) font effects
(4) Variable-size sliding window (3) word art
(5) None of these (4) text effects
(5) None of these
Answer :4
Answer :4
93. This component is required to
process data into information and 97. The horizontal and vertical
consists of integrated circuits . lines on a worksheet are called :
(1) Hard disk (1) cells
(2) RAM (2) sheets
(3) CPU (3) block lines
(4) ROM (4) gridlines
(5) None of these (5) None of these

Answer :3 Answer :4
98. The basic input/output system
94. From which menu you can (BIOS) is stored in:
insert Header and Footer? (1) RAM
(1) Insert Menu (2) ROM
(2) View Menu (3) the CPU
(3) Format menu (4) the hard drive
(4) Tools Menu (5) None of these
(5) Edit Menu
Answer :2
Answer :2 99. Which of the following
features usually applies to data in a
95. Moves the cursor one space to data warehouse?
the right to puts spaces in between (1) Data are often deleted
words…… (2) Most applications consists of
(1) control key transactions
(2) space bar (3) Data are rarely deleted
(3) printer (4) Relatively few records are
(4) mouse processed by applications
(5) None of these (5) None of these
Answer :2
Answer :2

14
100. What type of program (5) None of these
controls the various computer parts
and allows the user interact with Answer :3
the computer ? 104. The feature of Word that
(1) Utility software automatically adjusts the amount
(2) Operating system of space between certain
(3) Word processing software combinations of characters so that
(4) Database program an entire word looks more evenly
(5) None of these spaced. What is that feature
called?
Answer :1 (1) Spacing
(2) Scaling
Computer Awareness- Practice (3) Kerning
Test 6 (4) Positioning
(5) None of these
101. Which of the following is an Answer :3
example of connectivity? 105. Which of the following
(1) data statement is wrong?
(2) hard disk (1) Windows XP is an operating
(3) Internet system
(4) power cord (2) Linux is owned and sold by
(5) None of these Microsoft
Answer :3 (3) Photoshop is a graphical design
102. The command used to remove tool by Adobe
text or graphics from a document. (4) Linux is free and open source
The information is then stored on a software
clipboard so you can paste it. (5) None of the above
(1) chop Answer :2
(2) cut 106. A phenomenon in virtual
(3) clip memory schemes in which the
(4) cart away processor spends most of the time
(5) None of these swapping pages rather than
Answer :2 executing instructions is :
103. People, procedures, software, (1)loading
hardware, and data are the five (2) swapping
parts of a(n) : (3) thrashing
(1) competency system (4) aging
(2) computer system (5) digging
(3) information system
(4) software system Answer :3

15
(2) Located on the ten-key pad
107. Give the name of the Linear section of your keyboard.
list in which elements can be (3) Assigned to another task.
added at ends but not in the (4) From the same font family as
middle: the symbol.
(1) Array (5) None of these
(2) Queue
(3) Tree Answer :1
(4) Circular Queue
(5) None of these
111. Which American Computer
Answer :2 Company is called big blue?
(1) Microsoft
108. Flip-flop is the basic structure (2) Compaq Corp
of the device: (3) IBM
(1) Hard disk (4) Tandy Sevenson
(2) Memory (5) Hewlett Packard
(3) Cells
(4) Speakers Answer :3
(5) None of these
112. A dumb terminal has :
Answer :2 (1) An embedded microprocessor
(2) Extensive memory
109. What is a specialized (3) Independent processing
software program that allows input (4) A keyboard and screen
and output devices to (5) None of these
communicate with the rest of the
computer system? Answer :2
(1) Utility driver
(2) Utility program 113. Which of the following is a
(3) Data compression utility software selection criteria?
(4) Device driver (1) Appropriateness
(5) None of these (2) Efficiency
(3) Compatibility
Answer :4 (4) All of the above
(5) None of these
110. When assigning a shortcut Answer :2
key to a symbol, you should
always try to select a key or key 114. Which of the following
combination that is: memories needs refresh?
(1) unassigned

16
(1) SRAM (1) Compiler
(2) DRAM (2) Assembler
(3) ROM (3) Interpreter
(4) All of above (4) Language processor
(5) None of these (5) None of these

Answer :4 Answer :4

115. ……… is paperless document 119. The subject of cybernetics


transfer between companies. deals with the science of :
(1) EFT (1) Genetics
(2) EDI (2) Control and communications
(3) ETS (3) Molecular biology
(4) RTGS (4) Biochemistry
(5) None of these (5) None of these

Answer :4 Answer :2

116. The switching devices used in 120. WAIS stands for :


First Generation computer’s were: (1) Wide Area Intellectual Service
(1) Transistors (2) Web Access Information
(2) SSI chips system
(3) VLSI chips (3) World wide Application of
(4) Vacuum Tubes Intelligent System
(5) None of these (4) Wide Area Information Service
(5) None of these
Answer :4
Answer :4
117. The Virtual Memory is
located logically : Computer Awareness- Practice
(1) in the CPU Test 7
(2) in main memory
(3) in between CPU and primary 121. Correcting errors in a
memory program is referred to as………
(4) in the Hard disk (1) debugging
(5) None of these (2) bugging
(3) rectifying
Answer :2 (4) modifying
118. A software used to convert (5) None of these
source program instructions to
object instruction is known as : Answer: 1

17
122. Which type of processing
speed measurement is used 126. Smart Card is :
primarily with supercomputers? (1) Special purpose Cards
(1) Flops (2) Microprocessor Cards
(2) Fractions of second (3) Processing unit contains
(3) Gigahertz memory for storing data
(4) MIPS (4) Processing unit for software
(5) None of these handling
(5) None of these
Answer: 1
123. What is the term associated Answer: 2
with the second part of an e-mail 127. A screen element of MS
address? Word that is usually located below
(1) Local address the title bar that provides
(2) Eight characters long categorized options is :
(3) User name (1) Menu mar
(4) Domain name (2) Tool Bar
(5) None of these (3) Status Bar
(4) All of the above
Answer: 4 (5) None of these
124. Bold, Italic, Regular are
known as : Answer: 1
(1) font styles 128. Which keys can be used
(2) font effects together with other keys for special
(3) word art tasks ?
(4) text effects (1) Insert, Delete
(5) None of these (2) Ctrl, Shift
(3) Left Arrow, Right Arrow
Answer: 1 (4) Page up, Page Down
125. This is a group of servers that (5) None of these
share work and may be able to Answer: 2
back each other up if one server 129. Data related crime does not
fails. incorporate :
(1) Channel bank (1) Data Didling
(2) Cluster (2) Data Spying
(3) Tiger team (3) Data Leakage
(4) Serverless backup (4) Data Mining
(5) Logical unit (5) None of these

Answer: 2 Answer: 4

18
130. ‘DOS’ floppy disk does not Answer: 4
have :
(1) A Boot Record 134. MS-DOS is a ………
(2) A File Allocation Table operating system.
(3) A Root Directory (1) point-and-click
(4) Virtual Memory (2) user-friendly
(5) None of these (3) command-driven
(4) Mac
Answer: 4 (5) None of these

131. A disk on which you store Answer: 3


information………
(1) plate 135. Procedures are typically
(2) data disk documented in manuals written by
(3) paper disk :
(4) TV disk (1) computer specialists
(5) None of these (2) end users
(3) Microsoft
Answer: 2 (4) service providers
(5) None of these
132. Lets you leave a screen or ]
program…… Answer: 1
(1) boot
(2) programs 136. What deletes the entire file
(3) exit except the file structure ?
(4) text (1) ERASE
(5) None of these (2) DELETE
(3) ZAP
Answer: 3 (4) PACK
133. The operating system does all (5) None of these
of the following EXCEPT:
(1) provide a way for the user to Answer: 3
interact with the computer. 137. ……… takes one line, checks
(2) manage the central processing it for errors and then executes it.
unit (CPU). (1) Assembler
(3) manage memory and storage. (2) Interpreter
(4) enable users to perform a (3) Loader
specific task such as document (4) Complier
editing. (5) None of these
(5) None of these
Answer: 2

19
138. Artificial Intelligence is
associated with which generation? Answer: 3
(1) First Generation
(2) Second Generation 142. A technique used by codes to
(3) Third Generation convert an analog signal into a
(4) Fifth Generation digital bit stream is known as :
(5) Sixth Generation (1) Pulse code modulation
(2) Pulse stretcher
Answer: 4 (3) Query processing
(4) Queue management
139. Time during which a job is (5) None of these
processed by the computer is :
(1) Delay times Answer: 1
(2) Real time 143. The number of bits that can
(3) Execution time be transmitted over a network in a
(4) Down time certain period of time:
(5) None of these (1) Latency
(2) Delay
Answer: 3 (3) Bandwidth
(4) Baud
140. Which of the following is not (5) None of these
an input device?
(1) OCR Answer: 3
(2) Optical scanners 144. Linux partitions are created
(3) Voice recognition device using the file system:
(4) COM (Computer Output to (1) FAT
Microfilm) (2) FAT32
(5) None of these (3) EXT3
Answer: 4 (4) NTFS
(5) None of these
Computer Awareness- Practice Answer: 3
Test 8 145. Which of the following data
structure is widely used in a
141. In latest generation network model RDBMS?
computers, the instructions are (1) Arrays
executed : (2) trees
(1) Parallel only (3) graphs
(2) Sequentially only (4) stacks
(3) Both sequentially and parallel (5) None of these
(4) All of above Answer: 3
(5) None of these

