Computer Awareness 50 Sets
Computer Awareness 50 Sets
Computer Awareness
1. Each process must be waiting for a resource 3. The language used in a computer that is
which is being held by another process, which in similar to the language of humans and is easy to
turn is waiting for the first process to release the understand is referred to as _______.
resource. then it is called as____ A. Source Code
A. Non preemptive B. Machine Language
B. Mutual exclusion C. High Level Language
C. Partial allocation D. Object Code
D. Circular wait E. Assembly language
E. None of these Answer: C
Answer: D A programming language such as FORTRAN or
Circular wait Pascal that enables a programmer to write
-> Each process must be waiting for a resource programs that are more or less independent of a
which is being held by another process, which in particular type of computer. Such languages are
turn is waiting for the first process to release the considered high-level because they are closer to
resource. human languages and further from machine
languages.
2. Which memory appears to exist as main
storage although most of it is supported by data 4. Which operator returns the rows in the first
held in secondary storage? query that are not present in the second query?
A. Core memory A. Union
B. Virtual memory B. Intersect
C. RAM C. Union all
D. Dynamic memory D. Minus
E. None of the above E. None of these
Answer: B Answer: D
Virtual Memory is the memory that appears to Minus operator
exist as main storage although most of it is ->Minus operator returns the rows in the first
supported by data held in secondary storage, query that are not present in the second query.
transfer between the two being made ->First eliminate duplicate query and then
automatically as required. completely eliminate second query.
ECHO is a command typically used in shell Multiple choice examination answer sheets can
scripts and batch files to output status text to the be evaluated automatically by Optical Mark
screen or a file, or as a source part of a pipeline Reader.
10. __________is used to quickly accept, store, 12. Which one of the following file contains a
and transfer data and instructions that are being Predefined style that can be used for a
used immediately by the CPU. presentation?
A. Processor A. Task bar
B. Data Bus B. Template
C. Cache C. CSS
D. Register D. Menu bar
E. Stack E. None of these
Answer: D Answer: B
Register is used to quickly accept, store, and Template
transfer data and instructions that are being used -> File contains readymade style that can be
immediately by the CPU. used for a presentation is called as Template.
There are various types of Registers that are
used for various purpose. 13. Which one of the following is a small disk
Some Registers named as AC or Accumulator, storage device that today typically has about 1.4
Data Register or DR, the AR or Address Megabytes of memory capacity?
Register, program counter (PC), Memory Data A. CD drive
Register (MDR) ,Index register, Memory Buffer B. Floppy drive
Register. C. Hard disk drive
D. All of these
11. Multiple choice examination answer sheets E. None of These
can be evaluated automatically by _______ Answer: B
A. Optical character recognitions Floppy drive
B. Optical character reader ->A floppy is a small disk storage device that
C. Optical Mark reader today typically has about 1.4 Megabytes of
D. Magnetic tape reader memory capacity.
E. None of these
Answer: C 14. _____ is a restriction (or) condition which is
applied on the column of the table to have data
correctness
characterized as follows: "A name indicates what 20. Among which of the following does the delay
we seek. An address indicates where it is that occur during the playback of a stream known
as?
18. A software program used to monitor the A. Stream delay
traffic in a network and hackers may use the B. Playback delay
sniffed data to access important confidential data C. Jitter
is called _________. D. Event delay
A. Mail bomb E. Both A & C
B. Spam Answer: C
C. Sniffers Jitter is the delay that occurs during the playback
D. Cookies of a stream.
E. None of These
Answer: C 21. The difference between memory and storage
Sniffers is that memory is _____ and storage is _______
-> A software program used to monitor the traffic A. Temporary, permanent
in a network. B. Permanent, temporary
-> The hackers may use the sniffed data to C. Slow, Fast
access important confidential data D. All the above
E. Large, Small
19. A ________ computer is a large and Answer: A
expensive computer capable of simultaneously Memory is temporarily saving the data and
processing data for hundreds or thousands for Storage is to save the data permanently.
users.
A. server 22. When we specify more than one value in
B. mainframe where clause then we use ______ condition.
C. desktop A. In condition
D. tablet B. Like condition
E. None of these C. Isnull condition
Answer: B D. Between and condition
A mainframe computer is a large and expensive E. None of these
computer capable of simultaneously processing Answer: A
data for hundreds or thousands for users. In condition
->When we specify more than one value in
where clause then we use In condition.
Computer Awareness
1. Today’s computer giant IBM was earlier 3. _______ is a web server that collects data from
known by different name which was changes in other web servers and puts it into a database
1924. What was that name? (much like an index), it provides links to pages
A.Tabulator Machine Co. that contain the object of your search.
B.Computing Tabulating Recording Co. A.Search Engine
C.The Tabulator Ltd. B.Browser
D.International Computer Ltd. C.FTP
E.None of these D.HTTP
Answer: B E.None of these
It was founded in 1911 in Endicott, New York, as Answer: A
the Computing-Tabulating-Recording Company Search Engine is a web server that collects data
(CTR) and was renamed "International Business from other web servers and puts it into a
Machines" in 1924. IBM is incorporated in New database (much like an index), it provides links to
York and has operations in over 170 countries pages that contain the object of your search.
used by one person at a time. It is usually because they are closer to human languages
characterized by relatively low cost and small and further from machine languages.
physical size.
25. Which memory appears to exist as main
24. Which among the following is a language storage although most of it is supported by data
used in a computer that is very similar to the held in secondary storage?
language of humans and is easy to understand? A. Core memory
A. Source Code B. Virtual memory
B. Machine Language C. RAM
C. High Level Language D. Dynamic memory
D. Object Code E. None of the above
E. Assembly language Answer: B
Answer: C Virtual Memory is the memory that appears to
A high-level language is a programming exist as main storage although most of it is
language such as C, FORTRAN, or Pascal that supported by data held in secondary storage,
enables a programmer to write programs that are transfer between the two being made
independent of any specific type of computer. automatically as required.
Such languages are considered high-level
Computer Awareness
1. Registers which are partially visible to users 3. Name the type of memory which clears
and used to hold conditional codes (bits set by everything when the power of a computer gets
the CPU hardware as the result of operations), switched off.
are known as _______. A.Volatile
A.PC B.Non-volatile
B.Flags C.ROM
C.Memory Address Registers D.Pen Drive
D.General Purpose Registers E.Google Drive
E.None of these Answer: A
Answer: B Volatile memory is a type of memory that clears
Registers which are partially visible to users and everything when the power of a computer gets
used to hold conditional codes(bits set by the switched off, whereas nonvolatile memory retains
CPU) hardware as the result of operations), are the data even when the power gets switched off.
known as Flags. Moreover, ROM and flash memory also retain
the data in case the power gets switched off.
2) Which feature helps to search the text through
reference material such as dictionaries, 4.Which mechanism that permits new classes to
encyclopedias and translation services? be created out of existing classes by extending
A.Translation and refining its capabilities?
B.Research A.Encapsulation
C.Find B.Inheritance
D.Font C.Class
E.Table D.Data hiding
Answer: B E.None of these
In the Research Option dialog box, you can Answer: B
select from dictionaries, thesauruses, and Inheritance
various Internet research Web sites in several -> Inheritance is the mechanism that permits new
languages. The Research Options services classes to be created out of existing classes by
available depend on the language of the version extending and refining its capabilities.
of Office and any services that we add to the
Research Options dialog box.
17. Which among the following is a utility 19. While studying DBMS, we many came
program that will clean the disk space by across the term SQL, What does ‘S’ represents?
fragmenting and rearranging data to utilize the A.Study
space properly? B. Sequence
A.Disk Space Utility C.Steady
D.Structured B.Printer
E.None of these C.Video card
Answer: D D.Motherboard
Explanation: E.Interface
SQL --> Structured Query Language Answer: E
In computing, an interface is a shared boundary
20. Which language is directly understood by the across which two or more separate components
computer without a translation Program? of a computer system exchange information. The
A.Machine language exchange can be between software, computer
B.C# Language hardware, peripheral devices, humans, and
C.High level language combinations of these.
D.C language
E.None of these 23.___________ is a secret computer program
Answer: A designed to provide continued access to a
Machine language is directly understood by the computer while actively hiding its presence.
computer without translation Program. A.Botnet
B.Phishing
21. Most of the commonly used personal C.Key logger
computers/laptops do not have a command key D.Rootkit
known as ______. E.Adware
A.Turnover Answer: D
B.Shift A rootkit is a secret computer program designed
C.Alter to provide continued access to a computer while
D.Delete actively hiding its presence. Rootkits are
E.Ctrl associated with malware such as Trojans,
Answer: A worms, viruses.
Explanation: Botnet is a set of networks connected
Most of the commonly used personal computers/devices that are used for malicious
computers/laptops do not have a command key purposes. Each computer in a botnet is called
known as Turn over Bot. It is also known as Zombie.
22. Which part of the hardware compensates the 24.____________is a technical standard for
difference between the CPU and peripherals? accessing information over a mobile wireless
A.Scanner network.
Computer Awareness
purpose register. For example, when a program battery backup power during a power outage
is interrupted its state, ie: the value of the UPS
registers such as the program counter,
instruction register or memory address register - 7. In Windows operating system after you
may be saved into the general purpose registers, double-click a character on the grid of
ready for recall when the program is ready to characters, keyboard shortcut SPACEBAR is
start again. used for _____
A.Move to the first character
5. You should create a(n) _____ unprotected to B.Move to the last character
prevent others from changing the worksheet from C.Switch between Enlarged and Normal mode
protected data when a character is selected
A.Access code D.Delete the character
B.Password E.None of these
C.Key Answer: C
D.Secret mark In Windows operating system after you double-
E.None of these click a character on the grid of characters,
Answer: B keyboard shortcut SPACEBAR is used for Switch
Explanation: between Enlarged and Normal mode when a
You should create a Password unprotected to character is selected
prevent others from changing the worksheet from
protected data. 8. Which button is called as middle button used
as third mouse button by pressing on it?
6. A is a device that not only provides surge A.Right button
protection, but also furnishes your computer with B.Scroll wheel
battery backup power during a power C.Select
outage________ D.Cursor
A.USB E.None of these
B.UPS Answer: B
C.URC The scroll wheel is called as middle button used
D.Battery Strip as the third mouse button by pressing on it.
E.None of these
Answer: B 9. The process is to check and ensure the
A is a device that not only provides surge components of the computer are operating and
protection, but also furnishes your computer with connected properly is known as ______
A.Repairing
B. Checking 12. Which one is used to combine all the object
C.Paring files and convert them into a final executable
D.Booting program?
E.None of these A.Loader
Answer: D B.Compiler
Booting is the process to check and ensure the C.Linker
components of the computer are operating and D.Assembler
connected properly E.None of These
Answer: C
10. Which of the following identifies a specific Linker
web page and its computer on the Web? ->It is used to combine all the object files and
A.Web site convert them into a final executable program.
B.Web site address
C.URL 13. Which one of the following gives you the
D.Domain Name ability to put a lot of information into one cell
E.None of these without spilling over into an adjacent cell?
Answer: D A.Merged cell
A domain name is a unique name that identifies B.Cell references
a website. Each website has a domain name that C.Wrapper Text
serves as an address, which is used to access D.All of these
the website. A domain name is used for finding E.None of These
and identifying computers on the Internet. Answer: C
Wrapper Text
11. Raw, unprocessed facts, including text, ->It gives you the ability to put a lot of information
numbers, images, and sounds, are called ______ in to one cell without spilling over in to an
A.applets adjacent cell.
B.data
C.metaware 14. Which among the following contains the
D.product temporary data such as function parameters,
E.script return address and local variables?
Answer: B A.Heap
Raw, unprocessed facts, including text, numbers, B.Stack
images, and sounds, are called Data. C.Data
D.Text
E.Register 16. Which are the following keys are used to
Answer: B runs a Thesaurus check on the selected word?
The process Stack contains the temporary data A.Shift + A
such as method/function parameters, return B.Shift + Y
address and local variable. C.Shift + F7
A process is basically a program in execution. A D.Shift + F3
process is defined as an entity which represents E.None of these
the basic unit of work to be implemented in the
system. Answer: C
A process can be divided into four sections ─ Shift + F7 is the key to run a thesaurus check on
stack, heap, text and data. the selected word.
15. Which of the following can be termed as end- 17. Which of the following is a specification for a
user programs that enable the user to complete set of communication protocols to standardize
tasks such as creating documents, spreadsheets the way that wireless devices, such as cellular
etc? telephones and radio transceivers, can be used
A.System Software for Internet access, including e-mail, the World
B.Web browser Wide Web, newsgroups, and instant messaging?
C.Hyperlinks A.LDAP
D.Application software B.WAP
E.None of the above C.WEP
Answer: D D.SNMP
Application software, or simply applications, are E.All of the above
often called productivity programs or end-user Answer: B
programs because they enable the user to Wireless Application Protocol (WAP) is a
complete tasks such as creating documents, technical standard for accessing information over
spreadsheets, databases, and publications, a mobile wireless network. A WAP browser is a
doing online research, sending email, designing web browser for mobile devices such as mobile
graphics, running businesses, and even playing phones that uses the protocol.
games. Application software is specific to the
task it is designed for and can be as simple as a 18. Which among the following need to be
calculator application or as complex as a word refreshed frequently to maintain the data?
processing application. A.SRAM
Margins refer to the blank white areas near the 24. The blank white area near the edges of every
edges of a page. Every page has top, bottom, left page in a Word document is known as a
and right margins. The area surrounded by these ________.
four margins where you write, edit, and format A.Cut mark
the text is known as the text area. Therefore, if B.Margin
you increase or decrease the margin of a page, C.New area
you get less or more space for writing text. D.Gutter
E.Indent
23.In the Network Layer, Data is transferred in Answer: B
the form of _________ through the logical network Margins refer to the blank white areas near the
path. edges of a page. Every page has top, bottom, left
A.Layers and right margins. The area surrounded by these
B.Datagrams four margins where you write, edit, and format
C.Segments the text is known as the text area. Therefore, if
D.Frames you increase or decrease the margin of a page,
E.Packets you get less or more space for writing text.
Answer: E
Data is transferred in the form of Packets via 25. Which one is used to combine all the object
logical network paths in an ordered format files and convert them into a final executable
controlled by the network layer. program?
The network layer is the third level of the Open A.Loader
Systems Interconnection Model (OSI Model) and B.Compiler
the layer that provides data routing paths for C.Linker
network communication. D.Assembler
Network layer protocols exist in every host or E.None of These
router. The router examines the header fields of Answer: C
all the IP packets that pass through it. Linker
->It is used to combine all the object files and
convert them into a final executable program.
Computer Awareness
The name of the display feature highlighting the 7. The technique that extends storage capacities
screen which requires operator attention is of main memory beyond the actual size of the
known as reverse video. Reverse video or the main memory is called _______
reverse screen is the computer display technique A.Additional storage
that inverts the values of background and text B.Extra storage
colour. C.Virtual storage
D.Stimulated storage
5. The indirect change of the values of a E.None of these
variablein one module by another module is Answer:C
called _______. The technique that extends storage capacities of
A.Internal change main memory beyond the actual size of the main
B.Inter-module change memory is called Virtual storage.
C.Side effect
D.All the above 8. Optimized for dial-up connections over noisy
E.None of these telephone lines, the oldest packet-switching
Answer: C protocol for WANusage, called _______________,
Explanation: is still widely used.
The indirect change of the values of a variable in A.Cat - 5
one module by another module is called a side B.Cat- 6
effect. C.X.25
6. Which of the following element will convert D.Ethernet
high-level language into machine-level E.None of these
language? Answer: C
A.Translator Optimized for dial-up connections over noisy
B.Assembler telephone lines, the oldest packet-switching
C.Transmitter protocol for WANusage, called X.25 is still widely
D.Compiler used
E.None of these
Answer: D 9. ______ type of program controls the various
The Compiler will convert high-level language computer parts and allows the user to interact
into machine-level language. with the computer
A.Application Software
B.Utility software
C.Middleware
In Microsoft PowerPoint, you can quickly and process in terms that will enable its effective
easily copy animations from one object to installation, commissioning, operation, control
another using the Animation Painter. The Format and maintenance
Painter is used when you want to copy text and
paragraph formatting, select an entire paragraph, 17. MS DOS is a very popular operating system
including the paragraph mark. used by many around the world. It was
developed by ____________
15. Which among the following was the first A.Apple Inc
general purpose electronic computer? B.Microsoft
A.ENIAC C.Tata Consultancy Services
B.UNIVAC D.IBM
C.EDSAC E.None of the above
D.Pascal Answer: B
E.EDVAC MS-DOS is a discontinued operating system for
Answer: A x86-based personal computers mostly developed
ENIAC (Electronic Numerical Integrator and by Microsoft. Collectively, MS-DOS, its
Computer) was the first electronic general- rebranding as IBM PC DOS, and some operating
purpose computer. It was Turing-complete, systems attempting to be compatible with MS-
digital, and capable of being reprogrammed to DOS, are sometimes referred to as "DOS" (which
solve "a large class of numerical problems" is also the generic acronym for disk operating
system). MS-DOS was the main operating
16. A set of information that defines the status of system for IBM PC compatible personal
resources allocated to a process is computers during the 1980s and the early 1990s,
_____________. when it was gradually superseded by operating
A.Process control systems offering a graphical user interface (GUI),
B.ALU in various generations of the graphical Microsoft
C.Register Unit Windows operating system.
D.Process description
E.None of these 18. ______ terminals (formerly known as cash
Answer: D registers) are often connected to complex
A set of information that defines the status of inventory and sales computer systems.
resources allocated to a process of process A.Data
description. A process description is a set of B.Point-of-sale (POS)
information that describes the characteristics of a C.Sales
Computer Awareness
1. In most of the IBM PCs, the CPU, the device shows them the current price and various offers
drivers, memory, expansion slots and active that may be associated with that product.
components are mounted on a single board.
What is the name of the board? 3. The diamond (rhombus) symbol in the
A. Motherboard flowchart is used for which among the following
B. Daughterboard purposes?
C. Bredboard A.Start and end
D. Fatherboard B.Subroutines
E.None of the above C.Input/ Output
Answer: A D.Labelled connectors
A motherboard (also called mainboard, main E.Conditional or decisional
circuit board, system board, baseboard, planar Answer: E
board, logic board, and mobo) is the main printed Conditional or decision is represented as a
circuit board (PCB) in general-purpose diamond (rhombus) showing where a decision is
computers and other expandable systems. necessary, commonly a Yes/No question or
True/False test. The conditional symbol is
2. This system is a small, wireless handheld peculiar in that it has two arrows coming out of it,
computer that scans the tag of the item and pulls usually from the bottom point and right point, one
up the current price (and any special offers) as corresponding to Yes or True, and one
you shop. corresponding to No or False.
A.PSS
B.POS 4. Registers which are partially visible to users
C.Inventory and used to hold conditional codes (bits set by
D.Data mining the CPU hardware as the result of operations),
E.None of these are known as ___________.
Answer: A A.PC
Personal Shopping System or PSS is a handheld B.Flags
device that is given to customers shopping in a C.Memory Address Registers
self-service retail market instead of a shopping D.General Purpose Registers
cart or a trolley. This device is installed with a E.None of these
customer-friendly interface program or software Answer: B
that scans the price tags on the products and
Registers which are partially visible to users and continues for a specific length. The major
used to hold conditional codes(bits set by the disadvantageof unpaged cache is that _______.
CPU) hardware as the result of operations), are A.it allows cache domain to contain redundant
known as Flags data
B.it does not allow writes to be cached
5. Which one acts as a centralised connection to C.its access time is greater than that ofpaged
several computers with the central node or caching
server? D.read ahead cache domain blocks are
A.Ethernet necessarily fixed in size
B.Ring E.None of these
C.Hub Answer: A
D.Bridge An unpaged cache associates disk domains with
E.None of these the address of the read and continuesfor a
Answer: C specific length. The major disadvantageof
Hub is like a repeater with multiple ports used to unpaged cache is that it allows cache domain to
connect the network channels. contain redundant data
It acts as a centralised connection to several
computers with the central node or server. 8. To find a saved document in the computer’s
memory and bring it up on the screen to view
6. Which one of the following cashless approach _______.
is used to pay for goods and services? A.Reverse
A.Internet banking B. Rerun
B.Electronic fund transfer C.Retrieve
C.E-Marketing D. Return
D.E-services E.None of these
E.None of These Answer: C
Answer: B To find a saved document in the computer’s
Electronic fund transfer (EFT) memory and bring it up on the screen to view is
-> A cashless approach is used to pay for goods know as Retrive.
and services.
9. To read the system messages and warnings,
7. An unpaged cache associates disk access in Windows, Which of the following files
domainswith the address of the read and should be checked?
A.System manager
of using it is that a hexadecimal digit represents 21.Which of the following is the most important
a nibble which is one half of a byte which has powerful computer in a typical network?
range from 00 to FF where F is 15 in decimal A.Desktop
system. B.Network server
C.Network hub
19. A typical university or corporate LAN that D.Network client
includes one or more servers and clients is E.None of these
called a____ Answer: B
A.Master slave network The most important powerful computer in a
B.Peer-to-peer typical network is Network server.
