0% found this document useful (0 votes)
67 views300 pages

Computer Awareness 50 Sets

Uploaded by

3168 Anand Uppar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views300 pages

Computer Awareness 50 Sets

Uploaded by

3168 Anand Uppar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 300

Computer Awareness Bundle PDF Course Day -1 (Eng)

Computer Awareness

1. Each process must be waiting for a resource 3. The language used in a computer that is
which is being held by another process, which in similar to the language of humans and is easy to
turn is waiting for the first process to release the understand is referred to as _______.
resource. then it is called as____ A. Source Code
A. Non preemptive B. Machine Language
B. Mutual exclusion C. High Level Language
C. Partial allocation D. Object Code
D. Circular wait E. Assembly language
E. None of these Answer: C
Answer: D A programming language such as FORTRAN or
Circular wait Pascal that enables a programmer to write
-> Each process must be waiting for a resource programs that are more or less independent of a
which is being held by another process, which in particular type of computer. Such languages are
turn is waiting for the first process to release the considered high-level because they are closer to
resource. human languages and further from machine
languages.
2. Which memory appears to exist as main
storage although most of it is supported by data 4. Which operator returns the rows in the first
held in secondary storage? query that are not present in the second query?
A. Core memory A. Union
B. Virtual memory B. Intersect
C. RAM C. Union all
D. Dynamic memory D. Minus
E. None of the above E. None of these
Answer: B Answer: D
Virtual Memory is the memory that appears to Minus operator
exist as main storage although most of it is ->Minus operator returns the rows in the first
supported by data held in secondary storage, query that are not present in the second query.
transfer between the two being made ->First eliminate duplicate query and then
automatically as required. completely eliminate second query.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -1 (Eng)

5. A technique for searching special databases, B. Graphical User interface


called data warehouses, looking for related C. Character User interface
information and patterns is called _____. D. Ms-Dos
A. Data redundancy E. None of these
B. Data mining Answer: B
C. Data integrity Graphical User interface (GUI) is a computer
D. Data programming program that enables a person to communicate
E. None of these with a computer through the use of symbols,
Answer: B visual metaphors and pointing device.
A technique for searching special databases,
called data warehouses, looking for related 8. Modem is a device that converts digital to
information and patterns is called Data mining. analog signal at _____ side and converts back
analog to digital signal at ___ Side
6. What is the name of the display feature that A. Receiver, sender
highlights are of the screen which requires B. Receiver, client
operator attention? C. Client, Sender
A. Pixel D. Sender, Receiver
B. Reverse video E. None of these
C. Touch screen Answer: D
D. Cursor Modem is a device that converts digital to analog
E. None of these signal (Modulator) at Sender side and converts
Answer: B back analog to digital signal (Demodulator) at
The name of the display feature highlighting the Receiver Side. A modem always placed between
screen which requires operator attention is a telephone line and c
known as reverse video. Reverse video or the
reverse screen is the computer display technique 9. Which command is used to display the
that inverts the values of background and text message or value of any variable on the screen?
colour. A. Char
B. Info
7. _______ is a computer program that enables a C. Ping
person to communicate with a computer through D. Echo
the use of symbols, visual metaphors and E. None of these
pointing device Answer: D
A. User interface

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -1 (Eng)

ECHO is a command typically used in shell Multiple choice examination answer sheets can
scripts and batch files to output status text to the be evaluated automatically by Optical Mark
screen or a file, or as a source part of a pipeline Reader.

10. __________is used to quickly accept, store, 12. Which one of the following file contains a
and transfer data and instructions that are being Predefined style that can be used for a
used immediately by the CPU. presentation?
A. Processor A. Task bar
B. Data Bus B. Template
C. Cache C. CSS
D. Register D. Menu bar
E. Stack E. None of these
Answer: D Answer: B
Register is used to quickly accept, store, and Template
transfer data and instructions that are being used -> File contains readymade style that can be
immediately by the CPU. used for a presentation is called as Template.
There are various types of Registers that are
used for various purpose. 13. Which one of the following is a small disk
Some Registers named as AC or Accumulator, storage device that today typically has about 1.4
Data Register or DR, the AR or Address Megabytes of memory capacity?
Register, program counter (PC), Memory Data A. CD drive
Register (MDR) ,Index register, Memory Buffer B. Floppy drive
Register. C. Hard disk drive
D. All of these
11. Multiple choice examination answer sheets E. None of These
can be evaluated automatically by _______ Answer: B
A. Optical character recognitions Floppy drive
B. Optical character reader ->A floppy is a small disk storage device that
C. Optical Mark reader today typically has about 1.4 Megabytes of
D. Magnetic tape reader memory capacity.
E. None of these
Answer: C 14. _____ is a restriction (or) condition which is
applied on the column of the table to have data
correctness

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -1 (Eng)

A. Constraints 16. A technique used by codes to convert an


B. Literals analog signal into a digital bit stream is known as
C. Alias __________
D. Concatenation A. Pulse code modulation
E. None of these B. Pulse stretcher
Answer: A C. Query processing
Constraints D. Queue management
-> it is a restriction (or) condition which is applied E. None of these
on the column of the table to have data Answer: A
correctness. A technique used by codes to convert an analog
signal into a digital bit stream is known as Pulse
15. Which of the following terms is used for code modulation. Pulse-code modulation (PCM)
programs that automatically submit the search is a method used to digitally represent sampled
request to several search engines analog signals.
simultaneously?
A. Metasearch engines 17. Every device on the internet has a unique
B. Webcrawlers ____ address that identifies it in the same way
C. Terafinders that a street address identifies the location of a
D. Megasearchers house.
E. None of the above A. DH
Answer: A B. DA
A metasearch engine (or aggregator) is a search C. IP
tool that uses another search engine's data to D. IA
produce their own results from the Internet. E. None of these
Metasearch engines take input from a user and Answer: C
simultaneously send out queries to third-party An Internet Protocol address (IP address) is a
search engines for results. Sufficient data is numerical label assigned to each device (e.g.,
gathered, formatted by their ranks and presented Computer, printer) participating in a Computer
to the users. network that uses the Internet Protocol for
Examples include Savvysearch engine and communication.
Metaseek engine. An IP address serves two principal functions:
host or network interface identification and
location addressing. Its role has been

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -1 (Eng)

characterized as follows: "A name indicates what 20. Among which of the following does the delay
we seek. An address indicates where it is that occur during the playback of a stream known
as?
18. A software program used to monitor the A. Stream delay
traffic in a network and hackers may use the B. Playback delay
sniffed data to access important confidential data C. Jitter
is called _________. D. Event delay
A. Mail bomb E. Both A & C
B. Spam Answer: C
C. Sniffers Jitter is the delay that occurs during the playback
D. Cookies of a stream.
E. None of These
Answer: C 21. The difference between memory and storage
Sniffers is that memory is _____ and storage is _______
-> A software program used to monitor the traffic A. Temporary, permanent
in a network. B. Permanent, temporary
-> The hackers may use the sniffed data to C. Slow, Fast
access important confidential data D. All the above
E. Large, Small
19. A ________ computer is a large and Answer: A
expensive computer capable of simultaneously Memory is temporarily saving the data and
processing data for hundreds or thousands for Storage is to save the data permanently.
users.
A. server 22. When we specify more than one value in
B. mainframe where clause then we use ______ condition.
C. desktop A. In condition
D. tablet B. Like condition
E. None of these C. Isnull condition
Answer: B D. Between and condition
A mainframe computer is a large and expensive E. None of these
computer capable of simultaneously processing Answer: A
data for hundreds or thousands for users. In condition
->When we specify more than one value in
where clause then we use In condition.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -1 (Eng)

23.In which of the following processes, the Answer: B


changes made in the linked object do not reflect An uninterruptible power supply, also
and save in the original document? uninterruptible power source, UPS or
A. Linking battery/flywheel backup, is an electrical
B. Embedding apparatus that provides emergency power to a
C. Inserting load when the input power source or mains
D. Hyper linking power fails.
E. Saving
Answer: B 25. A simple automated program that scans the
In embedding process the changes made in the web for specific data and insert into a designated
linked object do not reflect and save in the database is ________.
original document. A. Web mining
B. Web database integration
24.A device that not only provides surge C. Web crawler
protection but also furnishes the computer with D. Web scanning
battery backup power during a power outage is E. Web searching
______ Answer: C
A. Battery strip A web crawler (also known as a web spider or
B. UPS web robot) is a program or automated script
C. Surge strip which browses the World Wide Web in a
D. USB methodical, automated manner. This process is
E. Memory called Web crawling or spidering.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -2 (Eng)

Computer Awareness

1. Today’s computer giant IBM was earlier 3. _______ is a web server that collects data from
known by different name which was changes in other web servers and puts it into a database
1924. What was that name? (much like an index), it provides links to pages
A.Tabulator Machine Co. that contain the object of your search.
B.Computing Tabulating Recording Co. A.Search Engine
C.The Tabulator Ltd. B.Browser
D.International Computer Ltd. C.FTP
E.None of these D.HTTP
Answer: B E.None of these
It was founded in 1911 in Endicott, New York, as Answer: A
the Computing-Tabulating-Recording Company Search Engine is a web server that collects data
(CTR) and was renamed "International Business from other web servers and puts it into a
Machines" in 1924. IBM is incorporated in New database (much like an index), it provides links to
York and has operations in over 170 countries pages that contain the object of your search.

2. Different components on the motherboard of a 4. Which one represents a collection of objects


PC unit are linked together by sets of parallel having same characteristic properties that exhibit
electrical conducting lines. What are these lines common behaviour?
called? A.Generalization
A.Conductors B.Specialization
B.Buses C.Class
C.Connectors D.Data hiding
D.Consecutives E.None of these
E.None of these Answer: C
Answer: B Class
A bus is a common pathway through which ->A class represents a collection of objects
information flows from one computer component having same characteristic properties that exhibit
to another. This pathway is used for common behaviour.
communication purpose and it is established ->It gives the blueprint or description of the
between two or more computer components. objects that can be created from it.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -2 (Eng)

5. Which of the following layer is responsible for Answer: C


the transmission and reception of Data communication is the exchange of data
the unstructured raw bit stream over a medium? between two devices using some form of
A.Application layer transmission media.
B.Physical layer
C.Data link layer 8. _______ type of malware that is designed to
D.Transmission layer gain administrative-level control over a computer
E.None of these system without being detected
Answer: B A.Payloads
The Physical layeris responsible for transmission B.Freeware
and reception of theunstructured raw bit stream C.Root kits
over a medium D.Update
E.None of these
6. If we want to eliminate the duplicate values Answer: C
than _____ keyword is also to be used Rootkits is a type of malware that is designed to
A.Values gain administrative-level control over a computer
B.Groups system without being detected.
C.Distinct values
D.Columns 9. Extensible Markup Language (XML) is a
E.None of these simple, very flexible text format, Which is derived
Answer: C from _______.
->If we want to count only distinct values than the A.HTML
DISTINCT keyword is also to be used B.ETML
->Count function counts all the not null values in C.STML
the specific column. D.SGML
E.None of these
7. Which one of the following is the exchange of Answer: D
data between two devices using some form of Extensible Markup Language (XML) is a simple,
transmission media? very flexible text format derived from SGML
A.Networking (Standard Generalized Markup Language).
B.Communication
C.Data communication 10. The time taken by the hard drive of a
D.Information Passing computer to locate a file in the system is known
E.None of these as________.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -2 (Eng)

A.Execution time C.MODEM


B.Hard drive time D.Network
C.Access time E.ALU
D.Excess time Answer: C
E.Other than those given in options MODEM is responsible to convert digital signal to
Answer: C analogous and vice versa for the transmission
In a computer, Access time is the time interval and connection of computer
between the instant at which an instruction
control unit initiates a call for data or a request to 13. Which one of the following layer uses
store data, and the instant at which delivery of Process to process protocol for data
the data is completed or the storage is started. transmission?
Access time is measured in milliseconds, or ms. A.Physical
when making comparisons. B.Transport
C.Data link
11. Imagine that a user has a WORD document D.Network
open at a workstation and that workstation is E.None of These
unexpectedly disconnected from the school Answer: C
network and from the Internet. Where should the Data link
user BEST save her work? ->This layer uses Hub and Process to process
A.USB key protocol (PPP) for data transmission.
B. P drive
C.H drive 14. Which one is used for renaming the column
D.S drive name temporarily and it will not affect the
E.None of these database?
Answer: C A.Constraints
The data which are opened in the workstation, B.Literals
which is disconnected will be stored in H drive. C.Column Alias
D.Concatenation
12. Which of the following is responsible to E.None of these
convert a digital signal to analogous and vice Answer: C
versa for the transmission and connection of Column Alias
computer? -> In SQL Column Alias is used for renaming the
A.CPU column name temporarily and it will not affect the
B.USB database.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -2 (Eng)

15. RARP was used to translate hardware B.Word processing package


interface addresses to protocol addresses. C.Outlining package
RARP stands for_______. D.Outline processors
A.Raw Address Resolution Protocol E.Spread sheet package
B.Reverse Advanced Resolution Protocol Answer: E
C.Reverse Address Retrieval Protocol A spreadsheet is an interactive computer
D.Reverse Address Resolution Protocol application program for organization, analysis
E.Returning Address Resolution Protocol and storage of data in tabular form. Spread
Answer: D sheets developed as computerized simulations of
RARP (Reverse Address Resolution Protocol) is paper accounting worksheets. The program
a protocol by which a physical machine in a local operates on data represented as cells of an
area network can request to learn its IP address array, organized in rows and columns
from a gateway server's Address Resolution
Protocol (ARP) table or cache. 18. More advanced method of Phishing in which
the attackers create duplicate or similar looking
16. OSI is an ISO standard for worldwide website of other companies, to attract customers
communications that defines a networking and steal the data is called as _____
framework for implementing protocols. What A.Worms
does ‘O’ stands for? B.Phishing
A.Operation C.Adware
B.Open D.Pharming
C.Organisation E.None of These
D.Optical Answer: D
E.None of these Pharming
Answer: B ->More advanced method of Phishing in which
OSI - Open Systems Interconnection the attackers create duplicate or similar looking
The Open System Interconnection (OSI) model website of other companies, to attract the
defines a networking framework to implement customers and steal the data.
protocols in seven layers.
19. A(n) ___________ is a system that includes
17. What is the package called which helps the collection of people, hardware, software, data
create manipulate and analyse data arranged in records, and activities that process the data and
rows and columns? information in an organization.
A.Application package A.traditional organization structure

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -2 (Eng)

B.information system Dial-up Internet access is a form of Internet


C.data mart access that uses the facilities of the public
D.information functional unit switched telephone network to establish a
E.None of these connection to an Internet service provider by
Answer: B dialling a telephone number on a conventional
A(n) information system is a system that includes telephone line
the collection of people, hardware, software, data
records, and activities that process the data and 22. In Excel, which of the following conditional
information in an organization. formatting styles shows bars in a cell range
along with values?
20. Personnel who design, program, operate and A.Data bars
maintain computer equipment refers to B.Top/bottom rules
______________. C.Highlight cell rules
A.Programmer D.Colour scales
B.System Analyst E.Range bars
C.People ware Answer: A
D.Console-operator Data bars in Excel make it very easy to visualize
E.None of these values in a range of cells. A longer bar
Answer: C represents a higher value. To add data bars: 1.
People ware refers to the role of people in the Select a range 2. On the Home tab, in the Styles
computing process. While hardware and group, click Conditional Formatting 3. Click Data
software make up a computer system, both are Bars and click a subtype.
designed to be used by humans. Therefore,
peopleware is sometimes considered the third 23. Which of the following is a small
component of computing. microprocessor-based computer designed to be
used by one person at a time?
21. Connections to the Internet using a phone A. Netbook
line and a modem are called ______ connections. B. Mainframe
A.digital C. Supercomputer
B.dial – up D. Personal computer
C. broadband E. All-in-one
D.dish Answer: D
E.None Personal Computer (PC) A microprocessor-
Answer: B based computer which is primarily intended to be

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -2 (Eng)

used by one person at a time. It is usually because they are closer to human languages
characterized by relatively low cost and small and further from machine languages.
physical size.
25. Which memory appears to exist as main
24. Which among the following is a language storage although most of it is supported by data
used in a computer that is very similar to the held in secondary storage?
language of humans and is easy to understand? A. Core memory
A. Source Code B. Virtual memory
B. Machine Language C. RAM
C. High Level Language D. Dynamic memory
D. Object Code E. None of the above
E. Assembly language Answer: B
Answer: C Virtual Memory is the memory that appears to
A high-level language is a programming exist as main storage although most of it is
language such as C, FORTRAN, or Pascal that supported by data held in secondary storage,
enables a programmer to write programs that are transfer between the two being made
independent of any specific type of computer. automatically as required.
Such languages are considered high-level

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -3 (Eng)

Computer Awareness

1. Registers which are partially visible to users 3. Name the type of memory which clears
and used to hold conditional codes (bits set by everything when the power of a computer gets
the CPU hardware as the result of operations), switched off.
are known as _______. A.Volatile
A.PC B.Non-volatile
B.Flags C.ROM
C.Memory Address Registers D.Pen Drive
D.General Purpose Registers E.Google Drive
E.None of these Answer: A
Answer: B Volatile memory is a type of memory that clears
Registers which are partially visible to users and everything when the power of a computer gets
used to hold conditional codes(bits set by the switched off, whereas nonvolatile memory retains
CPU) hardware as the result of operations), are the data even when the power gets switched off.
known as Flags. Moreover, ROM and flash memory also retain
the data in case the power gets switched off.
2) Which feature helps to search the text through
reference material such as dictionaries, 4.Which mechanism that permits new classes to
encyclopedias and translation services? be created out of existing classes by extending
A.Translation and refining its capabilities?
B.Research A.Encapsulation
C.Find B.Inheritance
D.Font C.Class
E.Table D.Data hiding
Answer: B E.None of these
In the Research Option dialog box, you can Answer: B
select from dictionaries, thesauruses, and Inheritance
various Internet research Web sites in several -> Inheritance is the mechanism that permits new
languages. The Research Options services classes to be created out of existing classes by
available depend on the language of the version extending and refining its capabilities.
of Office and any services that we add to the
Research Options dialog box.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -3 (Eng)

5. A remote batch-processing operation where D.Controller


data is solely input to a central computer would E.All of these
require _____. Answer: C
A.Telegraph line Console refers to a terminal attached to a
B.Simplex lines minicomputer or mainframe and used to monitor
C. Mixed band channel the status of the system
D.Multi channel
E.None of these 8. Which of the following is used to convert one
Answer: B type of number system in to the other form?
Explanation: A.Modifier
A remote batch-processing operation where data B.Translator
is solely input to a central computer would C.Decoder
require Simplex lines D.Adder
E. None of these
6. Which one of the following allows objects with Answer: C
different internal structures to have a common Decoder will convert one type of number system
external interface? into another form of numbers
A.Encapsulation
B.Inheritance 9. In which part of the computer, does the data is
C.Polymorphism stored before entering into CPU from the Main
D.Message passing memory?
E.None of these A.External hard disk
Answer: C B.Secondary memory
Polymorphism C.Cache memory
-> Polymorphism allows objects with different D.In CPU
internal structures to have a common external E.None of these
interface. Answer: C
The data is stored in Cache memory, before
7. Which of the following refers to a terminal entering in to CPU from the Main memory.
attached to a minicomputer or mainframe and
used to monitor the status of the system? 10. Software that is actively utilised by end-users
A.Monitor (like word or powerpoint) is
B.Mouse called _____________.
C.Console A.Actionware

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -3 (Eng)

B.Operating system Under the GUI, Icons and Menus displayed on


C.System software the screen to send command to the computer
D.Driver system.
E.Application software
Answer: E 13. Which one of the following is a simple
Applications software (also called end-user protocol that can be used to communicate
programs) include such things as database between web forms and your program?
programs, word processors, Web browsers and A.GUI
spreadsheets, MS Office suite. An application B.CGI
program is a computer program designed to C.Telnet
perform a group of coordinated functions, tasks, D.Instant messaging
or activities for the benefit of the user. E.None of These
Answer: B
11. While studying about computer, we may Common Gateway Interface (CGI)
came to know about the term QDR. Expand ->It is a simple protocol that can be used to
QDR. communicate between Web forms and your
A.Quad data rate program.
B.Quad decryption region
C.Quad degree region 14. From child table, foreign key is going to
D.Quad deficit rate pointing the primary key of foreign table so it is
E.None of these called as____
Answer: A A.Primary key
Explanation: B.Candidate key
QDR ⇒Quad data rate C.Referential integrity key
D.Alternate key
12. Which of the following is used in icons and E.None of these
menus displayed on the screen to send Answer: C
commands to the computer system? Explanation:
A.System Utility From child table, foreign key is going to pointing
B.API the primary key of foreign table so it is called as
C.GUI Referential integrity key.
D.User Interfaces
E.None of these 15. In the Binary language each letter of the
Answer: C alphabet, each number and each special

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -3 (Eng)

character is made up of a unique combination B.Disk Defragmenter


of? C.Disk Function
A.Eight Bit D.Disk Drive Function
B.Eight Kilobytes E.Disk Driver Function
C.Eight Bytes Answer: B
D.Eight Characters Disk Defragmenter is a utility in Microsoft
E.None of these Windows designed to increase access speed by
Answer: A rearranging files stored on a disk to occupy
In the Binary language each letter of the contiguous storage locations, a technique called
alphabet, each number and each special defragmentation. Defragmenting a disk
character is made up of a unique combination of minimizes head travel, which reduces the time it
eight bits. takes to read files from and write files to the disk.
Beginning with Windows XP, Disk Defragmenter
16. A register organized to allow to move left or also reduces system startup times.
right operations is called a ___________
A.Counter 18. ____ is where your files are permanently
B.Loader stored on your computer. Also, normally, your
C.Adder operating system is installed here
D.Shift register A.CD drive
E.None of these B.Floppy drive
Answer: D C.Hard disk drive
A register organized to allow to move left or right D.All of these
operations is called a Shift register. A shift E.None of These
register is a digital memory circuit found in Answer: C
calculators, computers, and data-processing Hard disk drive(s)
systems. Bits (binary digits) enter the shift ->This is where your files are permanently stored
register at one end and emerge from the other on your computer. Also, normally, your operating
end system is installed here.

17. Which among the following is a utility 19. While studying DBMS, we many came
program that will clean the disk space by across the term SQL, What does ‘S’ represents?
fragmenting and rearranging data to utilize the A.Study
space properly? B. Sequence
A.Disk Space Utility C.Steady

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -3 (Eng)

D.Structured B.Printer
E.None of these C.Video card
Answer: D D.Motherboard
Explanation: E.Interface
SQL --> Structured Query Language Answer: E
In computing, an interface is a shared boundary
20. Which language is directly understood by the across which two or more separate components
computer without a translation Program? of a computer system exchange information. The
A.Machine language exchange can be between software, computer
B.C# Language hardware, peripheral devices, humans, and
C.High level language combinations of these.
D.C language
E.None of these 23.___________ is a secret computer program
Answer: A designed to provide continued access to a
Machine language is directly understood by the computer while actively hiding its presence.
computer without translation Program. A.Botnet
B.Phishing
21. Most of the commonly used personal C.Key logger
computers/laptops do not have a command key D.Rootkit
known as ______. E.Adware
A.Turnover Answer: D
B.Shift A rootkit is a secret computer program designed
C.Alter to provide continued access to a computer while
D.Delete actively hiding its presence. Rootkits are
E.Ctrl associated with malware such as Trojans,
Answer: A worms, viruses.
Explanation: Botnet is a set of networks connected
Most of the commonly used personal computers/devices that are used for malicious
computers/laptops do not have a command key purposes. Each computer in a botnet is called
known as Turn over Bot. It is also known as Zombie.