20
146. The scientist who developed
the idea of the WWW is : 150. Easy to use……
(1) James Gosling (1) user friendly
(2) Tim Berns Lee (2) select
(3) Andrew Tannenbaum (3) helpful
(4) Linus Torvalds (4) ever-ready
(5) Bill Gates (5) None of these

Answer: 2 Answer: 1

147. What was the data 151. Commands at the top of a


transmission method in which bi- screen such as : FILE-EDIT-
directional data flow is allowed? FONT-TOOLS to operate and
(1) Simplex change things within
(2) Duplex programs……
(3) Analog (1) menu bar
(4) Single side mode (2) tool bar
(5) None of these (3) user friendly
(4) word processor
Answer: 2 (5) None of these

148. To check the presence of a Answer: 1


computer in the network, use the 152. Anything written on the
command: screen ……
(1) ping (1) cursor
(2) cmd (2) text
(3) check (3) folder
(4) ipconfig (4) boot
(5) connect (5) None of these
Answer: 2
Answer: 1 153. Which of the following is not
149. The word processing task the major function of a computer ?
associated with changing the (1) Processing data into
appearance of a document is : information
(1) Editing (2) Storing data or information
(2) Writing (3) Gathering data
(3) Formatting (4) Analysing data or information
(4) All of above (5) None of these
(5) None of these
Answer: 4
Answer: 3

21
154. A method of executing two or (2) SATA
more programs concurrently using (3) ATA
the same computer describe: (4) PCI
(1) multi processing (5) None of these
(2) multiprogramming
(3) virtual processing Answer: 1
(4) time sharing
(5) None of these 158. is a language, instead of using
numbers; programmers began
Answer: 2 using English like abbreviations
(Mnemonics) to represent the
155. When you save to ……… elementary operations.
your data will remain intact even (1) Machine language
when the computer is turned off. (2) Mnemonics language
(1) RAM (3) Assembly level language
(2) motherboard (4) High level language
(3) secondary storage device (5) None of the these
(4) primary storage device
(5) None of these Answer: 3

Answer: 3 159. Encryption decryption are


functions of :
156. A one-time password is : (1) Transport layer
(1) one that changes every time it (2) Session layer
is used (3) Presentation layer
(2) one that is assigned once and (4) All of the above
not changed at all. (5) None of these
(3) one that can be used only at a
particular time of the day Answer: 2
(4) one that is assigned for all
session that starts at a particular 160. The process of building a
time model that demonstrate the
(5) None of these features of a proposed product,
service or system is called a :
Answer: 1 (1) JAD
(2) RAD
157. A hardware interface that (3) templating
allows for the connection of (4) prototyping
several peripheral devices to a (5) TAD
single PCI board.
(1) SCSI ANSWER-4

22
Computer Awareness- Practice 164. All of the following are steps
Test 9 involved in the boot process
EXCEPT:
161. Memory, also called random (1) load the operating system into
access memory, or RAM………. RAM.
(1) contains the electronic circuits (2) the power-on self-test.
that cause processing to occur (3) activate the basic input/output
(2) makes the information system (BIOS).
resulting from processing available (4) load application programs.
for use (5) None of these
(3) allows data, programs,
commands, and user responses to Answer: 4
be entered into a computer
(4) consists of electronic 165. A port that allows 8 bits at a
components that store data time to be transmitted
(5) None of these simultaneously is a(n) ……….
(1) dedicated port
Answer: 4 (2) parallel port
(3) SCSI port
162. A ……… represent (4) USB port
approximately one billion memory (5) None of these
locations.
(1) kilobyte Answer: 2
(2) megabyte
(3) gigabyte 166. Which of these terms refers to
(4) terabyte the feature of an OS that allows a
(5) None of these single computer to process the
tasks of several users at different
Answer: 3 stations, in round-robin fashion?
(1) Multiprocessing
163. An interrupt handler is a(n): (2) Multiprogramming
(1) location in memory that keeps (3) Multitasking
track of recently generated (4) Time processing
interrupts. (5) Time-sharing
(2) peripheral device.
(3) utility program. Answer: 5
(4) special numeric code that
indicates the priority of a request 167. A program which helps create
(5) None of these written documents and lets you go
back and make corrections as
Answer: 4 necessary……

23
(1) spreadsheet 171. When you insert a picture and
(2) personal writer adjust the height, Word
(3) word printer automatically adjusts the ………
(4) word processor to maintain the correct proportion.
(5) None of these (1) pixel size
(2) resolution
Answer: 4 (3) screen size
(4) width
168. Screen that comes on when (5) None of these
you turn on your computer that
shows all the icons…… Answer: 4
(1) desktop
(2) face to face 172. Which of the following is
(3) viewer NOT one of the steps in the
(4) view space machine cycle?
(5) None of these (1) Execute
(2) Store
Answer: 1 (3) Decode
(4) Pipelining
169. A place that a user can create (5) None of these
to store files……
(1) cursor Answer: 4
(2) text
(3) folder 173. How many peripheral devices
(4) boot can be connected to a single SCSI
(5) None of these port?
(1) 1
Answer: 3 (2) 8
(3) 16
170. Electronic pens are used with (4) 32
the mouse to write on a slide in (5) 64
which view?
(1) Master Answer: 2
(2) Slide Sorter
(3) Slide Show 174. The four-step process of
(4) Normal fetch, decode, execute, and store is
(5) Print preview called a(n):
(1) machine cycle
Answer: 3 (2) instruction cycle
(3) arithmetic operation
(4) logical operation

24
(5) None of these Answer: 4

Answer: 1 178. Data are ……… in


client/server computing.
175. All of the following are (1) never sent to the client machine
TRUE regarding virtual memory (2) sent in very large sections to
EXCEPT : save processing time
(1) any amount of RAM can be (3) sent only upon the client’s
allocated to virtual memory. request
(2) the setting for the amount of (4) sent in complete copies for the
hard drive space to allocate to client to filter and sort
virtual memory can be manually (5) sent from the client to the
changed. server for processing
(3) this temporary storage is called
the swap file or page file. Answer: 3
(4) virtual memory is physical
space on the hard drive. 179. The total set of interlinked
(5) None of these hypertext documents worldwide is
:
Answer: 1 (1) HTT
(2) Browser
176. The operating system is the (3) WWW
most common type of ……… (4) B2B
software. (5) None of these
(1) communication
(2) application Answer: 1
(3) system
(4) word-processing 180. Which of the following is not
(5) None of these one of the three ‘Mail Merge
Helper’ steps?
Answer: 3 (1) Merge the two files
(2) Create the main document
(3) Set the mailing list parameters
177. The human-readable version (4) Create the data source
of a program is called ……… (5) None of
(1) source code these
(2) program code
(3) human code
(4) system code Answer: 3
(5) None of these

25
184. Array is ………
(1) Linear data structure
(2) non-linear data structure
Computer Awareness- Practice (3) simple data structure
Test 10
(4) complex data structure
(5) None of these
181. Which is the part of a
computer that one can touch and Answer: 1
feel ?
185. A computer checks the
(1) Programs
……… of user names and
(2) Software
passwords for a match before
(3) Hardware
granting access.
(4) Output
(1) website
(5) None of these
(2) network
Answer: 3 (3) backup file
(4) database
182. A command to get a file you (5) None of these
worked on from the memory
where it was stored…… Answer: 4
(1) close
186. Which of the following is the
(2) delete
latest version of MS Word?
(3) open
(1) Word 2000
(4) get it
(2) Word 2007
(5) None of these
(3) Word 2010
Answer: 3 (4) Word 2011
(5) Word 2012
183. There are several security
devices used to stop individuals Answer: 3
from exploiting your system.
187. In the online world of
Which of the following is used in
electronic commerce, what do the
conjunction with a firewall?
initials CEM stands for ?
(1) Proxy server
(1) Costly E-Commerce Marketing
(2) Intrusion-detection system
(2) Customer Experience
(3) Terminal server
Management
(4) Web server
(3) Customer Experience
(5) None of these
Misleading
Answer: 1 (4) Cost Estimates are Mind
Boggling

26
(5) None of these of directories that include all of the
following EXCEPT:
Answer: 2 (1) files
188. What type of program (2) folders
controls the various computer parts (3) drives
and allows the user interact with (4) systems
the computer ? (5) None of these
(1) Utility software Answer: 4
(2) Operating system
(3) Word processing software 192. Leaves of which of the
(4) Database program following trees are at the same
(5) None of these level ?
(1) Binary tree
Answer: 1 (2) B-tree
(3) AVL-tree
189. Which of the following (4) Expression tree
transmission systems provide the (5) None of these
highest data rate to in individual
device? Answer: 2
(1) computer bus
(2) telephone lines 193. The transformation of a
(3) voice and mode message into an encoded form is
(4) lease lines known as :
(1) Mnemonics
Answer: 1 (2) Encoding
(3) Encryption
190. The combination of the (4) Decoding
operating system and the processor (5) None of these
is referred to as the computer’s:
(1) CPU Answer: 2
(2) platform
(3) BIOS 194. Firewalls are used to protect
(4) CMOS against………
(5) None of these (1) Unauthorized Attacks
(2) Virus Attacks
Answer: 2 (3) Data Driven Attacks
(4) Fire Attacks
191. The operating system allows (5) All of these
users to organize the computer’s
contents in a hierarchical structure Answer: 1