C.Client server network
D.LAN 22. Which among the following options is the line
E.None of these that describes the contents of the message while
Answer: C sending an e-mail?
A typical university or corporate LAN that A.BCC
includes one or more servers and clients is called B.to
a Client server network. C.subject
D.cc
20. Which one is an Optical disk storage medium E.None of these
designed to recapture the data normally in DVD Answer: C
format? Subject line in short describes content of an e-
A.Compact Disk mail.
B.Digital Video Disk
C.Blue-ray Disk 23.API is a code that allows two software
D.Floppy Disk programs to communicate with each other. What
E.None of these does ‘A’ mean in API?
Answer: C A.Automatic
Blue-ray Disk is an Optical disk storage medium B.Advanced
designed to recapture the data normally in DVD C.Application
format and it contains 25 GB(23.31 GB) per layer D.Address
space. E.Asynchronous
है और इसमें प्रति परि स्थान 25 जीबी (23.31 जीबी) है। Answer: C
Application Program Interface is an abbreviation
of API. It is a code that allows two software
Computer Awareness
B.Mutual exclusion
20. If there are features of both the analog and C.Hold and wait
digital computer in a system it is called D.Circular wait
as__________. E.None of these
A.Digi log computer Answer: C
B.Hybrid computer Hold and wait or resource holding
C.Mini computer A process is currently holding at least one
D.Super computer resource and requesting additional resources
E.None of the above which are being held by other processes.
Answer: B
Hybrid computers are those which have features 23.For cold booting of your Personal Computer,
of both digital computer and analog computer. which among the following will be used?
These types of computers can be found in A.Root Disc
geological departments for survey and analysis B.Sub-prime Disc
purposes C.Primary Disc
D.Secondary Disc
21. If you wished to limit what you would see on E.None of the above
an Excel worksheet, what data function would Answer: E
you use? A system boot disk is a floppy disk which allows
A.Conditional format your computer to boot into an operating system
B.Filter such as DOS. Examples include the DOS
C.Data analysis installation disk and the Windows 95/98/Me
D.Sort startup disk.
E.None of these
Answer: B 24. The ability to recover and read deleted or
If you wished to limit what you would see on an damaged files from a criminal’s computer is an
Excel worksheet, what data function would you example of a law enforcement speciality called
use filter. _________________.
A.Robotics
22. Which process is currently holding at least B.Simulation
one resource and requesting additional C.Computer forensics
resources which are being held by other D.Animation
processes? E.None of these
A.Non preemptive Answer: C
25.Multi-user systems provide cost savings for mostly of just a display monitor and a keyboard (and
small business as they use a single processing perhaps a mouse as well). It has no internal CPU
(central processing unit), and thus has little or no
unit to link several ______.
processing power.
A.Personal computers
B.Workstations
Computer Awareness
1. __________are the attempts by individuals to 3. In which process, each program is split into
obtain confidential information from you by fixed-size program components called pages?
falsifying their identity. A. Multitasking
A. Phishing B. Logging on
B. Computer viruses C. Paging
C. Spyware scams D. Scheduling
D. Viruses E. Time-Sharing
E. None of the above Answer: C
Answer: A Paging is a process in which each program is
Phishing is a type of Internet fraud scam where split into fixed-size program components called
the scammer sends email messages that appear pages. Some pages of it are loaded in the main
to be from financial institutions or credit card memory, depending upon the storage availability
companies that try to trick recipients into giving and requirement to execute a program.
private information (i.e., username, password,
account number, etc.). 4. Which process is currently holding at least one
resource and requesting additional resources
2. The section of the CPU that selects, interprets which are being held by other processes?
and sees to the execution of program A. Non preemptive
instructions is ____________. B. Mutual exclusion
A. Memory C. Hold and wait
B. Register unit D. Circular wait
C. Control unit E. None of these
D.ALU Answer: C
E. None of the above Hold and wait or resource holding
Answer: C A process is currently holding at least one
The control unit (CU) is a component of a resource and requesting additional resources
computer's central processing unit (CPU) that which are being held by other processes.
directs the operation of the processor. It tells the
computer's memory, arithmetic/logic unit and 5. A database ______ is procedural code that is
input and output devices on how to respond to a automatically executed in response to certain
program's instructions. events on a particular table in a database?
A.Constraints
search engines for results. Sufficient data is 17. What is the term given to software that has
gathered, formatted by their ranks and presented so many features that it requires considerable
to the users. disk space and memory resources to run?
Examples include Savvysearch engine and A.Spyware
Metaseek engine. B.Freeware
C.Bloatware
15. Which of the following is a widely-used D.Adware
programming language for working with E.Delaware
relational databases? Answer: C
A.Assembly Language Software comes to be known as Bloatware when
B.Structured Query Language it becomes so unwieldy that its functionality is
C.Data-Oriented Language drowned out by its useless features. This is also
D.Wolfram Language known as software bloat.
E.None of the above
Answer: B 18. Which one is add functionality to your
SQL stands for Structured Query Language. SQL computer or help your computer perform better?
lets you access and manipulate databases. SQL A.Operating system
became a standard of the American National B.Utility programs
Standards Institute (ANSI) in 1986, and of the C. Patch
International Organization for Standardization D.Virtual memory
(ISO) in 1987. E.None of these
Answer: B
16. The Software tools that enable a user to Explanation:
interact with a computer for specific purposes are Utility programs, commonly referred to as just
known as ______________. "utilities," are software programs that add
A.Hardware functionality to your computer or help your
B.Networked Software computer perform better.
C.Shareware
D.Applications 19. Which is a piece of code intentionally
E.None of these inserted in to a computer’s memory that will set
Answer: D off a malicious function when specified
The Software tools that enable a user to interact conditions are met?
with a computer for specific purposes are known A.Proxy server
as Application. B.Time bomb
24.Which number system is commonly used as a 25. A language used in a computer that is similar
shortcut notation for groups of our binary digits? to the languages of humans and is easy to
A.Binary understand is referred to as___.
B.Decimal A.Source code
C.Octal B.Machine Language
D.Hexadecimal C.High Level Language
E.None of these D.Object Code
Answer: D E.Assembly Language
For representing binary digits, the hexadecimal Answer: C
notation is used commonly. Another advantage Programs written in a high-level language must
of using it is that a hexadecimal digit represents be translated into machine language by a
a nibble which is one half of a byte which has compiler or interpreter.
Computer Awareness
1. Which among the following is the reboot 3. When a real-time telephone call between
where the power to the system is physically people is made over the Internet using
turned off and back on again, causing an initial computers, it is called ___________.
boot of the machine? A.A chat session
A.Toggle B.An E-mail
B.Cold booting C.An instant message
C.Warm booting D.Internet telephony
D.Logging off E.None of these
E.None of these Answer: D
Answer: B An Internet telephony service provider (ITSP)
Reboots can be either cold (alternatively known offers digital telecommunications services based
as hard) where the power to the system is on Voice over Internet Protocol (VoIP) that are
physically turned off and back on again, causing provisioned via the Internet.
an initial boot of the machine, or warm
(alternatively known as soft) where the system 4. The computer uses which of the following
restarts without the need to interrupt the power. system to store data and perform calculation?
A.Decimal
2. Which is the command used to remove text or B.Hexadecimal
graphics from a document and the information is C.Octal
then stored on a clipboard so you can paste it D.Binary
later on? E.None of these
A.Cut Answer: D
B.Clip All the datas, which are stored and performed for
C.Chop calculation for system are stored as Binary.
D.Chew
E.Chunk 5. If we are inserting a header and footer in a
Answer: A document, the main objective behind that
The Office Clipboard stores text and graphics is_____________.
that you copy or cut from anywhere, and it lets A.Formatting a document
you paste the stored items into any other Office B.Allowing header and footer to appear on the
file. document when printed
C.Enabling header and footer to identify the 7. What is the term used for studies of the rules
document for forming admissible steps of an algorithm?
D.Enabling header and footer to modify the A.Syntax
document B.Programming structure
E.None of the above C.Programming language
Answer: B D.Logic
Headers and footers are areas in the top and E.None of these
bottom margins of each page in a document. You Answer: A
can add, edit, or delete headers and footers Syntax is the set of those procedures which
when your document is in print layout view or contain specific rules so that an instruction or a
publishing layout view. You can add page sentence can be comprehended in a meaningful
numbers, the time and date, a company logo, the manner.
document title or file name, or the author's name
to a header or footer. 8. SRAM retains data as long as power is
provided to the memory chip and need not be
6. The principle that Internet service providers refreshed periodically. What does ‘S’ represent?
should enable access to all content and A.Stagnant
applications equally regardless of the source is B.Storage
known as ______________. C.Simple
A.Net Servicing D.Static
B.Net Equality E.None of these
C.Net Neutrality Answer: D
D.Fair Usage Policy SRAM retains data as long as power is provided
E.None of these to the memory chip and need not be refreshed
Answer: C periodically. SRAM stands for Static Random
Net neutrality is the principle that Internet service Access Memory.
providers and governments regulating most of
the Internet must treat all data on the Internet the 9. What is the term used for an application which
same, and not discriminate or charge combines the features of more than different
differentially by user, content, website, platform, applications?
application, type of attached equipment, or A.Integrated software
method of communication. B.A suite
C.A combo package
D.High-end
Computer Awareness
1. Which among the following is a cloud 3. ___________is a low-level code that defines
computing platform and infrastructure created by how a microprocessor should function when it
Microsoft? executes machine-language instructions.
A.Simple Storage Service A.Micro code
B.Atmos B.Mini code
C.Openstack Swift C.Small Code
D.OceanStore D.Primary Code
E.Azure E.Alpha Code
Answer: E Answer: A
Microsoft is a cloud computing platform and Microcode is low-level code that defines how a
infrastructure created by Microsoft for building, microprocessor should function when it executes
deploying, and managing applications and machine-language instructions. Typically, one
services through a global network of Microsoft- machine-language instruction translates into
managed data centers. Azure was announced in several microcode instructions.
October 2008 and released on 1 February 2010
as Windows Azure, before being renamed to 4. At least one resource must be held in a non-
Microsoft Azure on 25 March 2014. shareable mode. Otherwise, the processes
would not be prevented from using the resource
2. The ability to recover and read deleted or when necessary is known as ________
damaged files from a criminal’s computer is an A.Non preemptive
example of a law enforcement speciality called B.Mutual exclusion
________________. C.Partial allocation
A.Robotics D.Circular wait
B.Simulation E.None of these
C.Computer forensics Answer: B
D.Animation Mutual exclusion
E.None of these ->At least one resource must be held in a non-
Answer: C shareable mode. Otherwise, the processes
Computer forensics is the application of would not be prevented from using the resource
scientifically proven methods to gather, process, when necessary. Only one process can use the
interpret, and to use digital evidence to provide a resource at any given instant of time.
conclusive description of cyber- crime activities.
email, FAX, and video or voice conferencing write operation till the data is made available or
services in order to collaborate. written at the desired location?
A.Response time
10. Who among the following is known as 'Father B.Access time
of Modern Computer Science'? C.Average time
A.Charles Babbage D.Waiting time
B.Alan Turing E.None of these
C.John Von Neumann Answer: B
D.JP Eckert Access time
E.JW Mauchly ->It is the time required between the desired
Answer: B mode for a read or write operation till the data is
Alan Turing is considered by many to be the made available or written at the desired location.
father of modern computer science as the world
knows it. He formed the concept of the 13. Once you load the suitable program and
algorithms and computations with one of his provide the required data, the computer does not
inventions, the Turing machine. Alan Turing was need human intervention. This feature is known
born on June 23, 1912 in England, the son of as _________________.
Julius and Sara Turing. A.Accuracy
B.Reliability
11.The second generation computer which was C.Versatility
built by transistors was built by D.Automatic
________________. E.None of the above
A.Oxford University Answer: D
B.Stanford University Once you load a suitable program and provide
C.ETH Zurich the required data, the computer does not need
D.University of Manchester "human intervention". This feature is called as
E.Harvard University "Automatic".
Answer: D
The second generation computer was built at 14. In Microsoft PowerPoint two kinds of sound
University of Manchester. effects files that can be added to the
presentation are___________&____________
12. Which one of the following is the time respectively.
required between the desired mode for a read or A..wav files and .midi files
B..wav files and .gif files
analyze the data to come out with different working properly before starting the remainder of
conclusions. the boot process.
24. The process of checking all the peripheral 25. Which among the following options is the
units by the OS during the time of booting is application that combines text, sound, graphics,
known as_____ motion video, and/ or animation?
A.BIOS A.Multimedia
B.POST B.Minimedias
C.BUS C.Videoscapes
D.Chkdsk D.Motionware
E.None of these E.Maxomedia
Answer: B Answer: A
POST (Power on Self-Test) is a test the Multimedia is content that uses a combination of
computer must complete to verify all hardware is different content forms such as text, audio,
images, animation, video and interactive content.
Computer Awareness
1. Which of the following is a windows utility 3. Which of the following is the type of software
program that locates and eliminates unnecessary that controls the internal operations of the
fragments and rearranges filed and unused disk computer and controls how the computer works
space to optimize operations? with all its parts?
A.Backup A.Shareware
B.Disk cleanup B.Public domain software
C.Disk defragmenter C.Application software
D.Restore D.Operating system software
E.None of these E.None of these
Answer: C Explanation
Disk Defragmenter is a utility in Microsoft Answer: D
Windows designed to increase access speed by An operating system (OS) is a program or
rearranging files stored on a disk to occupy software that manages and coordinates the
contiguous storage locations, a technique called functions of all the components of a computer. It
defragmentation. also acts as an interface between the user and
the hardware of a computer.
2. Which type of software is distributed free but
requires the users to pay some amount for 4. Which one of the following function display all
further use among the following mentioned the not null values in the specific column?
options? A.Distinct
A.Freeware B.Count
B.Shareware C.Order by
C.Rental ware D.Dual
D.Public-domain software E.None of These
E.Abandon ware Answer: B
Answer: B Count function
Among the following mentioned options ->Count function in SQL returns the number of
shareware is a type of software is distributed free values.
but requires the users to pay some amount for ->Count function counts all the not null values in
further use. the specific column.
5. Which of the following Microsoft products is 7. The software which uses a pattern-matching
used to send and receive emails? technique to understand and find out harmful
A.Access elements in all the files in the disk is known as
B.Power point __________.
C.Outlook A.Anti-virus software
D.Web font B.Assisted software
E.Web access C.Software maxis
Answer: C D.Software diagram
Microsoft Outlook is used to send & receive E.Software patch
messages. It is personal information manager Answer: A
from Microsoft. It includes a calendar, task Antivirus or anti-virus software (often abbreviated
manager, contact manager, note taking, journal, as AV), sometimes known as anti-malware
and web browsing. software, is computer software used to prevent,
detect and remove malicious software. Antivirus
6. Every device on the internet has a unique ____ software was originally developed to detect and
address that identifies it in the same way that a remove computer viruses, hence the name.
street address identifies the location of a house. However, with the proliferation of other kinds of
A.DH malware, antivirus software started to provide
B.DA protection from other computer threats.
C.IP
D.IA 8. Each process must be waiting for a resource
E.None of these which is being held by another process, which in
Answer: C turn is waiting for the first process to release the
An Internet Protocol address (IP address) is a resource, then it is called as____
numerical label assigned to each device (e.g., A.Non preemptive
Computer, printer) participating in a Computer B.Mutual exclusion
network that uses the Internet Protocol for C.Partial allocation
communication. D.Circular wait
An IP address serves two principal functions: E.None of these
host or network interface identification and Answer: D
location addressing. Its role has been Circular wait
characterized as follows: "A name indicates what -> Each process must be waiting for a resource
we seek. An address indicates where it is which is being held by another process, which in
(or move) to secondary storage (disk) and make cable Internet, DSL is one of the most popular
that memory available to other processes. ways ISPs provide broadband Internet access.
->At some later time, the system swaps back the
process from the secondary 16. If in a computer, 16 bits are used to specify
storage to main memory. address in a RAM, the number of addresses will
be ______________.
14. In which of the topology all the nodes A.216
attached in a circular wiring arrangement? B.65,536
A.Star topology C.64K
B.Bus topology D.Any of the above
C.Network topology E.None of the above
D.Ring topology Answer: D
E.Mesh topology If, in a computer, 16 bits are used to specify
Answer: D addresses in a RAM, the number of addresses
A ring topology is a network configuration in will be Any of the above
which device connections create a circular data In computing, a memory address is a reference
path. Each networked device is connected to two to a specific memory location used at various
others, like points on a circle. Together, devices levels by software and hardware. Memory
in a ring topology are referred to as a ring addresses are fixed-length sequences of digits
network. conventionally displayed and manipulated as
unsigned integers. Such numerical semantic
15. If internet services are provided by bases itself upon features of CPU (such as the
transmitting data over the wires of the telephone instruction pointer and incremental address
network, which of the following is used? registers), as well upon use of the memory like
A.Anodes an array endorsed by various programming
B.Digital Subscriber Line languages.
C.Digital Anodes
D.Wireless Diodes 17. Which of the following is a program in which
E.Wires malicious or harmful code is contained inside
Answer: B apparently harmless programming or data in
DSL (Digital Subscriber Line) is a such a way that it can get control and do its
communications medium used to transfer digital chosen form of damage, such as ruining the file
signals over standard telephone lines. Along with allocation table on your hard disk?
A. Logic Bomb
Computer Awareness
1. Which feature helps to search the text through The most commonly used toggle key is the caps
reference material such as dictionaries, lock key, which alternates the letter keys
encyclopedias and translation services? between uppercase and lowercase.
A. Translation
B. Research 3. Which of the following feature of Excel allows
C. Find you to create small charts that you can insert in
D. Font individual cells?
E. Table A. Sparkline
Answer: B B. Slicer
In the Research Option dialog box, you can C. Macro
select from dictionaries, thesauruses, and D. All of the above
various Internet research Web sites in several E. None of these
languages. The Research Options services Answer: A
available depend on the language of the version Spark lines are mini charts that you can place
of Office and any services that we add to the inside a cell of a worksheet to represent
Research Options dialog box. numerical data. They also allow you to quickly
recognise time-based trends or variants in data.
2. If the Keyboard keys alter their status from
one state to another when they pressed, those 4. What should be minimum requirement of
kinds of keys are called ___________. random access memory (RAM) for internet
A. Toggle Keys access?
B. Function Keys A. 8KB
C. Modifier Keys B. 32MB
D. Alphanumeric Keys C. 16MB
E. There is no such key D. 64KB
Answer: A E. None of these
A toggle key toggles the input from other keys on Answer: B
the keyboard between different input modes. 32MB is the minimum requirement of random
A toggle key can also be used as an accessibility access memory for internal access
option to alternate the input mode of keys.
5. Any communication between memory and 7. The process of writing computer instructions in
ALU of a computer is performed by which among a programming language is known as ____.
the following? A. Coding
A. Electronic Bus B. Algorithming
B. Universal Serial Bus C. Processing
C. Control Unit D. File
D. Memory Bus E. Instructioning
E. All of the Above Answer: A
Answer: C A programming language is a formal constructed
The Control Unit (CU) is a component of a language designed to communicate instructions
computer's central processing unit (CPU) that to a machine, particularly a computer. The
directs the operation of the processor. process of writing computer instructions in a
It tells the computer's memory, arithmetic/logic programming language is known as coding.
unit and input and output devices how to respond
to a program's instructions. 8. _____ is a restriction (or) condition which is
It is also responsible for communication between applied on the column of the table to have data
the memory unit and ALU. correctness
A. Constraints
6. Any source program on a computer is written B. Literals
with the help of which among the following C. Alias
languages? D. Concatenation
A. Assembly language E. None of these
B. Source code Answer: A
C. HTML Constraints
D. High Level Language -> it is a restriction (or) condition which is applied
E. Machine Language to the column of the table to have data
Answer: D correctness.
A high-level language is a programming
language such as C, FORTRAN, or Pascal that 9. An area of the microprocessor chip used to
enables a programmer to write programs that are temporarily store instructions and data that the
more or less independent of a particular type of processor is likely to use frequently is termed
computer. Such languages are considered high- a(n) ___________________.
level because they are closer to human A.ALU
languages and further from machine languages. B. Bus
-> The database must remain in a consistent other network services over the traditional
state after any transaction. No transaction should circuits of the public switched telephone network.
have any adverse effect on the data residing in The main feature of ISDN is that it can integrate
the database. speech and data on the same lines, which were
not available in the classic telephone system.
14. Which of the following is responsible to
convert digital signals to analogous and vice 16. What type of control pins are needed in a
versa for the transmission and connection of microprocessor to regulate traffic on the bus, in
computers? order to prevent two devices from trying to use it
A.CPU at the same time?
B.USB A. Bus control
C.MODEM B. Interrupts
D. Network C. Bus arbitration
E.ALU D. Status
Answer: C E. None of the above
Explanation: Answer: C
MODEM is responsible to convert digital signal to Bus Arbitration will control pins which needed in
analogous and vice versa for the transmission a microprocessor to regulate traffic. Explanation:
and connection of computer When a bus needs to access master control and
leaves it and passes the control to another bus.