22. Which part of the hardware compensates the 24.____________is a technical standard for
difference between the CPU and peripherals? accessing information over a mobile wireless
A.Scanner network.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -3 (Eng)

A.MAP browser for mobile devices such as mobile


B.WAP phones that uses the protocol.
C.TAP
D.GAP 25. A computer program that transaction one
E.LAP program instructions at a time into machine
Answer: B language is called a/an______.
Wireless Application Protocol (WAP) is a A. Interpreter
technical standard for accessing information over B.CPU
a mobile wireless network. It is a specification for C. Computer
a set of communication protocols to standardize D. Simulator
the way that wireless devices, such as cellular E. None of these
telephones and radio transceivers, can be used Answer: A
for Internet access. A WAP browser is a web An Interpreter translates program one statement at a
time. It takes less amount of time to analyze the
source code but the overall execution time is slower.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -4 (Eng)

Computer Awareness

1. A physical connection between the 3. Programmers generally develop software in


microprocessor memory and other parts of the high-level languages because___________.
microcomputer is known as A.It is easy to use this language in the computer
A.Path B.It saves a lot of money since it does not require
B.Address bus to be converted
C.Route C.It is helpful because you do not need to worry
D.All of the above about changing it using another software
E.None of these D.It is very easy to encode programmes in high-
Answer: B level computer programming languages
A physical connection between the E.Other than those given in options
microprocessor memory and other parts of the Answer: D
microcomputer is known as Address bus. In case of computer programming, generally
Address Bus. The address bus carries the programmers develop computer language in high
address of the piece of memory or I/O device to level language since it is very easy to develop
be read from or written to. It is a unidirectional programmes in that language but the computer
bus, which is to say that data travels only one does not understand anything about high level
way; from the CPU to memory. The number of languages. In order to address this issue, the
lines on the bus determines the number of same needs to be converted into low level
addressable memory elements. language and translator is generally used for this
purpose
2. What is the term that refers to an ad hidden
inside software that you downloaded from an 4. Registers, which are partially visible to users
internet site? and used to hold conditional, are known as
A.Spam _________________.
B.Cookie A.PC
C.Phish B.Memory address registers
D.Adware C.General purpose register
E.None of these D.Flags
Answer: D E.None of these
Adware is software that automatically displays or Answer: C
downloads advertising material such as banners Registers, which are partially visible to users and
or pop-ups when a user is online. used to hold conditional, are known as General

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -4 (Eng)

purpose register. For example, when a program battery backup power during a power outage
is interrupted its state, ie: the value of the UPS
registers such as the program counter,
instruction register or memory address register - 7. In Windows operating system after you
may be saved into the general purpose registers, double-click a character on the grid of
ready for recall when the program is ready to characters, keyboard shortcut SPACEBAR is
start again. used for _____
A.Move to the first character
5. You should create a(n) _____ unprotected to B.Move to the last character
prevent others from changing the worksheet from C.Switch between Enlarged and Normal mode
protected data when a character is selected
A.Access code D.Delete the character
B.Password E.None of these
C.Key Answer: C
D.Secret mark In Windows operating system after you double-
E.None of these click a character on the grid of characters,
Answer: B keyboard shortcut SPACEBAR is used for Switch
Explanation: between Enlarged and Normal mode when a
You should create a Password unprotected to character is selected
prevent others from changing the worksheet from
protected data. 8. Which button is called as middle button used
as third mouse button by pressing on it?
6. A is a device that not only provides surge A.Right button
protection, but also furnishes your computer with B.Scroll wheel
battery backup power during a power C.Select
outage________ D.Cursor
A.USB E.None of these
B.UPS Answer: B
C.URC The scroll wheel is called as middle button used
D.Battery Strip as the third mouse button by pressing on it.
E.None of these
Answer: B 9. The process is to check and ensure the
A is a device that not only provides surge components of the computer are operating and
protection, but also furnishes your computer with connected properly is known as ______

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -4 (Eng)

A.Repairing
B. Checking 12. Which one is used to combine all the object
C.Paring files and convert them into a final executable
D.Booting program?
E.None of these A.Loader
Answer: D B.Compiler
Booting is the process to check and ensure the C.Linker
components of the computer are operating and D.Assembler
connected properly E.None of These
Answer: C
10. Which of the following identifies a specific Linker
web page and its computer on the Web? ->It is used to combine all the object files and
A.Web site convert them into a final executable program.
B.Web site address
C.URL 13. Which one of the following gives you the
D.Domain Name ability to put a lot of information into one cell
E.None of these without spilling over into an adjacent cell?
Answer: D A.Merged cell
A domain name is a unique name that identifies B.Cell references
a website. Each website has a domain name that C.Wrapper Text
serves as an address, which is used to access D.All of these
the website. A domain name is used for finding E.None of These
and identifying computers on the Internet. Answer: C
Wrapper Text
11. Raw, unprocessed facts, including text, ->It gives you the ability to put a lot of information
numbers, images, and sounds, are called ______ in to one cell without spilling over in to an
A.applets adjacent cell.
B.data
C.metaware 14. Which among the following contains the
D.product temporary data such as function parameters,
E.script return address and local variables?
Answer: B A.Heap
Raw, unprocessed facts, including text, numbers, B.Stack
images, and sounds, are called Data. C.Data

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -4 (Eng)

D.Text
E.Register 16. Which are the following keys are used to
Answer: B runs a Thesaurus check on the selected word?
The process Stack contains the temporary data A.Shift + A
such as method/function parameters, return B.Shift + Y
address and local variable. C.Shift + F7
A process is basically a program in execution. A D.Shift + F3
process is defined as an entity which represents E.None of these
the basic unit of work to be implemented in the
system. Answer: C
A process can be divided into four sections ─ Shift + F7 is the key to run a thesaurus check on
stack, heap, text and data. the selected word.

15. Which of the following can be termed as end- 17. Which of the following is a specification for a
user programs that enable the user to complete set of communication protocols to standardize
tasks such as creating documents, spreadsheets the way that wireless devices, such as cellular
etc? telephones and radio transceivers, can be used
A.System Software for Internet access, including e-mail, the World
B.Web browser Wide Web, newsgroups, and instant messaging?
C.Hyperlinks A.LDAP
D.Application software B.WAP
E.None of the above C.WEP
Answer: D D.SNMP
Application software, or simply applications, are E.All of the above
often called productivity programs or end-user Answer: B
programs because they enable the user to Wireless Application Protocol (WAP) is a
complete tasks such as creating documents, technical standard for accessing information over
spreadsheets, databases, and publications, a mobile wireless network. A WAP browser is a
doing online research, sending email, designing web browser for mobile devices such as mobile
graphics, running businesses, and even playing phones that uses the protocol.
games. Application software is specific to the
task it is designed for and can be as simple as a 18. Which among the following need to be
calculator application or as complex as a word refreshed frequently to maintain the data?
processing application. A.SRAM

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -4 (Eng)

B.DRAM 20. Which among the following is the shortcut


C.EPROM key combination to copy formatting from the
D.EEPROM text?
E.PROM A.Alt + Shift + C
Answer: B B.Tab + Shift + C
Dynamic Random Access Memory (DRAM) C.Ctrl + Shift + C
needs to be refreshed frequently to maintain the D.F1 + Shift + C
data. E.None of these
DRAM is used for data or program code that a Answer: C
computer processor needs to function. It is used Ctrl + Shift + C is used to copy text formatting.
in personal computers (PCs), workstations and
servers. 21. The rectangular area of the screen that
Random access allows the PC processor to displays a program, data, and/or information is a
access any part of the memory directly rather ___
than having to proceed sequentially from a A.title bar
starting place. B.title bar
C.dialog box
19. ________ is an early packet switching D.windows
network and the first network to implement the E.None of these
protocol suite Answer: D
A.CNNET Explanation:
B.ARPANET The rectangular area of the screen that displays
C.ASAPNET a program, data, and/or information is a
D.NSFNET windows.
E.None of these
Answer: B 22. The blank white area near the edges of every
The Advanced Research Projects Agency page in a word document is known as a
Network (ARPANET) was an early packet- ________.
switching network and the first network to A.Cut mark
implement the protocol suite TCP/IP. Both B.Margin
technologies became the technical foundation of C.New area
the Internet. D.Gutter
E.Indent
Answer: B

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -4 (Eng)

Margins refer to the blank white areas near the 24. The blank white area near the edges of every
edges of a page. Every page has top, bottom, left page in a Word document is known as a
and right margins. The area surrounded by these ________.
four margins where you write, edit, and format A.Cut mark
the text is known as the text area. Therefore, if B.Margin
you increase or decrease the margin of a page, C.New area
you get less or more space for writing text. D.Gutter
E.Indent
23.In the Network Layer, Data is transferred in Answer: B
the form of _________ through the logical network Margins refer to the blank white areas near the
path. edges of a page. Every page has top, bottom, left
A.Layers and right margins. The area surrounded by these
B.Datagrams four margins where you write, edit, and format
C.Segments the text is known as the text area. Therefore, if
D.Frames you increase or decrease the margin of a page,
E.Packets you get less or more space for writing text.
Answer: E
Data is transferred in the form of Packets via 25. Which one is used to combine all the object
logical network paths in an ordered format files and convert them into a final executable
controlled by the network layer. program?
The network layer is the third level of the Open A.Loader
Systems Interconnection Model (OSI Model) and B.Compiler
the layer that provides data routing paths for C.Linker
network communication. D.Assembler
Network layer protocols exist in every host or E.None of These
router. The router examines the header fields of Answer: C
all the IP packets that pass through it. Linker
->It is used to combine all the object files and
convert them into a final executable program.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -5 (Eng)

Computer Awareness

1. Which of the following is used to transfer data Answer: B


intended for a peripheral device into a disk, so Red indicates either a possible spelling error or
that it can be transmitted to the peripheral device that Word doesn't recognize a word, such as a
at a more suitable time or in bulk? proper name or place. Green underline- Word
A.Virtual programming thinks that grammar should be revised. Blue
B.Multiprogramming underline- A word is spelled correctly but does
C.Caching not seem to be the correct word for the sentence.
D.Multitasking
E.Spooling 3. A Compiler translates a program written in a
Answer: E high-level language into ___________________.
In computing, spooling is a specialized form of A.Machine language
multi-programming for the purpose of copying B.An algorithm
data between different devices. In contemporary C.A debugged program
systems[a] it is usually used for mediating D.Java
between a computer application and a slow E.None of these
peripheral, such as a printer. Spooling allows Answer: A
programs to "hand off" work to be done by the A Compiler is a computer program that
peripheral and then proceed to other tasks, or do transforms source code written in a programming
not begin until input has been transcribed. A language (the source language) into another
dedicated program, the spooler, maintains an computer language (the Machine language, often
orderly sequence of jobs for the peripheral and having a binary form known as object code).
feeds it data at its own rate.
4. What is the name of the display feature that
2. If a word is typed that is not in MS Word's highlights are of the screen which requires
dictionary, a wavy underline appears below the operator attention?
word. What is the colour of the underline that A.Pixel
appears in this situation? B.Reverse video
A.Blue C.Touch screen
B.Red D.Cursor
C.Green E.None of these
D.Black Answer: B
E.Pink

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -5 (Eng)

The name of the display feature highlighting the 7. The technique that extends storage capacities
screen which requires operator attention is of main memory beyond the actual size of the
known as reverse video. Reverse video or the main memory is called _______
reverse screen is the computer display technique A.Additional storage
that inverts the values of background and text B.Extra storage
colour. C.Virtual storage
D.Stimulated storage
5. The indirect change of the values of a E.None of these
variablein one module by another module is Answer:C
called _______. The technique that extends storage capacities of
A.Internal change main memory beyond the actual size of the main
B.Inter-module change memory is called Virtual storage.
C.Side effect
D.All the above 8. Optimized for dial-up connections over noisy
E.None of these telephone lines, the oldest packet-switching
Answer: C protocol for WANusage, called _______________,
Explanation: is still widely used.
The indirect change of the values of a variable in A.Cat - 5
one module by another module is called a side B.Cat- 6
effect. C.X.25
6. Which of the following element will convert D.Ethernet
high-level language into machine-level E.None of these
language? Answer: C
A.Translator Optimized for dial-up connections over noisy
B.Assembler telephone lines, the oldest packet-switching
C.Transmitter protocol for WANusage, called X.25 is still widely
D.Compiler used
E.None of these
Answer: D 9. ______ type of program controls the various
The Compiler will convert high-level language computer parts and allows the user to interact
into machine-level language. with the computer
A.Application Software
B.Utility software
C.Middleware

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -5 (Eng)

D.System software A.Generalization


E.None of these B.Aggregation
Answer: B C.Specialization
Utility software is a type of program that controls D.Mapping Cardinalities
the various computer parts and allows the user to E.None of These
interact with the computer Answer: D
Mapping Cardinalities
10. Which among the following key can be used -> Express the number of entities to which
as a shortcut to rename a folder in Microsoft another entity can be associated via a
Windows 8 and higher versions? relationship.
A.F2
B.F4 13. Which one of the following is a series of
C.F6 operations that convert raw facts into useful
D.F9 information?
E.F11 A.Schema
Answer: A B.Data processing
F2 is a shortcut to rename a selected object in C.Data Processing System
MS windows 8 and higher versions D.Data recovery
E.None of These
11. While studying about networking, we may Answer: B
came to know about the term SACK. What does Data processing
SACK represents? ->It is a series of operations that convert raw
A.Selection Acknowledgement facts into useful information.
B.Selective Acknowledgement
C.Supreme request 14. Which of the following features of PowerPoint
D.Suppress Data allows you to copy the animation from one object
E.None of these and apply it on another object?
Answer: B A.Format Painter
Explanation: B.Painter
SACK ⇒ Selective Acknowledgement C.Copy & Paste
D.Animation Painter
12. Which one is used to express the number of E.Transition
entities to which another entity can be associated Answer: D
via a relationship?

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -5 (Eng)

In Microsoft PowerPoint, you can quickly and process in terms that will enable its effective
easily copy animations from one object to installation, commissioning, operation, control
another using the Animation Painter. The Format and maintenance
Painter is used when you want to copy text and
paragraph formatting, select an entire paragraph, 17. MS DOS is a very popular operating system
including the paragraph mark. used by many around the world. It was
developed by ____________
15. Which among the following was the first A.Apple Inc
general purpose electronic computer? B.Microsoft
A.ENIAC C.Tata Consultancy Services
B.UNIVAC D.IBM
C.EDSAC E.None of the above
D.Pascal Answer: B
E.EDVAC MS-DOS is a discontinued operating system for
Answer: A x86-based personal computers mostly developed
ENIAC (Electronic Numerical Integrator and by Microsoft. Collectively, MS-DOS, its
Computer) was the first electronic general- rebranding as IBM PC DOS, and some operating
purpose computer. It was Turing-complete, systems attempting to be compatible with MS-
digital, and capable of being reprogrammed to DOS, are sometimes referred to as "DOS" (which
solve "a large class of numerical problems" is also the generic acronym for disk operating
system). MS-DOS was the main operating
16. A set of information that defines the status of system for IBM PC compatible personal
resources allocated to a process is computers during the 1980s and the early 1990s,
_____________. when it was gradually superseded by operating
A.Process control systems offering a graphical user interface (GUI),
B.ALU in various generations of the graphical Microsoft
C.Register Unit Windows operating system.
D.Process description
E.None of these 18. ______ terminals (formerly known as cash
Answer: D registers) are often connected to complex
A set of information that defines the status of inventory and sales computer systems.
resources allocated to a process of process A.Data
description. A process description is a set of B.Point-of-sale (POS)
information that describes the characteristics of a C.Sales

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -5 (Eng)

D.Query 21. You are planning on using a single network


E.None of these that supports 208 users. Which IP address class
Answer: B would you choose to be the most efficient?
The POS terminal is basically an electronic cash A.Class A
register & is used for realizing a retail transaction B.Class B
using a small hardware connected to the C.Class C
customer’s electronic payment portals. D.Class D
E.Class E
19. To navigate to a new web page for which you Answer: C
know the URL, type that URL in the browser's Explanation:
_______ and press Enter Class C type of IP is sufficient to provide
A.Name button connection to 208 users.
B.Home
C.Address bar 22. At least one resource must be held in a non-
D.Domain bar shareable mode. Otherwise, the processes
E.None of these would not be prevented from using the resource
Answer: C when necessary is known as ________
To navigate to a new web page for which you A.Non preemptive
know the URL, type that URL in the B.Mutual exclusion
browser's Address bar and press Enter C.Partial allocation
20. In MS Word, ______ is a predefined D.Circular wait
decorative text that you can add to a document. E.None of these
A.ClipArt Answer: B
B.SmartArt Mutual exclusion
C.Charts ->At least one resource must be held in a non-
D.WordArt shareable mode. Otherwise, the processes
E.Comment would not be prevented from using the resource
Answer: D when necessary. Only one process can use the
WordArt includes predefined and pre-decorated resource at any given instant of time.
text that can be added to a document for
enhancing its appearance. You can also 23. What is a simulated experience generated by
customise the font size and font colour of the a computer like visiting outer space or stepping
WordArt. on Moon?
A.Extended Reality

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -5 (Eng)

B.Virtual Reality obtaining findings, conclusions, and evaluations


C.Augmented Reality about software systems and their implementation
D.Snooping & composition. It serves as means to monitor,
E.Eavesdropping observe and optimize software development.
Answer: B
Virtual reality basically means 'near-reality’; it 25.Which one of the following key alone does not
usually refers to a specific type of reality (generally) trigger any action from the computer?
emulation which is simulated experience A.Toggle
generated by a computer. B.Alphanumeric
C.Modifier
24. A computer programme that is used to detect D.All of these
possible faults and their reasons with respect to E.None of These
a computer is known as____________. Answer: C
A.Corrective Software Modifier key
B.Diagnostic Software ->Modifier key is a special key (or combination)
C.Dialysis Software on a computer keyboard that temporarily
D.Diagnosing Software modifies the normal action of another key when
E.Incorrect Software pressed together.
Answer: B ->By themselves, modifier keys usually do
The Diagnostic Software catalogue includes nothing.
programs developed to evaluate, monitor, and ->Pressing any of the Shift, Alt, or Ctrl keys alone
optimize your computer system. It refers to does not (generally) trigger any action from the
concepts, techniques, and tools that allow for computer.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -6 (Eng)

Computer Awareness

1. In most of the IBM PCs, the CPU, the device shows them the current price and various offers
drivers, memory, expansion slots and active that may be associated with that product.
components are mounted on a single board.
What is the name of the board? 3. The diamond (rhombus) symbol in the
A. Motherboard flowchart is used for which among the following
B. Daughterboard purposes?
C. Bredboard A.Start and end
D. Fatherboard B.Subroutines
E.None of the above C.Input/ Output
Answer: A D.Labelled connectors
A motherboard (also called mainboard, main E.Conditional or decisional
circuit board, system board, baseboard, planar Answer: E
board, logic board, and mobo) is the main printed Conditional or decision is represented as a
circuit board (PCB) in general-purpose diamond (rhombus) showing where a decision is
computers and other expandable systems. necessary, commonly a Yes/No question or
True/False test. The conditional symbol is
2. This system is a small, wireless handheld peculiar in that it has two arrows coming out of it,
computer that scans the tag of the item and pulls usually from the bottom point and right point, one
up the current price (and any special offers) as corresponding to Yes or True, and one
you shop. corresponding to No or False.
A.PSS
B.POS 4. Registers which are partially visible to users
C.Inventory and used to hold conditional codes (bits set by
D.Data mining the CPU hardware as the result of operations),
E.None of these are known as ___________.
Answer: A A.PC
Personal Shopping System or PSS is a handheld B.Flags
device that is given to customers shopping in a C.Memory Address Registers
self-service retail market instead of a shopping D.General Purpose Registers
cart or a trolley. This device is installed with a E.None of these
customer-friendly interface program or software Answer: B
that scans the price tags on the products and

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -6 (Eng)

Registers which are partially visible to users and continues for a specific length. The major
used to hold conditional codes(bits set by the disadvantageof unpaged cache is that _______.
CPU) hardware as the result of operations), are A.it allows cache domain to contain redundant
known as Flags data
B.it does not allow writes to be cached
5. Which one acts as a centralised connection to C.its access time is greater than that ofpaged
several computers with the central node or caching
server? D.read ahead cache domain blocks are
A.Ethernet necessarily fixed in size
B.Ring E.None of these
C.Hub Answer: A
D.Bridge An unpaged cache associates disk domains with
E.None of these the address of the read and continuesfor a
Answer: C specific length. The major disadvantageof
Hub is like a repeater with multiple ports used to unpaged cache is that it allows cache domain to
connect the network channels. contain redundant data
It acts as a centralised connection to several
computers with the central node or server. 8. To find a saved document in the computer’s
memory and bring it up on the screen to view
6. Which one of the following cashless approach _______.
is used to pay for goods and services? A.Reverse
A.Internet banking B. Rerun
B.Electronic fund transfer C.Retrieve
C.E-Marketing D. Return
D.E-services E.None of these
E.None of These Answer: C
Answer: B To find a saved document in the computer’s
Electronic fund transfer (EFT) memory and bring it up on the screen to view is
-> A cashless approach is used to pay for goods know as Retrive.
and services.
9. To read the system messages and warnings,
7. An unpaged cache associates disk access in Windows, Which of the following files
domainswith the address of the read and should be checked?
A.System manager

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -6 (Eng)

B.Even viewer communication for notebook users is called


C.Control panel _____.
D.System message A.Wireless switch
E.None of these B.Wireless hub
Answer:B C.Router
In Even viewer, the user can read the system D.HUB
messages and warnings, access in Windows. E.None of these
Answer: C
10. Which among the following is true regarding A USB communication device that supports duty
Flash memory in your computer? encryption for scare wireless loss communication
A.It is a volatile memory for notebook users is called Router.
B.It can be electronically erased
C.It was developed by EEPROM 13. Multi user systems provided cost savings for
D.Both B and C small business because they use a single
E.All the above processing unit to link several _______________.
Answer: D A.Personal computers
Flash Memory refers to a kind of non-volatile B.Workstations
storage used by a computer in order to store C.Dumb terminals
data that can be electronically erased and edited D.Mainframes
only. It was developed by EEPROM Memory E.None of the above
Answer: C
11. Specialized program that assist users in Multi user systems provided cost savings for
locating information of the web are called ____ small business because they use a single
A.Search engine processing unit to link several Dumb terminals
B.Brower
C.Resource locater 14. Which among the following is a command of
D.Antivirus the Data Control Language, a subdivision of
E.None of these Structured Query Language?
Answer: A A.Truncate
Specialized program that assist users in locating B.Rename
information of the web are called Search engine. C.Update
D.Select
12. A USB communication device that supports E.Revoke
duty encryption for scare wireless loss Answer: E

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -6 (Eng)

Data Control Language (DCL) is used to control Answer: B


privileges in Database. Grant and Revoke The first laptop computer available to the public
commands are used in the Data Control was the Osborne 1. The Osborne Computer
Language. Corporation released this model in 1981. It cost
GRANT - It is used to provide any user access $1795 at the time of release.
privileges or other privileges for the database.
REVOKE - It is used to take back permissions 17. ______ is a superset of keywords, symbols
from any user. and a system of rules for constructing statements
by which human can communicate the
15. _______ is a Windows utility program that instructions to be executed by a computer.
locates and eliminates unnecessary fragments A.A computer program
and rearranges files and unused disk space to B.A programming language
optimize operations. C.An assemble
A.Backup D.Computer I/O Device
B.Disk cleanup E.None of these
C.Disk defragmenter Answer: B
D.Restore A programming language is a formal computer
E.Disk restorer language or constructed language designed to
Answer: C communicate instructions to a machine,
Disk Defragmenter is a utility in Microsoft particularly a computer. Programming languages
Windows designed to increase access speed by can be used to create programs to control the
rearranging files stored on a disk to occupy behaviour of a machine or to express algorithms.
contiguous storage locations, a technique called
defragmentation. 18. Which number system is commonly used as
From Windows 8, the program was renamed to a shortcut notation for groups of our binary
Defragment and Optimize Drives. digits?
A.Binary
16. When was the world’s first laptop computer B.Decimal
introduced in the market and by whom? C.Octal
A.Hewlett-Packard, 1980 D.Hexadecimal
B.Osborne, 1981 E.None of these
C.Laplink Traveling Software Inc, 1982 Answer: D
D.Tandy Model-200, 1985 For representing binary digits, the hexadecimal
E.None of these notation is used commonly. Another advantage

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -6 (Eng)

of using it is that a hexadecimal digit represents 21.Which of the following is the most important
a nibble which is one half of a byte which has powerful computer in a typical network?
range from 00 to FF where F is 15 in decimal A.Desktop
system. B.Network server
C.Network hub
19. A typical university or corporate LAN that D.Network client
includes one or more servers and clients is E.None of these
called a____ Answer: B
A.Master slave network The most important powerful computer in a
B.Peer-to-peer typical network is Network server.
C.Client server network
D.LAN 22. Which among the following options is the line
E.None of these that describes the contents of the message while
Answer: C sending an e-mail?
A typical university or corporate LAN that A.BCC
includes one or more servers and clients is called B.to
a Client server network. C.subject
D.cc
20. Which one is an Optical disk storage medium E.None of these
designed to recapture the data normally in DVD Answer: C
format? Subject line in short describes content of an e-
A.Compact Disk mail.
B.Digital Video Disk
C.Blue-ray Disk 23.API is a code that allows two software
D.Floppy Disk programs to communicate with each other. What
E.None of these does ‘A’ mean in API?
Answer: C A.Automatic
Blue-ray Disk is an Optical disk storage medium B.Advanced
designed to recapture the data normally in DVD C.Application
format and it contains 25 GB(23.31 GB) per layer D.Address
space. E.Asynchronous
है और इसमें प्रति परि स्थान 25 जीबी (23.31 जीबी) है। Answer: C
Application Program Interface is an abbreviation
of API. It is a code that allows two software