27
195. Auto correct was originally (5) None of these
designed to replace ……… words
as you type. Answer: 3
(1) Short, repetitive
(2) Grammatically incorrect 199. The definition of thrashing is:
(3) Misspelled (1) swapping data between virtual
(4) Half memory and RAM too frequently.
(5) None of these (2) insufficient hard disk space.
(3) too many processors being
Answer: 3 managed by the operating system.
(4) inaccurate information stored
196. Ensuring that the essential in the registry
peripheral devices are attached and (5) None of these
operational is the ……… process.
(1) configuration Answer: 1
(2) CMOS
(3) POST 200. The primary device that a
(4) ROM computer uses to store
(5) check information……
(1) register
Answer: 3 (2) storehouse
(3) desk
197. The unique signal, generated (4) hard drive
by a device, that tells the operating (5) None of these
system that it is in need of
immediate attention is called an: Answer: 4
(1) action
(2) event. Computer Awareness- Practice
(3) interrupt Test 11
(4) activity
(5) None of these 201. Which of the following is a
disadvantage of machine
Answer: 3
language?
198. Before a package can be used 1) Machine Dependent
in a java program it must be 2) Slower Execution
……… 3) Machine Independent
(1) executed 4) It requires Translation
(2) referenced 5) None of these
(3) imported
(4) declared Answer: 1

28
4) JAVA
202. Android Operating system is 5) PROLOG
an example of which kind of
Source Model? Answer:5
1) Open Source
2) Vertical Market Software 206. AltaVista is a(n)
3) Horizontal Market Software 1) Windows Utility
4) Shareware 2) Search engine
5) None of these 3) Program
4) Antivirus
Answer:1 5) None of these

203. Cache memory is an example Answer:2


of which of the following?
1) Virtual Memory 207. The term Hard copy is related
2) Non Volatile Memory to:
3) Static Random Access Memory 1) Storing data on Hard Disk
4) Secondary Memory 2) Output displayed on Monitor
5) None of these 3) Scanned Image
4) Printouts
Answer:3 5) None of the above

204. A software that is not Answer:4


protected by copyright or
trademark is ...... 208. MIME is an acronym for ....
1) Vertical Market Software 1) Multiprogramming Internet
2) Public Domain Software Mail Extension
3) Shareware Software 2) Multicasting Internet Mail
4) Trialware Extension
5) Adware 3) Multiple Internet Mail
Extension
Answer:2 4) Multipurpose Internet Mail
Extension
205. Which of the following 5) None of these
programming languages is
associated with Artificial Answer: 4
Intelligence?
1) C 209. Any crime that involves a
2) B Computer and a Network is called:
3) C++ 1) Virus

29
2) Malware 213. Which of the following is an
3) Trojan Horse Object Oriented Programming
4) Cyber crime Language?
5) Identity Theft 1) C
2) Java
Answer: 4 3) C++
4) Both 2 and 3
210. Which of the following 5) Both 1 and 2
generation computers is referred to
an expert system? Answer: 4
1) 2nd
2) 1st 214. The popular name for
3) 4th “Information Super Highway” is:
4) 3rd 1) Intranet
5) 5th 2) Extranet
3) Virtual Private Network
Answer: 5 4) MAN
5) Internet
211). ......... is a set of instructions. Answer: 5
1) Hardware
2) Code 215. Encryption is primarily used
3) Language in:
4) Program 1) Computer Processing
5) All the above 2) File retention
3) Data communication
Answer: 4 4) Data Storage
5) None of these
212. Which of the following is the
keyboard short-cut for permanent Answer: 3
deletion of a file/folder in
windows? 216. The main folder on a storage
1) Del. device is called .....
2) Shift + Del. 1) Root directory
3) Ctrl + Del. 2) Interface
4) Alt + Enter 3) Device driver
5) None of these 4) Platform
5) Main directory
Answer: 2

30
Answer: 1 2) References
3) Review
217. To protect the computer from 4) View
hacker intrusions, ..... must be 5) Layout
installed.
1) Firewall Answer: 3
2) Mailer
3) Script Computer Awareness- Practice
4) Yahoo Messenger Test 12
5) None of these
221. Blu-Ray disk is an example of
Answer: 1
a(n) ....
1) Hard disk
218. Which of the following is
2) Magnetic Disk
used to read handwritten or printed
3) Optical Disk
text to make a digital image that is
4) Output Device
stored in memory?
5) None of these
1) Printer
2) Laser beam Answer:3
3) Scanner
4) Touchpad 222. Which of the following is true
5) None of these about Name box?
1) It appears at the left of the
Answer: 3
formula bar
2) It appears below the menu bar
219. A program designed to
3) It shows the locations of the
destroy data on the computer
active cell.
which can travel to infect other
4) Both 1 and 3
computers is called a .....
5) Both 2 and 3
1) Hurricane
2) Infector Answer:4
3) Disease
4) Virus 223. Which of the following is
5) None known as non volatile memory?
1) Hard Disk
Answer: 4
2) Floppy Disk
3) CD-ROM
220. Thesaurus option is available
4) DVD-ROM
in ..... menu.
5) All the above
1) Page layout

31
Answer: 5 4) Cut
5) Print Preview
224. Auto correct function option
is present in ..... menu of MS Answer: 5
Word.
1) View 228. .... helps create, manipulate
2) Insert and analyze data arranged in rows
3) Format and columns?
4) Tools 1) Application Package
5) Table 2) Word Processing Package
3) Outlining Package
Answer: 4 4) Outline Processors
5) Spreadsheet Package
225. Which of the following is
another name for pre-programmed Answer: 5
formula in Excel?
1) Range 229. A register that keeps track of
2) Graph the next instruction to be executed
3) Function is called a(n):
4) Cell 1) Data Register
5) None of these 2) Instruction Register
3) Action Register
Answer: 3 4) Program Counter
5) None of these
226. ALU works on the
instructions held in ....... Answer: 2
1) Notebook
2) Registers 230. Which of the following is the
3) Notepad feature that keeps track of the right
4) Clipboard margin?
5) I/O Devices 1) Find and Replace
2) Dragged Right
Answer: 2 3) Ruler
4) Right Justified
227. To see the document before 5) Left Justified
the printout is taken, use .......
1) Insert Table Answer: 4
2) Paste
3) Format Painter

32
231. A network which connects
cities or states is known as:
1) LAN Answer: 3
2) CAN
3) PAN 235. ...... is the storage area for e-
4) VPN mails.
5) MAN 1) Folder
2) Mail box
Answer: 5 3) Directory
4) Hard Disk
232. Which of the following 5) None of these
allows you to insert graphics into a
word document? Answer: 2
1) Callouts
2) Flowcharts 236. Three types of Compact disks
3) Basic Shapes include CD-ROM, CD-R and ......
4) All of the above 1) CD-W
5) None of these 2) CD-RAM
3) CD-DVD
Answer: 4 4) CD-RW
5) None of these
233. An email address consists of:
1) Domain name 2) User name Answer: 4
3) Username followed by
password 237. Collecting personal
4) Domain name followed by user information and effectively posing
name as another individual is known as:
5) Username followed by domain 1) Spooling
name 2) Spoofing
3) Hacking
Answer: 5 4) Identity Theft
5) None of these
234. ERP is an acronym for:
1) Enterprise Retirement Planning Answer: 2
2) Enterprise Relationship
Planning 238. Which of the following
3) Enterprise Resource Planning controls the manner of interaction
4) Enterprise Reorder Planning between the user and the operating
5) None of these system?
1) Language Translator

33
2) Platform 1) Slide show
3) User Interface 2) Slide master
4) Icon 3) Slide sorter
5) None of these 4) Notes Page
5) Design Slide
Answer: 3

239. Which of the following best Answer: 3


defines Embedded system?
1) A program that comes wrapped 242. A set of rules for telling the
in a box computer what operations to
2) A program that is permanent perform is / are called:
part of a computer 1) Structures
3) A computer that is a part of a 2) Procedural Language
larger computer 3) Command Language
4) A computer and software 4) Natural Language
system that controls a machine 5) Programming Language
5) None of these
Answer: 5
Answer: 4
243. Devices that enter
240. The .......... Settings are information and let you
automatic and standard. communicate with the computer
1) Default are called:
2) CPU 1) Software
3) Peripheral 2) Hardware
4) User-friendly 3) Output Devices
5) None of these 4) Input / Output devices
5) Input Devices
Answer: 1
Answer: 5

244. The speed of which of the


Computer Awareness- Practice following memory chips is faster?
Test 13 1) Not Fixed
2) DRAM
241. Which of the following power 3) SRAM
point view displays each slide of 4) For smaller chips SRAM is
the presentation as a thumbnail and faster
is useful for rearranging slides? 5) For larger chips DRAM is faster

34
248. Which among the following
Answer: 3 is the file extension for Word
Documents?
245. Mahesh Babu has his cute 1) .xls
childhood photos in an album 2) .ppt
which might fade out in a couple 3) .docx
of years, which he wants to show it 4) .worddoc
to his fans by uploading it in his 5) None
twitter account. Which of the
following devices can he use to do Answer: 3
that?
1) Keyboard 249. Linux Operating system is an
2) Mouse example of which of the
3) Printer following?
4) Scanner 1) Freeware
5) None of these 2) Open Source Software
3) Shareware
Answer: 4 4) Complimentary
5) None of these
246. Which of the following is not
a social networking site? Answer: 2
1) WAYN
2) Hi 5 250. A device that connects to a
3) Orkut network without the use of a cable
4) Yahoo is said to be:
5) Facebook 1) Distributed
2) Non-Wired
Answer: 4 3) Centralised
4) Open source
247. In the URL 5) Wireless
https://twitter.com, what does 's'
represent in 'https'? Answer: 5
1) Safe
2) System 251. Which of the following
3) Start-up software applications would be
4) Semantic most appropriate for performing
5) Secured Statistical and Numerical
calculations:
Answer: 5 1) Document Processor
2) Graphics Package II