15. A set of communication standards for
simultaneous digital transmission of voice, video, 17. The prime area of application of this
data, and other network services is known as language entails is the learning environment.
__________. This language was not really developed to be
A.WAN used for anything other than teaching students
B. HTTP the basics of programming. Name the language.
C.ISDN A.MATLAB
D.LAN B. Visual basic
E.WAP C. C++
Answer: C D. Pascal
Integrated services digital network (ISDN) is a E. None of these
set of communication standards for simultaneous Answer: D
digital transmission of voice, video, data, and Pascal is a general-purpose, high-level language
that was originally developed by Niklaus Wirth in
18. Changing desktop wallpaper is a simple task 21. Which operator returns the rows in the first
which can be accessed through ________ section query that are not present in the second query?
of all control panel items. A. Union
A. Personalize B. Intersect
B. Image C. Union all
C. Graphics D. Minus
D. Windows E. None of these
E. None of these Answer: D
Answer: A Minus operator
Wallpapers can be changed by the personalize Minus operator returns the rows in the first query
section of all control panel items. that are not present in the second query. First
eliminate duplicate query and then completely
19. By using which of the following key, the eliminate second query.
exciting document can be saved under another
name in Microsoft word? 22. Which one of the following will remove all
A. file records from a table, including all spaces
B. tool allocated for the records are removed?
C. save A. Drop
D. Save as B. Delete
E. None of these C. Truncate
Answer: D D. All of these
The exciting document can be saved in another E. None of These
name in Microsoft word by using Save as. Answer: C
Truncate
20. Which one of the following domains is used -> Remove all records from a table, including all
by Non-Profit Organisation? spaces allocated for the records are removed.
A. com
B. gov 23.What is the name of Google's optical head-
C. org mounted display designed in the shape of a pair
D. edu of eyeglasses?
Computer Awareness
1. Which among the following term is used for 3. Which of the following is any malicious
those hardware devices that are not part of the computer program which is used to hack into a
main computer system and are often added later computer by misleading users of its true intent?
to the system? A. Worm
A. Clip art B. Spyware
B. Highlight C. Trojan horse
C. Execute D. Keylogger
D. Peripheral E.VGA file
E. None of these Answer: C
Answer: D In computing, Trojan horse, or Trojan, is any
A peripheral device is generally defined as any malicious computer program which is used to
auxiliary device such as a computer mouse or hack into a computer by misleading users of its
keyboard that connects to and works with the true intent.
computer in some way.
4. To make a notebook act as desktop as a
2. Name the type of memory which clears desktop model, the notebook can be connected
everything when the power of a computer gets to a ________ which is connected to a monitor
switched off. and other devices.
A. Volatile A.bay
B. Non-volatile B. docking station
C.ROM C. port
D. Flash memory D. network
E. None of these E. None of these
Answer: A Answer: B
Volatile memory is a type of memory that clears To make a notebook act as desktop as a desktop
everything when the power of a computer gets model, the notebook can be connected to a
switched off, whereas nonvolatile memory retains docking station, it can be connected to a
the data even when the power gets switched off. monitor and other devices.
Moreover, ROM and flash memory also retain
the data in case the power gets switched off. 5. An auto responder is a type of computer
_______on mail server that automatically replies
to e-mails?
Computer Awareness
1. The key that is used in case you want to make 3. Which number system is commonly used as a
the letters bold without using the Shift key even shortcut notation for groups of our binary digits?
once is__________. A. Binary
A. Ctrl B. Decimal
B. Alt + Del C. Octal
C. Caps Lock D. Hexadecimal
D. Num Lock E. None of these
E. Alt + Del + Num Lock Answer: D
Answer: C For representing binary digits, the hexadecimal
In case you want to make all the characters in notation is used commonly. Another advantage
the sentence in capitals and you do not want to of using it is that a hexadecimal digit represents
use the Shift key in the keyboard in that case you a nibble which is one half of a byte which has
can use the Caps Lock option so that you do not range from 00 to FF where F is 15 in decimal
have to go for the Shift option every single time. system.
2. Which of the following is a device that 4. By using which of the following key, the
separates two or more network segments within exciting document can be saved in another name
one logical network? in the Microsoft word?
A. Router A. file
B. Bridge B. tool
C. Switch C. save
D. Hub D. Save as
E. LAN E. None of these
Answer: B Answer: D
A bridge is a device that separates two or more The exciting document can be saved in another
network segments within one logical network name in the Microsoft word by using Save as.
(e.g. a single IP-subnet). It is usually placed
between two separate groups of computers that 5. Which among the following transfers
talk with each other, but not that much with the information to and fro with respect to the
computers in the other group. processor?
A. Address Bus
B. Memory Bus
A program that converts a high-level language UPS is a device that not only provides surge
source file into a machine-language file is called protection, but also furnishes your computer with
a Compiler. battery backup power during a power outage.
20. Which among the following reports all the 22. Which process check to ensure the
errors of the program along with the line components of the computer are operating and
numbers? connected properly?
A. Assembler A. Booting
B. Compiler B. Processing
C. Interpreter C. Saving
D. Linker D. Editing
E. Loader E. None of these
Answer: B Answer: A
Compiler converts the program in a high-level Booting is a startup sequence that starts the
language into low-level language and reports all operating system of a computer when it is turned
the errors of the program along with the line on. A boot sequence is the initial set of
numbers. C, C++ use compilers. operations that the computer performs when it is
Interpreter converts the programs in a high-level switched on. Every computer has a boot
language to low-level language. It translates line sequence. The average computer doesn’t
by line and reports the error once after understand the boot sequence but is important to
completing the translation process. know for customizing and troubleshooting your
computer.
21. __________ is a device that not only provides
surge protection, but also furnishes your 23.Inside a GIF image, which among the
computer with battery backup power during a following is a small program that is often
power outage. embedded?
A.USB A. Web browsers
B.UPS B. Web bugs
C.URC C. Web fragments
D. Battery Strip D. Web sites
E. None of these E. Web pages
Answer: B Answer: B
Web bug or web beacon is a file object that can
be used in order to track the user behaviour.
Unlike a cookie which can either be accepted or GRANT - It is used to provide any user access
rejected by a user, this cannot be accepted or privileges or other privileges for the database.
rejected by the user. Rather it appears as REVOKE - It is used to take back permissions
another file object inside a GIF image or for that from any user.
matter as another GIF image itself
25.Which among the following is the software
24.Which among the following is a command of that is used to create text-based documents in
the Data Control Language, a subdivision of your computer?
Structured Query Language? A. Excel
A. Truncate B. Word Processors
B. Rename C. Word Functions
C. Update D. Word Files
D. Select E. Word Illustrations
E. Revoke Answer: B
Answer: E A word processor is an electronic device or
Data Control Language (DCL) is used to control computer software application that performs the
privileges in Database. Grant and Revoke task of composing, editing, formatting, and
commands are used in the Data Control printing of documents. It is not to be mistaken for
Language. a text editor, which does not save any formatting
in each document.
Computer Awareness
5. The analytical engine developed during the Compiler converts the program in a high-level
first generation of computers used __________ as language into low-level language and reports all
a memory unit. the errors of the program along with the line
A.RAM numbers. C, C++ use compilers.
B.Floppies Interpreter converts the programs in a high-level
C.Cards language to low-level language. It translates line
D.Counter wheels by line and reports the error once after
E.None of these completing the translation process.
Answer: D
The analytical engine developed during first 8. Laser printer can print ___ pages of text per
generation of computers used counter wheels as minute and their resolution ranges from
a memory unit. ______dpi
A.5-25, 400-1300
6. Which of the following include the file name B.5-25, 400-1200
and possibly a directory of folders? C.5-24, 400-1200
A.File directory D.5-25, 500-1300
B.Information packet E.None of these
C.File specification Answer: C
D.File extension Laser printer can print 5-24 pages of text per
E.None of these minute and their resolution ranges from 400-
Answer: A 1200 dpi.
A directory is a file system cataloging structure
which contains references to other computer 9. Which among the following term is used for
files, and possibly other directories. those hardware devices that are not part of the
main computer system and are often added later
7. Which among the following reports all the to the system?
errors of the program along with the line A.Clip art
numbers? B.Highlight
A.Assembler C.Execute
B.Compiler D.Peripheral
C.Interpreter E.None of these
D.Linker Answer: D
E.Loader A peripheral device is generally defined as any
Answer: B auxiliary device such as a computer mouse or
and performing specific functions. The A digital plotter is a computer output device
application software requires various supporting which draws curves and other computer graphics
files and folder which help in running of the data on ordinary
software. Various examples of application
software are MS Word, accounting software Tally 17. A __________ is one of thousands of
etc. programs that can invade computer and perform
a variety of functions ranging from annoying
15. The main components of a computer (e.g., popping up messages as a joke) to
communicate with each other through which dangerous (e.g., deleting files or destroying your
among the following? hard disk).
A.Universal Port A.MS Access
B.Private Bus B.MS Word
C.System Bus C.Antivirus
D.Universal Bus D.Computer Virus
E.Traffic Bus E.None of these
Answer: C Answer: D
A system bus is a single computer bus that A computer virus is a program or piece of code
connects the major components of a computer that is loaded onto your computer without your
system, combining the functions of a data bus to knowledge and runs against your wishes.
carry information, an address bus to determine Viruses can also replicate themselves.
where it should be sent, and a control bus to
determine its operation. 18. Which command is used to remove text or
graphics from a document and the information is
16. A high quality CAD system uses which of the then stored on a clipboard so you can paste it
following for printing drawing and graphs? later on?
A.Dot matrix printer A.Cut
B.Digital plotter B.Clip
C.Line printer C.Chop
D.All of the above D.Chew
E.None of the above E.Chunk
Answer: B Answer: A
A high quality CAD system uses the Digital The Office Clipboard stores text and graphics
plotter for printing drawing and graphs. that you copy or cut from anywhere, and it lets
you paste the stored items into any other Office The BSoD error screen serves as an alert to
file. avert further computer and system damage.
A BSoD freezes Windows and requires that the
19. A _______ typically connects personal system be rebooted in order to continue to
computers within a very limited geographical operate.
area, usually within a single building.
A.LAN 21.The internet service that provides a
B.MAN multimedia interface to available resources is
C.WAN called—————
D.HAN A.World Wide web
E.None B.Telnet
Answer: A C.NOTA
Explanation: D.FTP
Local Area Network is the typically connects E.None of these
personal computers within a very limited Answer: A
geographical area, usually within a single The internet service that provides a multimedia
building. interface to available resources is called World
Wide Web.
20) __________ is an error screen that indicates
the system conflicts and the potential for a crash. 22. Which mechanism that permits new classes
A.Fault to be created out of existing classes by
B.Motherboard Crash extending and refining its capabilities?
C.BIOS A.Encapsulation
D.BSoD B.Inheritance
E.Kernel Panic C.Class
Answer: D D.Data hiding
Blue screen of death (BSoD) is a Microsoft E.None of these
Windows operating system error screen that is Answer: B
displayed to indicate system conflicts and the Inheritance
potential for a crash. -> Inheritance is the mechanism that permits new
BSoD errors relate to system hardware, classes to be created out of existing classes by
temperature, timing, resources, corrupt registries extending and refining its capabilities.
or viruses.
Computer Awareness
-> In SQL Column Alias is used for renaming the 11. _______ virus take up residence in the
column name temporarily and it will not affect the Computer memory, making them hard to detect
database. A. Worms
B. Macro
9. What happens if the base and derived class C. Stealth
contains definition of a function with some D. Cluster
prototype? E. None of these
A. compiler report an error on compilation Answer: C
B. only base class function will get called Stealth virus take up residence in the Computer
irrespective objective memory, making them hard to detect.
C. base class function will call base class
function and derived class object will call derived 12. Which one is used to crop the character
class function present starting and ending position of the
D. only derived class function will get called string?
irrespective objective A. Lpad / Rpad
E. None of these B. Trim
Answer: C C. Replace
If the base and derived class contains definition D. Concat
of a function with some prototype base class E. None of these
function will call base class function and derived Answer: B
class object will call derived class function. Explanation:
Trim
10. AND gates, NOR gates are called as ______ ->Trim is used remove the character present
that can be combined to form any other kind of starting and ending position of the string.
logic gate
A. Inverse gate 13. If a transaction executes all its operations
B. Combination gate successfully and all its effects are now
C. Both B and D permanently established on the database system
D. Universal gate is known as____
E. None of these A. Active
Answer: D B. Partially Committed
NAND gates, NOR gates are called as "universal C. Committed
gates" that can be combined to form any other D. Abort
kind of logic gate. E. None of These
15. In the Network Layer, Data is transferred in 17. Which of the following can be termed as end-
the form of _________ through the logical network user programs that enable the user to complete
path. tasks such as creating documents, spreadsheets
A. Layers etc?
B. Datagrams A. System Software
C. Segments B. Web browser
D. Frames C. Hyperlinks
E. Packets D. Application software
Answer: E E. None of the above
Data is transferred in the form of Packets via Answer: D
logical network paths in an ordered format Application software, or simply applications, are
controlled by the network layer. often called productivity programs or end-user
programs because they enable the user to
complete tasks such as creating documents, computers or terminal to access a single system
spreadsheets, databases, and publications, with one OS on it is Multiuser operating system.
doing online research, sending email, designing
graphics, running businesses, and even playing 20.LANs can be connected by devices called
games. Application software is specific to the ______ which operate on the data link layer.
task it is designed for and can be as simple as a A. Hub
calculator application or as complex as a word B. Bridges
processing application. C.HDLC
D. Tunnel
18. Which of the following terms is used for E. None of these
buying or selling of goods over the Internet? Answer: B
A. e-buying LANs can be connected by bridges. The bridge is
B. e-selling a device used to connect two separate Ethernet
C. e-business networks into one extended Ethernet.
D. e-commerce
E. None of these 21.The operation of a digital computer is based
Answer: D on which of the following principle?
Today, most people use e-commerce to perform A. counting
monetary transaction (buying or selling goods) B. electronic
online because of the ease, convenience, and C. logical
security that it provides. D. mechanical
E. All of these
19. The computer operating system that is Answer: A
developed to allow many users on different The operations of a digital computer is based on
computers or terminal to access a single system the counting principle.
with one OS on it is ____________
A. Single user operating system 22. Which one of the following electronic device
B. Multi user operating system used to process card payments at retail
C. Dual user operating system locations?
D. All of the above A.OMR
E. None of these B.MICR
Answer: B C.EFT
The computer operation system that is D.POS
developed to allow many users on different E. None of These
Computer Awareness
main memory location at the same time. The 8. Which one is used in system call that causes
cached data allows for fast retrieval on demand. the caller to block and be suspended until
another process wakes it up?
6. Which among the following bus carries A. Signal
information from processors to peripherals ? B. Wait
A. Data bus C. Sleep
B. Address bus D. Wakeup
C. Access bus E. None of These
D. Mechanical bus Answer: C
E. Electrical bus Sleep
Answer: A ->It is used in a system call that causes the caller
A data bus is a system within a computer or to block and be suspended until another process
device, consisting of a connector or set of wires, wakes it up.
that provides transportation for data. Different
kinds of data buses have evolved along with 9. Which of the following is responsible to
personal computers and other pieces of convert digital signal to analogous and vice versa
hardware. for the transmission and connection of
computer?
7. A device for changing the connection on a A.CPU
connector to a different configuration is called B.USB
____. C.MODEM
A. Converter D.Network
B. Competent E.ALU
C. Attachment Answer: C
D. Adapter MODEM is responsible to convert digital signal to
E. None of these analogous and vice versa for the transmission
Answer: D and connection of computer
An (electrical) adapter or adaptor is a device that
converts attributes of one electrical device or 10. Which clause is used for giving some
system to those of an otherwise incompatible restriction (or) condition on the row (or) Records?
device or system. A.As
B. Where
C. On
D. count
E. None of these 13. From child table, foreign key is going to point
Answer: B the primary key of foreign table so it is called
Where clause is used for giving some restriction as____
(or) condition on the row (or) Records. A. Primary key
B. Candidate key
11. When a file contains instructions that can be C. Referential integrity key
carried out by the computer, it is often called a(n) D. Alternate key
__________ file. E. None of these
A. data Answer: C
B. information Explanation:
C. executable From child table foreign key is going to pointing
D. application the primary key of foreign table so it is called as
E. assembly Referential integrity key.
Answer: C
When a file contains instructions that can be 14. Which one is used to combine all the object
carried out by the computer, it is often called a(n) files and convert them into a final executable
executable file program?
A. Loader
12. Which one of the following is normally a read B. Compiler
only drive where files are permanently stored? C. Linker
A.CD drive D. Assembler
B. Floppy drive E. None of These
C. Hard disk drive Answer: C
D. All of these Linker
E. None of These ->It is used to combine all the object files and
Answer: A convert them into a final executable program.
Compact Disk Read Only Memory (CD-ROM)
->This is normally a read only drive where files 15. API is a code that allows two software
are permanently stored. programs to communicate with each other. What
->There are now read/write CD-ROM drives that does ‘A’ mean in API?
use special software to allow users to read from A. Automatic
and write to these drives. B. Advanced
C. Application
D. Address
Computer Awareness
1. Which among the following search engine is a 3. In the Microsoft Office, Spelling & Grammar
search tool that uses another search engine's tool is located under which among the following
data to produce its own results from the Internet? tabs?
A.Meta A.Reference Tab
B.Individual B.View Tab
C.Directory C.Insert Tab
D.Subject directory D.Home Tab
E.None of these E.Review Tab
Answer: A Answer: E
A meta search engine (or aggregator) is a search Spelling & Grammar tool is located under the
tool that uses another search engine's data to Proofing group of Review Tab.
produce their own results from the Internet. The tools in the Review Tab helps to improve the
Metasearch engines take input from a user and document. It contains the following control
simultaneously send out queries to third party groups and keys.
search engines for results. Proofing Group (Spelling & Grammar,
Thesaurus, Autocorrect, word count)
2. The key that is used in case you want to make Comments Group (Add new comment, show
the letters bold without using the Shift key even comment, Delete comment)
once is__________. Tracking Group (Track changes, Simple
A.Ctrl mark-up, Review pane)
B.Alt + Del Changes Group (Accept or Reject changes)
C.Caps Lock Compare Group (Comparing the documents)
D.Num Lock Protect Group (Restrict editing, Block
E.Alt + Del + Num Lock Authors)
Answer: C
In case you want to make all the characters in 4. Who can maintain personal databases by
the sentence in capitals and you do not want to using ready-made program packages, provide
use the Shift key in the keyboard in that case you easy-to-use menu-based or graphics-based
can use the Caps Lock option so that you do not interfaces?
have to go for the Shift option every single time. A.Navie user
B.Stand-alone users
C.Sophisticated end-users
5. If the data is transmitted to all the nodes in the 7. Through ______ an administrator or another
network without routing, it is known as user can access someone else’s computer
____________. remotely
A.Repeating A.Administrator
B.Broadcasting B.Web server
C.Optimizing C.Web application
D.Flooding D.HTTP
E.Token Passing E.Telnet
Answer: D Answer: E
There are two techniques to transmit data over Telnet is a user command and an underlying
the Mesh topology. They are Routing, Flooding. TCP/IP protocol for accessing remote computers.
Routing – The nodes have a routing logic to Through Telnet, an administrator or another user
direct the data to reach the designation using the can access someone else's computer remotely.
shortest distance.
Flooding – The data is transmitted to all the 8.The loader generates the addresses at the
nodes in the network; hence no routing is time when a program is loaded intomain memory
required. is known as _____
A.Physical address
6. What is the term used for the amount of B.Logical address
information transmitted through a communication C.Relative address
medium in a certain amount of time? D.Symbolic address
A.DPI E.None of These
B.Bandwidth Answer: A
C.BPS Physical addresses
D.Baud rate
->The loader generates the addresses at the 11. The ___________ folder retains copies of
time when a program is loaded into the main messages that you have started but are not yet
memory. ready to send.
A.Inbox
9. What is the name of the operation that helps B.Send mail
the control unit determines what the program is C.Trash
telling the computer to do? D.Spam
A.Encryption E.Outbox
B.Decode Answer: E
C.Decryption The Outbox folder retains copies of messages,
D.Encode which are not sent
E.None of these
Answer: B 12. Which one of the following uses four 1-byte
The decode operation will helps the control unit decimal numbers, separated by a dot?
to determine, what the program is telling the A.ISDN
computer. B.IPV4
C.IPV6
10. Which clause is used to combine records D.ICMP
from two or more tables in a database? E.None of These
A.Where Answer: B
B.Order by IPV4
C.Group by ->IPv4 uses four 1-byte decimal numbers,
D.Joins separated by a dot (i.e.192.168.1.1).