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -6 (Eng)

programs to communicate with each other. An


API defines the correct way for a developer to 25.Which one of the following is a structured text
request services from an operating system (OS) that uses logical links (hyperlinks) between
or other application and expose data within nodes containing text?
different contexts and across multiple channels. A.DNS
B.URL
24.Which of the following option will not be C.HTML
helpful to instruct Word to stop bulleting D.HTTP
paragraphs? E.None of These
A.Press the enter key twice Answer: D
B.Click the Undo button on the Standard toolbar Hypertext Transfer Protocol (HTTP)
C.Press the backspace key to remove the bullet ->It is an application protocol for distributed,
D.Click the Bullets button on the Formatting collaborative, hypermedia information systems.
toolbar ->it is the foundation of data communication for
E.All of the above the World Wide Web.
Answer: B ->Hypertext is structured text that uses logical
Clicking undo button in this context will not end links (hyperlinks) between nodes containing text.
bulleting.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -7 (Eng)

Computer Awareness

1. What type of control pins are needed in a A.Processed Data


microprocessor to regulate traffic on the bus, in B.Database
order to prevent two devices from trying to use it C.Physical Layer
at the same time? D.Router
A.Bus control E.Repeater
B.Interrupts Answer: B
C.Bus arbitration A database is an organized collection of data. It
D.Status is the collection of schemas, tables, queries,
E.None of the above reports, views and other objects. The data are
Answer: C typically organized to model aspects of reality in
Bus Arbitration will control pins which are needed a way that supports processes requiring
in a microprocessor to regulate traffic. information, such as modelling the availability of
Explanation: When a bus needs to access rooms in hotels in a way that supports finding a
master control and leaves it and passes the hotel with vacancies.
control to another bus.
4. Always make sure the lower limit is lesser than
2. ……….is the science that attempts to produce the upper limit value is known as _____
machines that display the same type of A.In condition
intelligence that humans do. B.Like condition
A.Nanotechnology C.Isnull condition
B.Mini technology D.Between and condition
C.Simulation E.None of these
D.Artificial intelligence (AI) Answer: D
E.None of these Between and condition
Answer: D ->Always make sure the lower limit is lesser than
Artificial intelligence (AI) is apparently intelligent the upper limit value is known as Between and
behaviour by machines, rather than the natural condition.
intelligence (NI) of humans and other animals. Example
Select * from emp
3. A collection of information organized into Where deptno between 30 and 40
interrelated tables of data and specifications of
data objects is known as____________.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -7 (Eng)

5. Metropolitan Area Network (MAN) is defined D.All of these


for _______ and provides regional connectivity E.None of these
within a campus Answer: B
A.More than 50km These objects can be realized as parallel
B.Less than 30km process with method corresponding to defined
C.Less than 50km object operations known as Server.
D.Less than 60km
E.None of these 8. Which of the following was the world's first
Answer: C electronic programmable computing device?
Metropolitan Area Network (MAN) is defined for A.EDVAC
Less than 50km and provides regional B.ENIAC
connectivity within a campus or small C.PC
geographical area. D.Colossus
E.None of these
6. Which one of the following is a simple protocol Answer: (D)
that can be used to communicate between web Colossus was the world's first electronic digital
forms and your program? programmable computer. It used a large number
A.GUI of valves (vacuum tubes). It had paper-tape input
B.CGI and was capable of being configured to perform
C.Telnet a variety of Boolean logical operations on its
D.Instant messaging data, but it was not Turing-complete.
E.None of These 9. When one computer provides services to
Answer: B another computer, the environment is a(n) _____
Common Gateway Interface (CGI) infrastructure.
->It is a simple protocol that can be used to A.Master slave
communicate between Web forms and your B.Client /server
program. C.Domain
D.Independent
7. These objects can be realized as parallel E.None of these
process with method corresponding to defined Answer: B
object operations. If one computer provides services to another
A.Self-descriptiveness computer, the environment is a(n) Client /server
B.Servers infrastructure
C.Simplicity

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -7 (Eng)

10. Which among the following is an organised


collection of data about a single entity? 13. When a real-time telephone call between
A.File people is made over the Internet using
B.Database computers, it is called ___________.
C.Dictionary A.A chat session
D.Library B.An E-mail
E.None of these C.An instant message
Answer: E D.Internet telephony
Record is the correct answer, as it is not in the E.None of these
given options none of these is correct. Answer: D
An Internet telephony service provider (ITSP)
11. Which of the following registers is used to offers digital telecommunications services based
keep track of the address of the memory location on Voice over Internet Protocol (VoIP) that are
where the next instruction is located? provisioned via the Internet.
A.Memory address register
B.Memory data register 14. Which option is used to save the document
C.Instruction register with another name or to another location?
D.Program counter A.Save
E.None of these B.Save and replace
Answer: D C.Save as
The program counter is used to keep track of the D.New file
address of the memory location where the next E.None of these
instruction is located. Answer: C
12. In which of the following communication The “save as” option is basically used for three
system, both the sender and receiver can different purposes: for saving the file with a new
transfer the information at the same time? name, changing the location of the file and to
A.Half duplex change the format of the file. These options
B.Full duplex basically change the path of the file in the
C.Multi duplex memory of the system.
D. Simplex
E.None of these 15. What is the term given to software that has
Answer: B so many features that it requires considerable
In Full duplex, both the sender and receiver can disk space and memory resources to run?
transfer the information at the same time. A.Spyware

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -7 (Eng)

B.Freeware Note: The range is treated as a single unit, you


C.Bloatware can make the same change, or combination of
D.Adware changes to more than one cell at a time.
E.Delaware
Answer: C 18. Which of the following is a device that
Software comes to be known as Bloatware when separates two or more network segments within
it becomes so unwieldy that its functionality is one logical network?
drowned out by its useless features. This is also A.Router
known as software bloat. B.Bridge
C.Switch
16. If each and every system in the networks are D.Hub
connected together then such a topology are E.LAN
known as _______. Answer: B
A.Star A bridge is a device that separates two or more
B.Bus network segments within one logical network
C.Ring (e.g. a single IP-subnet). It is usually placed
D.Mesh between two separate groups of computers that
E.Mixed talk with each other, but not that much with the
Answer: (A) computers in the other group.
In Star topology every system are connected
together. 19. A detailed written description of the
programming cycle and the program, along with
17. In Excel, a ______ is identified by the cell in the test results and a printout of the program is
the upper-left corner and the cell in the lower- called_______
right corner, separated by a colon. A. Reporting
A.Worksheet B.Documentation
B.Value C.Output
C.Cell reference D.Special sheet
D.Range E.None of these
E.None of these Answer: B
Answer: D A detailed written description of the programming
In Excel, a range is identified by the cell in the cycle and the program, along with the testresults
upper-left corner and the cell in the lower-right and a printout of the program is called
corner, separated by a colon. Documentation.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -7 (Eng)

B.Mutual exclusion
20. If there are features of both the analog and C.Hold and wait
digital computer in a system it is called D.Circular wait
as__________. E.None of these
A.Digi log computer Answer: C
B.Hybrid computer Hold and wait or resource holding
C.Mini computer A process is currently holding at least one
D.Super computer resource and requesting additional resources
E.None of the above which are being held by other processes.
Answer: B
Hybrid computers are those which have features 23.For cold booting of your Personal Computer,
of both digital computer and analog computer. which among the following will be used?
These types of computers can be found in A.Root Disc
geological departments for survey and analysis B.Sub-prime Disc
purposes C.Primary Disc
D.Secondary Disc
21. If you wished to limit what you would see on E.None of the above
an Excel worksheet, what data function would Answer: E
you use? A system boot disk is a floppy disk which allows
A.Conditional format your computer to boot into an operating system
B.Filter such as DOS. Examples include the DOS
C.Data analysis installation disk and the Windows 95/98/Me
D.Sort startup disk.
E.None of these
Answer: B 24. The ability to recover and read deleted or
If you wished to limit what you would see on an damaged files from a criminal’s computer is an
Excel worksheet, what data function would you example of a law enforcement speciality called
use filter. _________________.
A.Robotics
22. Which process is currently holding at least B.Simulation
one resource and requesting additional C.Computer forensics
resources which are being held by other D.Animation
processes? E.None of these
A.Non preemptive Answer: C

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -7 (Eng)

Computer forensics is the application of C.Dumb terminals


scientifically proven methods to gather, process, D.Mainframe
interpret, and to use digital evidence to provide a E.Laptop
conclusive description of cyber- crime activities. Answer: C)
A dumb terminal is a computer terminal that consists

25.Multi-user systems provide cost savings for mostly of just a display monitor and a keyboard (and

small business as they use a single processing perhaps a mouse as well). It has no internal CPU
(central processing unit), and thus has little or no
unit to link several ______.
processing power.
A.Personal computers
B.Workstations

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -8 (Eng)

Computer Awareness

1. __________are the attempts by individuals to 3. In which process, each program is split into
obtain confidential information from you by fixed-size program components called pages?
falsifying their identity. A. Multitasking
A. Phishing B. Logging on
B. Computer viruses C. Paging
C. Spyware scams D. Scheduling
D. Viruses E. Time-Sharing
E. None of the above Answer: C
Answer: A Paging is a process in which each program is
Phishing is a type of Internet fraud scam where split into fixed-size program components called
the scammer sends email messages that appear pages. Some pages of it are loaded in the main
to be from financial institutions or credit card memory, depending upon the storage availability
companies that try to trick recipients into giving and requirement to execute a program.
private information (i.e., username, password,
account number, etc.). 4. Which process is currently holding at least one
resource and requesting additional resources
2. The section of the CPU that selects, interprets which are being held by other processes?
and sees to the execution of program A. Non preemptive
instructions is ____________. B. Mutual exclusion
A. Memory C. Hold and wait
B. Register unit D. Circular wait
C. Control unit E. None of these
D.ALU Answer: C
E. None of the above Hold and wait or resource holding
Answer: C A process is currently holding at least one
The control unit (CU) is a component of a resource and requesting additional resources
computer's central processing unit (CPU) that which are being held by other processes.
directs the operation of the processor. It tells the
computer's memory, arithmetic/logic unit and 5. A database ______ is procedural code that is
input and output devices on how to respond to a automatically executed in response to certain
program's instructions. events on a particular table in a database?
A.Constraints

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -8 (Eng)

B.Literals Adware is a software that is used to post


C.Trigger unwanted advertisements. Generally, these
D.Schema advertisements are posted as popups.
E.None of These
Answer: C 8. Which of the following part will hold many of
Trigger the crucial components of a computer, including
-> A database trigger is procedural code that is the central processing unit (CPU), memory and
automatically executed in response to certain connectors for input and output devices?
events on a particular table in a database. A.Holders
-> Triggers can restrict access to specific data, B.Mother Board
perform logging, or audit data modifications. C.Main Board
D.System Board
6. Which one is an Optical disk storage medium E.Breadboard
designed to recapture the data normally in DVD Answer: (B)
format? A motherboard is one of the most essential parts
A.Compact Disk of a computer system. It holds together many of
B.Digital Video Disk the crucial components of a computer, including
C.Blue-ray Disk the central processing unit (CPU), memory and
D.Floppy Disk connectors for input and output devices.
E.None of these
Answer: C 9. The operating system acts as a device
Blue-ray Disk is an Optical disk storage medium management that keeps track of devices.
designed to recapture the data normally in DVD Channels and control units is called as _______.
format and it contains 25 GB(23.31 GB) per layer A.I/O dispatch
space. B.I/O manger
C.I/O traffic controller
7. Which of the following software posts D.I/O receiver
unwanted advertisements on client’s computer? E.I/O gainer
A.Virus Answer: C
B.Malware I/o Traffic Controller: Keeps track of status of all
C.Worm devices, control units and channels.
D.Adware
E.Logic bombs 10. Which of the following terms is used for
Answer: D buying or selling of goods over the Internet?

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -8 (Eng)

A.e-buying -> The database must remain in a consistent


B.e-selling state after any transaction. No transaction should
C.e-business have any adverse effect on the data residing in
D.e-commerce the database.
E.None of these
Answer: D 13. Which one the following shortcut key is used
Today, most people use e-commerce to perform to delete the character which is on the left of the
monetary transaction (buying or selling goods) cursor and moves the cursor to that position?
online because of the ease, convenience, and A. Space
security that it provides. B.Enter
C. Back space
11. _________ is the specialized OS for use in D.Delete
computers which are built into larger systems. E.None of These
A.Embedded OS Answer: C
B.Real time OS Back space key
C.Mobile OS ->It is used to deletes the character which is on
D.Network OS the left of the cursor and moves the cursor to that
E.None of these position.
Answer: A
Explanation: 14. Which of the following terms is used for
Embedded OS is the specialized OS for use in programs that automatically submit the search
computers which are built into larger systems. request to several search engines
simultaneously?
12. ________ is a stable state before the A.Metasearch engines
execution of a transaction and stable state after B.Webcrawlers
the execution of the transaction as well. C.Terafinders
A.Atomicity D.Megasearchers
B.Consistency E.None of the above
C.Isolation Answer: A
D.Durability A metasearch engine (or aggregator) is a search
E.None of These tool that uses another search engine's data to
Answer: B produce their own results from the Internet.
Consistency Metasearch engines take input from a user and
simultaneously send out queries to third party

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -8 (Eng)

search engines for results. Sufficient data is 17. What is the term given to software that has
gathered, formatted by their ranks and presented so many features that it requires considerable
to the users. disk space and memory resources to run?
Examples include Savvysearch engine and A.Spyware
Metaseek engine. B.Freeware
C.Bloatware
15. Which of the following is a widely-used D.Adware
programming language for working with E.Delaware
relational databases? Answer: C
A.Assembly Language Software comes to be known as Bloatware when
B.Structured Query Language it becomes so unwieldy that its functionality is
C.Data-Oriented Language drowned out by its useless features. This is also
D.Wolfram Language known as software bloat.
E.None of the above
Answer: B 18. Which one is add functionality to your
SQL stands for Structured Query Language. SQL computer or help your computer perform better?
lets you access and manipulate databases. SQL A.Operating system
became a standard of the American National B.Utility programs
Standards Institute (ANSI) in 1986, and of the C. Patch
International Organization for Standardization D.Virtual memory
(ISO) in 1987. E.None of these
Answer: B
16. The Software tools that enable a user to Explanation:
interact with a computer for specific purposes are Utility programs, commonly referred to as just
known as ______________. "utilities," are software programs that add
A.Hardware functionality to your computer or help your
B.Networked Software computer perform better.
C.Shareware
D.Applications 19. Which is a piece of code intentionally
E.None of these inserted in to a computer’s memory that will set
Answer: D off a malicious function when specified
The Software tools that enable a user to interact conditions are met?
with a computer for specific purposes are known A.Proxy server
as Application. B.Time bomb

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -8 (Eng)

C.Logic bomb computer or terminal to access a single system


D.Hack bot with one OS on it is Multiuser operating system.
E.None of these
Answer: C 22. In which process, each program is split into
Logic bomb is a piece of code intentionally fixed size program components called pages?
inserted in to a computer’s memory that will set A.Multitasking
off a malicious function when specified conditions B.Logging on
are met. C.Paging
D.Scheduling
20. Which one is used in a program to execute a E.Time Sharing
particular set of statements repeatedly? Answer: C
A.Visual basic Paging is a memory management scheme by
B.Pseudocode which a computer store and retrieves data from
C.Condition secondary storage for use in main memory. In
D.Looping this scheme, the operating system retrieves data
E.None of these from secondary storage in same-size blocks
Answer: D called pages.
Looping is control structure which is used in a
program to execute a particular set of statements 23. In terms of Structured Query Language,
repeatedly. which among the following command is NOT an
example of Data Manipulation Language?
21. The computer operation system that is A.CREATE
developed to allow many users on different B.SELECT
computer or terminal to access a single system C.INSERT
with one OS on it is ____________ D.UPDATE
A.Single user operating system E.DELETE
B.Multi user operating system Answer: A
C.Dual user operating system CREATE command is an example of Data
D.All of the above Definition Language. The other commands are
E.None of these examples of Data Manipulation Languages.
Answer: B The SQL commands that deals with the
The computer operation system that is manipulation of data present in the database
developed to allow many users on different belong to DML or Data Manipulation Language
and this includes most of the SQL statements.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -8 (Eng)

Examples of DML are SELECT, INSERT, range from 00 to FF where F is 15 in decimal


UPDATE, DELETE. system.

24.Which number system is commonly used as a 25. A language used in a computer that is similar
shortcut notation for groups of our binary digits? to the languages of humans and is easy to
A.Binary understand is referred to as___.
B.Decimal A.Source code
C.Octal B.Machine Language
D.Hexadecimal C.High Level Language
E.None of these D.Object Code
Answer: D E.Assembly Language
For representing binary digits, the hexadecimal Answer: C
notation is used commonly. Another advantage Programs written in a high-level language must
of using it is that a hexadecimal digit represents be translated into machine language by a
a nibble which is one half of a byte which has compiler or interpreter.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -9 (Eng)

Computer Awareness

1. Which among the following is the reboot 3. When a real-time telephone call between
where the power to the system is physically people is made over the Internet using
turned off and back on again, causing an initial computers, it is called ___________.
boot of the machine? A.A chat session
A.Toggle B.An E-mail
B.Cold booting C.An instant message
C.Warm booting D.Internet telephony
D.Logging off E.None of these
E.None of these Answer: D
Answer: B An Internet telephony service provider (ITSP)
Reboots can be either cold (alternatively known offers digital telecommunications services based
as hard) where the power to the system is on Voice over Internet Protocol (VoIP) that are
physically turned off and back on again, causing provisioned via the Internet.
an initial boot of the machine, or warm
(alternatively known as soft) where the system 4. The computer uses which of the following
restarts without the need to interrupt the power. system to store data and perform calculation?
A.Decimal
2. Which is the command used to remove text or B.Hexadecimal
graphics from a document and the information is C.Octal
then stored on a clipboard so you can paste it D.Binary
later on? E.None of these
A.Cut Answer: D
B.Clip All the datas, which are stored and performed for
C.Chop calculation for system are stored as Binary.
D.Chew
E.Chunk 5. If we are inserting a header and footer in a
Answer: A document, the main objective behind that
The Office Clipboard stores text and graphics is_____________.
that you copy or cut from anywhere, and it lets A.Formatting a document
you paste the stored items into any other Office B.Allowing header and footer to appear on the
file. document when printed

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -9 (Eng)

C.Enabling header and footer to identify the 7. What is the term used for studies of the rules
document for forming admissible steps of an algorithm?
D.Enabling header and footer to modify the A.Syntax
document B.Programming structure
E.None of the above C.Programming language
Answer: B D.Logic
Headers and footers are areas in the top and E.None of these
bottom margins of each page in a document. You Answer: A
can add, edit, or delete headers and footers Syntax is the set of those procedures which
when your document is in print layout view or contain specific rules so that an instruction or a
publishing layout view. You can add page sentence can be comprehended in a meaningful
numbers, the time and date, a company logo, the manner.
document title or file name, or the author's name
to a header or footer. 8. SRAM retains data as long as power is
provided to the memory chip and need not be
6. The principle that Internet service providers refreshed periodically. What does ‘S’ represent?
should enable access to all content and A.Stagnant
applications equally regardless of the source is B.Storage
known as ______________. C.Simple
A.Net Servicing D.Static
B.Net Equality E.None of these
C.Net Neutrality Answer: D
D.Fair Usage Policy SRAM retains data as long as power is provided
E.None of these to the memory chip and need not be refreshed
Answer: C periodically. SRAM stands for Static Random
Net neutrality is the principle that Internet service Access Memory.
providers and governments regulating most of
the Internet must treat all data on the Internet the 9. What is the term used for an application which
same, and not discriminate or charge combines the features of more than different
differentially by user, content, website, platform, applications?
application, type of attached equipment, or A.Integrated software
method of communication. B.A suite
C.A combo package
D.High-end

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -9 (Eng)

E.None of these B.Consistency


Answer: A C.Isolation
Integrated software is an application which is a D.Durability
complete package in itself. These are basically E.None of These
packed with different software which has similar Answer: D
functionality. For instance, MS office has similar Durability
software as integrated software. ->The database should be durable enough to
hold all its latest updates even if the system fails
10. What is the term used for measurement of or restarts.
how fast data moves from one place to another?
A.Data per unit 13. Which one of the following data’s stored in a
B.Bits per second tree structure and each data is connected with a
C.Bits per hour network?
D.Ratio per bit A.Hierarchical model
E.None of these B.Network model
Answer: B C.Relational model
Bits per second is the term used for the D.All of these
measurement of how fast data moves from one E.None of these
place to another. Answer: B
Network Model
11. Which of the following order is definitely true, ->The data’s are stored in tree structure and
based on the distance coverage of the network? each data is connected with network.
A.MAN > LAN > WAN ->The search will start from root of the tree by
B.MAN > WAN > LAN using network.
C.WAN > LAN > MAN ->We can fetch the data faster, but maintaining
D.WAN > MAN > LAN the network is complicated.
E.None of these
Answer: D 14. The ability to recover and read deleted or
WAN (Country) > MAN (City) > LAN(100m) damaged files from a criminal’s computer is an
example of law enforcement’s speciality called
12. The database should be durable enough to _________.
hold all its latest updates even if the system fails A.Robotics
or restarts is known as ______ B.Simulation
A.Atomicity C.Computer forensics

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -9 (Eng)

D.Animation D.Word processor


E.None of these E.None of these
Answer: C Answer: D
Computer forensics is a discipline that comes A program which helps create written documents
under the digital forensic sciences. This branch and lets you go back and make necessary
deals with the evidence that is stored digitally. It corrections is Word processor.
involves extraction of data that is stored in the
electronic devices recovered during the 17. __________ is a web server that collects data
investigation of a criminal case by the police and from other web servers and puts it into a
other relevant authorities. database (much like an index), it provides links
to pages that contain the object of your search.
15. Who among the following is accredited with A.Search Engine
development of the architecture of the modern B.Browser
computer? C.FTP
A.Sir Clive Sinclair D.HTTP
B.Bill Gates E.None of these
C.Charles Babbage Answer: A
D.John Von Neumann Search Engine is a web server that collects data
E.None of these from other web servers and puts it into a
Answer: D database (much like an index), it provides links to
In electronics engineering and computer pages that contain the object of your search.
engineering, computer architecture is a set of
disciplines that describes a computer system by 18. A device that not only provides surge
specifying its parts and their relations. John von protection, but also furnishes the computer with
Neumann's 1945 paper, First Draft of a Report battery backup power during a power outage is
on the EDVAC, which described an organization ______.
of logical elements A.Battery strip
B.UPS
16. A program which helps create written C.Surge strip
documents and lets you go back and make D.USB
necessary corrections is _________. E.None of these
A.Spreadsheet Answer: B
B.Personal writer An uninterruptible power supply, also an
C.Word printer uninterruptible power source, UPS or

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -9 (Eng)

battery/flywheel backup, is an electrical B.Joystick


apparatus that provides emergency power to a C. Mouse
load when the input power source or mains D.Tracker
power fails. E.None of these
Answer: C
19. ____ ensures that originators of messages Mouse is used to move the pointing device in a
cannot refuse they are not sender of the graphical user platform
message.
A.Authentication 22. Which one represents a collection of objects
B.Integrity having same characteristic properties that exhibit
C.Access control common behaviour?
D.Non-Repudiation A.Generalization
E.None of these B.Specialization
Answer: D C.Class
Non-Repudiation ensures that originators of D.Data hiding
messages cannot refuse if they are not the E.None of these
sender of the message. Answer: C
Class
20. The feature in database language that allows ->A class represents a collection of objects
us to access certain records in the database is having same characteristic properties that exhibit
called __________. common behaviour.
A.Query ->It gives the blueprint or description of the
B.Forms objects that can be created from it.
C.Reports
D.Tables 23. Which among the following search engine is
E.None of these a search tool that uses another search engine's
Answer: A data to produce its own results from the Internet?
Query allows us to access certain records in the A.Meta
database. B.Individual
C.Directory
21. Which of the following device is used to D.Subject directory
move the pointing device in a graphical user E.None of these
platform? Answer: A
A.Keyboard

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -9 (Eng)

A meta-search engine (or aggregator) is a search Answer: A


tool that uses another search engine's data to Those commands, options are available in the
produce its own results from the Internet. menu bar.
Metasearch engines take input from a user and
simultaneously send out queries to third-party 25. The quickest and easiest way in Word, to
search engines for results. locate a particular word or phrase in a document
is to use the ___command.
24. Commands at the top of a screen such as A.Replace
File-Edit, Format and Tools to operate and B.Find
change things are incorporated in C.Lookup
__________________. D.Search
A.Menu bar E.None of these
B.Tool bar Answer: B
C.User friendly MS Word find command is used to search the
D.Word processor text or phrase in a document
E.None of these

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -10 (Eng)