35
3) Power Point Answer: 2
4) Spreadsheet
5) Meta Processor 255. Chiranjeevi sent a mail to
Pavan Kalyan by putting his email
Answer: 4 address in 'Cc' and to Nagababu by
putting his email address in 'Bcc'.
252. Removing and replacing Which of the following is true
devices without turning off the based on the given scenario?
computer is referred to as: 1) Pavan Kalyan can view the
1) Search Engines email address of Chiranjeevi and
2) Operating System Nagababu
3) Software 2) Nagababu can view the email
4) Resource Locators address of Pavan Kalyan &
5) Plug-n-Play Chiranjeevi
3) Pavan Kalyan can view the
Answer: 5 email address of Nagababu only
4) Both 1 and 2
253. Mr. Prashanth has a song 5) None of them is true
sung by him on the desktop, in the
C drive, and also in the D drive. Answer: 2
This scenario in computer
language is generally referred to 256. When data changes in
as: multiple lists and all lists are not
1) Data Redundancy updated, this causes:
2) Multiple Data Places 1) Data Population Problem
3) Various File Places 2) Data Reduction
4) Data Inconsistency 3) Data Induction
5) Data Independent 4) Data Overload
5) Data Inconsistency
Answer: 1
Answer: 5
254. What is a Firewall?
1) A wall to protect against Fire 257. The legal right to use
2) A software to protect from software based on specific
computer hacker intrusions restrictions is granted via a:
3) A software to destroy computer 1) Software privacy policy
4) A wall to make partitions in 2) Software License
computer 3) Software password manager
5) None of these 4) Software log
5) None of these

36
Answer: 2 261. The common name for
Modulator and Demodulator is:
258. Which of the following is not 1) Modem
an operating system? 2) Joiner
1) Windows 2000 3) Networker
2) DOS 4) Connecter
3) Windows 7 5) Mom-dom
4) Mac Os X Lion
5) Google Answer: 1

262. In order to delete a sentence


Answer: 5 from a document you would use
.......
259. Find the Mis-Matched pair. 1) Highlight and copy
1) Chrome - Google 2) Cut and Paste
2) Opera - Opera Software 3) Copy and Paste
3) Internet Explorer - Microsoft 4) Highlight and Delete
4) Safari - Net Scape 5) Select and Paste
Communications
5) None of these Answer: 4

Answer: 4 263. What is the keyboard shortcut


for Slide Show in Powerpoint ? :
260. What is the full form of 1) F4
RISC? 2) F8
1) Reduced Instruction Set 3) F9
Computing 4) F5
2) Reformed Instruction System 5) F12
Computing
3) Reduced Information System Answer: 4
Computing
4) Restoration of Information in 264. A ...... is a design tool that
System Computing graphically shows the logic in a
5) Reduced Instruction Sect Code solution algorithm.
1) Flow chart
Answer: 1 2) Hierarchy Chart
3) Structure Chart
Computer Awareness- Practice 4) Context Diagram
Test 14 5) None

37
3) Alphabet Coding
Answer: 1 4) Encrography
5) Deptography
265. The justification that aligns
text on both margins of a Answer: 2
document in Word is ......
1) Justify 269. ..... is a type of RAM that
2) Bold stores each bit of data in a separate
3) Centre capacitor within an integrated
4) Right circuit making it an efficient way
5) Balanced to store data in memory.
1) DRAM
Answer: 1 2) PRAM
3) NRAM
266. The Open, Print and Save 4) NORAM
Buttons are all located on the ...... 5) None
1) Status Bar
2) Formatting Toolbar Answer: 1
3) Standard Toolbar
4) Titlebar 270. A computer network that uses
5) Status and Title bars Internet protocol technology to
share information, Operational
Answer: 3 system, within an organization is
usually referred to as
267. SMPS in a computer stands 1) Internet
for? 2) MAN
1) Switched-Mode Power Supply 3) PAN
2) Simple-Mode Power Supply 4) NPN
3) Simple-Mode Power System 5) Intranet
4) Switched-Menu Power Supply Answer: 5
5) None of these
271. What is the symbol for
Answer: 1 attachments in yahoo mail?
1) Envelope
268. The process of transforming 2) Letter A
information using an algorithm to 3) Paper Clip
make it unreadable by anyone is 4) Pen
usually referred to as: 5) None
1) Decryption
2) Encryption

38
Answer: 3 3) Common Business Operated
Language
272. Which of the following 4) Common Business Organized
computers is used in Scientific Language
researches? 5) None of these
1) Super Computers
2) Main Frame Answer: 1
3) Laptop
4) Micro Computers 276. The human readable version
5) None of these of a software program is called:
1) cache
Answer: 1 2) instruction set
3) source code
273. Winzip is an example of : 4) word size
1) Free ware 5) None of these
2) Shareware
3) Open Source Answer: 3
4) Vertical Market Software
5) None 277. Which of the following is not
a programming language with
Answer: 1 Object Oriented Features?
1) COBRA
274. ........... is the science that 2) ABAP
attempts to produce machines that 3) C++
display the same type of 4) C#
intelligence that humans do 5) C
1) Nanoscience
2) Nanotechnology Answer: 5
3) Simulation
4) Artificial intelligence (AI) 278. Which of the following
5) None programming language is favoured
for Artificial Intelligence?
Answer: 4 1) ABAP
2) COBOL
275. COBOL is an acronym for 3) LISP
............. 4) JAVA
1) Common Business Oriented 5) C#
Language
2) Computer Business Oriented Answer: 3
Language
279. The quickest and easiest way

39
in Word, to locate a particular recording medium is–
word or phrase in a document 1. Magnetic tape
1) Replace 2. Compact disk
2) Find 3. Hard disk
3) Lookup 4. All of the above
4) Search 5. None of these
5) None of these
Answer: 1
Answer: 2
283. An E-mail protocol for
280. What symbol is present on the storage, manage-ment and change,
number key '2' on the keyboard? especially in corporate offices–
1) ! 1. Message handling service
2) % 2. Postal service’s
3) ^ 3. Data storage
4) @ 4. All of the above
5) * 5. None of these

Answer: 4 Answer: 1

Computer Awareness- Practice


Test 15 284. Which of the following is an
advantage of stored programs?
1. Reliability
281. A digital communication 2. Reduction in operation costs
system capable of interconnecting, 3. The computers becoming
a large number of computers, general-purpose
terminals and other peripheral 4. All of the above
devices within a limited 5. None of these
geographical area is called–
1. LAN Answer: 1
2. WAN
3. Internet 285. Which of the following is not
4. All of the above true for primary storage?
5. None of these 1. It is a part of the CPU
2. It allows very fast access of data
Answer: 1 3. It is relatively more expensive
then other storage devices.
282. A secondary storage device 4. Can be removed and
that uses a long plastic strip coated
with a magnetic material as a

40
transported. 289. A method whereby messages
5. All of the above to be transmitted between
computers are all sent to a central
Answer: 1 computer, which gathers them and
routes them to the appropriate
286. Function of control unit in the destination(s) is known as–
CPU is– 1. Message switching
1. To decode program instructions 2. Message delete
2. To transfer data to primary 3. Message accept
storage 4. All of the above
3. To perform logical operations 5. None of these
4. To store program instructions
5. All of the above Answer: 1

Answer: 4 290. Which of the following


describe one or more
287. Electronic spreadsheets are characteristics of a modem
useful in situation where relatively computer?
.......... data must be input 1. An electronic device
1. Small 2. A mechanical device
2. Large 3. A electro-mechanical device
3. No 4. All of the above
4. All of the above 5. None of these
5. None is true
Answer: 1
Answer: 1

288. A list of options from which a 291. Combining records from two
program user can select anyone in or more ordered files into a single
order to perform a desired action is ordered file is called–
referred as– 1. Menu
1. Menu 2. Merging
2. Index 3. Taking
3. Directory 4. All of the above
4. All of the above 5. None of these
5. None of these
Answer: 1
Answer: 2
292. The ascending order of a data
hierarchy is

41
1. Bit-byte-record-field-file- 4. Minute
database 5. All of the above
2. Byte-bit-field-record-file-
database Answer: 1
3. Byte-bit-record-file-field-
database 296. Alternate facilities of
4. Bit-byte-field-record-file- programs, data files, hardware
database equipments, etc. used in case the
5. All of the above original one is destroyed, lost, or
fail to operate is–
1. Backup
Answer: 2 2. Forehead
3. Delete
293. A LSI chip contains the entire 4. All of the above
CPU of computer except main 5. None of these
memory is called–
1. Microprocessor Answer: 1
2. Hard disk
3. Input device 297. One-thousandth of a second is
4. Output device called–
5. All of the above 1. Microsecond
2. Millisecond
Answer: 4 3. Hour 4. Minute
5. All of the above
294. A storage medium that loses
its contents in the event of power Answer: 1
failure is called–
1. Volatile storage 298. The CPU (central processing
2. Non volatile storage unit) consists of
3. Permanent storage 1. Input, output, and processing
4. All of the above 2. Control unit, primary storage,
5. None of these and secondary storage
3. Control unit, arithmetic-logic
Answer: 1 unit, and primary storage
4. All of the above
295. One-millionth of a second is 5. None of these
referred as–
1. Microsecond Answer: 2
2. Millisecond
3. Hour 299. The product of data