E.None of these
Answer: D 13. Which analyser phase reads the characters
Explanation: in the program and groups them into tokens that
Joins clause all sequences of characters have a collective
-> In SQL Joins clause is used to combine meaning?
records from two or more tables in a database. A A.Lexical
JOIN is a means for combining fields from two B.Syntax
tables by using values common to each. C.Semantic
D.Intermediate code
E.None of these
Answer: A
23. In Which group can you find or replace text E.None of these
and select text or objects in a document? Answer: D
A.Proofing The fourth generation has used compact
B.Paragraph electronic parts extensively and this generation
C.Editing has used microprocessors as switching device.
D.Font
E.None of these 25. Which among the following is a program that
Answer: C places programs into main memory and prepares
The different groups under the Home tab in Word them for execution?
are: Clipboard, Font, Paragraph, Styles and A.Linker
Editing. The editing group provides options to B.Assembler
find, replace and select text/objects in a C.Dialler
document. D.Loader
E.Absolute entity
24. With rapid technical advancement, which Answer: D
device used microprocessor as switching A loader is a major component of an operating
Computer Awareness
1. __________is used to quickly accept, store, using a small hardware connected to the
and transfer data and instructions that are being customer’s electronic payment portals.
used immediately by the CPU.
A.Processor 3. The most widely used code that represents
B.Data Bus each character as a unique 8-bit code is _______.
C.Cache A.ASCII
D.Register B.Unicode
E.Stack C.Binary numbering system
Answer: D D.EBCDIC
Register is used to quickly accept, store, and E.None of these
transfer data and instructions that are being used Answer: A
immediately by the CPU. Most modern character-encoding schemes are
There are various types of Registers that are based on ASCII (American Standard Code for
used for various purpose. Information Interchange), although they support
Some Registers named as AC or Accumulator, many additional characters.
Data Register or DR, the AR or Address
Register, program counter (PC), Memory Data 4. Which one of the following will remove all
Register (MDR) ,Index register, Memory Buffer records from a table, including all spaces
Register. allocated for the records removed?
A.Drop
2.______ terminals (formerly known as cash B.Delete
registers) are often connected to complex C.Truncate
inventory and sales computer systems. D.All of these
A.Data E.None of These
B.Point-of-sale (POS) Answer: C
C.Sales Truncate
D.Query -> Remove all records from a table, including all
E.None of these spaces allocated for the records are removed.
Answer: B
The POS terminal is basically an electronic cash 5. What is the term used to refer to the study of
register & is used for realizing a retail transaction machines which are supposed to display
intelligence of the levels which humans show?
C.Adware
10. Which of the following concept means D.Pharming
determining at runtime what method to invoke? E.None of These
A.Data hiding
B.Dynamic loading Answer: D
C.Dynamic Typing Pharming
D.Dynamic binding ->More advance method of Phishing in which the
E.None of these attackers create duplicate or similar looking
Answer: D website of other companies, to attract the
Dynamic binding also called dynamic dispatch is customers and steal the data.
the process of linking procedure call to a specific
sequence of code (method) at run-time. It means 13. Different components on the motherboard of
that the code to be executed for a specific a PC unit are linked together by sets of parallel
procedure call is not known until run-time. electrical conducting lines. What are these lines
Dynamic binding is also known as late binding or called?
run-time binding. A.Conductors
B.Buses
11. Which of the following people probably has C.Connectors
the least amount of technical knowledge? D.Consecutives
A.Programmer E.None of these
B.Computer Operator Answer: B
C.System analyst A bus is a common pathway through which
D.User information flows from one computer component
E.None of these to another. This pathway is used for
Answer: D communication purpose and it is established
User will have the least amount of technical between two or more computer components.
knowledge.
14. The loader generates these addresses at the
12. More advanced method of Phishing in which time when a program is loaded into main
the attackers create a duplicate or similar looking memory is known as _____
websites of other companies, to attract A.Physical address
customers and steal the data is called as _____ B.Logical address
A.Worms C.Relative address
B.Phishing D.Symbolic address
D.Slide skip
19. Which one of the following tree contains the E.None of these
maximum or possible number of nodes at all Answer: C
levels except a leaf? Rehearse timings button will helps to add times
A.Binary to the slide in a presentation.
B.Full Binary
C.Complete Binary 22. Which one of the following consists of two or
D.Extended Binary more platters mounted to a single shaft?
E.None of these A.Zip disk
Answer: B B.Disk pack
Full Binary tree contains the maximum or C.Winchester disk
possible number of nodes at all levels except a D.All of these
leaf. E.None of These
Answer: B
20. Which of the following is a small Disk pack
microprocessor-based computer designed to be ->It consists of two or more platter mounted to a
used by one person at a time? single shaft.
A.Netbook
B.Mainframe 23. Copying a process from memory to disk to
C.Supercomputer allow space for other processes is called
D.Personal computer __________.
E.All-in-one A. Swapping
Answer: D B. Deadlock
Personal Computer (PC) A microprocessor- C. Demand Paging
based computer which is primarily intended to be D. Page Fault
used by one person at a time. It is usually E. Cloud Computing
characterized by relatively low cost and small Answer: A
physical size. Swapping concept comes in terms of process
scheduling. Scheduler removes process from
21. Which of the following can you use to add CPU for duration and reduces the degree of
times to the slides in a presentation? multiprogramming. And after some time these
A.Slide show menu process can again be reintroduced into main
B.Space bar memory.
C.Rehearse timings button
Computer Awareness
1. The ability to recover and read deleted or process can again be reintroduced into main
damaged files from a criminal’s computer is an memory.
example of law enforcement’s speciality called
_________. 3. Which physical layer devices can be used to
A. Robotics enlarge the area covered by a single LAN
B. Simulation segment?
C. Computer forensics (i) Switch
D. Animation (ii) NIC
E. None of these (iii) Hub
Answer: C (iv) Repeater
Computer forensics is a discipline that comes (v) RJ45 transceiver
under the digital forensic sciences. This branch A. Only i
deals with the evidence that is stored digitally. It B. Both i and iii
involves extraction of data that is stored in the C. Both iii and iv
electronic devices recovered during the D. Only v
investigation of a criminal case by the police and E. None of these
other relevant authorities. Answer: C
A repeater operates at the physical layer. Its job
2. Copying a process from memory to disk to is to regenerate the signal over the same
allow space for other processes is called network before the signal becomes too weak or
__________. corrupted so as to extend the length to which the
A. Swapping signal can be transmitted over the same network.
B. Deadlock A hub is basically a multiport repeater. A hub
C. Demand Paging connects multiple wires coming from different
D. Page Fault branches, for example, the connector in star
E. Cloud Computing topology which connects different stations.
Answer: A
Swapping concept comes in terms of process 4. Which of the following attributes Contain
scheduling. Scheduler removes process from values that are calculated from other attributes?
CPU for duration and reduces the degree of A. Composite
multiprogramming. And after some time these B. Multi-valued
C. Derived
6. _______ is the application of investigation and 8. AND gates, NOR gates are called ______ that
analysis techniques to gather and preserve can be combined to form any other kind of logic
evidence from a particular computing device in a gate
way that is suitable for presentation in a court of A. Inverse gate
law. B. Combination gate
A. Robotics C. Both B and D
B. Animation D. Universal gate
C. Simulation E. None of these
D. Computer Forensics Answer: D
E. None of these NAND gates, NOR gates are called as "universal
Answer: D gates" that can be combined to form any other
Computer forensics is a branch of digital forensic kind of logic gate.
science pertaining to evidence found in
computers and digital storage media. Computer
9. Which of the following key is used in the Console refers to a terminal attached to a
Operating system to display or hide the start minicomputer or mainframe and used to monitor
menu? the status of the system
A. Windows Logo
B. Windows logo + Break 12. Which one of the following is similar to disk
C. Windows Logo + D pack but in this the hard disk platters and disk
D. Windows Logo + M drive are sealed together?
E. Windows Logo + T A. Zip disk
Answer: A B. Disk pack
The windows logo is used to display or hide the C. Winchester disk
start menu. D. All of these
E. None of These
10. Which of the following is the most important Answer: C
powerful computer in a typical network? Winchester disk:
A. Desktop -> It is similar to disk pack but in this the hard
B. Network server disk platters and disk drive are sealed together.
C. Network hub -> Its storage size is more than the disk pack
D. Network client hard disk, because both the surface of top and
E. None of these bottom platter is used to store information.
Answer: B
The most important powerful computer in a 13. ______________ is the language understood
typical network is Network server. by a computer that is very difficult to understand,
but it is the only thing that the computer can work
11. Which of the following refers to a terminal with.
attached to a minicomputer or mainframe and A. Binary Language
used to monitor the status of the system? B. Assembly Language
A. Monitor C. Machine Language
B. Mouse D. High-level Language
C. Console E. Low-Level Language
D. Controller Answer: C
E. All of these The language that computers can understand is
Answer: C called machine language. Although it is
exceedingly challenging to comprehend, it is the
only thing that the computer can use.
B. Painter Answer: B
C. Copy & Paste Explanation:
D. Animation Painter The proxy server is a computer that offers a
E. Transition computer network service to allow clients to
Answer: D make indirect network connections to other
In Microsoft PowerPoint, you can quickly and network services.
easily copy animations from one object to
another using the Animation Painter. The Format 25. While editing an MS Word document if you
Painter is used when you want to copy text and accidentally lose text, which of the following can
paragraph formatting, select an entire paragraph, be used to revert the action?
including the paragraph mark. A. Copy
B. Replace
24._______ is a computer that offers a computer C. Insert
network service to allow clients to make indirect D. Repair
network connections to other network services. E. Undo
A. Server Answer: E
B. Proxy server The Undo command undoes anything you do in
C. Client Word, which includes formatting text, moving
D. Back page blocks, typing and deleting text, formatting etc.
E. None of these
Computer Awareness
1. Any component of a computer that humans malware, antivirus software started to provide
can physically touch and those are the main protection from other computer threats.
electronic components that go into making a
computer is referred to as _________. 3. What does P represent in APCI on the
a) Hardware computer?
b) Software a) Protocol
c) Memory b) Phrase
d) Information c) Portfolio
e) Input d) Projects
Answer: A e) Private
Any component of a computer that humans can Answer: A
physically touch is referred to as hardware. The meaning of APCI is Application-Layer
These are the main electronic components that Protocol Control Information
go into making a computer.
4. C Programming Language was developed by
2. The software which uses a pattern-matching _______________.
technique to understand and find out harmful a) Charles Babbage
elements in all the files on the disk is known as b) Blaise Pascal
__________. c) Bill Gates
a) Anti-virus software d) Dennis Ritchie
b) Assisted software e) Michael Baht
c) Software maxis Answer: D
d) Software diagram C, a computer programming language created by
e) Software patch American computer scientist Dennis M. Ritchie at
Answer: A Bell Laboratories in the early 1970s (formerly
Antivirus or anti-virus software (often abbreviated AT&T Bell Laboratories).
as AV), sometimes known as anti-malware
software, is computer software used to prevent, 5. The foundation for successful computer
detect and remove malicious software. Antivirus system construction is the __________.
software was originally developed to detect and a) Computer Memory
remove computer viruses, hence the name. b) Computer Architecture
However, with the proliferation of other kinds of c) Computer Hardware
The exchange of digital data between two or 12. Computers all over the world are connected
more reliable computers or data networks, also by a huge global network called the
referred to as data communication or a __________________.
telecommunication network, enables data a) Program
transfer between sender and receiver. b) Internet
c) Modem
10. __________________is an organized d) Database
collection of structured information, or data, e) CyberSecurity
typically stored electronically in a computer Answer: B
system. Computers all over the world are connected by a
a) Database huge global network called the Internet.
b) Data Channel
c) Data Bank 13. Which of the following file format can be
d) Operating System added to a PowerPoint show?
e) Computer Program a) .jpg
Answer: A b) .gif
A database is an organized collection of c) .wav
structured information, or data, typically stored d) All the above
electronically in a computer system. e) None of the above
Answer: D
11. Which of the following languages may be jpg, gif, and . wav file formats can be added to a
understood by a computer? PowerPoint show.
a) Binary
b) Assembly 14. Which of the following languages is the
c) BASIC source of the word computer?
d) JAVA a) Latin
e) All the above b) Greek
Answer: A c) French
Machine language is the only language that a d) Sanskrit
computer can understand or use. It can be e) Hindi
understood by computers because it simply has Answer: A
binary values of 0s and 1. Simply explained, the "Computer" comes from the Latin "putare" which
computer only comprehends binary code, which means both to think and to prune.
consists of 0s and 1s.
15. A symmetric key encryption algorithm called A portable computer can be easily carried around
__________ divides messages into blocks of 64 in a pocket and operated while you're carrying it.
bits and then individually encrypts each block. Handheld computers are also known as personal
a) Decryption digital assistants (PDAs) or Palmtop computers.
b) Algorithm
c) Blowfish 18. ____ is a powerful tool used to create and
d) Topology format spreadsheets.
e) Protocol a) Microsoft PowerSpoint
Answer: C b) Microsoft Excel
An asymmetric key encryption algorithm called c) Adobe Photoshop
Blowfish divides messages into blocks of 64 bits d) Mozilla Firefox
and then individually encrypts each block. e) Internet Explorer
Answer: B
16. Microsoft Office was developed in With the help of Microsoft Excel, you can write
______________. formulae to solve mathematical problems, create
a) 1972 graphs to visually portray data, create
b) 1975 spreadsheets, analyze data and share it with
c) 1978 others to help you come to better judgments.
d) 1982
e) 1988 19. The _________________ Model is a
Answer: E conceptual and logical layout that defines
Microsoft Office is software that was developed network communication used by systems open
by Microsoft in 1988. to interconnection and communication with other
systems.
17. A portable computer that can be held in the a) OSI Model
hand is referred to as a handheld computer. b) Data Model
What is the other name for Handheld Computer? c) Standard Model
a) Personal Computer d) Internet Model
b) Portable Computer e) Communication Model
c) Palmtop Computer Answer: A
d) Workstation Computer The Open Systems Interconnection (OSI) Model
e) Desktop Computer is a conceptual and logical layout that defines
Answer: C network communication used by systems open to
interconnection and communication with other 22. Which of the following registers is used to
systems. keep track of the address of the memory location
where the next instruction is located?
20. ___________________ is the programme that a) Memory address register
controls all other application programmes in a b) Memory data register
computer after being installed into the system c) Instruction register
first by a boot programme. d) Program counter
a) Operating System e) None of these
b) Computer Hardware Answer: D
c) Computer Software The program counter is used to keep track of the
d) Database address of the memory location where the next
e) Input Management instruction is located.
Answer: A
An operating system (OS) is the program that 23. Which of the following part will hold many of
controls all other application programs in a the crucial components of a computer, including
computer after being installed into the system the central processing unit (CPU), memory and
first by a boot program. connectors for input and output devices?
a) Holders
21. Imagine that a user has a WORD document b) Mother Board
open at a workstation and that workstation is c) Main Board
unexpectedly disconnected from the school d) System Board
network and from the Internet. Where should the e) Breadboard
user BEST save her work? Answer: B
a) USB key A motherboard is one of the most essential parts
b) P drive of a computer system. It holds together many of
c) H drive the crucial components of a computer, including
d) S drive the central processing unit (CPU), memory and
e) None of these connectors for input and output devices.
Answer: C
The data which are opened in the workstation, 24. The peripheral nodes are connected to a
which is disconnected will be stored in H drive. central node, which rebroadcasts all
transmissions received from any peripheral node
to all peripheral nodes on the network, including
the originating node is known as ____.
Computer Awareness
1. Which among the following are the examples b) American Standard Code for Information
of Computer Hardware? Interchange
a) Processor c) Advanced Research Projects Agency Network
b) Memory Devices d) Average Access Time Network
c) Monitor e) Algorithmic State Machine
d) Keyboard Answer: C
e) All the above The Advanced Research Projects Agency
Answer: E Network (ARPANET), the forerunner of the
Examples of hardware in a computer are the Internet, was a pioneering long-haul network
Processor, Memory Devices, Monitor, Printer, funded by the U.S. Department of Defense's
Keyboard, Mouse, and Central Processing Unit. Advanced Research Projects Agency (ARPA).
d) John Von Neumann used to calculate the sum of specific cells. Most
e) None of the above commonly used in spreadsheet
Answer: D Applications.
Von-Neumann first offered his idea for a
computer system in 1945; this concept became 8. The process of confirming that someone or
known as Von-Neumann Architecture. It had a something is who or what it claims to be is
Control Unit, Registers, an Arithmetic and Logical known as _________________.
Memory Unit (ALU), and Inputs and Outputs. a) Integration
b) Topology
6. Where is the temporary copy of the document c) Authentication
stored when you are working on it on a d) Security
computer? e) Protocol
a) Floppy Disk Answer: C
b) RAM The process of confirming that someone or
c) ROM something is who or what it claims to be is known
d) Hard Disk as authentication.
e) Cassette
Answer: B 9. ___________________ Transmission is required
The document is momentarily kept in RAM. It is a for keyboard and computer communication.
component of your computer that it makes use of a) Automatic
when it is turned on. b) Half Duplex
c) Full Duplex
7. A formulated cell reference that will not adjust d) Simplex
when used to calculate the sum of specific cells e) None of the above
is ___________________. Answer: D
a) Absolute Address Communication between a computer and a
b) Absolute Reference keyboard involves simplex transmission because
c) Access Point here data flows in a single direction. Simplex
d) Artificial Intelligence transmission is a type of transmission mode.
e) Actuator
Answer: B 10. A software programme that enables users to
Absolute Reference: A formulated cell reference build, develop, and maintain databases as well
that will not adjust when as grant restricted access to data is known as a
_________________________.
a) Data Management Software 13. The difference between memory and storage
b) Database Management System is that memory is _____ and storage is _______
c) Data Driven System a) Temporary, permanent
d) Data Management System b) Permanent, temporary
e) Database Management Software c) Slow, Fast
Answer: B d) Large, Small
A software program that enables users to build, e) All the above
develop, and maintain databases as well as Answer: A
grant restricted access to data is known as a Memory is temporarily saving the data and
database management system (DBMS). Storage is to save the data permanently.
11. Select the Switching Devices that are used in 14. Which of the following is the correct order of
the First generation of computers. the four major functions of a computer?
a) Vacuum tubes a) Input, Output, Storage, Process
b) Transistors b) Storage, Process, Input, Output
c) Integrated Circuits c) Input, Process, Output, Storage
d) Super Large Scale Integrated Chips d) Process, Input, Output, Storage
e) Large Scale Integrated Circuit e) Input, Process, Storage, Output
Answer: A Answer: C
Vacuum tubes, which produced a lot of heat, Input, Process, Output, and Storage is the
were bulky, and unreliable, and were employed correct order of the four major functions of a
in the first generation of electronic computers. computer.
12. When was the Concept of the Internet 15. A/ An ______________ is a procedure used
originated? for solving a problem or performing a
a) 1966 computation.
b) 1969 a) Decryption
c) 1970 b) Algorithm
d) 1972 c) Blowfish
e) 1975 d) Topology
Answer: B e) Protocol
The internet and glue sticks were both invented Answer: B
in 1969. An algorithm is a procedure used for solving a
problem or performing a computation. Algorithms
act as an exact list of instructions that conduct 18. A___________ is a computer program that
specified actions step by step in either hardware- can capture, display, and manipulate data
or software-based routines. Algorithms are arranged in rows and columns.
widely used throughout all areas of IT. a) Spreadsheet
b) Word Art
16. ________________ is a collection of c) Graphical Interface
programmes made to increase productivity and d) Smart Art
carry out typical operations on a computer. e) Pivot Table
a) Microsoft Office Answer: A
b) Operating System A spreadsheet is a computer program that can
c) Database capture, display, and manipulate data arranged
d) Input in rows and columns. Spreadsheets are one of
e) Application Software the most popular tools available with personal
Answer: A computers. A spreadsheet is generally designed
Microsoft Office is a collection of programs made to hold numerical data and short text strings.
to increase productivity and carry out typical
operations on a computer. 19. In what OSI layer do repeaters operate?
a) Application Layer
17. The ____________ computers are high- b) Presentation Layer
performance computers with large amounts of c) Physical Layer
memory and processors that process billions of d) Data Link Layer
simple calculations and transactions in real-time. e) All the above
a) Nano computer Answer: C
b) Mini computer To amplify or regenerate an incoming signal
c) Mainframe computer before retransmitting it, repeaters are network
d) Super computer devices that operate at the physical layer of the
e) Embedded Computer OSI model.
Answer: C
Mainframe computers are high-performance 20. _________ is a startup sequence that starts
computers with large amounts of memory and the operating system of a computer when it is
processors that process billions of simple turned on.
calculations and transactions in real-time. a) Starting
b) Initialising
c) Booting
d) Delete
Computer Awareness
holding down the mouse button, drag the sheet 22. Which one is used for renaming the column
tab to its new location. name temporarily and it will not affect the
database?