Computer Awareness

1. Which among the following is a cloud 3. ___________is a low-level code that defines
computing platform and infrastructure created by how a microprocessor should function when it
Microsoft? executes machine-language instructions.
A.Simple Storage Service A.Micro code
B.Atmos B.Mini code
C.Openstack Swift C.Small Code
D.OceanStore D.Primary Code
E.Azure E.Alpha Code
Answer: E Answer: A
Microsoft is a cloud computing platform and Microcode is low-level code that defines how a
infrastructure created by Microsoft for building, microprocessor should function when it executes
deploying, and managing applications and machine-language instructions. Typically, one
services through a global network of Microsoft- machine-language instruction translates into
managed data centers. Azure was announced in several microcode instructions.
October 2008 and released on 1 February 2010
as Windows Azure, before being renamed to 4. At least one resource must be held in a non-
Microsoft Azure on 25 March 2014. shareable mode. Otherwise, the processes
would not be prevented from using the resource
2. The ability to recover and read deleted or when necessary is known as ________
damaged files from a criminal’s computer is an A.Non preemptive
example of a law enforcement speciality called B.Mutual exclusion
________________. C.Partial allocation
A.Robotics D.Circular wait
B.Simulation E.None of these
C.Computer forensics Answer: B
D.Animation Mutual exclusion
E.None of these ->At least one resource must be held in a non-
Answer: C shareable mode. Otherwise, the processes
Computer forensics is the application of would not be prevented from using the resource
scientifically proven methods to gather, process, when necessary. Only one process can use the
interpret, and to use digital evidence to provide a resource at any given instant of time.
conclusive description of cyber- crime activities.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -10 (Eng)

5. ____ is a systematic approach to decomposing E.None of these


tables to eliminate data redundancy and Answer: B
anomalies A microcomputer uses magnetic or optical media
A.Aggregation storage. A magnetic media stores the data on a
B.Specialization material which is magnetisable and the
C.Normalization information is read using a head. The optical
D. Denormalization media is comprised of modern disks, hard drives
E.None of these etc. which are read by the optical reader.
Answer: C
Normalization is a systematic approach of 8. Accessing the information in one’s computer,
decomposing tables to eliminate data without their knowledge is known as _____
redundancy and anomalies like insertion, update A.Tracking
and deletion. B.Hacking
C.Routing
6. _____ and _____ refer to the action of clicking D.Coping
and holding down the mouse button while E.None of these
moving the mouse and realigning it Answer: B
A.Drag, Click Accessing information in one’s computer, without
B.Drop, Drag their knowledge is known as Hacking.
C.Drag, Drop
D.Click, RightClick 9. What term is used to identify people coming
E.None of these together from various geographical locations to
Answer: C complete some task?
Drag and Drop refers to the action of clicking and A.Distributed team
holding down the mouse button while moving the B.Internet
mouse and realigning it. C.Virtual team
D.Similar team
7. The storage subsystem is a microcomputer E.None of these
consists mainly of _____or_____ media with Answer: C
varying capacities A virtual team (also known as a geographically
A.Memory or video dispersed team, distributed team, or remote
B.Magnetic or optical team) usually refers to a group of individuals who
C.Optical or memory work together from different geographic locations
D.Video or magnetic and rely on communication technology such as

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -10 (Eng)

email, FAX, and video or voice conferencing write operation till the data is made available or
services in order to collaborate. written at the desired location?
A.Response time
10. Who among the following is known as 'Father B.Access time
of Modern Computer Science'? C.Average time
A.Charles Babbage D.Waiting time
B.Alan Turing E.None of these
C.John Von Neumann Answer: B
D.JP Eckert Access time
E.JW Mauchly ->It is the time required between the desired
Answer: B mode for a read or write operation till the data is
Alan Turing is considered by many to be the made available or written at the desired location.
father of modern computer science as the world
knows it. He formed the concept of the 13. Once you load the suitable program and
algorithms and computations with one of his provide the required data, the computer does not
inventions, the Turing machine. Alan Turing was need human intervention. This feature is known
born on June 23, 1912 in England, the son of as _________________.
Julius and Sara Turing. A.Accuracy
B.Reliability
11.The second generation computer which was C.Versatility
built by transistors was built by D.Automatic
________________. E.None of the above
A.Oxford University Answer: D
B.Stanford University Once you load a suitable program and provide
C.ETH Zurich the required data, the computer does not need
D.University of Manchester "human intervention". This feature is called as
E.Harvard University "Automatic".
Answer: D
The second generation computer was built at 14. In Microsoft PowerPoint two kinds of sound
University of Manchester. effects files that can be added to the
presentation are___________&____________
12. Which one of the following is the time respectively.
required between the desired mode for a read or A..wav files and .midi files
B..wav files and .gif files

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -10 (Eng)

C..wav files and .jpg files Answer: C


D..jpg files and .gif files Paragraph formatting lets you control the
E.None of these appearance if individual paragraphs. For
Answer: A example, you can change the alignment of text
In Microsoft PowerPoint, two kinds of sound from left to centre or the spacing between lines
effects files that can be added to the presentation from single to double.
are .wav &.midi respectively. We can add sound
files to our presentations from a variety of 17. _______ is a Windows utility program that
sources. For example, we can add sound files locates and eliminates unnecessary fragments
we download from the Internet or special sound and rearranges files and unused disk space to
effects CDs. However, PowerPoint does not optimize operations.
recognize all sound file types. A.Backup
B.Disk cleanup
15. _______ is a mathematically oriented high C.Disk defragmenter
level language frequently used in time sharing. D.Restore
A.ASCII E.Disk restorer
B.ANSI Answer: C
C.ADA Disk Defragmenter is a utility in Microsoft
D.APL Windows designed to increase access speed by
E.None of these rearranging files stored on a disk to occupy
Answer: D contiguous storage locations, a technique called
APL is a set of powerful built-in functions, which defragmentation.
can be combined by indefinitely "nesting" From Windows 8, the program was renamed to
functions and it is frequently used in time Defragment and Optimize Drives.
sharing.
18. Which one of the following tree contains the
16. The word processing task associated with maximum or possible number of nodes at all
changing the appearance of a document is levels except a leaf?
________________-. A.Binary
A.Editing B.Full Binary
B.Writing C.Complete Binary
C.Formatting D.Extended Binary
D.All of the above E.None of these
E.None of the above Answer: B

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -10 (Eng)

Explanation: B.Flat-file database systems


Full Binary tree contains the maximum or C.Relational database system
possible number of nodes at all levels except a D.Hierarchical database system
leaf. E.None of these
Answer: C
19. _________ are specially designed computer Microsoft's Access and Corel's Paradox are both
chips that reside inside other devices, such as examples of Relational database system
yourcar or your electronic thermostat
A.Server 22. In which of the following processes, the
B.Embedded system changes made in the linked object do not reflect
C.Client system and save in the original document?
D.Robotic application A.Linking
E.None of these B.Embedding
Answer: B C.Inserting
Embedded system are specially designed D.Hyper linking
computer chips that reside inside other devices, E.Saving
such as your car or your electronic thermostat Answer: B
In the embedding process the changes made in
20. Which one performs simply an informal way the linked object do not reflect and save in the
of describing a program and does not follow any original document.
Syntax Strictly?
A.Mnemonic 23.Which of the following is NOT one of the four
B.Opcode major data processing functions of a computer?
C.Pseudocode A.Gathering data
D.Operand B.Processing data into information
E.None of these C.Analyzing the data or information
Answer: C D.Storing the data or information
Pseudocode is not a programming language, but E.None of these
simply an informal way of describing a program Answer: C
and it does not follow any Syntax Strictly. A computer has the function of taking data as
input, processing it and then displaying output. If
21. Microsoft's Access and Corel's Paradox are needed, it stores the data as well. But there is no
both examples of which type of software? such functionality in the computer where it can
A.Network database systems

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -10 (Eng)

analyze the data to come out with different working properly before starting the remainder of
conclusions. the boot process.

24. The process of checking all the peripheral 25. Which among the following options is the
units by the OS during the time of booting is application that combines text, sound, graphics,
known as_____ motion video, and/ or animation?
A.BIOS A.Multimedia
B.POST B.Minimedias
C.BUS C.Videoscapes
D.Chkdsk D.Motionware
E.None of these E.Maxomedia
Answer: B Answer: A
POST (Power on Self-Test) is a test the Multimedia is content that uses a combination of
computer must complete to verify all hardware is different content forms such as text, audio,
images, animation, video and interactive content.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -11 (Eng)

Computer Awareness

1. Which of the following is a windows utility 3. Which of the following is the type of software
program that locates and eliminates unnecessary that controls the internal operations of the
fragments and rearranges filed and unused disk computer and controls how the computer works
space to optimize operations? with all its parts?
A.Backup A.Shareware
B.Disk cleanup B.Public domain software
C.Disk defragmenter C.Application software
D.Restore D.Operating system software
E.None of these E.None of these
Answer: C Explanation
Disk Defragmenter is a utility in Microsoft Answer: D
Windows designed to increase access speed by An operating system (OS) is a program or
rearranging files stored on a disk to occupy software that manages and coordinates the
contiguous storage locations, a technique called functions of all the components of a computer. It
defragmentation. also acts as an interface between the user and
the hardware of a computer.
2. Which type of software is distributed free but
requires the users to pay some amount for 4. Which one of the following function display all
further use among the following mentioned the not null values in the specific column?
options? A.Distinct
A.Freeware B.Count
B.Shareware C.Order by
C.Rental ware D.Dual
D.Public-domain software E.None of These
E.Abandon ware Answer: B
Answer: B Count function
Among the following mentioned options ->Count function in SQL returns the number of
shareware is a type of software is distributed free values.
but requires the users to pay some amount for ->Count function counts all the not null values in
further use. the specific column.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -11 (Eng)

5. Which of the following Microsoft products is 7. The software which uses a pattern-matching
used to send and receive emails? technique to understand and find out harmful
A.Access elements in all the files in the disk is known as
B.Power point __________.
C.Outlook A.Anti-virus software
D.Web font B.Assisted software
E.Web access C.Software maxis
Answer: C D.Software diagram
Microsoft Outlook is used to send & receive E.Software patch
messages. It is personal information manager Answer: A
from Microsoft. It includes a calendar, task Antivirus or anti-virus software (often abbreviated
manager, contact manager, note taking, journal, as AV), sometimes known as anti-malware
and web browsing. software, is computer software used to prevent,
detect and remove malicious software. Antivirus
6. Every device on the internet has a unique ____ software was originally developed to detect and
address that identifies it in the same way that a remove computer viruses, hence the name.
street address identifies the location of a house. However, with the proliferation of other kinds of
A.DH malware, antivirus software started to provide
B.DA protection from other computer threats.
C.IP
D.IA 8. Each process must be waiting for a resource
E.None of these which is being held by another process, which in
Answer: C turn is waiting for the first process to release the
An Internet Protocol address (IP address) is a resource, then it is called as____
numerical label assigned to each device (e.g., A.Non preemptive
Computer, printer) participating in a Computer B.Mutual exclusion
network that uses the Internet Protocol for C.Partial allocation
communication. D.Circular wait
An IP address serves two principal functions: E.None of these
host or network interface identification and Answer: D
location addressing. Its role has been Circular wait
characterized as follows: "A name indicates what -> Each process must be waiting for a resource
we seek. An address indicates where it is which is being held by another process, which in

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -11 (Eng)

turn is waiting for the first process to release the D.Loading


resource. E.None of these
Answer: A
9.Which of the following key can be used as a Explanation:
shortcut to rename a folder in Microsoft Windows In an absolute loading scheme, the Reallocation
8 and higher versions? loader function is accomplished by an assembler.
A.F2
B.F4 12. When a transaction executes its terminal
C.F6 operation, it is said to be in a committed ______
D.F9 state
E.F11 A. Active
Answer: A B.Partially Committed
F2 is a shortcut to rename selected object in C.Failed
MS windows 8 and higher versions D. Abort
E.None of These
10. Which one is used in system call that causes Answer: B
the caller to block and be suspended until Partially Committed
another process wakes it up? ->When a transaction executes its final
A.Signal operation, it is said to be in a partially committed
B.Wait state.
C. Sleep
D.Wakeup 13. Which mechanism is used as a process that
E.None of These can be cropped temporarily out of main memory
Answer: C (or move) to secondary storage (disk) and make
Sleep that memory available to other processes?
->It is used in system call that causes the caller A.Fragmentation
to block and be suspended until another process B.Segmentation
wakes it up. C.Swapping
D. Paging
11. In an absolute loading scheme, which loader E.None of These
function is accomplished by the assembler? Answer: C
A.Reallocation Swapping
B.Allocation ->Swapping is a mechanism in which a process
C.Linking can be swapped temporarily out of main memory

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -11 (Eng)

(or move) to secondary storage (disk) and make cable Internet, DSL is one of the most popular
that memory available to other processes. ways ISPs provide broadband Internet access.
->At some later time, the system swaps back the
process from the secondary 16. If in a computer, 16 bits are used to specify
storage to main memory. address in a RAM, the number of addresses will
be ______________.
14. In which of the topology all the nodes A.216
attached in a circular wiring arrangement? B.65,536
A.Star topology C.64K
B.Bus topology D.Any of the above
C.Network topology E.None of the above
D.Ring topology Answer: D
E.Mesh topology If, in a computer, 16 bits are used to specify
Answer: D addresses in a RAM, the number of addresses
A ring topology is a network configuration in will be Any of the above
which device connections create a circular data In computing, a memory address is a reference
path. Each networked device is connected to two to a specific memory location used at various
others, like points on a circle. Together, devices levels by software and hardware. Memory
in a ring topology are referred to as a ring addresses are fixed-length sequences of digits
network. conventionally displayed and manipulated as
unsigned integers. Such numerical semantic
15. If internet services are provided by bases itself upon features of CPU (such as the
transmitting data over the wires of the telephone instruction pointer and incremental address
network, which of the following is used? registers), as well upon use of the memory like
A.Anodes an array endorsed by various programming
B.Digital Subscriber Line languages.
C.Digital Anodes
D.Wireless Diodes 17. Which of the following is a program in which
E.Wires malicious or harmful code is contained inside
Answer: B apparently harmless programming or data in
DSL (Digital Subscriber Line) is a such a way that it can get control and do its
communications medium used to transfer digital chosen form of damage, such as ruining the file
signals over standard telephone lines. Along with allocation table on your hard disk?
A. Logic Bomb

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -11 (Eng)

B. Bot Under the GUI, Icons and Menus displayed on


C.Trojan Horse the screen to send command to the computer
D. Rootkit system.
E. Adware
Answer: C 20. Which of the following is NOT one of the four
In computing, a Trojan horse, or Trojan, is any major data processing functions of a computer?
malicious computer program which misleads A.Gathering data
users of its true intent. The term is derived from B.Processing data into information
the Ancient Greek story of the deceptive wooden C.Analyzing the data or information
horse that led to the fall of the city of Troy. D.Storing the data or information
E.None of these
18. A type of instruction that can produce several Answer: C
lines of machine language code is called a A computer has the function of taking data as
______. input, processing it and then display output. If
A. Mnemonic needed, it stores the data as well. But there is no
B. Address such functionality in the computer where it can
C. Macro analyze the data to come out with different
D. Assemble conclusions.
E. None of these
Answer: C 21. Which of the following is a program that
A Macro instruction is a line of computer program works like a calculator for keeping track of
coding that results in one or more lines of money and making budgets?
program coding in the target programming A.calculator
language, sets variables for use by other B.bank
statements, etc. C.spread sheet
19. Which of the following is used in icons and D.budget
menus displayed on the screen to send E.None of these
command to the computer system? Answer: C
A.System Utility Spreadsheet is a program that works likes a
B.API calculator for keeping track for money and
C.GUI making budget.
D.User Interfaces 22. Which of the following terms is used for
E.None of these programs that automatically submit the search
Answer: C

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -11 (Eng)

request to several search engines Wallpapers can be changed by the personalize


simultaneously? section of all control panel items.
A. Metasearch engines 24.______ is a program that visits websites and
B. Webcrawlers reads their pages and other information in order
C. Terafinders to create entries for a search engine index
D. Megasearchers A.Web hacker
E. None of the above B.Web crawler
Explanation C.Web source
Answer: A D.Blogger
A metasearch engine (or aggregator) is a search E.None of these
tool that uses another search Engine’s data to Answer: B
produce their own results from the Internet. Web crawler is a program that visits web sites
Metasearch engines take input from a user and and reads their pages and other information in
simultaneously send out queries to third party order to create entries for a search engine index
search engines for results. Sufficient data is
gathered, formatted by their ranks and presented 25. Which among the following is the using
to the users. Examples include Savvysearch scheduling and multiprogramming to provide an
engine and Metaseek engine. economical interactive system of two or more
users?
23.Changing desktop wallpaper is a simple task A. Time sharing
which can be accessed through ________ section B. Programming
of all control panel items. C. Time changing
A. Personalize D. Processing
B. Image E. None of the above
C. Graphics Answer: A
D. Windows Time-sharing or multitasking is a logical
E. None of these extension of multiprogramming. Processor's time
Answer: A which is shared among multiple users
simultaneously is termed as time-sharing.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -12 (Eng)

Computer Awareness

1. Which feature helps to search the text through The most commonly used toggle key is the caps
reference material such as dictionaries, lock key, which alternates the letter keys
encyclopedias and translation services? between uppercase and lowercase.
A. Translation
B. Research 3. Which of the following feature of Excel allows
C. Find you to create small charts that you can insert in
D. Font individual cells?
E. Table A. Sparkline
Answer: B B. Slicer
In the Research Option dialog box, you can C. Macro
select from dictionaries, thesauruses, and D. All of the above
various Internet research Web sites in several E. None of these
languages. The Research Options services Answer: A
available depend on the language of the version Spark lines are mini charts that you can place
of Office and any services that we add to the inside a cell of a worksheet to represent
Research Options dialog box. numerical data. They also allow you to quickly
recognise time-based trends or variants in data.
2. If the Keyboard keys alter their status from
one state to another when they pressed, those 4. What should be minimum requirement of
kinds of keys are called ___________. random access memory (RAM) for internet
A. Toggle Keys access?
B. Function Keys A. 8KB
C. Modifier Keys B. 32MB
D. Alphanumeric Keys C. 16MB
E. There is no such key D. 64KB
Answer: A E. None of these
A toggle key toggles the input from other keys on Answer: B
the keyboard between different input modes. 32MB is the minimum requirement of random
A toggle key can also be used as an accessibility access memory for internal access
option to alternate the input mode of keys.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -12 (Eng)

5. Any communication between memory and 7. The process of writing computer instructions in
ALU of a computer is performed by which among a programming language is known as ____.
the following? A. Coding
A. Electronic Bus B. Algorithming
B. Universal Serial Bus C. Processing
C. Control Unit D. File
D. Memory Bus E. Instructioning
E. All of the Above Answer: A
Answer: C A programming language is a formal constructed
The Control Unit (CU) is a component of a language designed to communicate instructions
computer's central processing unit (CPU) that to a machine, particularly a computer. The
directs the operation of the processor. process of writing computer instructions in a
It tells the computer's memory, arithmetic/logic programming language is known as coding.
unit and input and output devices how to respond
to a program's instructions. 8. _____ is a restriction (or) condition which is
It is also responsible for communication between applied on the column of the table to have data
the memory unit and ALU. correctness
A. Constraints
6. Any source program on a computer is written B. Literals
with the help of which among the following C. Alias
languages? D. Concatenation
A. Assembly language E. None of these
B. Source code Answer: A
C. HTML Constraints
D. High Level Language -> it is a restriction (or) condition which is applied
E. Machine Language to the column of the table to have data
Answer: D correctness.
A high-level language is a programming
language such as C, FORTRAN, or Pascal that 9. An area of the microprocessor chip used to
enables a programmer to write programs that are temporarily store instructions and data that the
more or less independent of a particular type of processor is likely to use frequently is termed
computer. Such languages are considered high- a(n) ___________________.
level because they are closer to human A.ALU
languages and further from machine languages. B. Bus

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -12 (Eng)

C. Cache E. None of these


D.CPU Answer: D
E. Flash Really Simple Syndication means the file is
Answer: C transferred from another computer to your
Explanation: computer
An area of the microprocessor chip used to
temporarily store instructions and data that the 12. Which one of the following is a structured text
processor is likely to use frequently is termed as that uses logical links (hyperlinks) between
Cache. nodes containing text?
A.DNS
10. Which one of the following shortcut keys is B.URL
used to delete the character which is on the right C.HTML
side of the cursor and does not mouse the D.HTTP
cursor? E. None of These
A. Space Answer: D
B. Enter Hypertext Transfer Protocol (HTTP)
C. Back space ->It is an application protocol for distributed,
D. Delete collaborative, hypermedia information systems.
E. None of These ->it is the foundation of data communication for
Answer: D the World Wide Web.
Delete key ->Hypertext is structured text that uses logical
->Sometimes labelled as Del. links (hyperlinks) between nodes containing text.
->It deletes the character which is on the right
side of the cursor and does not mouse the 13. Which one is a stable state before the
cursor. execution of a transaction and stable state after
-> It also deletes the selected text. the execution of the transaction as well is known
as____
11. Which of the following document means the A. Atomicity
file is transferred from another computer to your B. Consistency
computer? C. Isolation
A. Uploading D. Durability
B. Downloading E. None of These
C. Accessing Answer: B
D. Really Simple Syndication Consistency

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -12 (Eng)

-> The database must remain in a consistent other network services over the traditional
state after any transaction. No transaction should circuits of the public switched telephone network.
have any adverse effect on the data residing in The main feature of ISDN is that it can integrate
the database. speech and data on the same lines, which were
not available in the classic telephone system.
14. Which of the following is responsible to
convert digital signals to analogous and vice 16. What type of control pins are needed in a
versa for the transmission and connection of microprocessor to regulate traffic on the bus, in
computers? order to prevent two devices from trying to use it
A.CPU at the same time?
B.USB A. Bus control
C.MODEM B. Interrupts
D. Network C. Bus arbitration
E.ALU D. Status
Answer: C E. None of the above
Explanation: Answer: C
MODEM is responsible to convert digital signal to Bus Arbitration will control pins which needed in
analogous and vice versa for the transmission a microprocessor to regulate traffic. Explanation:
and connection of computer When a bus needs to access master control and
leaves it and passes the control to another bus.
15. A set of communication standards for
simultaneous digital transmission of voice, video, 17. The prime area of application of this
data, and other network services is known as language entails is the learning environment.
__________. This language was not really developed to be
A.WAN used for anything other than teaching students
B. HTTP the basics of programming. Name the language.
C.ISDN A.MATLAB
D.LAN B. Visual basic
E.WAP C. C++
Answer: C D. Pascal
Integrated services digital network (ISDN) is a E. None of these
set of communication standards for simultaneous Answer: D
digital transmission of voice, video, data, and Pascal is a general-purpose, high-level language
that was originally developed by Niklaus Wirth in

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -12 (Eng)

the early 1970s. It was developed for teaching E. None of these


programming as a systematic discipline and to Answer: C
develop reliable and efficient programs. org domain is used by Non-Profit Organisation.

18. Changing desktop wallpaper is a simple task 21. Which operator returns the rows in the first
which can be accessed through ________ section query that are not present in the second query?
of all control panel items. A. Union
A. Personalize B. Intersect
B. Image C. Union all
C. Graphics D. Minus
D. Windows E. None of these
E. None of these Answer: D
Answer: A Minus operator
Wallpapers can be changed by the personalize Minus operator returns the rows in the first query
section of all control panel items. that are not present in the second query. First
eliminate duplicate query and then completely
19. By using which of the following key, the eliminate second query.
exciting document can be saved under another
name in Microsoft word? 22. Which one of the following will remove all
A. file records from a table, including all spaces
B. tool allocated for the records are removed?
C. save A. Drop
D. Save as B. Delete
E. None of these C. Truncate
Answer: D D. All of these
The exciting document can be saved in another E. None of These
name in Microsoft word by using Save as. Answer: C
Truncate
20. Which one of the following domains is used -> Remove all records from a table, including all
by Non-Profit Organisation? spaces allocated for the records are removed.
A. com
B. gov 23.What is the name of Google's optical head-
C. org mounted display designed in the shape of a pair
D. edu of eyeglasses?