42
processing is– Answer: 1
1. Data
2. Information 303. Multiprogramming is the–
3. Software 1. The inter-leaved execution of
4. Computer two or more different and
5. All of the above independent programs by the same
computer
Answer: 3 2. The execution of single by the
different computers
300. The input device used by 3. The inter-leaved execution of
computer is– two or more different and
1. Motherboard independent programs by the
2. Central processing unit different computers
3. Keyboard 4. All of the above
4. System unit 5. None of these
5. All of the above
Answer: 2
Answer: 2
304. A facility available in an
Computer Awareness- Practice
operating system that allows
Test 16
multiple functions from the same
application package is referred as–
301. The structure of 1. Multi-threading
interconnecting of nodes of 2. Multi-programming
a computer network is referred as– 3. Multi-processing
1. Network topology 2. Internet 4. All of the above
3. Local Area Network 5. None of these
4. Wide Area Network
5. All of the above Answer: 1

Answer: 3 305. Narrowband channel is a


communication channels–
302. Nible is– 1. That handle low volumes of data
1. Double of byte 2. Used mainly for telegraph lines
2. Half of byte and low
3. Ten times of byte speed terminals
4. Five times of byte 3. Both 1. and 2.
5. All of the above 4. All of the above
5. None of these

43
Answer: 1 Answer: 2

309. The method of dividing a


306. Following is the example of physical channel into many logical
Network– channels so that a number of
1. LAN independent signals may be
2. WAN simultaneously transmitted on it is
3. Internet referred as–
4. All the above 1. Multithreading
5. None of these 2. Multiprocessing
3. Multiplexing
Answer: 4 4. All of the above
5. None of these
307. Peer-to-peer is a description–
1. Of communications between Answer: 2
two dissimilar devices
2. Of communications between 310. An interconnected computer
two equal devices configura-tions or computers with
3. Of communications between two or more independent CPUs
two different devices that have the ability to
4. All of the above simultaneously execute several
5. None of these programs is called–
1. Multithreading
Answer: 4 2. Multiprocessing
3. Multiplexing
308. Non-document files are– 4. All of the above
1. Pure ASCII files that can be 5. None of these
listed for any word processing
software Answer: 3
2. Non ASCII files that can be
listed for any word processing 311. Following is not a non-impact
software printer–
3. Pure ASCII files that can be 1. Thermal printer
listed for specific word processing 2. Ink-jet printer
software 3. Laser printer
4. Non ASCII files that can be 4. Dot-matrix printer
listed for pecific word processing 5. All of the above
software
5. All of the above Answer: 2

44
312. A number system with a base 1. Modulation
of 8 is referred as– 2. Digitization
1. Binary 3. Multiprocessing
2. Decimal 4. All of the above
3. Octal 5. None of these
4. All of the above
5. None of these Answer: 2

Answer: 3 316. Multiprocessor is a computer


system–
313. Devices converts digital 1. Where many CPU under a
signals to Sine waves at the common control
sending end and back to digital 2. Consisting of more than one
signals at the receiving end is input devices under common
called– control
1. Modem 3. Where many output devices
2. Telephone under
3. Mobile phone 4. All of the above
4. All of the above 5. None of these
5. None of these
Answer: 1
Answer: 3
317. The point at which the flow
314. Dividing a project into of text in a document moves to the
segments and smaller units in top of a new page–
order to simplify the analysis, 1. Page break
design and programming effort is 2. Page insert
referred as– 3. Page format
1. Monitoring 4. All of the above
2. Modular approach 5. None of these
3. Microprocessing
4. All of the above Answer: 1
5. None of these
318. Technique to implement
Answer: 1 virtual memory where memory is
divided into units of fixed size
315. The technique where digital memory is–
signals are converted to its analog 1. Paging
form for transmission over an 2. De-fragments
analog facility is called– 3. Segmentation

45
4. All of the above 4. All of the above
5. None of these 5. None of these

Answer: 1 Answer: 1

319. An adder where all the bits of 322. PL 1 (Programming


the two operands are added Language One) is–
simultaneously– 1. High level programming
1. Parallel adder language
2. Half adder 2. Low level programming
3. Full adder language
4. All of the above 3. Machine language
5. None of these 4. Assembly language
5. All of the above
Answer: 1
Answer: 1
320. An extra bit added to a string
of bits that enables the computer to 323. Pascal is–
detect internal errors in the 1. A high-level programming
transmission of binary data– language
1. Parity bit 2. Named after Blaise Pascal
2. Byte 3. Named after mathematician that
3. Nibble facilitates structured programming
4. All of the above techniques
5. None of these 4. All of the above
5. None of these
Answer: 1
Answer: 1

324. Storage device where time to


Computer Awareness- Practice retrieve stored information is
Test 17 independent of address where it is
stored is called–
321. Password is– 1. Random access memory (RAM)
1. Code by which a user gains 2. Primary memory
access to a computer system 3. Secondary memory
2. Pass for viewing movie 4. All of the above
3. Entrance without paying 5. None of these
something

46
Answer: 4 3. Micro second
4. Minute
325. Octal number system has a 5. All of these
base–
1. Two Answer: 1
2. Four
3. Eight 329. Following is of Non-vo a
4. Ten storage device
5. All of the above 1. Magnetic tape
2. Compact disk
Answer: 3 3. Floppy disk
4. All of the above
326. Since input and output 5. None of these
devices are on the edge of the main
processing therefore they are Answer: 1
referred as–
1. Peripheral devices 330. A storage medium that retains
2. Processing devices its contents even in the absence of
3. Personal devices power is referred as–
4. All of the above 1. Non-volatile storage
5. None of these 2. Volatile storage
3. Secondary storage
Answer: 3 4. Primary storage
5. None of these
327. A system changeover method
where complete changeover to the Answer: 4
new system takes place
incrementally over a period of time 331. If a word is typed that is not
is referred as– in Words dictionary, a ___ wavy
1. Phased replacement underline appears below the word.
2. Block replacement (A) red
3. Complete replacement (B) green
4. All of the above (C) blue
5. None of these (D) black
(E) None of these
Answer: 1
Ans (A)
328. One trillionth of a second is–
1. Pico second 332. The _____ button on the
2. Mille second quick access Toolbar allows you to

47
cancel your recent commands or (D) terabyte
actions. (E) None of these
(A) Search
(B) Cut Ans (C)
(C) Document
(D) Undo 336. ______ cells involves
(E) None of these creating a single cell by combining
two or more selected cells.
Ans (D) (A) Formatting
(B) Merging
333. In Excel, any set of characters (C) Embedding
containing a letter , hyphen, or (D) Splitting
space is considered ___ (E) None of these
(A) a formula
(B) text
(C) a name Ans (B)
(D) a title
(E) None of these 337. The operating system is the
most common type of
Ans (B) ______________ software.
(A) communication
334. ________ Software allows (B) application
users to perform calculations on (C) system
rows and columns of data. (D) word-processing
(A) Word processing (E) None of these
(B) Presentation graphics
(C) Database Management Ans (C)
Systems
(D) Electronic Spreadsheet 338. When you quickly press and
(E) None of these releaes the left mouse button twice
, you are ____
Ans (C) (A) Primary-clicking
(B) pointing
(C) Double-clicking
335. A _________ represent (D) Secondary-clicking
approximately one billion memory (E) None of these
locations.
(A) kilobyte Ans (C)
(B) megabyte
(C) gigabyte 339. The horizontal and vertical

48
lines on a worksheet are called ___ ____________ looks for the
(A) cells system files.
(B) sheets A CD
(C) block lines B. BIOS
(D) gridlines C. CPU
(E) None of these D. DVD

Ans (D) AnS (B)

340. To delete an incorrect 343. ____________ are lists of


character in a document, commands that appear on the
__________ to erase to the right of screen.
the insertion point. A GUIs
(A) press the left mouse key B Icons
(B) double-click the right mouse C Menus
key D Windows
(C) press the BACKSPACE key
(D) press the delete key Answer: C
(E) None of these
344. ____________ is the ability
Ans (D) of an operating system to control
the activities of multiple programs
Computer Awareness- Practice at the same time.
Test 18 A Multitasking
B Streamlining
C Multiuser
341. The operating system does all
D Simulcasting
of the following EXCEPT:
A. provide a way for the user to
Answer: A
interact with the computer.
B .manage the central processing
345. The unique signal, generated
unit (CPU).
by a device, that tells the operating
C .manage memory and storage.
system that it is in need of
D. enable users to perform a
immediate attention is called an:
specific task such as document
A action.
editing.
B event.
C interrupt.
Ans (D)
D activity.
342. During the boot process, the
Answer: C

49
C utility program.
346. The operating system controls D special numeric code that
access to the processor by indicates the priority of a request.
assigning a(n) ____________ to
each task requiring the processors Answer: D
attention.
A CPU 350. A spooler is a(n):
B slice of time A location in memory that
C stack maintains the contents of a
D event document until it prints out.
B print job.
Answer: B C program that coordinates the
print jobs that are waiting to print.
347. The blocks of code, included D message sent from the printer to
in the operating system, that the operating system when a print
software applications interact with job is completed.
are known as:
A application programming Answer: C
interfaces (APIs).
B complimentary metal-oxide 351. Virtual memory is typically
conductors (CMOS). located:
C device drivers. A on a floppy disk.
D bootstrap loaders. B in the CPU.
C in a flash card.
Answer: A D on the hard drive.