20. Which of the following layer is used to link a) Constraints
the network support layers and user support b) Literals
layers? c) Column Alias
a) Application Layer d) Concatenation
b) Transport Layer e) None of these
c) Physical Layer Answer: C
d) Data Link Layer Column Alias
e) Network Layer -> In SQL Column Alias is used for renaming the
Answer: B column name temporarily and it will not affect the
The session, presentation, and application layers database.
are user support layers, while physical, data
connection and network layers are network 23. Metropolitan Area Network (MAN) is defined
support layers. The data is segmented and re- for _______ and provides regional connectivity
organized by the transport layer to connect these within a campus
layers. a) More than 50km
b) Less than 30km
21. Which of the following types of software is c) Less than 50km
responsible for regulating how well the computer d) Less than 60km
and all of its components function internally? e) None of these
a) Computer Hardware Answer: C
b) Public domain software Metropolitan Area Network (MAN) is defined for
c) Application software Less than 50km and provides regional
d) Operating system software connectivity within a campus or small
e) None of the above geographical area.
Answer: D
An operating system (OS) is software that 24. If you wanted to tell the database
controls and coordinates the computer hardware management system that a specific attribute
devices and runs other software and applications contained numbers only, what would you need to
on a computer. set?
a) Data category
b) Data Manipulating
Computer Awareness
1. Any hardware part that enables you to enter Bug - A software bug is an error, flaw, failure, or
information and commands into a computer is fault in a computer program or system produces
referred to as an ____________. an incorrect or unexpected result.
a) Network Fax - A shortened form of the word facsimile. A
b) Input Device copy of a document transmitted electronically
c) Software from one machine to another.
d) Interaction
e) Terminal 3. What is the full form of AHA?
Answer: B a) Accelerated Hub Architecture
Any hardware part that enables you to enter b) Advanced Micro Devices
information and commands into a computer is c) Abstract Window ToolKit
referred to as an input device. d) Application Programming Interface
e) Advanced Audio Coding
2. A packet of information that travels between a Answer: a
browser and the webserver is known as Explanation:
____________. AHA: Accelerated Hub Architecture.
A. Cache
B. Cookie 4. A ________ is a set of instructions that a
C. Gopher computer can use to carry out a particular task.
D. Fax a) Program
E. Bug b) Register
Answer: B c) Cache
Cookie - A packet of information that travels d) Instruction
between a browser and the web server. e) Memory
Cache - It is a memory storage area that keeps Answer: A
frequent use data readily available to the A program is a set of instructions that can be
computer so that the computer does not retrieve executed by a computer to do a specific task.
them from slow storage devices.
Gopher - A protocol used for locating and 5. What is computer architecture?
transferring information on the internet. It is an a) Set of categories and methods that specify the
internet search tool that allows users to access functioning, organization, and implementation of
textual information. computer systems
b) Set of principles and methods that specify the resources, including computer programs, files,
functioning, organization, and implementation of services, data and application features.
computer systems a) Authentication
c) Set of functions and methods that specify the b) Automation
functioning, organization, and implementation of c) Encryption
computer systems d) Decryption
d) None of the above e) Authorisation
e) All (a) , (b) and (c) Answer: E
Answer: B Authorization is a security mechanism used to
A set of principles and methods that specify the determine user/client privileges or access levels
functioning, organization, and implementation of related to system resources, including computer
computer systems is known as computer programs, files, services, data, and application
architecture. A system’s architecture refers to its features.
structure in terms of the system’s individually
specified components and their 8. A networking connection device that is also
interrelationships. known as the_______________.
a) Absolute Address
6. ____________ is the place where data is held b) Absolute Reference
in an electromagnetic or optical form for access c) Access Point
by a computer processor. d) Artificial Intelligence
a) Storage e) Base Station
b) Memory Answer: E
c) Hardware A networking connection device is also known as
d) Software the base station.
e) Input
Answer: A 9. ____ is a technique that is used to send more
Storage is the place where data is held in an than one call over a single line.
electromagnetic or optical form for access by a a) Streaming
computer processor. b) Multiplexing
c) Streaming
7. ______________________ is a security d) Digital Transmission
mechanism used to determine user/client e) Infrared Transmission
privileges or access levels related to system Answer: B
a) Signalling a) Escape
b) Processing b) Minimize
c)Compiling c) Maximize
d) Inducing d) Enter
e) Uploading e) Control
Answer: B Answer: B
Data processing is the process of gathering data The Minimize button is among the three buttons
and transforming it into information. Any data at the right end of the title bar. This button has a
processing structure's inputs are raw data, and small dash (or minus sign). The Minimize button
the information obtained is known as the output. shrinks the window and places it on the taskbar
Data processing consists of several phases that while leaving the program running.
must be completed in a specific order to produce 18. A microcomputer is a full-featured computer
the proper inference. that is made on a smaller scale and intended for
solitary usage. Which among the following are
16. In computer programming and engineering, the three basic categories of physical equipment
__________ is a multi-step process that entails in Microcomputer Hardware?
locating a problem, tracking down the source of a) Keyboard, Monitor, Hard drive
the problem, and either fixing the problem b) System unit, Input/output, Memory
directly or finding a workaround. c) System unit, Input/output, Secondary storage
a) Debugging d) System unit, Primary storage, Secondary
b) Caching storage
c) Cookies e) Keyboard, Monitor, and secondary storage
d) Formatting Answer: D
e) Protocol System unit, Primary storage and Secondary
Answer: A storage are the three basic categories of physical
In computer programming and engineering, equipment in Microcomputer Hardware.
debugging is a multi-step process that entails
locating a problem, tracking down the source of 19. In Microsoft Excel, _______ is a collection of
the problem, and either fixing the problem one or more spreadsheets of worksheets, in a
directly or finding a workaround. single file.
a) Work Book
17. The window becomes an icon when the b) Slidesheet
________button is pressed, yet the word stays c) Slide Book
alive. d) Charts
e) Window b) CD
Answer: A c) LED
In Microsoft Excel, a workbook is a collection of d) BIOS
one or more spreadsheets, also called e) None of these
worksheets, in a single file. Answer: A
CRT (Cathode Ray Tube) is a typical rectangular
20. Which layer of the OSI model does the router shaped monitor that you see on a desktop
operate on? computer. It works by moving an electron beam
a) Application Layer back and forth across the back of the screen.
b) Presentation Layer
c) Physical Layer 23. The ________ can be programmed one time
d) Data Link Layer by either the manufacturer or the computer user.
e) Network Layer Once programmed, it cannot be modified.
Answer: E a) RAM
The network layer, or Layer 3, is most frequently b) OM
referred to as the layer where routing occurs. c) ROM
The primary responsibility of a router is to d) EPROM
transfer packets between networks. e) None of these
21. ______________ is the process of closing and Answer: C
starting a computer or its operating system from The PROM can be programmed onetime by
the initial boot loading sequence. either the manufacturer or the computer user.
a) Warm Boot Once programmed, it cannotbe modified
b) Cool Boot
c) Reboot 24. _______ is a computer program that enables
d) Normal Boot a person to communicate with a computer
e) Cold Boot through the use of symbols, visual metaphors
Answer: C and pointing device
Reboot is the process of closing and starting a a) User interface
computer or its operating system from the initial b) Graphical User interface
boot loading sequence. c) Character User interface
d) Ms-Dos
22. Which one is a typical rectangular shaped e) None of these
monitor that you see on a desktop computer? Answer: B
a) CRT
Computer Awareness
1. Which among the following is not an Input b) American Standard Code for Information
Device of the computer? Interchange
a) Keyboard c) Advanced ResearchProjects Agency Network
b) Mouse d) Average Access Time Network
c) Projector e) Algorithmic State Machine
d) Microphone Answer: B
e) Web Cam ASCII: American Standard Code for Information
Answer: C Interchange
An input device is any hardware part that
enables you to enter information and commands 4. What type of computer language has the
into a computer. The keyboard, mouse, feature of using a combination of 1s and 0s?
microphone, scanner, and webcam are five a) High-Level Language
frequently used input methods. To enter data b) PASCAL
into the computer, you press keys on a c) Machine Language
keyboard. d) C++
e) JAVA
2. Which of the following is a special database Answer: C
that holds information about the computer’s user, The numerical codes denoting the actions that a
installed programs and hardware devices? specific computer may carry out directly make up
a) History a machine language. Binary digits, often known
b) Compiled help module as bits, are strings of 0s and 1s that are routinely
c) Dynamic link library translated to and from hexadecimal (base 16) for
d) Initialization file human viewing and alteration.
e) Windows Registry
Answer: E 5. Which among the following are the different
The Windows Registry, usually referred to as components in the Computer System
just the registry, is a collection of databases of Architecture?
configuration settings in Microsoft Windows a) Input Unit
operating systems. b) Output Unit
c) Storage Unit
3. What does ASCII represent? d) Control Unit
a) Advanced Research ProjectsAgency e) All the above
Answer: D
The database management system was 13. Which of the following country has
developed to store enormous amounts of data, developed ARPANET?
which can take any form, including images, text, a) the United States
audio files, and video files. b) the United Kingdom
c) China
11. The term _________ refers to a device that d) Japan
transmits computer-processed data results and e) Russia
transforms digital data into easily readable and Answer: A
understandable human language. The ARPANET was established by the
a) Input device Advanced Research Projects Agency (ARPA) of
b) Output device the United States Department of Defense.
c) Software device
d) Both a and b 14. The process of confirming that someone or
e) Both b and c something is who or what it claims to be is
Answer: B known as _________________.
The term "output device" refers to a device that a) Integration
transmits computer-processed data results and b) Topology
transforms digital data into easily readable and c) Authentication
understandable human language. d) Security
e) Protocol
12. Which computer was built before the First Answer: C
Generation Computer? The process of confirming that someone or
a) Mechanical something is who or what it claims to be is
b) Electrical known as authentication.
c) Electro-mechanical
d) Magnetic 15. _______can be defined as a codified
e) Electronic representation of facts, concepts, or instructions
Answer: C that is suitable for human or electronic machine
Before the first generation of computers, electro- communication, interpretation, or processing.
mechanical computers were constructed. More a) Information
quickly than any other device at the time, this b) Data
computer can calculate. c) Memory
Data encryption and decryption take place in the 23. Which of the following is an application that
presentation layer as well. captures TCP/IP data packets, which can
maliciously be used to capture passwords and
21. A __________ turns off the power and erases other data while it is in transit either within the
any internal data and counters that the operating computer or over the network.
system and running apps create to keep track of a) Security exploit
operations from memory (RAM). b) Vulnerability Scanner
a) Warm Boot c) Packet sniffer
b) Fool Boot d) Rootkit
c) Reboot e) None of these
d) Normal Boot Answer: C
e) Cold Boot The packet sniffer is an application that captures
Answer: E TCP/IP data packets, which can maliciously be
A cold boot turns off the power and erases any used to capture passwords and other data while
internal data and counters that the operating it is in transit either within the computer or over
system and running apps create to keep track of the network.
operations from memory (RAM).
24. While going through the 4G network, we may
22.Which one allows objects with different come across the term ‘LTE’. What does E
internal structures to have a common external represent?
interface? a) Evolution
a) Encapsulation b) Improved
b) Inheritance c) Envelop
c) Polymorphism d) Enabled
d) Message passing e) None of these
e) None of these Answer: A
Answer: C ‘LTE’ à Long Term Evolution(LTE) is a 4G
Polymorphism wireless communications standard developed by
-> Polymorphism allows objects with different the 3rd Generation Partnership Project (3GPP)
internal structures to have a common external that's designed to provide up to 10x the speeds
interface. of 3G networks for mobile devices such as
smartphones, tablets, netbooks, notebooks and
wireless hotspots.
Computer Awareness
15. Which of the following is the earliest Select the text you want to copy and press
calculating device? Ctrl+C.
a) Analytical Engine
b) Calculator 18. Which of the following is a type of computer
c) Abacus classified based on the work?
d) Read Access Memory a) Analog Computer
e) Motherpad b) Hybrid Computer
Answer: C c) Supercomputer
Abacus is the earliest calculating device. d) Both (a) and (b)
e) Both (a) and (c)
16. A _________________ is a method for quietly Answer: D
determining whether a user has accessed There are three types of computer-based work.
particular content that is used on websites and in They are analog, digital, and hybrid computers.
emails.
a) Spam 19. When using Excel, the current cell's contents
b) Web Beacon are shown in the __________.
c) Topology a) Tool Bar
d) Protocol b) Menu Bar
e) Hardware c) Formula Bar
Answer: B d) Task Bar
A web beacon is a method for quietly e) Footer Bar
determining whether a user has accessed Answer: C
particular content that is used on websites and in The content of the active cell is shown in the
emails. formula bar.
17. The shortcut key for copying selected 20. Which is the lowest layer of the OSI model?
text/picture in MS Word is ______________. a) Data Link
a) Ctrl+C b) Application
b) Ctrl + V c) Network
c) Ctrl + X d) Physical
d) Ctrl + P e) Transport
e) Ctrl + S Answer: D
Answer: A
Physical. The lowest layer of the OSI model is specific length. The major disadvantage of
concerned with data communication in the form unpaged cache is that __________________.
of electrical, optic, or electromagnetic signals a) it allows cache domain to contain redundant
physically transmitting information between data
networking devices and infrastructure. b) it does not allow writes to be cached
c) its access time is greater than that of paged
21. A DOS is an operating system that runs from caching
a disk drive. DOS stands for _______________. d) read ahead cache domain blocks are
a) Disk Operating System necessarily fixed in size
b) Drive Operating System e) None of these
c) Durable Operating System Answer: A
d) Divided Operating System An unpaged cache associates disk domains with
e) Disk Opaque System the address of the read and continues for a
Answer: A specific length. The major disadvantage of
A DOS or disk operating system is an operating unpaged cache is that it allows cache domain to
system that runs from a disk drive. contain redundant data
22. Which property states that in a transaction 24.______ type of program controls the various
either all of its operations are executed or computer parts and allows the user to interact
nothing should be done? with the computer
a) Atomicity a) Application Software
b) Consistency b) Utility software
c) Isolation c) Middleware
d) Durability d) System software
e) None of These e) None of these
Answer: A Answer: B
Atomicity Utility software is type of program controls the
->Atomicity property states that in a transaction various computer parts and allows the user to
either all of its operations are executed or interact with the computer
nothing should be done.
25. Whenever there is a lack of communication
23. An unpaged cache associates disk domains between the customer and the software
with the address of the read and continues for a
Computer Awareness
6. What is the name of the primary folder on a was designed to provide interactivity on web
storage device? pages.
a) Platform a) Algorithm
b) Root Directory b) Actuator
c) Interface c) Adware
d) Device Driver d) Applet
e) Soft Driver e) Aero
Answer: B Answer: D
The top-level directory in a file system is known An applet is a small program generally written in
as the root directory or root folder. The term the Java programming
"root" designates the top level of the directory the language that was designed to provide
structure, which can be visualized as an upside- interactivity on web pages.
down tree. The root directory is the parent
directory for all other directories present in a 9. A network configuration known as a
disc. ___________ has devices such as computers and
routers connected.
7. An _________ is a small program generally a) Ring Topology
written in the Java programming language that b) Bus Topology
was designed to provide interactivity on web c) Mesh Topology
pages. d) Star Topology
a) Algorithm e) Mixed Topology
b) Actuator Answer: C
c) Adware A network configuration known as a mesh
d) Applet topology has devices such as computers and
e) Aero routers connected.
Answer: D
An applet is a small program generally written in 10. Which of the following are the components of
the Java programming language that was a Database Management System?
designed to provide interactivity on web pages. a) Hardware
b) Software
8. An _________ is a small program generally c) Database Access Language
written in the Java programming language that d) Data
e) All the above
b) Pascal b) Spreadsheet
c) Herman Hollerith c) Wordpad
d) Reynold Johnson d) Database
e) Gary Kildall e) Word Format
Answer: C Answer: A
A computer-punched card reader, also known as A word processor is a computer program that
a computer card reader, is a computer input provides special capabilities beyond that of a
device that reads data from punched cards and text editor such as the WordPad program that
computer programs in source or executable comes as part of Microsoft's Windows operating
form. Punched cards were first introduced by systems.
Herman Hollerith.
18. Analog computer works on the supply of
16. A _______________ is a specific kind of ______________.
computer network component that enables a) Continuous electrical pulses
communication with other bridge networks that b) Electrical pulses but not continuous
adhere to the same protocol. c) Magnetic strength
a) Assembler d) Physical strength
b) Interpreter e) Magnetic impulse
c) Hub Answer: A
d) Port Digital computers operate on discrete electrical
e) Bridge pulses while analogue computers operate on
Answer: E continuous electrical pulses.
A bridge is a specific kind of computer network
component that enables communication with 19. What phrase refers to the horizontal cells
other bridge networks that adhere to the same that can hold data?
protocol. a) Columns
b) Rows
17. ________________ is a computer program c) Cell
that provides special capabilities beyond that of d) Table
a text editor such as the WordPad program that e) Ribbon
comes as part of Microsoft's Windows operating Answer: B
systems. Rows are groups of information-containing
a) Word Processor horizontal cells. In spreadsheets, especially
Microsoft Excel, the working space is 22. Inwhich printers, Printing is achieved by
represented by cells. deflecting laser beam on to photosensitive
surface of a drum?
20. Which layer of the OSI model defines the a) Dot Matrix
type of transmission medium between two b) Daisy Wheel
devices? c) Laser printer
a) Physical d) Electromagnetic printer
b) Transport e) None
c) Data Link Answer: C
d) Session In Laser printers, Printing is achieved by
e) Application deflecting laser beam on to photosensitive
Answer: A surface of a drum.
Simplex, half-duplex and full-duplex are the
three transmission directions that are defined by 23. A computer that can be accessed by users
the physical layer between two devices. across a network mainly or exclusively for
Additionally, connecting gadgets to media is a storing and supplying data files is known as
concern. ______
a) application server
21. ___________ command is used to divide the b) data server
blank sector surface into a different partition. c) distributed server
a) Undo d) file server
b) Format e) None of these
c) Paste Answer: D
d) Copy A computer that can be accessed by users
e) Control across a network mainly or exclusively for
Answer: B storing and supplying data files is known as a file
Format command is used to divide the blank server
sector surface into a different partition. It also
assigns a unique address to each partition that is 24. A program which helps create written
divided. The format is the external command documents and lets you go back and make
because it is not commonly used. necessary corrections is _________.
a) Spreadsheet
b) Personal writer
Computer Awareness
1. The primary software that powers a computer 3. What is the full form of CAD?
is called system software. The hardware is a) Computer-Aided Design
activated, controlled, and coordinated when the b) Computer-Aided Engineering
computer is turned on. The system software also c) ComputerAided Instruction
influences the application programs. What is the d) Common Information Model
other name of System Software? e) Command Line Interface
a) Application software Answer: A
b) Background software CAD: Computer-Aided Design
c) Primary Software
d) Property Software 4. FORTRAN programming language is more
e) None of these suitable for ____
Answer: B a) Business Applications
The primary software that powers a computer is b) Marketing Applications
called system software. The hardware is c) Scientific Applications
activated, controlled, and coordinated when the d) Education technology
computer is turned on. The system software also e) Government Applications
influences the application programs. It is also Answer: C
known as background software. Fortran is the industry standard since it was
created for scientists and engineers. For the past
2. Communication circuits that transmit data in 30 years, FORTRAN has been used for a variety
both directions but not at the same time are of tasks, including designing bridges and other
operating in _______. aeroplane-related structures, controlling factory
a) Simplex mode automation, designing storm drainage systems,
b) Half-duplex mode analyzing scientific data, and more.
c) Full-duplex mode
d) Asynchronous mode 5. A broad variety of data types are compatible
e) None of these with the _______ architecture.
Answer: B a) RISC
Half-duplex data transmission means that data b) ARM
can be transmitted in both directions on a signal c) IA-32
carrier, but not at the same time. d) SIMD
e) IA-42
The cell having a bold boundary is the active 22. Which one of the following is a two-
cell. dimensional where we can store data in row and
column-wise?
20. Which layer of the OSI model divides the a) Hierarchical model
stream of bits received from the network layer b) Network model
into data frames? c) Relational model
a) Physical d) All of these
b) Transport e) None of these
c) Data Link Answer: C
d) Session Relational Model
e) Application ->It is an two dimensional, here we can store
Answer: C data in row and column wise.