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -12 (Eng)

A. Google head In a flowchart circles, ovals, stadiums or rounded


B. Google eye (fillet) rectangles usually contain the word "Start"
C. Google glass or "End", or another phrase signalling the start or
D. Google specs end of a process, such as "submit inquiry" or
E. Google hawk eye "receive product".
Answer: C
Google Glass is an optical head-mounted display 25. Which among the following should be used if
designed in the shape of a pair of eyeglasses. It the doctor wants to include his credentials and
was developed by X (previously Google X) with degrees at the bottom of every page of his
the mission of producing a ubiquitous computer. prescription book?
Google Glass displayed information in a A. Header
smartphone-like hands-free format. Wearers B. Footer
communicated with the Internet via natural C. Bottom
language voice commands. D. Page Down
E. Page Break
24. In a Flowchart, __________ shaped boxes are Answer: B
used for 'Start' or 'End' command. Headers and footers are pieces of text, or graphics,

A. Oval which appear at the top and bottom of a page. If a

B. Rectangular doctor wants to include all his credentials and


degrees at the bottom of every page of his
C. Diamond
prescription book, he should use the footer option in
D. Hexagonal
his computer.
E. Parallelogram
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -13 (Eng)

Computer Awareness

1. Which among the following term is used for 3. Which of the following is any malicious
those hardware devices that are not part of the computer program which is used to hack into a
main computer system and are often added later computer by misleading users of its true intent?
to the system? A. Worm
A. Clip art B. Spyware
B. Highlight C. Trojan horse
C. Execute D. Keylogger
D. Peripheral E.VGA file
E. None of these Answer: C
Answer: D In computing, Trojan horse, or Trojan, is any
A peripheral device is generally defined as any malicious computer program which is used to
auxiliary device such as a computer mouse or hack into a computer by misleading users of its
keyboard that connects to and works with the true intent.
computer in some way.
4. To make a notebook act as desktop as a
2. Name the type of memory which clears desktop model, the notebook can be connected
everything when the power of a computer gets to a ________ which is connected to a monitor
switched off. and other devices.
A. Volatile A.bay
B. Non-volatile B. docking station
C.ROM C. port
D. Flash memory D. network
E. None of these E. None of these
Answer: A Answer: B
Volatile memory is a type of memory that clears To make a notebook act as desktop as a desktop
everything when the power of a computer gets model, the notebook can be connected to a
switched off, whereas nonvolatile memory retains docking station, it can be connected to a
the data even when the power gets switched off. monitor and other devices.
Moreover, ROM and flash memory also retain
the data in case the power gets switched off. 5. An auto responder is a type of computer
_______on mail server that automatically replies
to e-mails?

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -13 (Eng)

A. Command Mainframe computers are the computers that are


B. Software primarily used by banks for bulk data processing
C. Program and for processing transactions.
D. Bug
E. None of these 8. Which process of decomposing a problem
Answer: C (program) into a set of modules so as to reduce
An auto-responder is a computer program that the overall complexity of the problem?
automatically answers e-mail sent to it. An auto- A. Polymorphism
responder is a series of emails, usually focused B. Modularity
on a specific topic, delivered in a pre-determined C. Hierarchy
sequence at pre-determined intervals. D. Abstraction
E. None of these
6. Specialized programs that assist users in Answer: B
locating information on the web are called ____. Modularity
A. Information engines -> Modularity is the process of decomposing a
B. Locator engines problem (program) into a set of modules so as to
C. Web browsers reduce the overall complexity of the problem.
D. Resource locators
E. Search engines 9. Which of the following controls the manner of
Answer: E interaction between the user and the operating
A web search engine is a software system that is system?
designed to search for information on the World A. user interface
Wide Web. Web search engines get their B. language translator
information by web crawling from site to site. C. platform
D. screen saver
7. The computers used by banks for transactions E. None of these
processing and analyzing bulk data are called Answer: A
_________________. The user interface controls the manner of
A. Desktop Computers interaction between the user and the operating
B. Personal Computers system.
C. Mainframe Computers
D. Laptop Computers 10. Which one of the following shortcut key is
E. Notebook Computers used to move the cursor to the beginning of the
Answer: C work area?

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -13 (Eng)

A. Page up effects are now permanently established on the


B. Esc database system.
C. Home
D. Enter 13. Which property states that in a transaction
E. None of These either all of its operations are executed or
Answer: C nothing should be done?
Home shortcut key is used to move the cursor to A. Atomicity
the beginning of the work area. B. Consistency
C. Isolation
11. ADSL, SDSL, HDSL and VDSL are examples D. Durability
of different types of _____________. E. None of These
A. Ethernet Answer: A
B. Digital subscriber link Atomicity
C. Modem ->Atomicity property states that in a transaction
D. Subscription either all of its operations are executed or
E. None of these nothing should be done.
Answer: B
ADSL, SDSL, HDSL, and VDSL are examples of 14. Which among the following is the reboot
different types of Digital subscriber link. where the power to the system is physically
turned off and back on again, causing an initial
12. If a transaction executes all its operations boot of the machine?
successfully and all its effects are now A. Toggle
permanently established on the database system B. Cold booting
is known as____ C. Warm booting
A. Active D. Logging off
B. Partially Committed E. None of these
C. Committed Answer: B
D. Abort Reboots can be either cold (alternatively known
E. None of These as hard) where the power to the system is
Answer: C physically turned off and back on again, causing
Committed an initial boot of the machine, or warm
->If a transaction executes all its operations (alternatively known as soft) where the system
successfully, it is said to be committed. All its restarts without the need to interrupt the power.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -13 (Eng)

15. _________ is a program that appears or C. Simulation


pretends to be a genuine application, but actually D. Computer Forensics
causes damage to the executable files on the E. None of these
computer. Answer: D
A. Trojan horse Computer forensics is a branch of digital forensic
B. Adware science pertaining to evidence found in
C. Spyware computers and digital storage media. Computer
D. Worm forensics is the application of investigation and
E. Viruses analysis techniques to gather and preserve
Answer: A evidence from a particular computing device in a
Trojan horse is a malicious program which looks way that is suitable for presentation in a court of
like a normal program and is accompanied with law.
useful application like computer games. When
you run the game, the Trojan horse gets 18. The operating system acts as device
activated and destroys the information in the management that keeps track of devices.
background. Channels and control units are called as
_______.
16. Which of the following operating system is A.I/O dispatch
not licensed by any company? B.I/O manger
A. Windows C.I/O traffic controller
B. Apple D.I/O receiver
C. UNIX E.I/O gainer
D.LINUX Answer: C
E. None of these I/o Traffic Controller: Keeps track of the status of
Answer: C all devices, control units and channels.
UNIX is not owned and licensed by a company
19. In which of the following communication
17. _______ is the application of investigation and system, both the sender and receiver can
analysis techniques to gather and preserve transfer the information at the same time?
evidence from a particular computing device in a A. Half duplex
way that is suitable for presentation in a court of B. Full duplex
law. C. Multi duplex
A. Robotics D. Simplex
B. Animation E. None of these

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -13 (Eng)

Answer: B E. None of These


In Full duplex, both the sender and receiver can Answer: B
transfer the information at the same time. Stand-alone users
->Stand-alone users can maintain personal
20. A device needed to communicate with databases by using ready-made program
computers using telephone lines is _____ packages, and provide easy-to-use menu-based
A. Disk or graphics-based interfaces.
B.CPU
C.VDU 23. The application program which is used to run
D. Modem animation on the webpage is known as___.
E. None of these A. Flash
Answer: D B. Spiders
A device needed to communicate with computers C. Cookies
using telephone lines is Modem. D. Applets
E. Sparks
21. The computer uses which of the following Answer: A
system to store data and perform calculation? Flash is an application program developed by
A. Decimal Adobe. It is used to load and run the elements
B. Hexadecimal which cause an animation to work in webpage on
C. Octal the internet.
D. Binary
E. None of these 24. Hardware devices that are not part of the
Answer: D main computer system and are often added later
All the data, which are stored and performed for to the system. They are called _____.
calculation for the system are stored as Binary. A. Peripheral
B. Clip art
22. Who can maintain personal databases by C. Highlight
using ready-made program packages, and D. Executive
provide easy-to-use menu-based or graphics- E. None of these
based interfaces? Answer: A
A. Navie user Hardware devices that are not part of the main
B. Stand-alone users computer system and are often added later to the
C. Sophisticated end-users system. They are called peripheral.
D. All of these

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -13 (Eng)

25. Which among the following defines Answer: A


something that can be played and recorded and Multimedia is the field concerned with the
also be made a part of the live performance ? computer-controlled integration of text, graphics,
A. Multimedia drawings, still and moving images (Video),
B. Function Media animation, audio, and any other media where
C. Distributive Media every type of information can be represented,
D. Fraction Media stored, transmitted and processed digitally.
E. None of the above

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -14 (Eng)

Computer Awareness

1. The key that is used in case you want to make 3. Which number system is commonly used as a
the letters bold without using the Shift key even shortcut notation for groups of our binary digits?
once is__________. A. Binary
A. Ctrl B. Decimal
B. Alt + Del C. Octal
C. Caps Lock D. Hexadecimal
D. Num Lock E. None of these
E. Alt + Del + Num Lock Answer: D
Answer: C For representing binary digits, the hexadecimal
In case you want to make all the characters in notation is used commonly. Another advantage
the sentence in capitals and you do not want to of using it is that a hexadecimal digit represents
use the Shift key in the keyboard in that case you a nibble which is one half of a byte which has
can use the Caps Lock option so that you do not range from 00 to FF where F is 15 in decimal
have to go for the Shift option every single time. system.

2. Which of the following is a device that 4. By using which of the following key, the
separates two or more network segments within exciting document can be saved in another name
one logical network? in the Microsoft word?
A. Router A. file
B. Bridge B. tool
C. Switch C. save
D. Hub D. Save as
E. LAN E. None of these
Answer: B Answer: D
A bridge is a device that separates two or more The exciting document can be saved in another
network segments within one logical network name in the Microsoft word by using Save as.
(e.g. a single IP-subnet). It is usually placed
between two separate groups of computers that 5. Which among the following transfers
talk with each other, but not that much with the information to and fro with respect to the
computers in the other group. processor?
A. Address Bus
B. Memory Bus

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -14 (Eng)

C. Data Bus Excel. VBA functions are built-in functions that


D. Access Bus are used in Excel's programming environment
E. Other than those given in options called Visual Basic for Applications (VBA).
Answer: C
Data Bus refers to the pathway which is used for 8. In which printers, Printing is achieved by
the purpose of transferring instruction from the deflecting laser beam on to photosensitive
processor and also in channelling instructions to surface of a drum?
the processor. It is an example of a bidirectional A. Dot Matrix
bus B. Daisy Wheel
C. Laser printer
6. The power-saving mode that allows the D. Electromagnetic printer
computer to be restarted by simply pressing a E. None
key on the keyboard is called _______________. Answer: C
A. Standby In Laser printers, Printing is achieved by
B. Warm boot deflecting laser beam on to photosensitive
C. Power management. surface of a drum.
D. Cold boot
E. None of these 9. Which among the following is an important
Answer: A circuitry in a computer system that directs the
The power-saving mode that allows the computer operation of the processor?
to be restarted by simply pressing a key on the A. Memory
keyboard is called Standby Mode. B. Address Bus
C. Accumulator
7. Any pre-programmed formula that is used in D.ALU
MS Excel is known as ____________. E. Control Unit
A. Defined formula Answer: E
B. Specified formula The Control Unit (CU) is digital circuitry
C. Function contained within the processor that coordinates
D. Defined function the sequence of data movements into, out of,
E. Definite formula and between a processor's many sub-units.
Answer: C
Worksheet formulas are built-in functions that are 10. Which one of the following carries fans and a
entered as part of a formula in a cell. These are special port designed for power supply?
the most basic functions used when learning A.CPU

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -14 (Eng)

B. Monitor 13. Which one of the following regulates the


C. Mother Board process of sending data between fast sender
D. UPS and slow receiver?
E. None of these A. Data routing
Answer: C B. Flow control
Mother Board carries fans and a special port C. Bandwidth
designed for power supply. D. Error control
E. None of these
11. The time utilized by the computer to process Answer: B
input and provide output is known as ______. Flow control
A. Delay time ->It regulates the process of sending data
B. Execution time between fast sender and slow receiver.
C. Real time
D. Down time 14. What happens if the base and derived class
E. None of these contains definition of a function with some
Answer: B prototype?
The time utilized by the computer to process A. compiler report an error on compilation
input and provide output is known as Execution B. only base class function will get called
time. irrespective objective
C. base class function will call base class
12. Which one of the following is a small disk function and derived class object will call derived
storage device that today typically has about 1.4 class function
Megabytes of memory capacity? D. only derived class function will get called
A.CD drive irrespective objective
B. Floppy drive E. None of these
C. Hard disk drive Answer: C
D. All of these If the base and derived class contains definition
E. None of These of a function with some prototype base class
Answer: B function will call base class function and derived
Floppy drive class object will call derived class function.
->A floppy is a small disk storage device that
today typically has about 1.4 Megabytes of 15. Which of the following referred as the overall
memory capacity. design, construction, organization, and

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -14 (Eng)

interconnection of the various components of a D. Open source


computer system? E. Source code
A. Computer system Answer: D
B. Computer architecture In general, open source refers to any program
C. Computer programming whose source code is made available for use or
D. Computer algorithm modification as users or other developers see fit.
E. Computer flow chart Open source software is usually developed as a
Answer: B public collaboration and made freely available.
Computer architecture is a specification detailing
how a set of software and hardware technology 18. In which process, each program is split into
standards interact to form a computer system or fixed-size program components called pages?
platform. In short, computer architecture refers to A. Multitasking
how a computer system is designed and what B. Logging on
technologies it is compatible with. C. Paging
D. Scheduling
16. The computer is manipulating data in many E. Time-Sharing
ways, and this manipulating is called ________ Answer: C
A. Batching Paging is a process in which each program is
B. Processing split into fixed-size program components called
C. Utilizing pages. Some pages of it are loaded in the main
D. Upgrading memory, depending upon the storage availability
E. Separating and requirement to execute a program.
Answer: B
The computer is manipulating data in many 19. A program that converts a high-level
ways, and this manipulating is called processing. language source file into a machine-language file
is called a _________.
17. Which among the following source makes the A. Translator
uncompiled program instructions – the source B. Assembler
code available to programmers who want to C. Compiler
modify and improve their quality for specific task D. Linker
oriented applications? E. None
A. Utility Answer: C
B. Application
C. Device driver

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -14 (Eng)

A program that converts a high-level language UPS is a device that not only provides surge
source file into a machine-language file is called protection, but also furnishes your computer with
a Compiler. battery backup power during a power outage.

20. Which among the following reports all the 22. Which process check to ensure the
errors of the program along with the line components of the computer are operating and
numbers? connected properly?
A. Assembler A. Booting
B. Compiler B. Processing
C. Interpreter C. Saving
D. Linker D. Editing
E. Loader E. None of these
Answer: B Answer: A
Compiler converts the program in a high-level Booting is a startup sequence that starts the
language into low-level language and reports all operating system of a computer when it is turned
the errors of the program along with the line on. A boot sequence is the initial set of
numbers. C, C++ use compilers. operations that the computer performs when it is
Interpreter converts the programs in a high-level switched on. Every computer has a boot
language to low-level language. It translates line sequence. The average computer doesn’t
by line and reports the error once after understand the boot sequence but is important to
completing the translation process. know for customizing and troubleshooting your
computer.
21. __________ is a device that not only provides
surge protection, but also furnishes your 23.Inside a GIF image, which among the
computer with battery backup power during a following is a small program that is often
power outage. embedded?
A.USB A. Web browsers
B.UPS B. Web bugs
C.URC C. Web fragments
D. Battery Strip D. Web sites
E. None of these E. Web pages
Answer: B Answer: B
Web bug or web beacon is a file object that can
be used in order to track the user behaviour.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -14 (Eng)

Unlike a cookie which can either be accepted or GRANT - It is used to provide any user access
rejected by a user, this cannot be accepted or privileges or other privileges for the database.
rejected by the user. Rather it appears as REVOKE - It is used to take back permissions
another file object inside a GIF image or for that from any user.
matter as another GIF image itself
25.Which among the following is the software
24.Which among the following is a command of that is used to create text-based documents in
the Data Control Language, a subdivision of your computer?
Structured Query Language? A. Excel
A. Truncate B. Word Processors
B. Rename C. Word Functions
C. Update D. Word Files
D. Select E. Word Illustrations
E. Revoke Answer: B
Answer: E A word processor is an electronic device or
Data Control Language (DCL) is used to control computer software application that performs the
privileges in Database. Grant and Revoke task of composing, editing, formatting, and
commands are used in the Data Control printing of documents. It is not to be mistaken for
Language. a text editor, which does not save any formatting
in each document.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -15 (Eng)

Computer Awareness

1. The icons on the __________ are organized


according to function and according to the most 3. On which of the following models does the
commonly used commands in MSWord. working of Bluetooth devices depend?
A.GUI A.Client/server
B.Icon layout B.Peer-to-peer
C.toolbars C.Master/slave
D.Windows D.Analog/digital
E.None of these E.None of these
Answer: C Answer: C
The icons on the toolbars are organized The working of Bluetooth devices is based on a
according to function and according to the most master/slave model. This model contains 266
commonly used commands in MSWord. The devices out of which one is a master device and
toolbar that usually appears directly below the 255 and slave devices. Any device can be
menu bar is called the Standard Toolbar. The master and the master device can select up to
toolbar just below that is called the Formatting seven slave devices and communicate with them
Toolbar. simultaneously.

2.__________are 'attempts by individuals to 4. Which one of the following is a series of


obtain confidential information from you by operations that convert raw facts into useful
falsifying their identity. information?
A.Phishing A.Schema
B.Computer viruses B.Data processing
C.Spyware scams C.Data Processing System
D.Viruses D.Data recovery
E.None of the above E.None of These
Answer: A Answer: B
Phishing is a type of Internet fraud scam where Data processing
the scammer sends email messages that appear ->It is a series of operations that convert raw
to be from financial institutions or credit card facts into useful information.
companies that try to trick recipients into giving
private information (i.e., username, password,
account number, etc.).

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -15 (Eng)

5. The analytical engine developed during the Compiler converts the program in a high-level
first generation of computers used __________ as language into low-level language and reports all
a memory unit. the errors of the program along with the line
A.RAM numbers. C, C++ use compilers.
B.Floppies Interpreter converts the programs in a high-level
C.Cards language to low-level language. It translates line
D.Counter wheels by line and reports the error once after
E.None of these completing the translation process.
Answer: D
The analytical engine developed during first 8. Laser printer can print ___ pages of text per
generation of computers used counter wheels as minute and their resolution ranges from
a memory unit. ______dpi
A.5-25, 400-1300
6. Which of the following include the file name B.5-25, 400-1200
and possibly a directory of folders? C.5-24, 400-1200
A.File directory D.5-25, 500-1300
B.Information packet E.None of these
C.File specification Answer: C
D.File extension Laser printer can print 5-24 pages of text per
E.None of these minute and their resolution ranges from 400-
Answer: A 1200 dpi.
A directory is a file system cataloging structure
which contains references to other computer 9. Which among the following term is used for
files, and possibly other directories. those hardware devices that are not part of the
main computer system and are often added later
7. Which among the following reports all the to the system?
errors of the program along with the line A.Clip art
numbers? B.Highlight
A.Assembler C.Execute
B.Compiler D.Peripheral
C.Interpreter E.None of these
D.Linker Answer: D
E.Loader A peripheral device is generally defined as any
Answer: B auxiliary device such as a computer mouse or

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -15 (Eng)

keyboard that connects to and works with the C.Super


computer in some way. D.Abstract
E.None of these
10. An approach that permits the computer to Answer: C
work on several programs instead of one is Super class
_________________-. ->The term Super refers to a class's direct
A.On-line thesaurus ancestor as well as all of its ascendant classes.
B.Multiprogramming
C.Over lapped processing 13. Which one of the following is a two
D.Outline processor dimensional in which we can store data in row
E.None of these and column-wise?
Answer: C A.Hierarchical model
An approach that permits the computer to work B.Network model
on several programs instead of one is Over C.Relational model
lapped processing. D.All of these
E.None of these
11. ‘COBOL ’ is one of the high level Answer: C
programming language, What does B Relational Model
represents? ->It is a two dimensional, here we can store data
A.Business in row and column wise.
B. Buyer ->We can easily fetch the output by given inputs.
C.Backend
D.Busy 14. During the installation of which of the
E.None of these following program, files should be copied into the
Answer: A hard disk from CD-ROM or other medium?
A.Programming software
COBOL --> Common Business Oriented B.System hardware
Language. It is the primary domain in business, C.Application hardware
finance and administration. D.Application software
E.None of these
12. The term _______ refers to a class's direct Answer: D
ancestor as well as all of its ascendant classes Application software is the one which is installed
A.Derived to run various applications on the computer; it
B.Subclass uses system software as a platform for running

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -15 (Eng)

and performing specific functions. The A digital plotter is a computer output device
application software requires various supporting which draws curves and other computer graphics
files and folder which help in running of the data on ordinary
software. Various examples of application
software are MS Word, accounting software Tally 17. A __________ is one of thousands of
etc. programs that can invade computer and perform
a variety of functions ranging from annoying
15. The main components of a computer (e.g., popping up messages as a joke) to
communicate with each other through which dangerous (e.g., deleting files or destroying your
among the following? hard disk).
A.Universal Port A.MS Access
B.Private Bus B.MS Word
C.System Bus C.Antivirus
D.Universal Bus D.Computer Virus
E.Traffic Bus E.None of these
Answer: C Answer: D
A system bus is a single computer bus that A computer virus is a program or piece of code
connects the major components of a computer that is loaded onto your computer without your
system, combining the functions of a data bus to knowledge and runs against your wishes.
carry information, an address bus to determine Viruses can also replicate themselves.
where it should be sent, and a control bus to
determine its operation. 18. Which command is used to remove text or
graphics from a document and the information is
16. A high quality CAD system uses which of the then stored on a clipboard so you can paste it
following for printing drawing and graphs? later on?
A.Dot matrix printer A.Cut
B.Digital plotter B.Clip
C.Line printer C.Chop
D.All of the above D.Chew
E.None of the above E.Chunk
Answer: B Answer: A
A high quality CAD system uses the Digital The Office Clipboard stores text and graphics
plotter for printing drawing and graphs. that you copy or cut from anywhere, and it lets

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -15 (Eng)

you paste the stored items into any other Office The BSoD error screen serves as an alert to
file. avert further computer and system damage.
A BSoD freezes Windows and requires that the
19. A _______ typically connects personal system be rebooted in order to continue to
computers within a very limited geographical operate.
area, usually within a single building.
A.LAN 21.The internet service that provides a
B.MAN multimedia interface to available resources is
C.WAN called—————
D.HAN A.World Wide web
E.None B.Telnet
Answer: A C.NOTA
Explanation: D.FTP
Local Area Network is the typically connects E.None of these
personal computers within a very limited Answer: A
geographical area, usually within a single The internet service that provides a multimedia
building. interface to available resources is called World
Wide Web.
20) __________ is an error screen that indicates
the system conflicts and the potential for a crash. 22. Which mechanism that permits new classes
A.Fault to be created out of existing classes by
B.Motherboard Crash extending and refining its capabilities?
C.BIOS A.Encapsulation
D.BSoD B.Inheritance
E.Kernel Panic C.Class
Answer: D D.Data hiding
Blue screen of death (BSoD) is a Microsoft E.None of these
Windows operating system error screen that is Answer: B
displayed to indicate system conflicts and the Inheritance
potential for a crash. -> Inheritance is the mechanism that permits new
BSoD errors relate to system hardware, classes to be created out of existing classes by
temperature, timing, resources, corrupt registries extending and refining its capabilities.
or viruses.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -15 (Eng)

23.____________ is the automatic addition of Answer: E


names and addresses from a database to letters In computing, an interface is a shared boundary
and envelopes in order to facilitate sending mail across which two or more separate components
especially advertising, to many addresses. of a computer system exchange information. The
A.Mail merge exchange can be between software, computer
B.Bcc hardware, peripheral devices, humans, and
C.Cc combinations of these.
D.Balloons
E.New 25. A software program used to monitor the
Answer: A traffic in a network and hackers may use the
Mail merge is used to create multiple documents sniffed data to access important confidential data
at once. These documents have identical layout, is ____________-
formatting, text, and graphics. Only specific A.Mail bomb
sections of each document vary and are B.Spam
personalised. C.Sniffers
D.Cookies
24.Which part of the hardware compensates the E.None of These
difference between the CPU and peripherals? Answer: C
A.Scanner Sniffers
B.Printer -> A software program used to monitor the traffic
C.Video card in a network.
D.Motherboard -> The hackers may use the sniffed data to access

E.Interface important confidential data

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -16 (Eng)

Computer Awareness

1. If a word is typed that is not in MS Word's 3. ___________ is a secret computer program


dictionary, a wavy underline appears below the designed to provide continued access to a
word. What is the colour of the underline that computer while actively hiding its presence.
appears in this situation? A. Botnet
A. Blue B. Phishing
B. Red C. Key logger
C. Green D. Rootkit
D. Black E. Adware
E. Pink Answer: D
Answer: B A rootkit is a secret computer program designed
Red indicates either a possible spelling error or to provide continued access to a computer while
that Word doesn't recognize a word, such as a actively hiding its presence. Rootkits are
proper name or place. Green underline- Word associated with malware such as Trojans,
thinks that grammar should be revised. Blue worms, viruses.
underline- A word is spelled correctly but does Botnet is a set of networks connected
not seem to be the correct word for the sentence. computers/devices that are used for malicious
purposes. Each computer in a botnet is called
2. Which among the following is an important Bot. It is also known as Zombie.
circuitry in a computer system that directs the
operation of the processor? 4. Which of the following key is used in the
A. Memory Operating system to display or hide the start
B. Address Bus menu?
C.ALU A. Windows Logo
D. Control Unit B. Windows logo + Break
E. None of these C. Windows Logo + D
Answer: D D. Windows Logo + M
The Control Unit (CU) is digital circuitry E. Windows Logo + T
contained within the processor that coordinates Answer: A
the sequence of data movements into, out of, The windows logo is used to display or hide the
and between a processor's many sub-units. start menu.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -16 (Eng)