348. MS-DOS is a ____________ Answer: D


operating system.
A point-and-click 352. The purpose of a swap (or
B user-friendly page) file is to:
C command-driven A maintain pages of documents
D Mac that are being spooled to the
printer.
Answer: C B hold a program’s data or
instructions in virtual memory
349. An interrupt handler is a(n): when it can’t fit in RAM.
A location in memory that keeps C prevent thrashing in a
track of recently generated multitasking environment.
interrupts. D allow multiple print jobs to print
B peripheral device. their pages out simultaneously.

50
B platform.
Answer: B C BIOS.
D CMOS.
353. The definition of thrashing is:
A swapping data between virtual Answer: B
memory and RAM too frequently.
B insufficient hard disk space. 357. The following message
C too many processors being generally means:
managed by the operating system. A a nonsystem floppy has been left
D inaccurate information stored in in the floppy disk drive.
the registry. B the CD drive is not functioning.
C the BIOS is corrupted.
Answer: A D there is a problem loading a
device.
354. All of the following are
TRUE of Safe Mode EXCEPT: Answer: A
A Safe Mode is a special
diagnostic mode. 358. Which of the following is the
B Safe Mode loads all nonessential correct sequence of actions that
icons. takes place during the boot-up
C Safe Mode allows users to process?
troubleshoot errors. A Load operating system ?
D Safe Mode loads only the most Activate BIOS ? Perform POST ?
essential devices. Check configuration settings
B Activate BIOS ? Perform POST
Answer: B ? Load operating system ? Check
configuration settings
355. Verification of a login name C Perform POST ? Load operating
and password is known as: system ? Activate BIOS ? Check
A configuration. configuration settings
B accessibility. D Activate BIOS ? Check
C authentication. configuration settings ? Perform
D logging in. POST ? Load operating system

Answer: C Answer: B

356. The combination of the 359. All of the following are steps
operating system and the processor involved in the boot process
is referred to as the computers: EXCEPT:
A CPU. A load the operating system into

51
RAM. C POST
B the power-on self-test. D ROM
C activate the basic input/output
system (BIOS). Answer: C
D load application programs.
363. The memory resident portion
Answer: D of the operating system is called
the:
360. The ____________, stored on A registry.
a ROM chip, is responsible for B API.
loading the operating system from C CMOS.
its permanent location on the hard D kernel.
drive into RAM.
A BIOS Answer: D
B API
C device driver 364. Which of the following does
D supervisor program NOT occur during the power-on
self-test ?
Answer: A A The ScanDisk utility begins to
run.
Computer Awareness- Practice B The video card and video
Test 19 memory are tested.
C The BIOS identification process
occurs.
361. The basic input/output system
D Memory chips are checked to
(BIOS) is stored in:
ensure they are working properly.
A RAM.
B ROM.
Answer: A
C the CPU.
D the hard drive.
365. All of the following are
TRUE regarding virtual memory
Answer: B
EXCEPT:
A any amount of RAM can be
362. Ensuring that the essential
allocated to virtual memory.
peripheral devices are attached and
B the setting for the amount of
operational is the ____________
hard drive space to allocate to
process.
virtual memory can be manually
A configuration
changed.
B CMOS
C this temporary storage is called
the swap file (or page file).

52
D virtual memory is physical space C Files are stored in RAM.
on the hard drive. D Files should be organized in
folders.
Answer: A
Answer: C
366. The operating system allows
users to organize the 369. Using Windows Explorer, a
computer’s contents in a plus (+) sign in front of a folder
hierarchical structure of directories indicates:
that include all of the following A an open folder.
EXCEPT: B the folder contains subfolders.
A files. C a text file.
B folders. D a graphics file.
D drives.
D systems. Answer: B

Answer: D 370. In Windows XP, if you want


to see the file size and modified
367. All of the following dates of all files in a folder, the
statements concerning windows best viewing option is the
are true EXCEPT: __________ view.
A windows are an example of a A List
command-driven environment. B Thumbnails
B windows can be resized and C Details
repositioned on the desktop. D Icon
C more than one window can be
open at a time. Answer: C
D toolbars and scrollbars are
features of windows. 371. All of the following are
examples of real security and
Answer: A privacy risks EXCEPT:
A. hackers.
368. All of the following B. spam.
statements concerning files are C. viruses.
true EXCEPT: D. identity theft.
A A file is a collection of related
pieces of information stored Answer: B
together for easy reference.
B Files can be generated from an 372. A process known as
application. ____________ is used by large

53
retailers to study trends. C. computer forensics.
A. data mining D. animation.
B. data selection
C. POS Answer: C
D. data conversion
376. Which of the following is
Answer: A NOT one of the four major data
processing functions of a
373. ____________terminals computer?
(formerly known as cash registers) A. gathering data
are often connected to complex B. processing data into information
inventory and sales computer C. analyzing the data or
systems. information
A. Data D. storing the data or information
B. Point-of-sale (POS)
C. Sales Answer: C
D. Query
377. ____________ tags, when
Answer: B placed on an animal, can be used
to record and track in a database
374. A(n) ____________ system is all of the animal’s movements.
a small, wireless handheld A. POS
computer that scans an item’s B. RFID
tag and pulls up the current price C. PPS
(and any special offers) as you D. GPS
shop.
A. PSS Answer: B
B. POS
C. inventory 378. Surgeons can perform
D. data mining delicate operations by
manipulating devices through
Answer: A computers instead of manually.
This technology is known as:
375. The ability to recover and A. robotics.
read deleted or damaged files from B. computer forensics.
a criminal’s computer is an C. simulation.
example of a law enforcement D. forecasting.
specialty called:
A. robotics. Answer: A
B. simulation.

54
379. Technology no longer fashion.
protected by copyright, available A. A process
to everyone, is considered to be: B. Software
A. proprietary. C. Storage
B. open. D. Information
C. experimental.
D. in the public domain. Answer: D

Answer: A 383. The name for the way that


computers manipulate data into
380. ____________ is the study of information is called:
molecules and structures whose A. programming.
size ranges from 1 to 100 B. processing.
nanometers. C. storing.
A. Nanoscience D. organizing.
B. Microelectrodes
C. Computer forensics Answer: B
D. Artificial intelligence
384. Computers gather data,
Answer: A which means that they allow
users to ____________ data.
A. present
Computer Awareness- Practice B. input
Test 20 C. output
D. store
381. ____________ is the
science that attempts to Answer: B
produce machines that display
the same type of intelligence 385. After a picture has been
that humans do. taken with a digital camera and
A. Nanoscience processed appropriately, the
B. Nanotechnology actual print of the picture is
C. Simulation considered:
D. Artificial intelligence (AI) A. data.
B. output.
Answer: D C. input.
D. the process.
382. ____________ is data that
has been organized or Answer: B
presented in a meaningful

55
386. Computers use the
____________ language to 390. A string of eight 0s and 1s
process data. is called a:
A. processing A. megabyte.
B. kilobyte B. byte.
C. binary C. kilobyte.
D. representational D. gigabyte.

Answer: C Answer: B

387. Computers process data 391. A ____________ is


into information by working approximately one billion bytes.
exclusively with: A. kilobyte
A. multimedia. B. bit
B. words. C. gigabyte
C. characters. D. megabyte
D. numbers.
Answer: C
Answer: D
392. A ____________ is
388. In the binary language approximately a million bytes.
each letter of the alphabet, A. gigabyte
each number and each special B. kilobyte
character is made up of a C. megabyte
unique combination of: D. terabyte
A. eight bytes.
B. eight kilobytes. Answer: C
C. eight characters.
D. eight bits. 393. ____________ is any part
of the computer that you can
Answer: D physically touch.
A. Hardware
389. The term bit is short for: B. A device
A. megabyte. C. A peripheral
B. binary language. D. An application
C. binary digit.
D. binary number. Answer: A

Answer: C

56
394. The components that computer, is responsible for
process data are located in the: processing data.
A. input devices. A. motherboard
B. output devices. B. memory
C. system unit. C. RAM
D. storage component. D. central processing unit
(CPU)
Answer: C
Answer: D
395. All of the following are
examples of input devices 399. The CPU and memory are
EXCEPT a: located on the:
A. scanner. A. expansion board.
B. mouse. B. motherboard.
C. keyboard. C. storage device.
D. printer. D. output device.