Data Link layer of OSI model divides the stream ->We can easily fetch the output by given inputs.
of bits received from the network layer into data
frames. 23. The technique that extends storage
capacities of main memory beyond the actual
21. While working with MS-DOS which size of the main memory is called _______
command transfers a specific file from one disk a) Additional storage
to another? b) Extra storage
a) Copy c) Virtual storage
b) Paste d) Stimulated storage
c) Control e) None of these
d) Cut Answer: C
e) Undo The technique that extends storage capacities of
Answer: A main memory beyond the actual size of the main
Use the Copy command to copy a specified file memory is called Virtual storage
from one disc to another. Disk copy transfers the
entire disc to a new disc. The Time command 24.________ is software which has its source
shows the current system time, while the code freely available for use, viewing,
Rename command renames a file. modification, and redistribution.
a) Source code
b) Free code
c) Open source
25. Which type of software works with end-user, software, and computer hardware to handle the
Computer Awareness
12. Which computer generation saw the 14. The foundation for successful computer
introduction of integrated Circuits, sometimes system construction is the __________.
known as ICs? a) Computer Memory
Computer Awareness
11. Which input device is used for inputting text, e) All the above
numbers and commands to the computer? Answer: E
a) Mouse The uses of the Internet:
b) Keyboard Electronic mail
c) Scanner Research
d) All of the above Downloading files
e) None of these Discussion groups
Answer: B Interactive games
The keyboard is used for inputting text, numbers, Education and self-improvement
and commands into the computer. Friendship and dating
Electronic newspapers and magazines
12. What is the unit of Speed measured in the
First Generation computers? 14. A portable computer that can be held in the
a) Milli seconds hand is referred to as a handheld computer.
b) Nanoseconds What is the other name for Handheld Computer?
c) Microseconds a) Personal Computer
d) Both (a) and (b) b) Portable Computer
e) All the above c) Palmtop Computer
Answer: A d) Workstation Computer
The Electronic Computer (ENIAC), which had e) Desktop Computer
over 19000 vacuum tubes, weighed close to 30 Answer: C
tonnes and had a volume of 3000 cubic feet, is A portable computer can be easily carried
an example of a first-generation computer. around in a pocket and operated while you are
Computers from the first generation had speeds carrying it. Handheld computers are also known
measured in milliseconds (thousands of a as personal digital assistants (PDAs) or Palmtop
second). computers.
13. Which of the following are the Uses of the 15. A __________ is a type of integrated electrical
Internet? circuit that performs the calculations that allow a
a) Research computer to function.
b) Downloading files a) Information
c) Education and self-improvement b) Data Processing
d) Electronic mail c) Memory
c) Memory Allocation
The data is stored in Cache memory, before d) Paging
entering in to CPU from the Main memory. e) None of these
Answer: A
25. _______is a memory management technique Segmentation is a memory management
in which each job is divided into several technique in which each job is divided into
segments of different sizes, one for each module several segments of different sizes, one for each
that contains pieces that perform related module that contains pieces that perform related
functions
functions.
a) Segmentation
b) Fragmentation
Computer Awareness
Meta Data provides information about other 3GLare C, C++, Java, JavaScript, and Visual
data. The basic data information is condensed Basic.
into metadata, which facilitates identifying and
interacting with specific instances of data. 13. The World Wide Web also referred to as the
Metadata can be generated automatically with Web, is an information system that makes it
more basic information or manually for greater possible to access papers and other web
accuracy. resources via the Internet. Who is the inventor of
WWW?
11. The first computer mouse was developed by a) Bill Gates
_____________. b) Lee. N. Feyong
a) Douglas Engelbart c) Tim Berners Lee
b) William English d) Tom Berners Lee
c) Daniel Cougher e) Tim Cook
d) Robert Zawaski Answer: C
e) William Henry The World Wide Web also referred to as the
Answer: A Web, is an information system that makes it
Development of the mouse began in the early possible to access papers and other web
1960s by SRI International's Douglas Engelbart, resources via the Internet. The web is another
while he was exploring the interactions between name for www. Tim Berners-Lee created it in
humans and computers. Bill English, then the 1989 at CERN in Geneva.
chief engineer at SRI, built the first computer
mouse prototype in 1964. 14. A file is transferred from one computer
system to another, or to a server so that others
12. In which generation is a high-level language can see or retrieve it is called
developed? ____________________.
a) First a) Download
b) Second b) Upload
c) Third c) Retrieval
d) Fourth d) Sharing
e) Fifth e) Software
Answer: C Answer: A
High-Level languages are developed in the third
generation. The third Generation languages, or
A file is transferred from one computer system to 17. Changing the appearance of a document is
another, or a server so that others can see or called ___
retrieve it is called Download. a) Aligning
b) Formatting
15. Who among the following is considered the c) Documenting
Father of the Computer? d) Copying
a) Charles Babbage e) Editing
b) Pascal Answer: B
c) Herman Hollerith The process of changing the appearance of the
d) Reynold Johnson text is called Formatting.
e) Gary Kildall
Answer: A 18. A ________ is the fundamental building block
Charles Babbage was considered to be the of an Excel spreadsheet that you insert data.
father of computing after his concept, and then a) Data
later the invention of the Analytical Engine in b) Tab
1837. c) Range
d) Cell
16. A ________________ is a network security e) Box
device used in computing that monitors and Answer: D
regulates incoming and outgoing network traffic A cell is the fundamental building block of an
by pre-established security rules. Excel spreadsheet where we insert data. Each
a) Bridge worksheet is made up of countless cells, which
b) Firewall are rectangular shapes. A row and a column
c) Port come together to form a cell.
d) Domain
e) Protocol 19. What are the basic rectangular building
Answer: B blocks of a spreadsheet?
A firewall is a network security device used in a) Columns
computing that monitors and regulates incoming b) Rows
and outgoing network traffic following pre- c) Cell
established security rules. d) Table
e) Ribbon
Answer: C
over the equator and their path follows the c) Drive imaging
equatorial plane of the Earth. d) Utility software
e) None of these
25 ______ is the software that creates a mirror Answer: C
image of the entire hard disk, including the Drive imaging is the software that creates a
operating system, application, files and data. mirror image of the entire hard disk, including the
a) Operating system operating system, application, files and data.
b) Backup software
Computer Awareness
1. Which among the following is the major The gutter margin is a typographical term used
feature of the Central Processing Unit (CPU)? to designate an additional margin added to a
a) It performs all types of data processing page layout to compensate for the part of the
operations paper made unusable by the binding process. In
b) It stores data, intermediate results, and a facing pages layout (Word refers to this type of
instructions (program) layout as "mirror margins"), the gutter margin is
c) It controls the operation of all parts of the on the very inside of both pages.
computer
d) All the above 3. What is the full form of COBOL?
e) None of the above a) Complementary Metal Oxide Binary Language
Answer: D b) Common Business Objective Language.
Central Processing Unit (CPU) consists of the c) Common Business Oriented Language
following features − d) Cathode Ray Tube Language
CPU is considered the brain of the e) Central Business Oriented Language
computer. Answer: C
CPU performs all types of data COBOL: Common Business-Oriented Language
processing operations.
It stores data, intermediate results, and 4. What is the name of the translator that
instructions (program). converts an assembly language program into
It controls the operation of all parts of the machine language code?
computer. a) Compiler
b) Interpreter
2.______________ is applicable at the time of c) Assembler
taking printing and binding printouts from a d) Linker
computer document. e) None of these
a) .Aligned margin Answer: C
b) Text margin An assembler translator creates machine
c) Gutter language code from an input assembly language
d) Slated margin program. A program known as an assembler
e) None of the above transforms assembly language into machine
Answer: C code.
5. Which of the following are the features of the because SRAM only requires a small steady
Memory Unit? current while DRAM requires bursts of power.
a) It stores all the data and the instructions
required for processing 7. Which of the following is the first Computer
b) It stores the final results of processing before Virus?
these results are released to an output device a) Mcafree
c) It stores intermediate results of processing b) Creepers
d) All inputs and outputs are transmitted through c) Firewall
the main memory d) Trojan
e) All the above e) Harle
Answer: E Answer: B
The functions of the memory unit are − The first computer virus is most frequently
It stores all the data and the instructions referred to as the creeper virus.
required for processing.
It stores intermediate results of 8. __________ is a program that allows you to
processing. search the files of all the Internet FTP servers
It stores the final results of processing that offer anonymous FTP.
before these results are released to an a) Applet
output device. b) Adware
All inputs and outputs are transmitted through c) Algorithm
the main memory. d) Archie
e) Application
6. In comparison to static RAM, dynamic RAM Answer: D
consumes _______ power. Archie is a program that allows you to search the
a) Less files of all the Internet FTP servers that offer
b) More anonymous FTP.
c) Neutral
d) No 9. _____________ are communication processors
e) Unstable that link various networks by translating one set
Answer: B of protocols into another.
Typically, a Static RAM module consumes less a) Network
power than a Dynamic RAM module. This is b) Wireless
c) Gateway
15. Analytical engines were originally introduced 17.What is the other name for Desktop and
in the first generation of computers. To store personal computers?
data, the first generation of computers used a) Microcomputers
_______ as memory units. b) Supercomputers
a) Counter Wheels c) Minicomputers
b) Microprocessor d) Mainframe computers
c) Transistors e) Hybrid computers
d) RAM Answer: A
e) Magnetic Tapes A single chip (microprocessor) serves as the
Answer: A central processing unit in a PC or microcomputer
During the first generation of computers, (CPU). A PC is now the most common type of
analytical engines were introduced. This first "microcomputer,"
generation of computers uses counter wheels as
a memory unit to store data. The analytical 18. Which of the following type of computer is an
engine was invented by Charles Babbage in integral component of most embedded systems,
1833. is it a combination of hardware and software that
is designated to perform a highly specific
16. Which among the following are the Toggle function?
Keys in the Keyboard? a) MicroComputer
a) Capslock b) Mini Computer
b) Number lock c) Mainframe Computer
c) Scroll Lock d) Embedded Computer
d) All the above e) Nano Computer
e) None of the above Answer: D
Answer: D An embedded computer, which is an integral
component of most embedded systems, is a
System Bus resides on the motherboard and 25. Which of the following devices have a
connects the CPU to other components on the limitation that we can only store information on it
Motherboard but cannot erase or modify it?
a) Floppy disk
24. Which one brings you through the process of b) Hard disk
creating a chart by displaying a series of dialog c) Tape drive
boxes? d) Pen drive
a) Chart area e) None of these
b) Chart title Answer: C
c) Chart wizard Tape drive devices have a limitation that we can
d) Legend only store information to it but cannot erase or
e) None of these modify it
Answer: C
Chart wizard brings you through the process of
creating a chart by displaying a series of dialog
boxes.
Computer Awareness
1. ______________ is a type of system software system, which set a new standard for graphics
that controls how computer hardware and displays. Prior to the development of VRAM,
software resources are used and offer basic dual-ported memory was quite expensive,
services to other software applications. limiting higher resolution bitmapped graphics to
a) Operating System high-end workstations. VRAM improved the
b) Utility Programs overall frame-buffer throughput, allowing low
c) Device drivers cost, high-resolution, high-speed, color graphics.
d) Language translators Modern GUI-based operating systems benefitted
e) None of the above from this and thus it provided a key ingredient for
Answer: A proliferation of graphical user interfaces (GUIs)
An operating system (OS) is a type of system throughout the world at that time.
software that controls how computer hardware
and software resources are used and offer basic 3. What does S represent in CSI?
services to other software applications. a) Sentence
b) Simple
2. Which among the following is used for the c) Second
purpose of video and graphics in the computer ? d) System
a) ROM e) Separated
b) EEPROM Answer: D
c) EPROM CSI: Common System Interface.
d) V-RAM
e) SRAM 4. ___________ are specialized software tools
Answer: D that convert the source code of one
Video RAM, or VRAM, is a dual-ported variant of programming language into machine code,
dynamic RAM (DRAM), which was once bytecode, or another programming language.
commonly used to store the frame-buffer in a) Compiler
graphics adapters. It was invented by F. Dill, D. b) Interpreter
Ling and R. Matick at IBM Research in 1980, c) Assembler
with a patent issued in 1985 (US Patent d) Linker
4,541,075). The first commercial use of VRAM e) None of these
was in a high-resolution graphics adapter Answer: A
introduced in 1986 by IBM for the PC/RT
Compilers are specialized software tools that 6. _____________ is a non-volatile memory type
convert the source code of one programming that receives data and permanently writes it on a
language into machine code, bytecode, or chip and it lasts even after you turn off your
another programming language. computer.
a) RAM
5. Which of the following are the features of the b) ROM
Control Unit? c) Storage
a) It is responsible for controlling the transfer of d) Input
data and instructions among other units of a e) Output
computer Answer: B
b) It manages and coordinates all the units of the ROM (read-only memory) is a non-volatile
computer memory type that receives data and permanently
c) It obtains the instructions from the memory, writes it on a chip and it lasts even after you turn
interprets them, and directs the operation of the off your computer.
computer
d) It communicates with Input/Output devices for 7. Firewalls are employed to provide security
the transfer of data or results from storage from ________________.
e) All the above a) Fire Attacks
Answer: E b) Virus Attacks
Functions of this unit are − c) Data Driven Attacks
It is responsible for controlling the transfer d) Unauthorised Attacks
of data and instructions among other units e) All the above
of a computer. Answer: D
It manages and coordinates all the units A firewall is a type of security device used to
of the computer. stop unauthorized users from entering or leaving
It obtains the instructions from the a computer network. Firewalls are frequently
memory, interprets them, and directs the used to prevent unauthorized users from
operation of the computer. connecting to private networks, or intranets,
It communicates with Input/Output connected to the internet.
devices for the transfer of data or results
from storage. 8. An ________ is a collection of data moved to a
It does not process or store data. repository for long-term retention, to be kept
18. ____ are specially designed computer chips The device is operated at the physical layer by a
that reside in other devices such as your car or "repeater." By the transmission loss, it is utilized
your electronic thermostat. to retransmit the digital or analogue signal. While
a) Networks an analogue repeater just amplifies the signal, a
b) Client digital repeater reconstructs the signal at its
c) Mainframe original capacity.
d) Supercomputer
e) Embedded System 21. When a user clicks on a file icon, the system
Answer: E can immediately run an encoded set of
Embedded Systems are specially designed instructions contained in an _________ file.
computer chips that reside in other devices such a) Data
as your car or your electronic thermostat. b) Executable
c) Information
19. What function shows column data in a row or d) Application
row data in a column? e) End
a) Hyperlink Answer: B
b) Ribbon When a user clicks on a file icon, the system can
c) Transpose immediately run an encoded set of instructions
d) Hypertext contained in an executable file (EXE file).
e) Index
Answer: C 22.Which process of decomposing a problem
If you have a worksheet with data in columns (program) into a set of modules so as to reduce
that you need to rotate to rearrange it in rows, the overall complexity of the problem?
use the Transpose feature. a) Polymorphism
b) Modularity
20. A device operating at the physical layer is c) Hierarchy
called a _________. d) Abstraction
a) Router e) None of these
b) Server Answer: B
c) Repeater Modularity
d) Transmitter -> Modularity is the process of decomposing a
e) Integrator problem (program) into a set of modules so as to
Answer: C reduce the overall complexity of the problem.
Computer Awareness
Each data item in a record may be a group item 25. Which scheduling is a non-preemptive, pre-
composed of sub-items; those items which are emptive scheduling algorithm and easy to
indecomposable are called Elementary items, understand and implement?
Atoms, and Scalars a) Priority scheduling
b) First-Come, First-Served
24. To read the system messages and warnings, c) Shortest-Job-Next
access in Windows, Which of the following files d) Round Robin
should be checked? e) None of these
a) System manager Answer: B
b) Even viewer Explanation:
c) Control panel First-Come, First-Served is a non-preemptive,
d) System message pre-emptive scheduling algorithm.
e) None of these Easy to understand and implement. Its
Answer: B implementation is based on FIFO queue.
In Even viewer, the user can read the system Poor in performance as the average wait time is
messages and warnings, access in Windows. high.
Computer Awareness
simultaneously ready numerous bytes of data 8. A _________ is a copy of important data that is
from the same row. stored in an alternative location, so it can be
recovered if deleted or it becomes corrupted.
6. The CPU may directly access the memory a) Malware
locations known as ________ which house the b) Archie
operands or instructions that are currently being c) Backup
processed. d) Bandwidth
a) Storage e) Baseband
b) Cache Answer: C
c) Registers A backup is a copy of important data that is
d) Input stored in an alternative location, so it can be
e) Output recovered if deleted or it becomes corrupted.
Answer: C
The CPU may directly access the memory 9. Devices that connect LANs include and work
locations known as registers, which house the at the data link layer is ______________.
operands or instructions that are currently being a) Hub
processed. The lowest form of integrated data b) Tunnel
storage in a CPU is a register. c) Bridges
d) HDLC
7. A ___________ is a type of computer e) All the above
application that a computer virus typically Answer: C
connects to. Bridge devices connect and facilitate
a) host program communication between two distinct networks at
b) target program the data link layer of the Open System
c) backdoor program Interconnect (OSI) model.
d) Bluetooth
e) trojan horse 10. ______________________________ means
Answer: E that the data contained in a database is
A Trojan Horse is a type of computer application accurate, consistent and reliable.
that a computer virus typically connects to. a) Data redundancy
b) Data reliability
c) Data Consistency
d) Data integrity
13. An ____________ is a restricted private 15. The ______________ was the first general-
network that gives authorized customers, purpose electronic digital computer design for
vendors and partners access to a portion of the business application produced in the United
States.
of one character that can be displayed in a cell Functions like printing a document, downloading
formatted with the standard font. On a new images, etc., can be performed only one at a
worksheet, the default width of all columns is time. Examples include MS-DOS, Palm OS, etc.
8.43 characters, which corresponds to 64 pixels.
22. From the child table foreign key is going to
20. The physical layer translates logical pointing the primary key of the foreign table so it
communication requests from the ______ into is called as____
hardware-specific operations. a) Primary key
a) data link layer b) Candidate key
b) network layer c) Referential integrity key
c) transport layer d) Alternate key
d) application layer e) None of these
e) None of the above Answer: C
Answer: A From child table foreign key is going to pointing
Physical layer accepts data or information from the primary key of foreign table so it is called as
the data link layer and converts it into hardware- Referential integrity key.
specific operations so as to transfer the
message through physical cables. Some 23. The process of confirming that someone or
examples of the cables used are optical fiber something is who or what it claims to be is
cables, twisted pair cables and co-axial cables. known as _________________.
a) Integration
21. An operating system that allows a single b) Topology
user to perform only one task at a time is called c) Authentication
a _______________________. d) Security
a) Single-user operating system e) Protocol
b) Multiuser operating system Answer: C
c) Single-tasking operating system The process of confirming that someone or
d) Multitasking operating system something is who or what it claims to be is
e) Real-time operating system known as authentication.
Answer: A
An operating system that allows a single user to 24. The program, which is used to gain
perform only one task at a time is called a administrative rights to someone’s computer is
Single-User Single-Tasking Operating System. known as ______.
Computer Awareness
6. When you first turn on a computer, the CPU is In computing, bandwidth is the maximum rate of
preset to execute instructions stored in the data transfer across a given path.
___________.
a) RAM 9. What is the short name of modulator and
b) ROM demodulator?
c) Cache a) MODEM
d) ALU b) MAN
e) Flash memory c) LAN
Answer: B d) Bridge
The CPU starts and fetches instructions into e) Hub
RAM from the BIOS, which is stored in the ROM. Answer: A
The modem is a device that converts digital
7. __________ are viruses that trick users into signals produced by computers into analogue
downloading and running them by seeming to be signals so they can travel through phone lines.
helpful programs. The "modulator-demodulator" or modem can
a) host program connect to an ISP or function as a dial-up for
b) target program LAN.
c) backdoor program
d) Bluetooth 10. There is a set of allowable values known as
e) trojan horse the ___ of that attribute for each attribute of a
Answer: E relation.
Trojan horses are viruses that trick users into a) Schema
downloading and running them by seeming to be b) Relation
helpful programs. c) Domain
d) Set
8. In computing, ___________ is the maximum e) Integrity
rate of data transfer across a given path Answer: C
a) Malware The domain should contain the attribute's values.
b) Archie A domain is a range of acceptable values.
c) Backup
d) Bandwidth 11. The computer monitor is connected to the
e) Baseband CPU through ______________.
Answer: D a) Bus
b) Cable Answer: B
c) Wire An application program known as a browser
d) Line driver offers a way to see and engage with all of the
e) Adapter content on the World Wide Web.
Answer: B
The computer monitor is connected to the CPU 14. A physical component known as a
through a Cable. ___________ transfers data between
transmission media so that information can be
12. Which of the following statements is not true sent from one computer to another.
for first-generation computers? a) Internet
a) They are about the size of the room. b) Modem
b) They consume more power and generate c) CPU
more heat. d) Pen drive
c) They are made up of semiconductor e) Compact Disk
transistors. Answer: B
d) They often fail to operate. A physical component known as a modem
e) None is true transfers data between transmission media so
Answer: C that information can be sent from one computer
The first-generation computers are large, about to another.
the size of a room. They consume more power
and also generate enormous heat. Because they 15. The actions and procedures required to
use vacuum tubes as switching devices. process data, such as answering questions or
However, transistors are semiconductor devices selecting an icon, are referred to as
used in the second generation of computers. ________________.
a) Steps
13. An application program known as a b) Instructions
___________ offers a way to see and engage c) Information
with all of the content on the World Wide Web. d) Processor
a) Web e) Sets
b) Browser Answer: B
c) Hyperlink The actions and procedures required to process
d) Hypertext data, such as answering questions or selecting
e) Telnet an icon, are referred to as Instructions.