5.Computer programs are written in a high-level defragmentation. Defragmenting a disk


programming language. The human-readable minimizes head travel, which reduces the time it
version of a program is called ______. takes to read files from and write files to the disk.
A. Cache Beginning with Windows XP, Disk Defragmenter
B. Instruction set also reduces system startup times.
C. Source code
D. Word size 7. A complete electronic circuit with transistors
E. None of these and other electronic components on a small
Answer: C silicon chip is called a (n) _____.
A source code is any collection of computer A. Workstation
instructions (possibly with comments) written B.CPU
using some human-readable computer language, C. Magnetic disk
usually as text. The source code of a program is D. Integrated circuit
specially designed to facilitate the work of E. None of these
computer programmers, who specify the actions Answer: D
to be performed by a computer mostly by writing An integrated circuit (IC) is a semiconductor
source code. wafer on which thousands or millions of tiny
The source code is often transformed by a resistors, capacitors, and transistors are
compiler program into low-level machine code fabricated. An IC can function as an amplifier,
understood by the computer. oscillator, timer, counter, computer memory, or
microprocessor.
6. Which among the following is a utility program
that will clean the disk space by fragmenting and 8. Which one is used for renaming the column
rearranging data to utilize the space properly? name temporarily and it will not affect the
A. Disk Space Utility database?
B. Disk Defragmenter A. Constraints
C. Disk Function B. Literals
D. Disk Drive Function C. Column Alias
E. Disk Driver Function D. Concatenation
Answer: B E. None of these
Disk Defragmenter is a utility in Microsoft Answer: C
Windows designed to increase access speed by Explanation:
rearranging files stored on a disk to occupy Column Alias
contiguous storage locations, a technique called

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -16 (Eng)

-> In SQL Column Alias is used for renaming the 11. _______ virus take up residence in the
column name temporarily and it will not affect the Computer memory, making them hard to detect
database. A. Worms
B. Macro
9. What happens if the base and derived class C. Stealth
contains definition of a function with some D. Cluster
prototype? E. None of these
A. compiler report an error on compilation Answer: C
B. only base class function will get called Stealth virus take up residence in the Computer
irrespective objective memory, making them hard to detect.
C. base class function will call base class
function and derived class object will call derived 12. Which one is used to crop the character
class function present starting and ending position of the
D. only derived class function will get called string?
irrespective objective A. Lpad / Rpad
E. None of these B. Trim
Answer: C C. Replace
If the base and derived class contains definition D. Concat
of a function with some prototype base class E. None of these
function will call base class function and derived Answer: B
class object will call derived class function. Explanation:
Trim
10. AND gates, NOR gates are called as ______ ->Trim is used remove the character present
that can be combined to form any other kind of starting and ending position of the string.
logic gate
A. Inverse gate 13. If a transaction executes all its operations
B. Combination gate successfully and all its effects are now
C. Both B and D permanently established on the database system
D. Universal gate is known as____
E. None of these A. Active
Answer: D B. Partially Committed
NAND gates, NOR gates are called as "universal C. Committed
gates" that can be combined to form any other D. Abort
kind of logic gate. E. None of These

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -16 (Eng)

Answer: C The network layer is the third level of the Open


Committed Systems Interconnection Model (OSI Model) and
->If a transaction executes all its operations the layer that provides data routing paths for
successfully, it is said to be committed. All its network communication.
effects are now permanently established on the Network layer protocols exist in every host or
database system. router. The router examines the header fields of
all the IP packets that pass through it.
14. If the transmission of packets was sent from
one sender to many receivers then they are 16. ICANN is a non-profit corporation, which is
named as _______ responsible for the allocation of IP addresses
A. Uni cast and managing the domain name. What does A
B. Multicast represent?
C. Broadcast A. Assigned
D. Selective cast B. Assisted
E. None of these C. Aided
Answer: C D. Adopted
Explanation: E. None of these
If the transmission of packets was sent from one Answer: A
sender to many receivers then they are named ICANN --> Internet Corporation for Assigned
as Broadcast. Names and Numbers

15. In the Network Layer, Data is transferred in 17. Which of the following can be termed as end-
the form of _________ through the logical network user programs that enable the user to complete
path. tasks such as creating documents, spreadsheets
A. Layers etc?
B. Datagrams A. System Software
C. Segments B. Web browser
D. Frames C. Hyperlinks
E. Packets D. Application software
Answer: E E. None of the above
Data is transferred in the form of Packets via Answer: D
logical network paths in an ordered format Application software, or simply applications, are
controlled by the network layer. often called productivity programs or end-user
programs because they enable the user to

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -16 (Eng)

complete tasks such as creating documents, computers or terminal to access a single system
spreadsheets, databases, and publications, with one OS on it is Multiuser operating system.
doing online research, sending email, designing
graphics, running businesses, and even playing 20.LANs can be connected by devices called
games. Application software is specific to the ______ which operate on the data link layer.
task it is designed for and can be as simple as a A. Hub
calculator application or as complex as a word B. Bridges
processing application. C.HDLC
D. Tunnel
18. Which of the following terms is used for E. None of these
buying or selling of goods over the Internet? Answer: B
A. e-buying LANs can be connected by bridges. The bridge is
B. e-selling a device used to connect two separate Ethernet
C. e-business networks into one extended Ethernet.
D. e-commerce
E. None of these 21.The operation of a digital computer is based
Answer: D on which of the following principle?
Today, most people use e-commerce to perform A. counting
monetary transaction (buying or selling goods) B. electronic
online because of the ease, convenience, and C. logical
security that it provides. D. mechanical
E. All of these
19. The computer operating system that is Answer: A
developed to allow many users on different The operations of a digital computer is based on
computers or terminal to access a single system the counting principle.
with one OS on it is ____________
A. Single user operating system 22. Which one of the following electronic device
B. Multi user operating system used to process card payments at retail
C. Dual user operating system locations?
D. All of the above A.OMR
E. None of these B.MICR
Answer: B C.EFT
The computer operation system that is D.POS
developed to allow many users on different E. None of These

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -16 (Eng)

Answer: D that originated with Teletype machines, and a


Point of sale terminal (POS terminal) space. It is a character encoding standard (the
->It is an electronic device used to process card Internet Assigned Numbers Authority (IANA)
payments at retail locations. prefers the name US-ASCII). ASCII codes
represent text in computers, telecommunications
23.Which among the following term is used for equipment, and other devices. Most modern
Unauthorized copying of software to be used for character-encoding schemes are based on
personal gain instead of personal backups? ASCII, although they support many additional
A. Program thievery characters.
B. Data snatching
C. Software piracy 25. Every device on the internet has a unique
D. Program looting ____ address that identifies it in the same way
E. Data looting that a street address identifies the location of a
Answer: C house.
Software piracy is the illegal copying, distribution, A.DH
or use of software. B.DA
C.IP
24. American Standard Code for Information D.IA
Interchange (ASCII) encodes 128 specified E.None of these
characters into _____ bit integers. Answer: C
A.8 An Internet Protocol address (IP address) is a
B.6 numerical label assigned to each device (e.g.,
C.7 Computer, printer) participating in a Computer
D.5 network that uses the Internet Protocol for
E.4 communication.
Answer: C An IP address serves two principal functions:
ASCII encodes 128 specified characters into 7 bit host or network interface identification and
integers. The characters encoded are numbers 0 location addressing. Its role has been
to 9, lowercase letters a to z, uppercase letters A characterized as follows: "A name indicates what
to Z, basic punctuation symbols, control codes we seek. An address indicates where it is

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -17 (Eng)

Computer Awareness

1. What is a simulated experience generated by B. Data snatching


computer called; like visiting the outer space or C. Software piracy
stepping on Moon? D. Program looting
A. Extended Reality E. Data looting
B. Virtual Reality Answer: C
C. Augmented Reality Software piracy is the illegal copying, distribution,
D. Snooping or use of software.
E. Eavesdropping
Answer: B 4. In a Microsoft PowerPoint, the special effects
Virtual reality basically means 'near-reality’; it used to introduce slides in a presentation are
usually refers to a specific type of reality called __________.
emulation which is simulated experience A. Effect
generated by a computer. B. Transistor
C. Custom animations
2. When a real time telephone call between D. Present animations
people is made over the Internet using E. None of these
computers, it is called ___________. Answer: B
A.A chat session In Microsoft PowerPoint special effects used to
B. An E-mail introduce slides in a presentation are called
C. An instant message Transistor
D. Internet telephony
E. None of these 5. Write Through technique is used in which
Answer: D among the following memory for updating the
An Internet telephony service provider (ITSP) data?
offers digital telecommunications services based A. Virtual Memory
on Voice over Internet Protocol (VoIP) that are B. Main Memory
provisioned via the Internet. C. Auxiliary Memory
D. Cache Memory
3. Which among the following term is used for E. None of these
Unauthorized copying of software to be used for Answer: D
personal gain instead of personal backups? Write-through is a storage method in which data
A.Program thievery is written into the cache and the corresponding

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -17 (Eng)

main memory location at the same time. The 8. Which one is used in system call that causes
cached data allows for fast retrieval on demand. the caller to block and be suspended until
another process wakes it up?
6. Which among the following bus carries A. Signal
information from processors to peripherals ? B. Wait
A. Data bus C. Sleep
B. Address bus D. Wakeup
C. Access bus E. None of These
D. Mechanical bus Answer: C
E. Electrical bus Sleep
Answer: A ->It is used in a system call that causes the caller
A data bus is a system within a computer or to block and be suspended until another process
device, consisting of a connector or set of wires, wakes it up.
that provides transportation for data. Different
kinds of data buses have evolved along with 9. Which of the following is responsible to
personal computers and other pieces of convert digital signal to analogous and vice versa
hardware. for the transmission and connection of
computer?
7. A device for changing the connection on a A.CPU
connector to a different configuration is called B.USB
____. C.MODEM
A. Converter D.Network
B. Competent E.ALU
C. Attachment Answer: C
D. Adapter MODEM is responsible to convert digital signal to
E. None of these analogous and vice versa for the transmission
Answer: D and connection of computer
An (electrical) adapter or adaptor is a device that
converts attributes of one electrical device or 10. Which clause is used for giving some
system to those of an otherwise incompatible restriction (or) condition on the row (or) Records?
device or system. A.As
B. Where
C. On
D. count

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -17 (Eng)

E. None of these 13. From child table, foreign key is going to point
Answer: B the primary key of foreign table so it is called
Where clause is used for giving some restriction as____
(or) condition on the row (or) Records. A. Primary key
B. Candidate key
11. When a file contains instructions that can be C. Referential integrity key
carried out by the computer, it is often called a(n) D. Alternate key
__________ file. E. None of these
A. data Answer: C
B. information Explanation:
C. executable From child table foreign key is going to pointing
D. application the primary key of foreign table so it is called as
E. assembly Referential integrity key.
Answer: C
When a file contains instructions that can be 14. Which one is used to combine all the object
carried out by the computer, it is often called a(n) files and convert them into a final executable
executable file program?
A. Loader
12. Which one of the following is normally a read B. Compiler
only drive where files are permanently stored? C. Linker
A.CD drive D. Assembler
B. Floppy drive E. None of These
C. Hard disk drive Answer: C
D. All of these Linker
E. None of These ->It is used to combine all the object files and
Answer: A convert them into a final executable program.
Compact Disk Read Only Memory (CD-ROM)
->This is normally a read only drive where files 15. API is a code that allows two software
are permanently stored. programs to communicate with each other. What
->There are now read/write CD-ROM drives that does ‘A’ mean in API?
use special software to allow users to read from A. Automatic
and write to these drives. B. Advanced
C. Application
D. Address

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -17 (Eng)

E. Asynchronous reports, views and other objects. The data are


Answer: C typically organized to model aspects of reality in
Application Program Interface is an abbreviation a way that supports processes requiring
of API. It is a code that allows two software information, such as modelling the availability of
programs to communicate with each other. An rooms in hotels in a way that supports finding a
API defines the correct way for a developer to hotel with vacancies.
request services from an operating system (OS)
or other application and expose data within 18. A technique used by codes to convert an
different contexts and across multiple channels. analog signal into a digital bit stream is known as
_____________.
16. Presentation of a series of still images on a A. Pulse code modulation
projection screen or electronic display device is B. Pulse stretcher
called as _____ C. Query processing
A. Video D. Queue management
B. Slide show E. None of these
C. Slide runner Answer: A
D. Movie clip Pulse - code modulation (PCM) is a method used
E. None of these to digitally represent sampled analog signals. It is
Answer: B the standard form of digital audio in computers,
Presentation of a series of still images on a compact discs, digital telephony and other digital
projection screen or electronic display device is audio applications. In a PCM stream, the
called as Slide show amplitude of the analog signal is sampled
regularly at uniform intervals, and each sample is
17. A collection of information organized into quantized to the nearest value within a range of
interrelated tables of data and specifications of digital steps.
data objects is known as____________.
A. Processed Data 19. Which one of the following allows you to
B. Database format the vertical alignment of text in a
C. Physical Layer document?
D. Router A. Status bar
E. Repeater B. Scroll bar
Answer: B C. Ruler bar
A database is an organized collection of data. It D. Menu bar
is the collection of schemas, tables, queries, E. None of these

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -17 (Eng)

Answer: C 22. Which of the following attributes Contain


Ruler bar values that are calculated from other attributes?
->It allows you to format the vertical alignment of A. Composite
text in a document. B. Multi-valued
C. Derived
20. The time taken by the hard drive of a D. Single
computer to locate a file in the system is known E. None of These
as________. Answer: C
A. Execution time Derived attributes
B. Hard drive time ->It Contain values that are calculated from other
C. Access time attributes.
D. Excess time
E. Other than those given in options 23.Which of the following operating systems
Answer: C provides immediate and accurate responses
In a computer, Access time is the time interval within the allocated time constraint?
between the instant at which an instruction A. Time-sharing operating system
control unit initiates a call for data or a request to B. Multiprocessing operating system
store data, and the instant at which delivery of C. Multiprogram operating system
the data is completed or the storage is started. D. Real-time operating system
Access time is measured in milliseconds, or ms. E. Single-program operating system
when making comparisons. Answer: D
A real-time operating system (RTOS) is an
21. An automatic machine that performs routine operating system (OS) intended to serve real-
seemingly human tasks is _______. time applications that process data as it comes
A.KIPS in, typically without buffer delays. Processing
B. Robot time requirements (including any OS delay) are
C.PL measured in tenths of seconds or shorter
D. Artificial intelligence increments of time.
E. None of these
Answer: B 24. What is the term used for measurement of
An automatic machine that performs routine how fast data moves from one place to another?
seemingly human tasks is called Robot. A. Data per unit
B. Bits per second
C. Bits per hour

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -17 (Eng)

D. Ratio per bit A. Pulling


E. None of these B. Pushing
Answer: B C. Downloading
Bits per second is the term used for D. Transferring
measurement of how fast data moves from one E. None of these
place to another. Answer: C
In computer networks, to download is to receive
25.The process of a computer receiving data from a remote system, typically a server
information server on the Internet is known as such as a web server, an FTP server, an email
____. server, or other similar systems.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -18 (Eng)

Computer Awareness

1. Which among the following search engine is a 3. In the Microsoft Office, Spelling & Grammar
search tool that uses another search engine's tool is located under which among the following
data to produce its own results from the Internet? tabs?
A.Meta A.Reference Tab
B.Individual B.View Tab
C.Directory C.Insert Tab
D.Subject directory D.Home Tab
E.None of these E.Review Tab
Answer: A Answer: E
A meta search engine (or aggregator) is a search Spelling & Grammar tool is located under the
tool that uses another search engine's data to Proofing group of Review Tab.
produce their own results from the Internet. The tools in the Review Tab helps to improve the
Metasearch engines take input from a user and document. It contains the following control
simultaneously send out queries to third party groups and keys.
search engines for results.  Proofing Group (Spelling & Grammar,
Thesaurus, Autocorrect, word count)
2. The key that is used in case you want to make  Comments Group (Add new comment, show
the letters bold without using the Shift key even comment, Delete comment)
once is__________.  Tracking Group (Track changes, Simple
A.Ctrl mark-up, Review pane)
B.Alt + Del  Changes Group (Accept or Reject changes)
C.Caps Lock  Compare Group (Comparing the documents)
D.Num Lock  Protect Group (Restrict editing, Block
E.Alt + Del + Num Lock Authors)
Answer: C
In case you want to make all the characters in 4. Who can maintain personal databases by
the sentence in capitals and you do not want to using ready-made program packages, provide
use the Shift key in the keyboard in that case you easy-to-use menu-based or graphics-based
can use the Caps Lock option so that you do not interfaces?
have to go for the Shift option every single time. A.Navie user
B.Stand-alone users
C.Sophisticated end-users

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -18 (Eng)

D.All of these E.ATS


E.None of These Answer: B
Answer: B In computer networks and computer science,
Stand-alone users digital bandwidth or just bandwidth means the
->Stand-alone users can maintain personal amount of data that can be sent from one point to
databases by using ready-made program another in a certain period of time. It is measured
packages, provide easy-to-use menu-based or as a bit rate expressed in bits per second (bits/s)
graphics-based interfaces. or multiples of it (kbit/s Mbit/s etc.)

5. If the data is transmitted to all the nodes in the 7. Through ______ an administrator or another
network without routing, it is known as user can access someone else’s computer
____________. remotely
A.Repeating A.Administrator
B.Broadcasting B.Web server
C.Optimizing C.Web application
D.Flooding D.HTTP
E.Token Passing E.Telnet
Answer: D Answer: E
There are two techniques to transmit data over Telnet is a user command and an underlying
the Mesh topology. They are Routing, Flooding. TCP/IP protocol for accessing remote computers.
Routing – The nodes have a routing logic to Through Telnet, an administrator or another user
direct the data to reach the designation using the can access someone else's computer remotely.
shortest distance.
Flooding – The data is transmitted to all the 8.The loader generates the addresses at the
nodes in the network; hence no routing is time when a program is loaded intomain memory
required. is known as _____
A.Physical address
6. What is the term used for the amount of B.Logical address
information transmitted through a communication C.Relative address
medium in a certain amount of time? D.Symbolic address
A.DPI E.None of These
B.Bandwidth Answer: A
C.BPS Physical addresses
D.Baud rate

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -18 (Eng)

->The loader generates the addresses at the 11. The ___________ folder retains copies of
time when a program is loaded into the main messages that you have started but are not yet
memory. ready to send.
A.Inbox
9. What is the name of the operation that helps B.Send mail
the control unit determines what the program is C.Trash
telling the computer to do? D.Spam
A.Encryption E.Outbox
B.Decode Answer: E
C.Decryption The Outbox folder retains copies of messages,
D.Encode which are not sent
E.None of these
Answer: B 12. Which one of the following uses four 1-byte
The decode operation will helps the control unit decimal numbers, separated by a dot?
to determine, what the program is telling the A.ISDN
computer. B.IPV4
C.IPV6
10. Which clause is used to combine records D.ICMP
from two or more tables in a database? E.None of These
A.Where Answer: B
B.Order by IPV4
C.Group by ->IPv4 uses four 1-byte decimal numbers,
D.Joins separated by a dot (i.e.192.168.1.1).
E.None of these
Answer: D 13. Which analyser phase reads the characters
Explanation: in the program and groups them into tokens that
Joins clause all sequences of characters have a collective
-> In SQL Joins clause is used to combine meaning?
records from two or more tables in a database. A A.Lexical
JOIN is a means for combining fields from two B.Syntax
tables by using values common to each. C.Semantic
D.Intermediate code
E.None of these
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -18 (Eng)

Explanation: analyze the data to come out with different


Lexical analyser phase conclusions.
->Reads the characters in the program and
groups them in to tokens that all sequence of a 16. In MS PowerPoint, what are visual
characters having a collective meaning. movements referred to as, when one slide
changes to another?
14. A software program used to monitor the A.Slide movement
traffic in a network and hackers may use the B.Slide transition
sniffed data to access important confidential data C.Slide change
is ______________. D.Slide transformation
A.Mail bomb E.None of these
B.Spam Answer: B
C.Sniffers The transition from one slide to another in
D.Cookies PowerPoint is known as a slide transaction.
E.None of These
Answer: C 17. LISA is one of the first commercial computers
Sniffers to have a Graphical User Interface (GUI). It was
-> A software program used to monitor the traffic developed by which among the following
in a network. company?
-> The hackers may use the sniffed data to A.IBM
access important confidential data B.Microsoft
C.Apple
15. Which of the following is NOT one of the four D.Google
major data processing functions of a computer? E.None of the above
A.Gathering data Answer: C
B.Processing data into information Lisa is a desktop computer developed by Apple.
C.Analyzing the data or information It is one of the first personal computers to offer a
D.Storing the data or information graphical user interface (GUI) in a machine
E.None of these aimed at individual business users.
Answer: C Locally Integrated Software Architecture is an
A computer has the function of taking data as acronym of LISA.
input, processing it and then display output. If
needed, it stores the data as well. But there is no
such functionality in the computer where it can

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -18 (Eng)

18. Which PowerPoint view displays each slide D.R


of the presentation as a thumbnail and is useful E.None of these
for rearranging slides? Answer: D
A.Slide Sorter R command is used to display both query and
B.Slide Show output.
C.Slide Master
D.Notes Page 21. What should be minimum requirement of
E.Slide Design random access memory (RAM) for internet
Answer: A access?
Slide sorter view in PowerPoint or Open Office A.8KB
Impress is a window that displays thumbnail B.32MB
versions of all your slides, arranged in horizontal C.16MB
rows. This view is useful to make global changes D.64KB
to several slides at one time. Rearranging or E.None of these
deleting slides is easy to do in Slide Sorter view Answer: B
32MB is the minimum requirement of random
19. The box that is displayed to indicate that the access memory for internal access
text, pictures or objects are placed in it is called
___________ 22. In database ______ is procedural code that is
A.Place holder automatically executed in response to certain
B.Auto text events on a particular table in a database.
C.Text box A.Constraints
D.Word Art B.Literals
E.None of these C.Trigger
Answer: A D.Schema
The box that is displayed to indicate that the text, E.None of These
pictures or objects are placed in it is called Place Answer: C
holder Trigger
-> A database trigger is procedural code that is
20. Which one of the following commands is automatically executed in response to certain
used to display both query and output? events on a particular table in a database.
A.List -> Triggers can restrict access to specific data,
B.Select perform logging, or audit data modifications.
C.Describe

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -18 (Eng)

23. In Which group can you find or replace text E.None of these
and select text or objects in a document? Answer: D
A.Proofing The fourth generation has used compact
B.Paragraph electronic parts extensively and this generation
C.Editing has used microprocessors as switching device.
D.Font
E.None of these 25. Which among the following is a program that
Answer: C places programs into main memory and prepares
The different groups under the Home tab in Word them for execution?
are: Clipboard, Font, Paragraph, Styles and A.Linker
Editing. The editing group provides options to B.Assembler
find, replace and select text/objects in a C.Dialler
document. D.Loader
E.Absolute entity
24. With rapid technical advancement, which Answer: D
device used microprocessor as switching A loader is a major component of an operating

device? system that ensures all necessary programs and

A.First Generation libraries are loaded, which is essential during the


startup phase of running a program. It places the
B.Second Generation
libraries and programs into the main memory in order
C.Third Generation
to prepare them for execution.
D.Fourth Generation

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -19 (Eng)

Computer Awareness

1. __________is used to quickly accept, store, using a small hardware connected to the
and transfer data and instructions that are being customer’s electronic payment portals.
used immediately by the CPU.
A.Processor 3. The most widely used code that represents
B.Data Bus each character as a unique 8-bit code is _______.
C.Cache A.ASCII
D.Register B.Unicode
E.Stack C.Binary numbering system
Answer: D D.EBCDIC
Register is used to quickly accept, store, and E.None of these
transfer data and instructions that are being used Answer: A
immediately by the CPU. Most modern character-encoding schemes are
There are various types of Registers that are based on ASCII (American Standard Code for
used for various purpose. Information Interchange), although they support
Some Registers named as AC or Accumulator, many additional characters.
Data Register or DR, the AR or Address
Register, program counter (PC), Memory Data 4. Which one of the following will remove all
Register (MDR) ,Index register, Memory Buffer records from a table, including all spaces
Register. allocated for the records removed?
A.Drop
2.______ terminals (formerly known as cash B.Delete
registers) are often connected to complex C.Truncate
inventory and sales computer systems. D.All of these
A.Data E.None of These
B.Point-of-sale (POS) Answer: C
C.Sales Truncate
D.Query -> Remove all records from a table, including all
E.None of these spaces allocated for the records are removed.
Answer: B
The POS terminal is basically an electronic cash 5. What is the term used to refer to the study of
register & is used for realizing a retail transaction machines which are supposed to display
intelligence of the levels which humans show?