Answer: D Answer: B

396. Which of the following is 400. Word processing,


an example of an input device? spreadsheet, and photo-editing
A. scanner are examples of:
B. speaker A. application software.
C. CD B. system software.
D. printer C. operating system software.
D. platform software.
Answer: A
Answer: A
397. All of the following are
examples of storage devices
EXCEPT:
A. hard disk drives. Computer Awareness- Practice
B. printers. Test 21
C. floppy disk drives.
D. CD drives. 401. ____________ is a set of
computer programs used on a
Answer: B computer to help perform tasks.
A. An instruction
398. The ____________, also B. Software
called the “brains†of the

57
C. Memory computers connected to a:
D. A processor A. network.
B. mainframe.
Answer: B C. supercomputer.
D. client.
402. System software is the set of
programs that enables your Answer: A
computers hardware devices and
____________ software to work 406. Smaller and less expensive
together. PC-based servers are replacing
A. management ____________ in many
B. processing businesses.
C. utility A. supercomputers
D. application B. clients
C. laptops
Answer: D D. mainframes

403. The PC (personal computer) Answer: D


and the Apple Macintosh are
examples of two different: 407. ____________ are specially
A. platforms. designed computers that perform
B. applications. complex calculations extremely
C. programs. rapidly.
D. storage devices. A. Servers
B. Supercomputers
Answer: A C. Laptops
D. Mainframes
404. Apple Macintoshes (Macs)
and PCs use different Answer: B
____________ to process data and
different operating systems. 408. DSL is an example of a(n)
A. languages ____________ connection.
B. methods A. network
C. CPUs B. wireless
D. storage devices C. slow
D. broadband
Answer: C
Answer: D
405. Servers are computers that
provide resources to other 409. The difference between

58
people with access to computers C. One thousand
and the Internet and those without D. One million
this access is known as the:
A. digital divide. Answer: A
B. Internet divide.
C. Web divide. 413. The binary language consists
D. broadband divide. of ____________ digit(s).
A. 8
Answer: A B. 2
C. 1,000
410. ____________ is the science D. 1
revolving around the use of nano
structures to build devices on an Answer: B
extremely small scale.
A. Nanotechnology 414. A byte can hold one
B. Micro-technology ____________ of data.
C. Computer forensics A. bit
D. Artificial intelligence B. binary digit
C. character
Answer: A D. kilobyte

411. Which of the following is the Answer: C


correct order of the four major
functions of a computer? 415. ____________ controls the
A. Process A Output A Input A way in which the computer system
Storage functions and provides a means by
B. InputA Output A Process A which users can interact with the
Storage computer.
C. Process A Storage A Input A A. The platform
Output B. The operating system
D. Input A Process A Output A C. Application software
Storage D. The motherboard

Answer: D Answer: B

412. ____________ bits equal one 416. The operating system is the
byte. most common type of
A. Eight ____________ software.
B. Two A. communication
B. application

59
C. system computer is the:
D. word-processing software A. system unit.
B. CPU.
Answer: C C. mainframe.
D. platform.
417. ____________ are specially
designed computer chips that Answer: A
reside inside other devices, such as
your car or your electronic Computer Awareness- Practice
thermostat. Test 22
A. Servers
B. Embedded computers
421. The earliest calculating
C. Robotic computers
devices are?
D. Mainframes
a) Clock
b) Difference Engine
Answer: B
c) Abacus
d) Calculator
418. The steps and tasks needed to
process data, such as responses to
questions or clicking an icon, are Answer: c
called:
A. instructions. 422. The basic operations
B. the operating system. performed by a computer are?
C. application software. a) Arithmetic Operations
D. the system unit. b) Logical Operations
c) Storage and relative
Answer: A d) All of the above
419. The two broad categories of Answer: d
software are:
A. word processing and 423. The man who built the first
spreadsheet. Mec-hanical Calculator was?
B. transaction and application. a) Joseph Marie Jacquard
C. Windows and Mac OS. b) John Mauchly
D. system and application. c) Blaise Pascal
d) Harward Ailken
Answer: D
Answer: c
420. The metal or plastic case that
holds all the physical parts of the 424. Punched cards were first

60
introduced by? a) Equation Editor
a) Powers b) Organization Chart
b) Pascal c) Photo Album
c) Jacquard d) All of these
d) Herman Hollerith
Answer: d
Answer: d
429. The first network that planted
425. LSTs(Large Integration) used the seeds of Internet was?
in? a) ARPANET
a) First generation b) NSF net
b) Second generation c) V net
c) Third generation d) I net
d) Fourth generation
Answer: a
Answer: d
430. Abbreviation www in
426. What is MS Word? www.yahoo.com, stands for?
a) A game a) World Word in Wonder
b) An Operating System b) World Wide Web
c) Word Processing Software c) World Web is Widening
d) Typing tutor software d) Wonderful World Web

Answer: c Answer: b

427. MS Excel is a? 431. What is Active Desktop?


a) Window based word processor a) A term that is synonymous with
package viewing your desktop as a web
b) Window based spreadsheet page
package b) A feature to customize your
c) DOS based spreadsheet package desktop to display informat-ion
d) Window based accounting you can update from the Internet.
package c) Both (a) and (b) above
mentioned.
d) Software
Answer: b
Answer: c
428. Power Point can display date
from which of the following add-in 432. Active Window means?
software of MS-Office? a) The active window is designated

61
by a different color toolbar than Answer: d
other open windows.
b) The window that currently open 436. A dialog box is a one?
c) Both (a) and (b) above a) Which is a sort of on-screen
mentioned from where you can fill in the
d) The window that is last used blanks, make selections from lists
and chose various combinations of
Answer: c options and settings.
b) In which you can connect to
433. A bitmap is? another Internet user and establish
a) Is a format which windows use an audio and video contact using
for desktop wallpaper? Microsoft Word.
b) A graphic file format made up c) In which you can give verbal
of small dots. commands to Microsoft Word
c) A specific kind of bitmap file menu
with the BMP extention. d) All of the above
d) All of the above.
Answer: a
Answer: d
437. A letter, memo, proposal or
434. Which of the following other file that is created using
printers generates character from a Microso-ft Word is called as?
grid? a) Master
a) Inkjet b) Slide
b) Laser c) Document
c) Daisy wheel d) Worksheet
d) Dot matrix
Answer: c
Answer: d
438. The meaning of double-click
435. Close Button? is?
a) When clicked will close the a) Pushing and releasing the main
dialog box, document or program mouse button twice in rapid
displayed in the window. succession when the on-tree mouse
b) Is located at the right top end of pointer is positioned over the
the title bar of most Win-dows. desired item
c) Implies for the small button b) Appearance of an icon
with an X on it c) To take a selection from the
d) All of the above document and move it to the

62
clipboard d) COBOL
d) All of the above
Answer: d
Answer: a
443. For Scientific work the most
popular language is?
439. A folder: (A) is an a) PASCAL
organizational tool used to store b) FORTRON
files.(B) is synonymous with c) COBOL
directory, but folder is the newer d) PROLOG
preferred term (C)contains data?
Answer: b
a) A only
b) B only 444. Which is not the portable
c) C only computer?
d) None of the above a) Micro-processor
b) Calculator
Answer: d c) Series Computes
d) Parallel Computers
440. Commercially produced first Answer: d
computer?
a) IBM 445. OBJECT ORIENTED language is?
b) MIPS a) ADA
c) UNIVAC b) PROLOG
c) PASCAL
d) EDSAC
d) FORTRAN
Answer: c Answer: a

446. Information is?


a) Summarization process of data
b) Data Information
441. Banks and other big organizations c) Textual form of data
requiring large data storage use? d) Facts and figures
a) Laptop PC's
b) Desktop PC's Answer: a
c) Mainframe Computer
d) Workstation 447. Total memory of system can be
known using?
Answer: c a) DIR commands
b) MEM commands
442. High Level Language useful for the c) Warm boot
beginners is? d) TOT MEM commands
a) BASIC
b) PASCAL Answer: b
c) FORTRON

63
453. Semi Conductor Memory is known
448. For running WINDOW minimum as?
disk free space required is? a) RAM
a) 8 MB b) ROM
b) 10 MB c) PROM
c) 16 MB d) EPROM
d) 32 MB
Answer: a
Answer: a
454. In which generation computers IC
449. The first graphical web browser have been used?
are? a) First
a) Gopher b) Second
b) WAIS c) Third
c) CERN d) Fourth
d) Mosaic
Answer: c
Answer: d
455. High level language is?
450. The programs used to view web a) Machine Independent
pages are called? b) Machine dependent
a) Clients c) (a) And (b) are true
b) Server d) (a) And (b) are false
c) Browser
d) Programmer Answer: a

Answer: c 456. Hypertext is?


a) Text stored in the memory of the
451. FTP means? computer
a) File Transfer Protocol b) Text displayed on the screen of the
b) File Telnet Protocol computer
c) Fast Track Processing c) Special text used in developing
d) Fine Tunning programs Internet developing package
d) A system of managing textual
Answer: a Information by creating associations
between different documents
452. Which among the following is
faster than Main Memory? Answer: d
a) RAM
b) ROM 457. Information on a computer is sto-
c) Cache red in the form of?
d) None of the above a) Files
b) Folders
Answer: c c) Directory
d) Data dictionary

64
Answer: a 462. In computer science, by
Informa-tion we mean?
458. TCP is?
a) Any output coming out from
a) Transfer control protocol
b) Transfer control process computer
c) Transmission control protocol b) A report printed by computer
d) Transmission control process c) Processed data put in intelligent
form
Answer: c d) Plural of data
459. Every computer on the Internet is
known as? Answer: c
a) Host 463. Which of the following are
b) Client parts of the CPU?
c) Modem a) Secondary Memory
d) Server b) Control unit
c) Input device
Answer: a
d) Printer
460. Fax machines are used to send
documents through a? Answer: b
a) Telephone line
b) Modems 464. The purpose of an application
c) Co-axial Wire program is to?
d) All of these
a) Meet specific user needs
Answer: a b) Make equivalent run better
c) Allow the operating system to
control resources better
Computer Awareness- Practice d) Convert program written in
Test 24 high-level language to machine
level language
461.The term overflow means? Answer: a
a) An excess of Internal storage
b) An excess of external storage 465. Micro computers are?
c) A situation where record cannot a) 8 bit
fit in to its right place b) 16 bit
d) A device, which controls the c) 32 bit
level of humidity in the computer d) Either 8 or 16 bit
room.
Answer: d
Answer: a