16. The topmost row of keys on the standard The Indian Space Research Organization
keyboard contains ____________ keys and the (ISRO) constructed the supercomputer known as
longest key on the keyboard is _______________. SAGA-220 (Supercomputer for Aerospace with
a) alphabetic, space bar GPU Architecture-220 Teraflops).
b) number, enter key Dr. K. Radhakrishnan, the ISRO Chairman,
c) function, enter key unveiled it on May 2, 2011. It is no longer the
d) function, space bar fastest supercomputer in India as of January 8,
e) capslock, enter key 2018, having been eclipsed by the Pratyush
Answer: D supercomputer, which has a theoretical
The topmost row of keys on the standard maximum speed of 220 TFlops.
keyboard contains function keys and the longest
key on the keyboard is the spacebar. 19. In Excel, ......... allows users to bring together
copies of workbooks that other users gave
17. Changing the appearance of a document is worked on independently.
called ___ a) Copying
a) Aligning b) Editing
b) Formatting c) Merging
c) Documenting d) Formatting
d) Copying e) Creating
e) Editing Answer: C
Answer: B In Excel, merging allows users to bring together
The process of changing the appearance of the copies of workbooks that other users gave
text is called Formatting. worked on independently.
18. Which of the following organization 20. Which of the following tasks is not done by
developed a SAGA-220 supercomputer in 2011? the data link layer?
a) DRDO a) framing
b) NASA b) error control
c) BARC c) flow control
d) ISRO d) channel coding
e) C-DAC e) All the above
Answer: D Answer: D
Channel coding is the function of the physical ->It is used for any changes made during
layer. The data link layer mainly deals with transaction and it does not made to the
framing, error control and flow control. The data database.
link layer is the layer where the packets are
encapsulated into frames. 23. ______ is used to find physical address for a
given IP address and ___ is used to find an IP
21. An operating system's ________ feature address for a given physical address
enables a user to handle multiple computer a) RARP, ARP
tasks simultaneously, such as running b) ARP, RARP
application software. c) ICMP, IGMP
a) Multiprocessing d) IGMP, ICMP
b) Multithreading e) None of these
c) Multitasking Answer: B
d) Multicomputing Address Resolution Protocol (ARP) is used to
e) Multisetting find physical address for a given IP address and
Answer: C Reverse Address Resolution Protocol (RARP) is
An operating system's multitasking feature used to find IP address for a given physical
enables a user to handle multiple computer address.
tasks simultaneously, such as running
application software. 24. The process is to check and ensure the
components of the computer are operating and
22. In SQL Which one is used for any changes connected properly is known as ______
made during the transaction and it does not a) Repairing
make to the database? b) Checking
a) Save point c) Paring
b) Commit d) Booting
c) Truncate e) None of these
d) Abort Answer: D
e) None of These Booting is the process to check and ensure the
Answer: D components of the computer are operating and
Abort connected properly
Computer Awareness
Computer Awareness
11. The output quality of a printer is measured in 13. Internet address is a ______________
_______________. number.
a) dots per sq a) 8 bit
b) dots per inch b) 12 bit
c) dots printer per inch c) 16 bit
d) All of these d) 32 bit
e) None of these e) 48 bit
Answer: B Answer: D
PPI (pixels per inch) is the input resolution of an IPv4 chose 32-bit because it was the biggest
image or photograph, and DPI (dots per inch) is register found in any common processor at the
the output resolution of a printer or imagesetter. time.
When an image is reproduced as a true physical
object, such as when printed onto paper, the 14. ______________ is a global, linked network of
term "DPI" refers to the physical dot density of computers that communicate with one another
the image. using a standard protocol.
a) Central Processing Unit
12. Vacuum tubes served as the foundational b) Internet
parts of the memory and CPU circuits in the first c) Processor
generation of computers. This generation d) Operating System
primarily used operating systems for e) Read Access Memory
___________. Answer: B
a) Multi-tasking The Internet is a global, linked network of
b) Networking computers that communicate with one another
c) Batch processing using a standard protocol.
d) Multi-tabulation
e) None of these
20. The network layer is concerned with 22.The database should be durable enough to
__________ of data. hold all its latest updates even if the system fails
a) bits or restarts is known as ______
b) frames A. Atomicity
c) packets B. Consistency
d) bytes C. Isolation
e) All the above D. Durability
Answer: C E. None of These
In computer networks, the data from the Answer: D
application layer is sent to the transport layer Durability
and is converted to segments. These segments ->The database should be durable enough to
are then transferred to the network layer and hold all its latest updates even if the system fails
these are called packets. These packets are or restarts.
then sent to data link layer where they are
encapsulated into frames. These frames are 23. Which of the following is responsible for
then transferred to physical layer where the deciding when the system can be released to
frames are converted to bits. customers,managing the process of creating the
release and distribution media and documenting
21. The _________ operating system enables the the release?
user to conduct multiple tasks simultaneously, A. System procurement
giving each one an equal amount of time to B. System quality assessment
complete. C. System release management
a) Multitasking D. System reliability
b) Multi setting E. None of these
c) Time sharing Answer: C
d) Time tracing System release management is responsible for
e) Time Setting deciding when the system can be released to
Answer: C customers, managing the process of creating the
The time-sharing operating system enables the release and distribution media and documenting
user to conduct multiple tasks simultaneously, the release
giving each one an equal amount of time to
complete.
24. If in a computer, 16 bits are used to specify 25. Whenever there is a lack of communication
the address in a RAM, the number of addresses between the customer and the software
will be __________ bits company they move on to the concept called
A.216 ________________.
B.64K A. Waterfall model
C.65536 B. Spiral model
D.1028 C. Prototype model
E. None of these D.V &V model
Answer: C E. None of these
If in a computer, 16 bits are used to specify the Answer: C
address in a RAM, the number of addresses will Whenever there is a lack of communication
be 65536 bits between the customer and the software
company they move on to the concept called the
Prototype model.
Computer Awareness
1. __________________ are specialised software From Windows 8, the program was renamed to
tools that convert the source code of one Defragment and Optimize Drives.
programming language into machine code,
bytecode, or another programming language. 3. What does V represent in DVI?
a) Assembler a) Video
b) Compiler b) Versatile
c) Interpreter c) Visual
d) Language Translator d) Version
e) Device Drivers e) Value
Answer: B Answer: C
Compilers are specialized software tools that DVI: Digital Visual Interface
convert the source code of one programming
language into machine code, bytecode, or 4. C, C++, JAVA, BASIC, and COBOL are
another programming language. Usually, a high- examples of ____ languages.
level, understandable language like Java or C++ a) Binary Language
is used to create the source code. b) Assembly Language
c) Machine Language
2. _______ is a Windows utility program that d) High-level Language
locates and eliminates unnecessary fragments e) Low-Level Language
and rearranges files and unused disk space to Answer: D
optimize operations. C, BASIC, COBOL, and Java are examples of
A. Backup high-level languages.
B. Disk cleanup
C. Disk defragmenter 5. Function of logic section is to perform logic
D. Restore operations such as ________.
E. Disk restorer a) Comparing of Data
Answer: C b) Selecting of Data
Disk Defragmenter is a utility in Microsoft c) Matching of Data
Windows designed to increase access speed by d) Merging of Data
rearranging files stored on a disk to occupy e) All the above
contiguous storage locations, a technique called Answer: E
defragmentation.
The function of the logic section is to perform 8. ______________ is an optical disc format that
logic operations such as comparing, selecting, was developed to enable recording, playback,
matching, and merging data. and rewriting of high-definition (HD) video.
a) Blue-ray Disc
6. _____________ is a small-sized type of volatile b) Optical Fibre
computer memory that provides high-speed data c) Batch File
access to a processor and stores frequently d) Binary
used computer programs, applications, and data. e) Blogger
a) RAM Answer: A
b) ROM Blue Ray Disc is an optical disc format that was
c) Cache developed to enable the recording, playback and
d) ALU rewriting of high-definition (HD) video.
e) Flash memory
Answer: C 9. Which is the first network system that started
Cache memory is a small-sized type of volatile the Internet?
computer memory that provides high-speed data a) INTRANET
access to a processor and stores frequently b) ARPANET
used computer programs, applications, and data. c) INTERNET
d) HYPERNET
7. A malicious assault known as __________ e) HYDRANET
conceals the IP packets' true source to make it Answer: B
difficult to determine where they originated. The Advanced Research Projects Agency
a) spoofing Network, or ARPANET, was developed in the
b) forging late 1960s and served as the first functional
c) IP spoofing prototype of the Internet. ARPANET, which was
d) All of these first supported by the US Department of
e) None of these Defense, used packet switching to enable multi-
Answer: C computer communication across a single
A malicious assault known as Internet Protocol network.
(IP) spoofing conceals the IP packets' true
source to make it difficult to determine where 10. When projecting a set of tuples from a
they originated. relation, the relational algebra procedure that is
most frequently employed is _________________.
An input device is a piece of hardware used in 18. Which was the first fully electronic computer
computing to send data and control signals to a in the world?
system that processes information, like a a) EDSAC
computer or information appliance. b) UNIVAC
c) ENIAC
16. _____________ is the practice of sending d) Z1
unsolicited bulk communications via electronic e) MARK1
messaging platforms like e-mails, other digital Answer: C
delivery systems, and broadcast media. The first programmable general-purpose
a) Spamming electronic digital computer was created by the
b) Spooling US during World War II and is known as ENIAC,
c) Phishing or Electronic Numerical Integrator and
d) Cracking Computer.
e) Creeping
Answer: A 19. Press ____ to select all rows and columns in
Spamming is the practice of sending unsolicited the worksheet.
bulk communications via electronic messaging a) Ctrl + X
platforms like e-mails, other digital delivery b) Ctrl + A
systems, and broadcast media. c) Ctrl + P
d) Ctrl + V
17. To make the selected text underline, the e) Ctrl + E
shortcut key is____. Answer: B
a) Ctrl + B The full worksheet is selected using Control + A.
b) Ctrl + I Control + A, on the other hand, will select all of
c) Ctrl + U the cells in a group of adjacent cells where the
d) Ctrl + S cursor is now located.
e) Ctrl + V
Answer: C 20. Which one of the following is not a function
The quickest way to underline text is to press of the network layer?
Ctrl+U and start typing. When you want to stop a) routing
underlining, press Ctrl+U again. b) inter-networking
c) congestion control
d) error control
e) All the above are the functions NAND gates, NOR gates are called as "universal
Answer: D gates" that can be combined to form any other
In the OSI model, the network layer is the third kind of logic gate.
layer and it provides data routing paths for
network communications. Error control is a 23. Which is a special type of stored procedure
function of the data link layer and the transport that is automatically invoked whenever the data
layer. in the table is modified?
A. Tripped
21. _________________ is an ability of an B. Trigger
operating system that executes more than one C. Procedure
program using a single processor machine. D. Cursor
a) Multiprocessing E. None of these
b) Multithreading Answer: B
c) Multitasking The special type of stored procedure that is
d) Multicomputing automatically invoked whenever the data in the
e) Multiprogramming table is modified is known as Trigger.
Answer: E
Multiprogramming OS is an ability of an 24. SRAM retains data as long as power is
operating system that executes more than one provided to the memory chip and need not be
program using a single processor machine. More refreshed periodically. What does ‘S’ represent?
than one task or program or job is present inside A. Stagnant
the main memory at one point in time. B. Storage
C. Simple
22. AND gates, NOR gates are called ______ D. Static
that can be combined to form any other kind of E. None of these
logic gate Answer: D
A. Inverse gate SRAM retains data as long as power is provided
B. Combination gate to the memory chip and need not be refreshed
C. Both B and D periodically. SRAM stands for Static Random
D. Universal gate Access Memory.
E. None of these
Answer: D 25. A specialised network device that determines
the next network point to which it can forward a
Computer Awareness
20. Transport layer aggregates data from 22. Which one of the following is the time
different applications into a single stream before required between the desired mode for a read or
passing it to ____________. write operation till the data is made available or
a) network layer written at the desired location?
b) data link layer a) Response time
c) application layer b) Access time
d) physical layer c) Average time
e) All the above d) Waiting time
Answer: A e) None of these
The flow of data in the OSI model flows in Answer: B
following manner Application -> Presentation -> Access time
Session -> Transport -> Network -> Data Link -> ->It is the time required between the desired
Physical. Each and every layer has its own set of mode for a read or write operation till the data is
functions and protocols to ensure efficient made available or written at the desired location.
network performance.
23. Multi user systems provided cost savings for
21. The first graphical user interface was small business because they use a single
developed at __________. processing unitto link several ______
a) Apple a) Personal Computer
b) Microsoft b) Workstation
c) Xerox Corporation c) Mainframes
d) Dell d) Dumb terminals
e) IBM e) None of these
Answer: C Answer: D
The GUI was first developed at Xerox PARC by Multi user systems provided cost savings for
Alan Kay, Larry Tesler, Dan Ingalls, David Smith, smallbusiness because they use a single
Clarence Ellis, and some other researchers. It processing unitto link several Dumb terminals
used windows, icons, and menus (including the
first fixed drop-down menu) to support 24. The data are modified to specific code and
commands such as opening files, deleting files, protected in the sender side while transferring,
moving files, etc. and the special key is used to retrieve the
original data in the receiver side. What is the
process used in receiver side to retrieve the It may also be performed with a set of keys or
original data? passwords.
a) Decoding
b) Encoding 25. Signals can be analog or digital and a
c) Encrypting computer that processes the both type of signals
d) Decrypting is known as ________
e) None of these a) Micro Computer
Answer: D b) Mainframe computer
Decryption is the process of transforming data c) Analog computer
that has been rendered unreadable through d) Digital Computer
encryption back to its unencrypted form. In e) Hybrid Computer
decryption, the system extracts and converts the Answer: E
garbled data and transforms it to texts and Signals can be analog or digital and a computer
images that are easily understandable not only that processes the both type of signals is known
by the reader but also by the system. Decryption as Hybrid Computer.
may be accomplished manually or automatically.
Computer Awareness
a) Machine Code
10. Which of the following is the category of b) Instruction Code
Low-Level Language? c) Operation code
a) Machine Level Language d) Assembly Code
b) Assembly Language e) Language Code
c) Binary Language Answer: C
d) Both (a) and (b) In computing, an opcode (abbreviated from
e) Both (a) and (c) operation code, also known as instruction
Answer: D machine code, instruction code, instruction
The low-level language is a programming syllable, instruction parcel, or string) is the
language that provides no abstraction from the portion of a machine language instruction that
hardware, and it is represented in 0 or 1 forms, specifies the operation to be performed.
which are the machine instructions. The
languages that come under this category are 13. A ______ in computer architecture is a
Machine level language and Assembly location that a computer's central processing unit
language. may access fast.
a) RAMs
11. The sequence of events that occurs in the b) Caches
computer when it is interpreting and executing c) Registers
an instruction is known as _______________. d) Memory
a) Execution Cycle e) Graphics
b) Instruction Cycle Answer: C
c) Working Cycle A processor register in computer architecture is
d) Machine Cycle a location that a computer's central processing
e) None of the above unit may access fast.
Answer: B
The "Instruction Cycle" refers to the series of 14. A _____ is a sort of instruction that can
actions taken by a computer to interpret and generate many lines of machine language code.
carry out an instruction. a) Macro
b) Assembly
12. The instruction code used in machine or c) Registers
assembly language which specifies the basic d) Cache
operations of the CPU is ______________. e) Bus
Computer Awareness
Excel provides a very easy way to move a sheet A bridge is a computer networking device used
from one place to another in the same workbook. to make a connection and pass along packets of
Click the sheet tab you want to move. While data between two networking computers using
holding down the mouse button, drag the sheet the same protocol.
tab to its new location.
12. A ___________ is the software used for
10. A private communication, such as a phone viewing pages on the web.
call, instant message, videoconference, or fax a) Boot Disk
transmission, can be intercepted in real-time b) Browser
without the intended recipient's knowledge and c) Blue Ray
is known as _______________. d) Bridge
a) Replay e) Buffer
b) eavesdropping Answer: B
c) patches A browser is software used for viewing pages on
d) payloads the web.
e) None of these
Answer: B 13. A ____________is a data area shared by
Private communication, such as a phone call, hardware devices or program processes that
instant message, videoconference, or fax operate at different speeds or with different sets
transmission, can be intercepted in real-time of priorities.
without the intended recipient's knowledge and is a) Boot Disk
known as eavesdropping. b) Browser
c) Blue Ray
11. A _________ is a computer networking device d) Bridge
used to make a connection and pass along e) Buffer
packets of data between two networking Answer: E
computers using the same protocol. A buffer is a data area shared by hardware
a) Boot Disk devices or program processes that operate at
b) Boolean different speeds or with different sets of
c) Blue Ray priorities.
d) Bridge
e) Buffer
Answer: D
14. A __________ is a grouping of wires that the computer networking technology known as
allow the flow of data from one area of the Token Ring. IBM first made it available in 1984.
computer to another.
a) Bus 17. ______________ is a network security device
b) Bridge that monitors and filters incoming and outgoing
c) Buffer network traffic based on an organization's
d) Browser previously established security policies.
e) Boot Disk a) Wireless
Answer: A b) Open Source
A bus is a grouping of wires that allow the flow of c) Firewall
data from one area of the computer to another. d) LAN
e) Outsource
15. A _________ is a computer data transfer or Answer: C
data storage measurement A Firewall is a network security device that
a) Bus monitors and filters incoming and outgoing
b) Bridge network traffic based on an organization's
c) Buffer previously established security policies.
d) Byte
e) Boot Disk 18. Which of the following protocol provides a
Answer: D connection-oriented reliable service?
A byte is a computer data transfer or data a) IP
storage measurement. One byte equals 8 bits. b) UDP
c) TCP
16. Token ring, token bus, and Ethernet are d) All the above
examples of __________. e) None of the above
a) LAN Answer: C
b) WAN Through the establishment of an end-to-end
c) MAN connection between the transmitting and
d) Internet receiving sites, TCP may verify that a packet has
e) Networking arrived at its destination. As a result, TCP is
Answer: A referred to as a "reliable, connection-oriented"
LAN types include Ethernet and token rings protocol.
(Local Area Network). LANs are created using
database functions. A database can be relationships with one another and with attributes
communicated using SQL. of physical objects.
24. A __________ is an abstract model that 25. The ____ database is the most widely used
describes, how the data are organized and database structure.
represented. a) Hierarchical
a) Database b) General
b) Instances c) Standard
c) Schema d) Table
d) DBMS e) Relational
e) Data Model Answer: E
Answer: E The most popular form of database is the
A data model is an abstract model used to relational database. Popular examples of
organize data items and standardize their relational databases are Microsoft Access,
MySQL, and Oracle.
Computer Awareness
1. The CPU comprises of Control unit, Memory, 3. _____________ is a component or system that
and ____ unit. stores data for quick access in digital electronics
a) Input such as computers and related computer
b) Output hardware.
c) Microprocessor a) Storage
d) Arithmetic/Logic Unit b) Compiler
e) System c) Memory
Answer: D d) Software
The control unit (CU), memory, and e) Hardware
arithmetic/logic unit (ALU) make up the CPU. Answer: C
The CU retrieves instructions from memory (also Memory is a component or system that stores
known as main memory/primary memory/RAM), data for quick access in digital electronics such
decodes, and executes them, invoking the ALU as computers and related computer hardware.
when necessary. The ALU conducts arithmetic
and logic operations. 4.The CPU and memory are located on the
_____________.
2. ______________ is a piece of equipment used a) Motherboard
to provide data and control signals to an b) Integrated Circuit
information processing system, such as a c) Keyboard
computer or information appliance. d) Graphics Board
a) Input Device e) Sound Board
b) Hardware Answer: A
c) Software The motherboard is the main circuit board of the
d) Output computer. It is a small plate that houses your
e) Interpreter computer's CPU, RAM, hard disc and optical
Answer: A drive connectors, expansion cards for controlling
An input device is a piece of equipment used to the video and audio, and connections to the
provide data and control signals to an ports (such as USB ports).
information processing system, such as a
computer or information appliance. 5. Which of the following controls the operation
of all parts of the computer?
a) Keyboard
Data Bus is a collection of signals that are used refreshed periodically. What does ‘S’
to convey data simultaneously from one represents?
computer component to another. a) Stagnant
b) Storage
19. Which of the following button is utilized to c) Simple
extend the duration of the Presentation’s slides? d) Static
a) Slide show menu e) None of these
b) Rehearse timings button Answer: D
c) Slide transition button SRAM retains data as long as power is provided
d) All the above to the memory chip and need not be refreshed
e) None of the above periodically. SRAM stands for Static Random
Answer: B access memory.
Rehearse timings button is utilized to extend the
duration of the presentation’s slides. 22. Which of the following is non-volatile
memory?
20. While working with MS-DOS which a) RAM
command transfers a specific file from one disk b) ROM
to another? c) Cache
a) Copy d) Primary
b) Paste e) None of these
c) Control Answer: B
d) Cut ROM is a volatile memory.
e) Undo
Answer: A 23. In which part of the computer, does the data
Use the Copy command to copy a specified file stored before entering into the CPU from the
from one disc to another. Disk copy transfers the Main memory?
entire disc to a new disc. The Time command a) External hard disk
shows the current system time, while the b) Secondary memory
Rename command renames a file. c) Cache memory
d) In CPU
21. SRAM retains data as long as power is e) None of these
provided to the memory chip and need not be Answer: C
The data is stored in Cache memory, before size of the main memory is called Virtual
entering into the CPU from the Main memory. storage.