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -19 (Eng)

A.Nano science keyboard, mouse and touch screen or through


B.Nanotechnology speech recognition software.
C.Simulation
D.Artificial intelligence (AI) 8. Which one of the following shortcut key is
E.None of these used to delete the character which is on the right
Answer: D side of the cursor and does not moves the
Artificial intelligence is the study which deals with cursor?
machines and computers supposed to possess A.Space
analytical and decision-making abilities. B.Enter
C.Back space
6. In Microsoft Excel, which of the following D.Delete
functions is used for finding the total of a E.None of These
sequence of cells? Answer: D
A.TOTAL Delete key
B.SUM ->Sometimes labelled as Del.
C.ADD ->It deletes the character which is on the right
D.MERGE side of the cursor and does not moves the
E.None of the above cursor.
Answer: B -> It also deletes the selected text.
SUM is the formula used for finding the total of a
sequence of cells in Excel 9. To make a notebook act as a desktop model,
the notebook can be connected to a ________
7. In addition to keying data directly into a which is connected to a monitor and other
database, data entry can be done from a(n) ___. devices.
A.Input form A.bay
B.Table B.docking station
C.Field C.port
D.Data dictionary D.network
E.None of these E.None of these
Answer: A Answer: B
In addition to keying data directly into a To make a notebook act as desktop as a desktop
database, data entry can be done from an input model, the notebook can be connected to a
form with the help of input device such as docking station, it can be connected to a
monitor and other devices.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -19 (Eng)

C.Adware
10. Which of the following concept means D.Pharming
determining at runtime what method to invoke? E.None of These
A.Data hiding
B.Dynamic loading Answer: D
C.Dynamic Typing Pharming
D.Dynamic binding ->More advance method of Phishing in which the
E.None of these attackers create duplicate or similar looking
Answer: D website of other companies, to attract the
Dynamic binding also called dynamic dispatch is customers and steal the data.
the process of linking procedure call to a specific
sequence of code (method) at run-time. It means 13. Different components on the motherboard of
that the code to be executed for a specific a PC unit are linked together by sets of parallel
procedure call is not known until run-time. electrical conducting lines. What are these lines
Dynamic binding is also known as late binding or called?
run-time binding. A.Conductors
B.Buses
11. Which of the following people probably has C.Connectors
the least amount of technical knowledge? D.Consecutives
A.Programmer E.None of these
B.Computer Operator Answer: B
C.System analyst A bus is a common pathway through which
D.User information flows from one computer component
E.None of these to another. This pathway is used for
Answer: D communication purpose and it is established
User will have the least amount of technical between two or more computer components.
knowledge.
14. The loader generates these addresses at the
12. More advanced method of Phishing in which time when a program is loaded into main
the attackers create a duplicate or similar looking memory is known as _____
websites of other companies, to attract A.Physical address
customers and steal the data is called as _____ B.Logical address
A.Worms C.Relative address
B.Phishing D.Symbolic address

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -19 (Eng)

E.None of These E.None of these


Answer: A Answer: D
Physical addresses The specific attribute contained numbers only are
->The loader generates these addresses at the called Data type.
time when a program is loaded into main 17. _________ is a program that appears or
memory. pretends to be a genuine application, but actually
causes damage to the executable files on the
15. ___________ is a secret computer program computer.
designed to provide continued access to a A.Trojan horse
computer while actively hiding its presence. B.Adware
A.Botnet C.Spyware
B.Phishing D.Worm
C.Key logger E.Viruses
D.Rootkit Answer: A
E.Adware Trojan horse is a malicious program which looks
Answer: D like a normal program and is accompanied with
A rootkit is a secret computer program designed useful application like computer games. When
to provide continued access to a computer while you run the game, the Trojan horse gets
actively hiding its presence. Rootkits are activated and destroys the information in the
associated with malware such as Trojans, background.
worms, viruses.
Botnet is a set of networks connected to 18. The set of rules and regulations that control
computers/devices that are used for malicious the exchange of information over a network is
purposes. Each computer in a botnet is called known as________.
Bot. It is also known as Zombie. A.Record
B.File
16. If you wanted to tell the database C.Protocol
management system that a specific attribute D.Rules
contained numbers only, what would you need to E.None of the above
set? Answer: C
A.Data category In case of computers, protocols refer to the set of
B.Data Manipulating rules and regulations used by the computer in
C.Data Integrity order to exchange information with any other
D.Data type computer system in a computer network

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -19 (Eng)

D.Slide skip
19. Which one of the following tree contains the E.None of these
maximum or possible number of nodes at all Answer: C
levels except a leaf? Rehearse timings button will helps to add times
A.Binary to the slide in a presentation.
B.Full Binary
C.Complete Binary 22. Which one of the following consists of two or
D.Extended Binary more platters mounted to a single shaft?
E.None of these A.Zip disk
Answer: B B.Disk pack
Full Binary tree contains the maximum or C.Winchester disk
possible number of nodes at all levels except a D.All of these
leaf. E.None of These
Answer: B
20. Which of the following is a small Disk pack
microprocessor-based computer designed to be ->It consists of two or more platter mounted to a
used by one person at a time? single shaft.
A.Netbook
B.Mainframe 23. Copying a process from memory to disk to
C.Supercomputer allow space for other processes is called
D.Personal computer __________.
E.All-in-one A. Swapping
Answer: D B. Deadlock
Personal Computer (PC) A microprocessor- C. Demand Paging
based computer which is primarily intended to be D. Page Fault
used by one person at a time. It is usually E. Cloud Computing
characterized by relatively low cost and small Answer: A
physical size. Swapping concept comes in terms of process
scheduling. Scheduler removes process from
21. Which of the following can you use to add CPU for duration and reduces the degree of
times to the slides in a presentation? multiprogramming. And after some time these
A.Slide show menu process can again be reintroduced into main
B.Space bar memory.
C.Rehearse timings button

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -19 (Eng)

24. A technique for searching special databases, A. Ground Services


called data warehouses, looking for related B. Cloud Services
information and patterns is called _____. C. Mainframe Services
A. Data redundancy D. Bandwidth Services
B. Data mining E. System Services
C. Data integrity Answer: B
D. Data programming The term cloud services is a broad category that
E. None of these encompasses the myriad IT resources provided
Answer: B over the internet. The expression may also be
Explanation: used to describe professional services that
A technique for searching special databases, support the selection, deployment and on-going
called data warehouses, looking for related management of various cloud-based resources.
information and patterns is called Data mining. The first sense of cloud services covers a wide
range of resources that a service provider
25. Which among the following is a broad delivers to customers via the internet, which, in
category that encompasses the myriad IT this context, has broadly become known as the
resources provided over the internet? cloud.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -20 (Eng)

Computer Awareness

1. The ability to recover and read deleted or process can again be reintroduced into main
damaged files from a criminal’s computer is an memory.
example of law enforcement’s speciality called
_________. 3. Which physical layer devices can be used to
A. Robotics enlarge the area covered by a single LAN
B. Simulation segment?
C. Computer forensics (i) Switch
D. Animation (ii) NIC
E. None of these (iii) Hub
Answer: C (iv) Repeater
Computer forensics is a discipline that comes (v) RJ45 transceiver
under the digital forensic sciences. This branch A. Only i
deals with the evidence that is stored digitally. It B. Both i and iii
involves extraction of data that is stored in the C. Both iii and iv
electronic devices recovered during the D. Only v
investigation of a criminal case by the police and E. None of these
other relevant authorities. Answer: C
A repeater operates at the physical layer. Its job
2. Copying a process from memory to disk to is to regenerate the signal over the same
allow space for other processes is called network before the signal becomes too weak or
__________. corrupted so as to extend the length to which the
A. Swapping signal can be transmitted over the same network.
B. Deadlock A hub is basically a multiport repeater. A hub
C. Demand Paging connects multiple wires coming from different
D. Page Fault branches, for example, the connector in star
E. Cloud Computing topology which connects different stations.
Answer: A
Swapping concept comes in terms of process 4. Which of the following attributes Contain
scheduling. Scheduler removes process from values that are calculated from other attributes?
CPU for duration and reduces the degree of A. Composite
multiprogramming. And after some time these B. Multi-valued
C. Derived

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -20 (Eng)

D. Single forensics is the application of investigation and


E. None of These analysis techniques to gather and preserve
Answer: C evidence from a particular computing device in a
Derived attributes way that is suitable for presentation in a court of
->It Contain values that are calculated from other law.
attributes.
7. When a real-time telephone call between
5. ________ ensure secure transfer of data over people is made over the Internet using
an unsecured network, such as the Internet. computers, it is called ___________.
A. Antivirus A.A chat session
B. Hacking B. An E-mail
C. Cracking C. An instant message
D. Spoofing D. Internet telephony
E. Cryptography E. None of these
Answer: E Answer: D
In cryptography, data are sent in such a way that An Internet telephony service provider (ITSP)
they look completely different from the original offers digital telecommunications services based
data. Thus, cryptography ensures secure transfer on Voice over Internet Protocol (VoIP) that are
of data over an unsecured network. provisioned via the Internet.

6. _______ is the application of investigation and 8. AND gates, NOR gates are called ______ that
analysis techniques to gather and preserve can be combined to form any other kind of logic
evidence from a particular computing device in a gate
way that is suitable for presentation in a court of A. Inverse gate
law. B. Combination gate
A. Robotics C. Both B and D
B. Animation D. Universal gate
C. Simulation E. None of these
D. Computer Forensics Answer: D
E. None of these NAND gates, NOR gates are called as "universal
Answer: D gates" that can be combined to form any other
Computer forensics is a branch of digital forensic kind of logic gate.
science pertaining to evidence found in
computers and digital storage media. Computer

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -20 (Eng)

9. Which of the following key is used in the Console refers to a terminal attached to a
Operating system to display or hide the start minicomputer or mainframe and used to monitor
menu? the status of the system
A. Windows Logo
B. Windows logo + Break 12. Which one of the following is similar to disk
C. Windows Logo + D pack but in this the hard disk platters and disk
D. Windows Logo + M drive are sealed together?
E. Windows Logo + T A. Zip disk
Answer: A B. Disk pack
The windows logo is used to display or hide the C. Winchester disk
start menu. D. All of these
E. None of These
10. Which of the following is the most important Answer: C
powerful computer in a typical network? Winchester disk:
A. Desktop -> It is similar to disk pack but in this the hard
B. Network server disk platters and disk drive are sealed together.
C. Network hub -> Its storage size is more than the disk pack
D. Network client hard disk, because both the surface of top and
E. None of these bottom platter is used to store information.
Answer: B
The most important powerful computer in a 13. ______________ is the language understood
typical network is Network server. by a computer that is very difficult to understand,
but it is the only thing that the computer can work
11. Which of the following refers to a terminal with.
attached to a minicomputer or mainframe and A. Binary Language
used to monitor the status of the system? B. Assembly Language
A. Monitor C. Machine Language
B. Mouse D. High-level Language
C. Console E. Low-Level Language
D. Controller Answer: C
E. All of these The language that computers can understand is
Answer: C called machine language. Although it is
exceedingly challenging to comprehend, it is the
only thing that the computer can use.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -20 (Eng)

14. Which property states that in a transaction E. Fifth generation


either all of its operations are executed or Answer: A
nothing should be done? The period of the first generation was from 1946-
A. Atomicity 1959. The computers of first generation used
B. Consistency vacuum tubes as the basic components for
C. Isolation memory and circuitry for CPU (Central
D. Durability Processing Unit). These tubes, like electric bulbs,
E. None of These produced a lot of heat and the installations used
Answer: A to fuse frequently. Therefore, they were very
Atomicity expensive and only large organizations were
->Atomicity property states that in a transaction able to afford it. In this generation, mainly batch
either all of its operations are executed or processing operating system was used. Punch
nothing should be done. cards, paper tape, and magnetic tape were used
as input and output devices. The computers in
15. What is a simulated experience generated by this generation used machine code as the
a computer called like visiting outer space or programming language.
stepping on Moon?
A. Extended Reality 17. The feature of Word that automatically
B. Virtual Reality adjusts the amount of space between certain
C. Augmented Reality combinations of characters so that an entire
D. Snooping word looks more spaced is termed as which of
E. Eavesdropping the following mentioned options?
Answer: B A. Spacing
Virtual reality basically means 'near-reality’; it B. Kerning
usually refers to a specific type of reality C. Positioning
emulation which is simulated experience D. Scaling
generated by a computer. E. Justifying
Answer: B
16. The vacuum tubes were used in computers Feature of Word that automatically adjusts the
in which generation of computers? amount of space between certain combinations
A. First generation of characters so that an entire word looks more
B. Second generation spaced is termed as Kerning.
C. Third generation
D. Fourth generation

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -20 (Eng)

18. Which of the following characteristics is used E.F11


to compute dynamically the results from Excel Answer: A
data? F2 is a shortcut to rename selected objects in
A. Go to MS windows 8 and higher versions
B. Table
C. Chart 21. Which one of the following cashless
D. Diagram approaches is used to pay for goods and
E. Formula and Function services?
Answer: E A. Internet banking
Functions are predefined formulas and are B. Electronic fund transfer
already available in Excel. They are used to C.E-Marketing
compute dynamically the results from Excel data. D.E-services
E. None of These
19. Which one of the following is links once Answer: B
visited can be saved in the favourites or Electronic fund transfer (EFT)
preferences categories? -> A cashless approach is used to pay for goods
A. Cookies and services.
B. History
C. Bookmark 22. Which one of the following ways can
D. Downloads participate in a relationship in entities?
E. None of these A. Simple duplex and half duplex
Answer: C B. Passive and active
Bookmark C. Wait and Signal
->It is the links once visited can be saved in the D. Total and partial
favourites or preferences categories. E. None of These
->It is usually integrated into browsers. Answer: D
Entities can participate in a relationship
20. Which of the following key can be used as a -> Total
shortcut to rename a folder in Microsoft Windows -> partial
8 and higher versions?
A.F2 23. Which of the following features of PowerPoint
B.F4 allows you to copy the animation from one object
C.F6 and apply to another object?
D.F9 A. Format Painter

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -20 (Eng)

B. Painter Answer: B
C. Copy & Paste Explanation:
D. Animation Painter The proxy server is a computer that offers a
E. Transition computer network service to allow clients to
Answer: D make indirect network connections to other
In Microsoft PowerPoint, you can quickly and network services.
easily copy animations from one object to
another using the Animation Painter. The Format 25. While editing an MS Word document if you
Painter is used when you want to copy text and accidentally lose text, which of the following can
paragraph formatting, select an entire paragraph, be used to revert the action?
including the paragraph mark. A. Copy
B. Replace
24._______ is a computer that offers a computer C. Insert
network service to allow clients to make indirect D. Repair
network connections to other network services. E. Undo
A. Server Answer: E
B. Proxy server The Undo command undoes anything you do in
C. Client Word, which includes formatting text, moving
D. Back page blocks, typing and deleting text, formatting etc.
E. None of these

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -21 (Eng)

Computer Awareness

1. Any component of a computer that humans malware, antivirus software started to provide
can physically touch and those are the main protection from other computer threats.
electronic components that go into making a
computer is referred to as _________. 3. What does P represent in APCI on the
a) Hardware computer?
b) Software a) Protocol
c) Memory b) Phrase
d) Information c) Portfolio
e) Input d) Projects
Answer: A e) Private
Any component of a computer that humans can Answer: A
physically touch is referred to as hardware. The meaning of APCI is Application-Layer
These are the main electronic components that Protocol Control Information
go into making a computer.
4. C Programming Language was developed by
2. The software which uses a pattern-matching _______________.
technique to understand and find out harmful a) Charles Babbage
elements in all the files on the disk is known as b) Blaise Pascal
__________. c) Bill Gates
a) Anti-virus software d) Dennis Ritchie
b) Assisted software e) Michael Baht
c) Software maxis Answer: D
d) Software diagram C, a computer programming language created by
e) Software patch American computer scientist Dennis M. Ritchie at
Answer: A Bell Laboratories in the early 1970s (formerly
Antivirus or anti-virus software (often abbreviated AT&T Bell Laboratories).
as AV), sometimes known as anti-malware
software, is computer software used to prevent, 5. The foundation for successful computer
detect and remove malicious software. Antivirus system construction is the __________.
software was originally developed to detect and a) Computer Memory
remove computer viruses, hence the name. b) Computer Architecture
However, with the proliferation of other kinds of c) Computer Hardware

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -21 (Eng)

d) Computer Model b) Computer Hardware


e) Computer Instructions c) Computer Protocol
Answer: B d) Computer Software
The foundation for successful computer system e) Internet Security
construction is computer architecture. The user Answer: A
enters coded data into the computer via an input Computer security is the protection of computer
device. It is a tool used to provide the computer systems and networks from information
with the information it needs, such as a keyboard disclosure, theft of, or damage to their hardware,
or mouse. software, or electronic data, as well as from the
disruption or misdirection of the services they
6. __________ is a component or system that provide.
stores data for quick access in digital electronics
such as computers and related computer 8. The exact memory location of data or a
hardware. specific location within a device is called
a) Storage _________________.
b) Memory a) Absolute Address
c) Hardware b) Absolute Reference
d) Software c) Access Point
e) Input d) Artificial Intelligence
Answer: B e) Actuator
Memory is a computing term for a system or Answer: A
device that stores data for immediate use in a The exact memory location of data or a specific
computer, computer hardware, or other digital location within a device is called Absolute
electronic devices. The terms main memory and Address.
primary storage are frequently used
interchangeably. 9. Data transmission across communication lines
occurs between two or more computers is called
7. ____________________ is the protection of __________________________.
computer systems and networks from a) Data Interpretation
information disclosure, theft of, or damage to b) Data Communication
their hardware, software, or electronic data, as c) Data Integration
well as from the disruption or misdirection of the d) Data Networking
services they provide. e) Data Transmission
a) Computer Security Answer: B

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -21 (Eng)

The exchange of digital data between two or 12. Computers all over the world are connected
more reliable computers or data networks, also by a huge global network called the
referred to as data communication or a __________________.
telecommunication network, enables data a) Program
transfer between sender and receiver. b) Internet
c) Modem
10. __________________is an organized d) Database
collection of structured information, or data, e) CyberSecurity
typically stored electronically in a computer Answer: B
system. Computers all over the world are connected by a
a) Database huge global network called the Internet.
b) Data Channel
c) Data Bank 13. Which of the following file format can be
d) Operating System added to a PowerPoint show?
e) Computer Program a) .jpg
Answer: A b) .gif
A database is an organized collection of c) .wav
structured information, or data, typically stored d) All the above
electronically in a computer system. e) None of the above
Answer: D
11. Which of the following languages may be jpg, gif, and . wav file formats can be added to a
understood by a computer? PowerPoint show.
a) Binary
b) Assembly 14. Which of the following languages is the
c) BASIC source of the word computer?
d) JAVA a) Latin
e) All the above b) Greek
Answer: A c) French
Machine language is the only language that a d) Sanskrit
computer can understand or use. It can be e) Hindi
understood by computers because it simply has Answer: A
binary values of 0s and 1. Simply explained, the "Computer" comes from the Latin "putare" which
computer only comprehends binary code, which means both to think and to prune.
consists of 0s and 1s.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -21 (Eng)

15. A symmetric key encryption algorithm called A portable computer can be easily carried around
__________ divides messages into blocks of 64 in a pocket and operated while you're carrying it.
bits and then individually encrypts each block. Handheld computers are also known as personal
a) Decryption digital assistants (PDAs) or Palmtop computers.
b) Algorithm
c) Blowfish 18. ____ is a powerful tool used to create and
d) Topology format spreadsheets.
e) Protocol a) Microsoft PowerSpoint
Answer: C b) Microsoft Excel
An asymmetric key encryption algorithm called c) Adobe Photoshop
Blowfish divides messages into blocks of 64 bits d) Mozilla Firefox
and then individually encrypts each block. e) Internet Explorer
Answer: B
16. Microsoft Office was developed in With the help of Microsoft Excel, you can write
______________. formulae to solve mathematical problems, create
a) 1972 graphs to visually portray data, create
b) 1975 spreadsheets, analyze data and share it with
c) 1978 others to help you come to better judgments.
d) 1982
e) 1988 19. The _________________ Model is a
Answer: E conceptual and logical layout that defines
Microsoft Office is software that was developed network communication used by systems open
by Microsoft in 1988. to interconnection and communication with other
systems.
17. A portable computer that can be held in the a) OSI Model
hand is referred to as a handheld computer. b) Data Model
What is the other name for Handheld Computer? c) Standard Model
a) Personal Computer d) Internet Model
b) Portable Computer e) Communication Model
c) Palmtop Computer Answer: A
d) Workstation Computer The Open Systems Interconnection (OSI) Model
e) Desktop Computer is a conceptual and logical layout that defines
Answer: C network communication used by systems open to

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -21 (Eng)

interconnection and communication with other 22. Which of the following registers is used to
systems. keep track of the address of the memory location
where the next instruction is located?
20. ___________________ is the programme that a) Memory address register
controls all other application programmes in a b) Memory data register
computer after being installed into the system c) Instruction register
first by a boot programme. d) Program counter
a) Operating System e) None of these
b) Computer Hardware Answer: D
c) Computer Software The program counter is used to keep track of the
d) Database address of the memory location where the next
e) Input Management instruction is located.
Answer: A
An operating system (OS) is the program that 23. Which of the following part will hold many of
controls all other application programs in a the crucial components of a computer, including
computer after being installed into the system the central processing unit (CPU), memory and
first by a boot program. connectors for input and output devices?
a) Holders
21. Imagine that a user has a WORD document b) Mother Board
open at a workstation and that workstation is c) Main Board
unexpectedly disconnected from the school d) System Board
network and from the Internet. Where should the e) Breadboard
user BEST save her work? Answer: B
a) USB key A motherboard is one of the most essential parts
b) P drive of a computer system. It holds together many of
c) H drive the crucial components of a computer, including
d) S drive the central processing unit (CPU), memory and
e) None of these connectors for input and output devices.
Answer: C
The data which are opened in the workstation, 24. The peripheral nodes are connected to a
which is disconnected will be stored in H drive. central node, which rebroadcasts all
transmissions received from any peripheral node
to all peripheral nodes on the network, including
the originating node is known as ____.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -21 (Eng)

a) Star peripheral nodes on the network, including the


b) Bus originating node is known as Star topology.
c) Mesh 25. BIOS stands for ___________.
d) Ring a) Bias Integrated Output System
e) None of these b) Basic Input Output System
Answer: A c) Bias Integrated Operator System
The peripheral nodes are connected to a central d) Basic Input Output Software
node, which rebroadcasts originating node e) Basic Integrated Output Software
received from any peripheral node to all 25. Answer: B
BIOS- basic input/output system

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -22 (Eng)

Computer Awareness

1. Which among the following are the examples b) American Standard Code for Information
of Computer Hardware? Interchange
a) Processor c) Advanced Research Projects Agency Network
b) Memory Devices d) Average Access Time Network
c) Monitor e) Algorithmic State Machine
d) Keyboard Answer: C
e) All the above The Advanced Research Projects Agency
Answer: E Network (ARPANET), the forerunner of the
Examples of hardware in a computer are the Internet, was a pioneering long-haul network
Processor, Memory Devices, Monitor, Printer, funded by the U.S. Department of Defense's
Keyboard, Mouse, and Central Processing Unit. Advanced Research Projects Agency (ARPA).

2. What do we call the process of collecting, 4. ______________ is the language understood by


organizing, storing and otherwise maintaining a a computer that is very difficult to understand,
complete historical record of programs and other but it is the only thing that the computer can work
documents used or prepared during the different with.
phases of the system? a) Binary Language
a) Segmentation b) Assembly Language
b) Documentation c) Machine Language
c) Data Management d) High-level Language
d) Data History e) Low-Level Language
e) Data presentation Answer: C
Answer: B The language that computers can understand is
The purpose of documentation in general is to called machine language. Although it is
make record information for use whenever exceedingly challenging to comprehend, it is the
required. The documents may be used for one- only thing that the computer can use.
time and immediate specific use.
5. Who developed the basic architecture of the
3. What is the full form of ARPANET on the computer?
computer? a) Charles Babbage
a) Advanced Research Projects Agency b) Blaise Pascal
c) Ada Lovelace

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -22 (Eng)

d) John Von Neumann used to calculate the sum of specific cells. Most
e) None of the above commonly used in spreadsheet
Answer: D Applications.
Von-Neumann first offered his idea for a
computer system in 1945; this concept became 8. The process of confirming that someone or
known as Von-Neumann Architecture. It had a something is who or what it claims to be is
Control Unit, Registers, an Arithmetic and Logical known as _________________.
Memory Unit (ALU), and Inputs and Outputs. a) Integration
b) Topology
6. Where is the temporary copy of the document c) Authentication
stored when you are working on it on a d) Security
computer? e) Protocol
a) Floppy Disk Answer: C
b) RAM The process of confirming that someone or
c) ROM something is who or what it claims to be is known
d) Hard Disk as authentication.
e) Cassette
Answer: B 9. ___________________ Transmission is required
The document is momentarily kept in RAM. It is a for keyboard and computer communication.
component of your computer that it makes use of a) Automatic
when it is turned on. b) Half Duplex
c) Full Duplex
7. A formulated cell reference that will not adjust d) Simplex
when used to calculate the sum of specific cells e) None of the above
is ___________________. Answer: D
a) Absolute Address Communication between a computer and a
b) Absolute Reference keyboard involves simplex transmission because
c) Access Point here data flows in a single direction. Simplex
d) Artificial Intelligence transmission is a type of transmission mode.
e) Actuator
Answer: B 10. A software programme that enables users to
Absolute Reference: A formulated cell reference build, develop, and maintain databases as well
that will not adjust when as grant restricted access to data is known as a
_________________________.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -22 (Eng)

a) Data Management Software 13. The difference between memory and storage
b) Database Management System is that memory is _____ and storage is _______
c) Data Driven System a) Temporary, permanent
d) Data Management System b) Permanent, temporary
e) Database Management Software c) Slow, Fast
Answer: B d) Large, Small
A software program that enables users to build, e) All the above
develop, and maintain databases as well as Answer: A
grant restricted access to data is known as a Memory is temporarily saving the data and
database management system (DBMS). Storage is to save the data permanently.