65
466. Computer uses information from you by falsifying
the_________number system to their identity.
store data and perform (A) Phishing
calculations. (B) Computer viruses
(A) binary (C) Spyware scams
(B) octal (D) Viruses
(C) decimal (E) None of the above
(D) hexadecimal
(E) None of these
Ans : (A)
Ans : (A)
470. Part number, part description,
467. A disk's content that is and number of parts ordered are
recorded at the time of examples of__________
manufacture and that cannot be (A) control
changed or erased by the user (B) output
is_______________ (C) processing
(A) Memory-only (D) feedback
(B) Write-only (E) input
(C) Once-only
(D) Run-only
(E) Read-only Ans : (E)

Ans : (E) 471. A Web site's main page is


called its______________
468. Which of the following can (A) Home Page
be used to select the entire (B) Browser Page
document ? (C) Search Page
(A) CTRL+A (D) Bookmark
(B) ALT+F5 (E) None of these
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H Ans : (A)

472. The simultaneous processing


Ans : (A) of two or more programs by
multiple
469.___________are 'attempts by Processors is_____________
individuals to obtain confidential (A) multiprogramming
(B) multitasking
(C) time-sharing

66
(D) multiprocessing are being given for free.
(E) None of these (C) Sharing copyrighted files
without permission breaks
copyright laws.
Ans : (D) (D) It is not unethical because the
files are being given for free.
(E) It is not unethical-anyone can
473. Codes consisting of lines of access a computer
varying widths or lengths that are
computer-readable are known
as____________ Ans : (C)
(A) an ASCII code
(B) a magnetic tape 476. Reusable optical storage will
(C) an OCR scanner typica1ly have the
(D) a bar code acronym__________
(E) None of these (A) CO
(B) DVD
(C) ROM
Ans : (D) (D) RW
(E) ROS
474. To instruct Word to fit the
width of a column to the contents
of a table Ans : (D)
automatically, click the button and
then point to AutoFit Contents. 477. The most common type of
(A) Fit to Form storage devices are__________
(B) Format (A) persistent
(C) Autosize (B) optical
(D) Contents (C) magnetic
(E) AutoFit (D) flash
(E) steel

Ans : (E)
Ans : (D)
475. Why is it unethical to share
copyrighted files with your friends
? 478. A device that connects to a
(A) It is not unethical, because it is network without the use of cables
legal. is said to be_________
(B) It is unethical because the files (A) distributed
(B) free

67
(C) centralized Reasoning
(D) open source Computer Awareness
General Knowledge
(E) None of these
Latest Jobs
Model Papers
English
Ans : (B) Quiz

479. A person who used his or her


expertise to gain access to other Home
people's computers to get Aptitude
Reasoning
information illegally or do damage
Computer Awareness
is a______________ General Knowledge
(A) hacker Model Papers
(B) analyst Forum
(C) instant messenger Chat Box
(D) programmer Twitter Facebook Feedburner Google
+1 youtube flickr
(E) spammer
Home » Computer Awareness »
Computer Awareness- Practice Test 25
Ans : (A) Computer Awareness- Practice Test 25

480. To access properties of an 481. To change selected text to all


object, the mouse technique to use capital letters, click the change case
is__________________ button, then click___________
(A) dragging
(A) UPPERCASE
(B) dropping (B) UPPER ALL
(C) right-clicking (C) CAPS LOCK
(D) shift-clicking (D) Lock Upper
(E) None of these (E) Large Size

Ans : (A)
Ans : (C)
482. The basic unit of a worksheet into
which you enter data in Excel is called
Banking Materials
a______________
For Banking Materials Subscribe here
(A) tab
Email:
(B) cell
Today Jobs :
(C) box
Some Modifications In LIC Notification
(D) range
Thursday, May 09, 2013
(E) None of these
home
Ans : (B)
Aptitude

68
Ans : (A)

483. You can keep your personal files / 487.____________.is the process of
folders in____________________ dividing the disk into tracks and sectors.
(A) My folder (A) Tracking
(B) My Documents (B) Formatting
(C) My Files (C) Crashing
(D) My Text (D) Allotting
(E) None of these (E) None of these

Ans : (B) Ans : (B)

484. In Word you can force a page 488. Help Menu is available at which
break____________ button ?
(A) By positioning your cursor at the (A) End
appropriate place and pressing the F1 (B) Staft
key (C) Turnoff
(B) By positioning your cursor at the (D) Restart
appropriate place and pressing (E) Reboot
Ctrl+Enter
(C) By using the Insert/Section Break Ans : (B)
(D) By changing the font size of your
document 489. The contents of____________are
(E) None of these lost when the computer turns off.
(A) storage
Ans : (B) (B) input
(C) output
485. The default view in Excel (D) memory
is___________view. (E) None of these
(A) Work
(B) Auto Ans : (D)
(C) Normal
(D) Roman 490. When you save to this, your data
(E) None of these will remain intact even when the
computer is turned off________
Ans : (C)
(A) RAM
486. The process of transferring files (B) Motherboard
from a computer on the Internet to your (C) Secondary storage device
computer is called___________ (D) Primary storage device
(A) downloading (E) None of these
(B) uploading Ans : (C)
(C) FTP
(D) JPEC 491. A central computer that holds
(E) downsizing collections of data and programs for

69
many PCs, workstations, and other (A) BUS
computers is a(n)_________ (B) CPU
(A) supercomputer (C) USB
(B) minicomputer (D) MIDI
(C) laptop (E) MINI
(D) server
(E) None of these Ans : (C)

Ans : (D) 496. You can__________a search by


providing more information the search
492. The_________folder retains copies engine can use to select a smaller, more
of messages that you have started but are useful set of results.
not yet ready to send. (A) refine
(B) expand
(A) Drafts (C) load
(B) Outbox (D) query
(C) Address Book (E) slowdown
(D) Sent Items
(E) Inbox Ans : (A)

Ans : (B) 497. What is the permanent memory


built into your computer called ?
493. Grouping and processing all of a (A) RAM
firm's transactions at one time is (B) Floppy
called_________ (C) CPU
(A) a database management system (D) CO-ROM
(B) batch processing (E) ROM
(C) a real-time system
(D) an on-line system Ans : (E)
(E) None of these

Ans : (B) 498. What displays the contents of the


active cell in Excel ?
494. The___________enables you to (A) Name box
simultaneously keep multiple Web pages (B) Row Headings
open in one browser window. (C) Formula bar
(A) tab box (D) Task pane
(B) pop-up helper (E) None of these
(C) tab row
(D) address bar Ans : (A)
(E) Esc key
499. The piece of hardware that converts
Ans : (C) your computer's digital signal to an
analog signal that can travel over
495. Which ports connect special types telephone lines is called a_______
of music instruments to sound cards ? (A) red wire

70
(B) blue cord (E) Refresh
(C) tower
(D) modem Ans : (E)
(E) None of these
503. This first step in the
Ans : (D)
transaction processing cycle
500. Video processors consist captures business data through
of________and________, which store various modes such as optical
and process images. scanning or at an electronic
(A) CPU and VGA commerce website__________
(B) CPU and memory
(A) Document and report
(C) VGA and memory
(D) VGI and DVI generation
(E) None of these (B) Database maintenance
(C) Transaction processing startup
Ans : (C) (D) Data Entry
(E) None of these
Computer Awareness- Practice
Test 26 Ans : (D)

504. A(n)_____________is a
501. If you want to connect to your
special visual and audio effect
own computer through the Internet
applied in Power-point to text or
from another location, you can
content.
use_________
(A) animation
(A) e-mail
(B) flash
(B) FTP
(C) wipe
(C) instant message
(D) dissolve
(D) Telnet
(E) None of these
(E) None of these

Ans : (A)
Ans : (D)
505. When the pointer is
502. To reload a Web page, press
positioned on a__________it is
the___________.button.
shaped like a hand.
(A) Redo
(A) grammar error
(B) Reload
(B) Formatting error
(C) Restore
(C) Screen Tip
(D) Ctrl
(D) Spelling error

71
(E) hyperlink
509. Which of, the following is a
Ans : (E) storage device that uses rigid,
permanently installed magnetic
506. A______________is the term disks to store
used when a search engine returns data/information__________
a Web page that matches the (A) floppy diskette
search criteria. (B) hard disk
(A) blog (C) permanent disk
(B) hit (D) optical disk
(C) link (E) None of these
(D) view
(E) success Ans : (B)

Ans : (E) 510. The computer abbreviation


KB usually means___________
507. ___________are words that a (A) Key Block
programming language has set (B) Kernel Boot
aside for its own use. (C) Key Byte
(A) Control words (D) Kit Bit
(B) Control structures (E) Kilo Byte
(C) Reserved words
(D) Reserved keys
(E) None of these Ans : (E)

Ans : (C) 511. What is the process of


copying software programs from
508. Mobile Commerce is best secondary storage media to the
described as___________ hard disk called?
(A) The use of Kiosks in (A) Configuration
marketing (B) Download
(B) Transporting products (C) Storage
(C) Buying and selling (D) Upload
goods/services through wireless (E) Installation
handheld devices
(D) Using notebook PC's in
marketing Ans : (D)
(E) None of the above
512. In Excel____________allows
users to bring together copies of
Ans : (C)

72
work-books that other users have
worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these

Ans : (B)

513. Which of the following are


advantages of CD-ROM as a
storage media?
(A) CD-ROM is an inexpensive
way to store large, amount of data
and information
(B) CD-ROM disks retrieve data
and information more quickly than
magnetic disks do
(C) CD-ROMs make less errors
than magnetic media
(D) An of the above
(E) None of these

Ans : (D)

514. A DVD is an example of a(n)


______________
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

73

You might also like