24. The technique that extends the storage 25. A(n)________ is a register or main memory
capacities of main memory beyond the actual location which contains the effective address of
size of the main memory is called _______. the operand.
a) Additional storage a) Special location
b) Extra storage b) Pointer
c) Virtual storage c) Pendrive
d) Stimulated storage d) Floppy
e) None of these e) Direct Indexed register
Answer: C Answer: A
The technique that extends the storage A(n) Special location is a register or main
capacities of main memory beyond the actual memory location which contains the effective
address of the operand.
Computer Awareness
Pseudocode is a detailed yet readable 12. Bus mastership is handed to the device that
description of what a computer program or will be the next to assume it through a process
algorithm must do, expressed in a formally- called __________________.
styled natural language rather than in a a) Bus Control
programming language. b) Bus Transmission
c) Bus Arbitration
10. Programming languages can be categorized d) Bus Calculation
as ____. e) System Bus
a) Binary Language Answer: C
b) High-level Language Bus mastership is handed to the device that will
c) Low-Level Language be the next to assume it through a process
d) Both (a) and (b) called bus arbitration.
e) Both (b) and (c)
Answer: E 13. ___________ refers to the components of a
Programming languages are classified into two computer system where data may be stored.
main categories – Low-level language and High- a) Cache
level language. b) Memory
c) Register
11. The address in the main memory is known d) Graphics
as ________________. e) Design
a) Logical Address Answer: B
b) Physical Address Memory refers to the components of a computer
c) Memory Address system where data may be stored.
d) Arithmetic Address
e) Loop Address 14. The CPU stores the address of the following
Answer: B instruction to be executed in a special-purpose
A location or physical address is the name given register named ____________.
to an address in the main memory. The a) Programme Counter
collection of these places is referred to as the b) System Bus
memory space and includes the real main c) Process Register
memory locations that can be directly addressed d) Memory Bus
for processing. e) Assembly Calculator
Answer: A
Computer Awareness
1. _____________ is a signal sent by a for an end user or, in some cases, for another
computer's internal program or a device application.
connected to the computer that instructs the a) System Application
operating system to pause and determine what b) Application Software
to do next. c) System Software
a) Break d) Input Device
b) Interrupt e) Register
c) Halt Answer: B
d) Storage An application also referred to as an application
e) Stylus program or application software is a computer
Answer: B software package that performs a specific
An interrupt is a signal sent by a computer's function directly for an end user or, in some
internal program or a device connected to the cases, for another application.
computer that instructs the operating system to
pause and determine what to do next. 4. The name of the location of a particular piece
of data is its____________.
2. A _______ is a communication system used in a) Bus
computer architecture that transports data b) Route
between computer components. c) Address
a) Cable d) Server
b) Bundle e) Register
c) Bus Answer: C
d) Stylus The address is the name of the address where a
e) Mouse specific piece of data is located.
Answer: C
A bus is a communication system used in 5. ______________ is a specific set of ordered
computer architecture that transports data operations for a computer to perform.
between computer components. a) Program
b) Buses
3. ___________________ is a computer software c) Register
package that performs a specific function directly d) Server
e) Processor
processor instruction register. Based on the readable form to one that the computer can
information in this register, the control unit then interpret.
generates a control signal that controls how
these instructions are executed. 12. Conversion of computer-generated results
into human-readable format is the function of
10. A unique class of digital electrical circuit that _______________________.
is integrated into a ________ is referred to as a a) CPU
"microprocessor" in general. b) RAM
a) Logic Chip c) Output interface
b) Microchip d) Input interface
c) Control Chip e) Hardware
d) Macro chip Answer: C
e) All the above Conversion of computer-generated results into
Answer: B human-readable format is the function of the
A unique class of digital electrical circuits that is Output interface.
integrated into a microchip is referred to as a
"microprocessor" in general. Consequently, a 13. The hardware in which data is stored
microprocessor, which serves as the computer's permanently for a computer system is
brain, can also be referred to as a microchip. ____________.
a) Registers
11. The device used to fetch (or bring) b) Bus
instructions and data into a computer system is c) Secondary memory
called ___________________. d) Main memory
a) ALU e) Primary memory
b) Control unit Answer: C
c) Input device The hardware in which data is stored
d) Output device permanently for a computer system is
e) Hardware Secondary Memory.
Answer: C
The tools we use to enter data into the computer 14. The clock rate of the CPU is measured in
are known as input devices. They establish a link which unit?
between the user and the computer. Input a) Milliseconds
devices convert information from a human- b) Microhertz
Computer Awareness
c) Primary memory can be accessed by the data A proxy server is used to intercept all messages
bus while Secondary memory is accessed by I/O entering and departing the network while
channels concealing the real network addresses.
d) Primary memory is costlier than secondary
memory while Secondary memory is cheaper 7. ________________ is a piece of software made
than primary memory to keep track of (log) each keystroke made on
the computer it is running on.
5. The most frequently used instructions of a a) Keylogger
computer program are likely to be fetched from b) Worm
________________ memory. c) Virus
a) Primary d) Cracker
b) Secondary e) Trojan
c) Cache Answer: A
d) Register Keylogger is a piece of software made to keep
e) Virtual track of (log) each keystroke made on the
Answer: C computer it is running on.
The information that the CPU is likely to need
next is stored in the cache memory together with 8. ____________ is the unauthorized use,
program instructions and data that are frequently copying or distribution of copyrighted software.
employed in the functioning of programs. Instead a) Hacking
of getting data from the computer's main b) Software piracy
memory, the CPU can quickly access this c) Software literacy
information from the cache. d) Cracking
e) Copyright
6. __________ is used to intercept all messages Answer: B
entering and departing the network while Software piracy is the unauthorized use,
concealing the real network addresses. copying, or distribution of copyrighted software.
a) Logic bomb
b) Firewall 9. ________ are upgrades to the software and
c) Patches operating systems (OS) that fix security flaws in
d) Proxy server a program or product.
e) None of these a) Fixes
Answer: D b) Trojan
c) Patches Answer: E
d) Logic Bomb A driver is a group of files that communicates
e) Firewall with the operating system of a computer to
Answer: C instruct a piece of hardware on how to operate.
Patches are upgrades to the software and
operating systems (OS) that fix security flaws in 12. Transforming plain text data (plaintext) into
a program or product. something that appears random and
meaningless(ciphertext) is the process of
10. Which of the following computer viruses ___________.
hijack the system when it boots and deletes a) Embed
data? b) Encryption
a) Trojan c) Decryption
b) System infectors d) Encoder
c) Stealth virus e) Ethernet
d) Boot infectors Answer: B
e) None of the above Transforming plain text data (plaintext) into
Answer: C something that appears random and
An operating system process-attacking computer meaningless(ciphertext) is the process of
virus that is disguised from standard anti-virus or encryption.
anti-malware scans is known as a stealth virus.
Stealth viruses are skilled at purposefully 13. The standard method for establishing
avoiding detection by hiding in files, partitions, connections between devices in a wired LAN or
and boot sectors. WAN is ________.
a) Embed
11. A ___________ is a group of files that b) Encryption
communicates with the operating system of a c) Decryption
computer to instruct a piece of hardware on how d) Encoder
to operate. e) Ethernet
a) Demodulation Answer: E
b) Decoder The standard method for establishing
c) Dongle connections between devices in a wired LAN or
d) Domain WAN is Ethernet.
e) Driver
In files, there is a key associated with each 21. The most frequently used piece of hardware
record which is used to differentiate among for inputting data is _______.
different records. For every file, there is at least a) Keyboard
one unique set of keys. Such a key is called the b) Mouse
primary key. c) Floppy Disk
d) Cursor
19. ____________ refers to a key used to e) Software
represent relationships between tables. Answer: A
a) Unique Key The most frequently used piece of hardware for
b) Secondary Key inputting data is Keyboard.
c) Primary Key
d) Index Key 22. An optical mouse used _______________.
e) Foreign Key a) Infrared light
Answer: E b) Light emitting diode (LED)
A foreign key aids in defining the connection c) Sensor
between tables. In a relational database, this d) Microwave
special key transmits one or more relationships e) Infrared wave
between two or more tables. Answer: B
An Optical Mouse used a Light emitting diode.
20. ______________ denotes that the copied
values are not the same, whereas data 23. What is a QWERTY keyboard?
redundancy denotes data duplication. a) It is the most popular keyboard
a) Data Inconsistency b) It is the fastest keyboard
b) Data Consistency c) Is a keyboard that is rarely used
c) Data integrity d) All of the above
d) Data Model e) None of these
e) None of these Answer: A
Answer: A QWERTY is the most popular keyboard layout
Data inconsistency denotes that the copied for Latin-script alphabets.
values are not the same, whereas data
redundancy denotes data duplication. 24. When used with a computer's cathode-ray
tube display, __________ is an input device in the
shape of a light-sensitive wand.
Computer Awareness
1. The method that increases the main memory's 4. Hard disk can be formatted at the time of
storage capacity beyond its physical size is ____________.
referred as ________________. a) RAM
a) multitasking b) Booting
b) multiprocessing c) disk reader
c) virtual storage d) All the above
d) multiprogramming e) None of these
e) multi stalking Answer: B
Answer: C Hard disk can be formatted at the time of
The method that increases the main memory's Booting.
storage capacity beyond its physical size is
referred as Virtual Storage. 5. Which of the following memories has the
fastest (or shortest) access time?
2. The memory that cannot be accessed directly a) RAM
by the processor (CPU) is _____________. b) ROM
a) internal memory c) Cache memory
b) external memory d) Magnetic core memory
c) cache memory e) All the above
d) system memory Answer: C
e) None of these Cache Memory is a memory unit placed between
Answer: B the CPU and main memory and is used to store
instructions, data, or both.
3. Higher the RAM of a computer, the faster its
processing speed. Since it eliminates 6. A _____________ is a device that generates
__________________. the original signal as output from the coded input
a) need for external memory signal and converts n lines of input into 2n lines
b) need for ROM of output.
c) need for cache memory a) Data Rate
d) All of these b) Data Communication
e) None of these c) Daughter Board
Answer: A d) DataBase
e) Decoder
16. Which of the following command is a type of 18. In which one of the following, the multiple
Data Definition language command? lower entities are grouped (or combined)
a) Create together to form a single higher-level entity?
b) Update a) Specialization
c) Delete b) Generalization
d) Merge c) Aggregation
e) Alter d) Manipulation
Answer: A e) None of the above
The database structure is often defined or Answer: B
maintained using the Data Definition Language. The generalisation makes use of the bottom-up
Creating, deleting, and altering tables are a few methodology. A single higher-level entity is
examples. In a nutshell, we can say that the created by combining the several lower-level
database table schemas are worked on using sub-entities. We may sum it up by saying that it
data definition languages. is the exact opposite of specialisation.
17. Which of the following is a top-down 19. In a relational database, every tuple divided
approach in which the entity's higher level can into the fields are known as
be divided into two lower sub-entities? the________________.
a) Aggregation a) Queries
b) Generalization b) Domains
c) Specialization c) Relations
d) Manipulation d) Programs
e) All the above e) All of the above
Answer: C Answer: B
The top-down method is utilised in specialisation Tuples are the number of rows in a table in a
and is appropriate for generalisation. database, and domains are created by further
The higher-level entity in the specialty can be subdividing these tuples (or rows) into those
broken down into lower-level sub-entities. It is fields.
typically employed to determine the portion of an
entity set that shares distinctive qualities. 20. Which of the following is used in the
application programs to request data from the
database management system?
a) Data Manipulation language
Computer Awareness
2. Which among the following are the main 5. Which of the following is the correct
categories of storage devices? chronological order of the memory unit?
a) Optical a) Bit, Nibble, Byte, Kilobyte (KB), Megabyte
b) Magnetic (MB), GigaByte (GB), TeraByte (TB), PetaByte
c) Semiconductor (PB), Exa Byte, Zetta Byte, Yotta Byte
d) All the above b) Byte, Nibble, Bit, Kilobyte (KB), Megabyte
e) None of the above (MB), GigaByte (GB), TeraByte (TB), PetaByte
Answer: D (PB), Exa Byte, Yotta Byte, Zetta Byte
There are three main categories of storage c) Bit, Nibble, Byte, Kilobyte (KB), GigaByte
devices: optical, magnetic, and semiconductor. (GB), Megabyte (MB), TeraByte (TB), Exa Byte,
The earliest of these was the magnetic device. PetaByte (PB), Zetta Byte, Yotta Byte
d) Bit, Byte, Kilobyte (KB), Megabyte (MB),
3. ______ is four binary digits or half of an eight- GigaByte (GB), PetaByte (PB), Exa Byte, Zetta
bit byte. Byte, Yotta Byte, TeraByte (TB)
a) Nibble e) None of these
b) Bits Answer: A
c) Cache The correct chronological order of the memory
d) Zettabyte unit:
e) Petabyte
available across a network to other computers, 25. A __________ is a piece of information from a
sometimes known as clients. website that is saved in a web browser for
a) Web subsequent retrieval by the website.
b) Server a) Cookies
c) Protocol b) Server
d) Hypertext c) Router
e) Hyperlink d) Cache
Answer: B e) Web
A server is a computer system that makes Answer: A
resources, information, services, or programs A cookie is a piece of information from a website
available across a network to other computers, that is saved in a web browser for subsequent
sometimes known as clients. retrieval by the website.
Computer Awareness
6. The frequency at which a processor's clock including the date, time, and some system setup
generator can produce pulses, which are needed parameters.
to coordinate the actions of its components, is
referred to as the ____________ in computing 8. ______________ is an application that converts
and is used as an indicator of the processor's a programming language into a machine
speed. language program.
a) Clipboard a) Assembler
b) Clock Speed b) Compiler
c) Channel c) Critical Mass
d) Cache d) Cursor
e) Cascade e) Clock Speed
Answer: B Answer: B
The frequency at which a processor's clock The compiler is an application that converts a
generator can produce pulses, which are needed programming language into a machine language
to coordinate the actions of its components, is program.
referred to as the clock speed in computing and
is used as an indicator of the processor's speed. 9. A ____________ is a device used in computer
user interfaces to indicate where the user can
7. When a computer system is shut off, a now interact on a computer screen or other
battery-operated chip called ______________ on display device and which response to input from
the motherboard is in charge of maintaining a text input or pointing device.
some system data, including the date, time, and a) Assembler
some system setup parameters. b) Compiler
a) Cache c) Critical Mass
b)CMOS d) Cursor
c) Cascade e) Clock Speed
d) Clock Speed Answer: D
e) Channel A cursor is a device used in computer user
Answer: B interfaces to indicate where the user can now
When a computer system is shut off, a battery- interact on a computer screen or other display
operated chip called CMOS on the motherboard device and which response to input from a text
is in charge of maintaining some system data, input or pointing device.
10. The term ____________ describes the virtual It connects different networks and sends
computing environment, and more particularly, a data packets from one network to
type of electronic media used to support online another.
communication. A router can be used both in LANs (Local
a) Assembler Area Networks) and WANs (Wide Area
b) Compiler Networks).
c) Critical Mass It transfers data in the form of IP packets.
d) Cyber Space To transmit data, it uses the IP address
e) Clock Speed mentioned in the destination field of the IP
Answer: D packet.
The term "cyberspace" describes the virtual Routers have a routing table in them that
computing environment, and more particularly, a is refreshed periodically according to the
type of electronic media used to support online changes in the network. To transmit data
communication. packets, it consults the table and uses a
routing protocol.
11. Which of the following are the functions of a To prepare or refresh the routing table,
Router in a Computer Network? routers share information.
a) They are responsible for receiving, analyzing, Routers protect against broadcast storms.
and forwarding data packets among the
connected computer networks 12. A computer network is known as a ____that
b) Managing traffic between these networks by usually spans a city or a large campus.
forwarding data packets to their intended IP a) LAN
addresses b) WAN
c) Allowing multiple devices to use the same c) MAN
Internet connection d) Protocol
d) Routers protect against broadcast storms e) SPAN
e) All the above Answer: C
Answer: E A computer network called a metropolitan area
Features of Routers network (MAN) typically covers a whole city or a
A router is a layer 3 or network layer sizable campus. A MAN often connects several
device. LANs using a high-capacity backbone
technology, including fiber-optic cables and
offers uplink services to WANs and the Internet.
e) None of these
13. What type of network address translation can Answer: C
be applied to allow multiple users to connect to LAN stands for Local Area Network
the global internet using a single IP address?
a) LAN 16. When a key is pressed on the keyboard,
b) MAN which standard is used for converting the
c) WAN keystroke into the corresponding bits?
d) PAT a) ANSI
e) NAT b) ASCII
Answer: D c) EBCDIC
Network address translation can be done one-to- d) ISO
many using port address translation (PAT). e) ACET
Answer: B
14. A system of rules and digital message When a key is pressed on the keyboard, the
formats for sending messages in or across ASCII standard is used for converting the
computing systems and in telecommunications is keystroke into the corresponding bits.
known as a ____________________.
a) Router 17. When a key is pressed, a keyboard interacts
b) Modem with _________________.
c) Server a) Sensor
d) Communications Protocol b) Keyboard controller
e) Topology c) Keyboard buffer
Answer: D d) Both (b) and (c)
A system of rules and digital message formats e) Both (a) and (b)
for sending messages in or across computing Answer: D
systems and in telecommunications is known as
a Communication Protocol. 18. To select text by shading as you drag the
mouse arrow over the text is referred to as
15. LAN stands for _______________________ ________.
a) Lane Area Network a) Clip art
b) Local Army Network b) Highlight
c) Local Area Network c) Fetch
d) Local Area Networking d) Decode
24. ____________ is the text that is displayed on 25. A word, phrase, or image that contains a
a computer screen or other electronic device and ___________ allows you to navigate to a different
has links to other texts the reader can view right document or section within the one you're
away. currently reading.
a) Web a) Web
b) Server b) Server
c) Protocol c) Protocol
d) Hypertext d) Hypertext
e) Hyperlink e) Hyperlink
Answer: D Answer: E
Hypertext is the text that is displayed on a A word, phrase, or image that contains a
computer screen or other electronic device and hyperlink allows you to navigate to a different
has links to other texts the reader can view right document or section within the one you're
away. currently reading.
Computer Awareness
1. In which type of memory, once the program or After a power outage, permanent data storage or
data is written, cannot be changed? information retention is referred to as Non-
a) EPROM volatile storage.
b) PROM
c) EEPROM 4. The process of dividing the disk into tracks
d) RAM and sectors is called ______________.
e) None of these a) Tracking
Answer: B b) Crashing
If there is a mistake when writing instructions or c) Dicing
data to Programmable Read-Only Memory d) Formatting
(PROM), the mistake cannot be fixed. PROM e) Caching
chip stops working. Answer: D
The process of dividing the disk into tracks and
2. The computer’s internal memory consists of sectors is called Formatting.
_______________.
a) Cache memory, registers 5. The main memory of a personal computer can
b) CPU registers, main memory, cache memory also be called as ________________.
c) Main memory, secondary memory a) Primary storage
d) Virtual memory, cache memory b) Internal memory
e) None of these c) Primary memory
Answer: B d) All of these
e) None of these
3. After a power outage, permanent data storage Answer: D
or information retention is referred to as The term memory is used as a synonym for
____________________. primary memory or as an abbreviation for a
a) Volatile storage specific type of primary memory called random
b) Non-volatile storage access memory (RAM).
c) Sequential storage
d) Both a and b 6. A standardized representation of facts, ideas,
e) Both a and c or instructions that is suitable for human or
Answer: B electronic machine processing, interpretation,
and transmission is known as ____________.
a) Data e) Database
b) Database Answer: B
c) Data Rate Data communications refer to the transmission
d) Decoder of this digital data between two or more
e) Demodulation computers and a computer network or data
Answer: A network is a telecommunications network that
A standardized representation of facts, ideas, or allows computers to exchange data.
instructions that is suitable for human or
electronic machine processing, interpretation, 9. The amount of data transmitted via a network
and transmission is known as data. in a given amount of time is known as the
_____________.
7. A __________ is a planned grouping of a) Data Rate
material that has been arranged and is often b) Data Communication
kept electronically in a computer system. c) Decoder
a) Data d) Demodulation
b) Database e) Database
c) Data Rate Answer: A
d) Decoder Explanation:
e) Demodulation The amount of data transmitted via a network in
Answer: B a given amount of time is known as the data
A database is a planned grouping of material rate.
that has been arranged and is often kept 10. A _____________ is a circuit board that
electronically in a computer system. connects to another circuit board and expands
its circuitry.
8. __________________ refers to the transmission a) Data Rate
of this digital data between two or more b) Data Communication
computers and a computer network or data c) Daughter Board
network is a telecommunications network that d) DataBase
allows computers to exchange data. e) Decoder
a) Data Rate Answer: C
b) Data Communication A daughterboard is a circuit board that connects
c) Decoder to another circuit board and expands its circuitry.
d) Demodulation