11. Select the Switching Devices that are used in 14. Which of the following is the correct order of
the First generation of computers. the four major functions of a computer?
a) Vacuum tubes a) Input, Output, Storage, Process
b) Transistors b) Storage, Process, Input, Output
c) Integrated Circuits c) Input, Process, Output, Storage
d) Super Large Scale Integrated Chips d) Process, Input, Output, Storage
e) Large Scale Integrated Circuit e) Input, Process, Storage, Output
Answer: A Answer: C
Vacuum tubes, which produced a lot of heat, Input, Process, Output, and Storage is the
were bulky, and unreliable, and were employed correct order of the four major functions of a
in the first generation of electronic computers. computer.

12. When was the Concept of the Internet 15. A/ An ______________ is a procedure used
originated? for solving a problem or performing a
a) 1966 computation.
b) 1969 a) Decryption
c) 1970 b) Algorithm
d) 1972 c) Blowfish
e) 1975 d) Topology
Answer: B e) Protocol
The internet and glue sticks were both invented Answer: B
in 1969. An algorithm is a procedure used for solving a
problem or performing a computation. Algorithms

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -22 (Eng)

act as an exact list of instructions that conduct 18. A___________ is a computer program that
specified actions step by step in either hardware- can capture, display, and manipulate data
or software-based routines. Algorithms are arranged in rows and columns.
widely used throughout all areas of IT. a) Spreadsheet
b) Word Art
16. ________________ is a collection of c) Graphical Interface
programmes made to increase productivity and d) Smart Art
carry out typical operations on a computer. e) Pivot Table
a) Microsoft Office Answer: A
b) Operating System A spreadsheet is a computer program that can
c) Database capture, display, and manipulate data arranged
d) Input in rows and columns. Spreadsheets are one of
e) Application Software the most popular tools available with personal
Answer: A computers. A spreadsheet is generally designed
Microsoft Office is a collection of programs made to hold numerical data and short text strings.
to increase productivity and carry out typical
operations on a computer. 19. In what OSI layer do repeaters operate?
a) Application Layer
17. The ____________ computers are high- b) Presentation Layer
performance computers with large amounts of c) Physical Layer
memory and processors that process billions of d) Data Link Layer
simple calculations and transactions in real-time. e) All the above
a) Nano computer Answer: C
b) Mini computer To amplify or regenerate an incoming signal
c) Mainframe computer before retransmitting it, repeaters are network
d) Super computer devices that operate at the physical layer of the
e) Embedded Computer OSI model.
Answer: C
Mainframe computers are high-performance 20. _________ is a startup sequence that starts
computers with large amounts of memory and the operating system of a computer when it is
processors that process billions of simple turned on.
calculations and transactions in real-time. a) Starting
b) Initialising
c) Booting

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -22 (Eng)

d) Formatting Spoofing represents user identity and describes


e) Debugging a situation in which one person or program
Answer: C successfully masquerades as another by
Booting is a startup sequence that starts the falsifying data.
operating system of a computer when it is turned
on. The initial collection of tasks that the 23. Which one of the following takes an entire
computer carries out when it is turned on is program and converts it into object code which is
known as the boot sequence. typically stored in a file?
a) Complier
21. _____ and _____ refers to the action of b) Converter
clicking and holding down the mouse button c) nstructor
while moving the mouse and realign it d) nterpreter
a) Drag,Click e) None of these
b) Drop, Drag Answer: A
c) Drag, Drop A compiler takes an entire program and converts
d) Click,RightClick it into object code which is typically stored in a
e) None of these file. The object code is also referred as binary
Answer: C code and can be directly executed by the
Drag and Drop refers to the action of clicking and machine after linking. Examples of compiled
holding down the mouse button while moving the programming languages are C and C++.
mouse and realign it.
24. Which of the following layer is responsible for
22. Which of the following represents user the transmission and reception of
identity describes a situation in which one person the unstructured raw bit stream over a medium?
or program successfully masquerades as a) Application layer
another by falsifying data? b) Physical layer
a) Authentication c) Data link layer
b) Spoofing d) Transmission layer
c) Altering e) None of these
d) Malpractice Answer: B
e) None of these Explanation
Answer: B The Physical layer is responsible for the
Explanation: transmission and reception of the unstructured
raw bit stream over a medium

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -22 (Eng)

25. Most of the commonly used personal e) Ctrl


computers/laptops do not have a command key Answer: A
known as ______. Explanation:
a) Turnover Most of the commonly used personal

b) Shift computers/laptops do not have a command key

c) Alter known as Turn over

d) Delete

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -23 (Eng)

Computer Awareness

1. _________________ serves as a single platform 3. What does P represent in ASP?


to connect all of the parts of a computer and can a) Provider
be considered the backbone of a computer. b) Projects
a) Motherboard c) Projector
b) Keyboard d) Program
c) Mouse e) Performer
d) CPU Answer: A
e) Scanner ASP: Application Service Provider / Active Server
Answer: A Pages.
The motherboard serves as a single platform to 4. _____________ is a program in a system that
connect all of the parts of a computer. It connects helps to link object modules of a program into a
the CPU, memory, hard drives, optical drives, single object file.
video card, sound cards, and other ports and a) Compiler
expansion cards directly or via cables. It can be b) Linker
considered the backbone of a computer. c) Assembler
d) Interpreter
2. Which of the following describes programs e) None of these
that can run independently travel from system to Answer: B
system and disrupt computer communication? A computer system application known as a linker
a) Trojans or link editor combines one or more object files
b) Viruses into a single executable file, library file, or other
c) Worm "object" file in computing.
d) Droppers
e) All of these 5. Which of the following are the types of
Answer: C Computer Architecture?
A computer worm is a standalone malware a) Microarchitecture
computer program that replicates itself in order to b) Harvard Architecture
spread to other computers. Often, it uses a c) Von- Neumann Architecture
computer network to spread itself, relying on d) System Design
security failures on the target computer to access e) All the above
it. Answer: E
Below are the types of Computer Architecture:

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -23 (Eng)

i) Von-Neumann Architecture Answer: B


ii) Harvard Architecture The term "malware" refers to a variety of
iii) Instruction Set Architecture malicious software versions, such as viruses,
iv) Microarchitecture ransomware, and spyware. Malware, a
v) System Design shorthand for malicious software, is often
composed of code created by cyber attackers to
6. Primary memory is computer memory that a seriously harm systems and data or gain
processor or computer accesses first or directly. unauthorized access to a network.
It allows a processor to access running execution
applications and services that are temporarily 8. ____________is the area of computer science
stored in a specific memory location. What is the focusing on creating machines that can engage
other name of Primary Memory? in behaviours that humans consider intelligent.
a) Main Memory a) Artificial Intelligence
b) Accelerate Memory b) Absolute Address
c) Secondary Memory c) Absolute Reference
d) Alternative Memory d) Access Point
e) Initial Memory e) Base Point
Answer: A Answer: A
Primary memory is computer memory that a Artificial Intelligence is the area of computer
processor or computer accesses first or directly. science focusing on creating machines that can
It allows a processor to access running execution engage in behaviours that humans consider
applications and services that are temporarily intelligent.
stored in a specific memory location. Primary
memory is also known as primary storage or 9. For successful and trustworthy data
main memory. communication, the communicating parties must
abide by a set of rules known as
7. Software with malicious content, such as _______________.
viruses, worms and trojan horses, is referred to a) Protocol
as _____________________. b) Transmission
a) Trojan c) Message
b) Malware d) Relation
c) Firewall e) Integration
d) Scareware Answer: A
e) Spyware

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -23 (Eng)

For successful and trustworthy data b) Assembly


communication, the communicating parties must c) Logic Programming
abide by a set of rules known as a protocol. d) Both (a) and (b)
e) Both (a) and (c)
10. Which of the following is not an example of a Answer: A
Database Management System (DBMS)? First-generation computers used machine
a) SQL Server language, a type of programming language. A
b) Microsoft Access collection of machine-level programming
c) FileMaker languages used to create programs for first-
d) Oracle generation computers is referred to as a first-
e) All the above generation (or 1GL) language.
Answer: E
Some DBMS examples include MySQL, 13. INTERNET is a short form of
PostgreSQL, Microsoft Access, SQL Server, _____________________.
FileMaker, Oracle, RDBMS, dBASE, Clipper, and a) International Networking
FoxPro. b) Intellectual Networking
c) Interconnected Network
11. A ____________ is a hardware device that d) Intercontinental Network
receives analog information, such as sound or e) Inter Networking
light, and records it digitally. Answer: C
a) Assembler The abbreviation INTERNET stands for
b) Interpreter Interconnected Network of All Web Servers
c) Compiler Worldwide. The Web or the World Wide Web are
d) Register other names for it.
e) Digitizer
Answer: E 14. Any hardware part that enables you to enter
A digitizer is a hardware device that receives information and commands into a computer is
analog information, such as sound or light, and referred to as an ____________.
records it digitally. a) Network
b) Input Device
12. Which of the following programming c) Software
language was used in the First Generation of d) Interaction
Computers? e) Terminal
a) Machine Answer: B

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -23 (Eng)

Any hardware part that enables you to enter d) Presentation


information and commands into a computer is e) None of these
referred to as an input device. Answer: B
15. ____________ is organized or classified data, In Microsoft Word, templates are pre-designed
which has some meaningful values for the documents that you or someone else (such as
receiver and is then processed data on which Microsoft) creates to use as a pattern for a
decisions and actions are based. project.
a) Information 18. _______________ is a portable microcomputer
b) Data Processing having its main components (such as processor,
c) Memory keyboard, and a display screen) integrated into a
d) Reports single unit capable of battery-powered operation.
e) None of the above a) Mainframe Computer
Answer: A b) Laptop
Information is organized or classified data, which c) Super Computers
has some meaningful values for the receiver and d) Micro Computers
is then processed data on which decisions and e) Nano Computers
actions are based. Answer: B
The laptop is a portable microcomputer having its
16. In what table does the operating system keep main components (such as a processor,
track of all the open files? keyboard, and display screen) integrated into a
a) open table single unit capable of battery-powered operation.
b) open-location table
c) open-seek table 19. In order to move from one worksheet to
d) open-file table another in MS Excel workbook one should click
e) open-search table ______________________.
Answer: D a) Sheet Tab
The Open File Table stores the information about b) Spreadsheet
all the files that are open while the OS is running. c) Active Cell
d) Scroll Bar
17. Which file contains pre-made styles that are e) Tab Button
suitable for usage in Word documents? Answer: A
a) File Excel provides a very easy way to move a sheet
b) Template from one place to another in the same workbook.
c) Letters Click the sheet tab you want to move. While

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -23 (Eng)

holding down the mouse button, drag the sheet 22. Which one is used for renaming the column
tab to its new location. name temporarily and it will not affect the
database?
20. Which of the following layer is used to link a) Constraints
the network support layers and user support b) Literals
layers? c) Column Alias
a) Application Layer d) Concatenation
b) Transport Layer e) None of these
c) Physical Layer Answer: C
d) Data Link Layer Column Alias
e) Network Layer -> In SQL Column Alias is used for renaming the
Answer: B column name temporarily and it will not affect the
The session, presentation, and application layers database.
are user support layers, while physical, data
connection and network layers are network 23. Metropolitan Area Network (MAN) is defined
support layers. The data is segmented and re- for _______ and provides regional connectivity
organized by the transport layer to connect these within a campus
layers. a) More than 50km
b) Less than 30km
21. Which of the following types of software is c) Less than 50km
responsible for regulating how well the computer d) Less than 60km
and all of its components function internally? e) None of these
a) Computer Hardware Answer: C
b) Public domain software Metropolitan Area Network (MAN) is defined for
c) Application software Less than 50km and provides regional
d) Operating system software connectivity within a campus or small
e) None of the above geographical area.
Answer: D
An operating system (OS) is software that 24. If you wanted to tell the database
controls and coordinates the computer hardware management system that a specific attribute
devices and runs other software and applications contained numbers only, what would you need to
on a computer. set?
a) Data category
b) Data Manipulating

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -23 (Eng)

c) Data Integrity a) Scalable


d) Data type b) Centralized
e) None of these c) Decentralized
Answer: D d) Dedication
The specific attribute containing numbers only e) None of these
are called Data type. Answer: C
Individual users must take responsibility for data
25.Individual users must take responsibility for backups and security on a peer-to-peer network
data backups and security on a peer-to-peer because this kind of network is considered as
network because this kind of network is decentralized.
considered as ______.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -24 (Eng)

Computer Awareness

1. Any hardware part that enables you to enter Bug - A software bug is an error, flaw, failure, or
information and commands into a computer is fault in a computer program or system produces
referred to as an ____________. an incorrect or unexpected result.
a) Network Fax - A shortened form of the word facsimile. A
b) Input Device copy of a document transmitted electronically
c) Software from one machine to another.
d) Interaction
e) Terminal 3. What is the full form of AHA?
Answer: B a) Accelerated Hub Architecture
Any hardware part that enables you to enter b) Advanced Micro Devices
information and commands into a computer is c) Abstract Window ToolKit
referred to as an input device. d) Application Programming Interface
e) Advanced Audio Coding
2. A packet of information that travels between a Answer: a
browser and the webserver is known as Explanation:
____________. AHA: Accelerated Hub Architecture.
A. Cache
B. Cookie 4. A ________ is a set of instructions that a
C. Gopher computer can use to carry out a particular task.
D. Fax a) Program
E. Bug b) Register
Answer: B c) Cache
Cookie - A packet of information that travels d) Instruction
between a browser and the web server. e) Memory
Cache - It is a memory storage area that keeps Answer: A
frequent use data readily available to the A program is a set of instructions that can be
computer so that the computer does not retrieve executed by a computer to do a specific task.
them from slow storage devices.
Gopher - A protocol used for locating and 5. What is computer architecture?
transferring information on the internet. It is an a) Set of categories and methods that specify the
internet search tool that allows users to access functioning, organization, and implementation of
textual information. computer systems

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -24 (Eng)

b) Set of principles and methods that specify the resources, including computer programs, files,
functioning, organization, and implementation of services, data and application features.
computer systems a) Authentication
c) Set of functions and methods that specify the b) Automation
functioning, organization, and implementation of c) Encryption
computer systems d) Decryption
d) None of the above e) Authorisation
e) All (a) , (b) and (c) Answer: E
Answer: B Authorization is a security mechanism used to
A set of principles and methods that specify the determine user/client privileges or access levels
functioning, organization, and implementation of related to system resources, including computer
computer systems is known as computer programs, files, services, data, and application
architecture. A system’s architecture refers to its features.
structure in terms of the system’s individually
specified components and their 8. A networking connection device that is also
interrelationships. known as the_______________.
a) Absolute Address
6. ____________ is the place where data is held b) Absolute Reference
in an electromagnetic or optical form for access c) Access Point
by a computer processor. d) Artificial Intelligence
a) Storage e) Base Station
b) Memory Answer: E
c) Hardware A networking connection device is also known as
d) Software the base station.
e) Input
Answer: A 9. ____ is a technique that is used to send more
Storage is the place where data is held in an than one call over a single line.
electromagnetic or optical form for access by a a) Streaming
computer processor. b) Multiplexing
c) Streaming
7. ______________________ is a security d) Digital Transmission
mechanism used to determine user/client e) Infrared Transmission
privileges or access levels related to system Answer: B

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -24 (Eng)

Multiplexing is a method for sending several calls d) Class D


over a single line. e) Class E
Answer: C
10. Which device converts human- Class C type of IP is sufficient to provide
understandable data and programs into a form connection to 208 users.
that computers can understand and process?
a) Output 13. The idea for the invention of the internet was
b) Monitor derived from __________________.
c) Input a) IBM
d) All the above b) Microsoft
e) None of the above c) ARPANET
Answer: C d) INTRANET
Input device converts human-understandable e) Web
data and programs into a form that computers Answer: C
can understand and process. The first workable prototype of the Internet came
in the late 1960s with the creation of ARPANET,
11. Choose the generation in which the or the Advanced Research Projects Agency
microprocessor was first launched. Network.
a) First
b) Second 14. Which among the following are the different
c) Third components in Computer System Architecture?
d) Fourth a) Input Unit
e) Fifth b) Output Unit
Answer: D c) Storage Unit
As thousands of integrated circuits were packed d) Control Unit
onto a single silicon chip, the microprocessor e) All the above
gave rise to the fourth generation of computers. Answer: E
The different components in the Computer
12. You are planning on using a single network System Architecture are Input Unit, Output Unit,
that supports 208 users. Which IP address class Storage Unit, Arithmetic Logic Unit, Control Unit,
would you choose to be the most efficient? etc.
a) Class A
b) Class B 15. What is the name of the process of
c) Class C converting data into information?

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -24 (Eng)

a) Signalling a) Escape
b) Processing b) Minimize
c)Compiling c) Maximize
d) Inducing d) Enter
e) Uploading e) Control
Answer: B Answer: B
Data processing is the process of gathering data The Minimize button is among the three buttons
and transforming it into information. Any data at the right end of the title bar. This button has a
processing structure's inputs are raw data, and small dash (or minus sign). The Minimize button
the information obtained is known as the output. shrinks the window and places it on the taskbar
Data processing consists of several phases that while leaving the program running.
must be completed in a specific order to produce 18. A microcomputer is a full-featured computer
the proper inference. that is made on a smaller scale and intended for
solitary usage. Which among the following are
16. In computer programming and engineering, the three basic categories of physical equipment
__________ is a multi-step process that entails in Microcomputer Hardware?
locating a problem, tracking down the source of a) Keyboard, Monitor, Hard drive
the problem, and either fixing the problem b) System unit, Input/output, Memory
directly or finding a workaround. c) System unit, Input/output, Secondary storage
a) Debugging d) System unit, Primary storage, Secondary
b) Caching storage
c) Cookies e) Keyboard, Monitor, and secondary storage
d) Formatting Answer: D
e) Protocol System unit, Primary storage and Secondary
Answer: A storage are the three basic categories of physical
In computer programming and engineering, equipment in Microcomputer Hardware.
debugging is a multi-step process that entails
locating a problem, tracking down the source of 19. In Microsoft Excel, _______ is a collection of
the problem, and either fixing the problem one or more spreadsheets of worksheets, in a
directly or finding a workaround. single file.
a) Work Book
17. The window becomes an icon when the b) Slidesheet
________button is pressed, yet the word stays c) Slide Book
alive. d) Charts

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -24 (Eng)

e) Window b) CD
Answer: A c) LED
In Microsoft Excel, a workbook is a collection of d) BIOS
one or more spreadsheets, also called e) None of these
worksheets, in a single file. Answer: A
CRT (Cathode Ray Tube) is a typical rectangular
20. Which layer of the OSI model does the router shaped monitor that you see on a desktop
operate on? computer. It works by moving an electron beam
a) Application Layer back and forth across the back of the screen.
b) Presentation Layer
c) Physical Layer 23. The ________ can be programmed one time
d) Data Link Layer by either the manufacturer or the computer user.
e) Network Layer Once programmed, it cannot be modified.
Answer: E a) RAM
The network layer, or Layer 3, is most frequently b) OM
referred to as the layer where routing occurs. c) ROM
The primary responsibility of a router is to d) EPROM
transfer packets between networks. e) None of these
21. ______________ is the process of closing and Answer: C
starting a computer or its operating system from The PROM can be programmed onetime by
the initial boot loading sequence. either the manufacturer or the computer user.
a) Warm Boot Once programmed, it cannotbe modified
b) Cool Boot
c) Reboot 24. _______ is a computer program that enables
d) Normal Boot a person to communicate with a computer
e) Cold Boot through the use of symbols, visual metaphors
Answer: C and pointing device
Reboot is the process of closing and starting a a) User interface
computer or its operating system from the initial b) Graphical User interface
boot loading sequence. c) Character User interface
d) Ms-Dos
22. Which one is a typical rectangular shaped e) None of these
monitor that you see on a desktop computer? Answer: B
a) CRT

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -24 (Eng)

Graphical User interface (GUI) is a computer a) XML


program that enables a person to communicate b) DML
with a computer through the use of symbols, c) HTTP
visual metaphors and pointing device. d) HTML
e) None of these
25. Which of the following is the communications Answer: C
protocol that sets the standard used by every HTTP is the communications protocol that sets
computer that accesses Web - based the standard used by every computer that
information? accesses Web - based information

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -25 (Eng)

Computer Awareness

1. Which among the following is not an Input b) American Standard Code for Information
Device of the computer? Interchange
a) Keyboard c) Advanced ResearchProjects Agency Network
b) Mouse d) Average Access Time Network
c) Projector e) Algorithmic State Machine
d) Microphone Answer: B
e) Web Cam ASCII: American Standard Code for Information
Answer: C Interchange
An input device is any hardware part that
enables you to enter information and commands 4. What type of computer language has the
into a computer. The keyboard, mouse, feature of using a combination of 1s and 0s?
microphone, scanner, and webcam are five a) High-Level Language
frequently used input methods. To enter data b) PASCAL
into the computer, you press keys on a c) Machine Language
keyboard. d) C++
e) JAVA
2. Which of the following is a special database Answer: C
that holds information about the computer’s user, The numerical codes denoting the actions that a
installed programs and hardware devices? specific computer may carry out directly make up
a) History a machine language. Binary digits, often known
b) Compiled help module as bits, are strings of 0s and 1s that are routinely
c) Dynamic link library translated to and from hexadecimal (base 16) for
d) Initialization file human viewing and alteration.
e) Windows Registry
Answer: E 5. Which among the following are the different
The Windows Registry, usually referred to as components in the Computer System
just the registry, is a collection of databases of Architecture?
configuration settings in Microsoft Windows a) Input Unit
operating systems. b) Output Unit
c) Storage Unit
3. What does ASCII represent? d) Control Unit
a) Advanced Research ProjectsAgency e) All the above

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


IBPS Clerk Prelims PDF Course 2023
GENERAL AWARENESS Day -25 (Eng)

Answer: E a) Absolute Address


The different components in the Computer b) Absolute Reference
System Architecture are Input Unit, Output Unit, c) Access Point
Storage Unit, Arithmetic Logic Unit, Control Unit, d) Artificial Intelligence
etc. e) Base Point
Answer: C
6. Memory is internal storage media of a An access point is a device that creates a
computer that has several names such as wireless local area network, or WLAN, usually in
majorly categorized into _________ types. an office or large building.
a) Two
b) Three 9. In a data communication system, the
c) Four information that needs to be transmitted is
d) Six referred to as ________________.
e) Eight a) Protocol
Answer: A b) Transmission
Memory is internal storage media of computer c) Message
that has several names such as majorly d) Relation
categorized into two types, 1. Primary e) Integration
Memory2.Secondary Memory. Answer: C
In a data communications system, the message
7. _____________ is the process of scrambling is the information that has to be transmitted. In
codes. data communication, messages are sent from
a) Authentication one location to another using a network system
b) Automation that is created to move data from one location to
c) Encryption another.
d) Decryption
e) Authorisation 10. What type of Data can be kept in the
Answer: C database?
The scrambling of code is known as encryption. a) Image-oriented data
b) Text, files containing data
8. An ____________ is a device that creates a c) Data in the form of audio or video
wireless local area network, or WLAN, usually in d) All of the above
an office or large building. e) None of the above

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


IBPS Clerk Prelims PDF Course 2023
GENERAL AWARENESS Day -25 (Eng)

Answer: D
The database management system was 13. Which of the following country has
developed to store enormous amounts of data, developed ARPANET?
which can take any form, including images, text, a) the United States
audio files, and video files. b) the United Kingdom
c) China
11. The term _________ refers to a device that d) Japan
transmits computer-processed data results and e) Russia
transforms digital data into easily readable and Answer: A
understandable human language. The ARPANET was established by the
a) Input device Advanced Research Projects Agency (ARPA) of
b) Output device the United States Department of Defense.
c) Software device
d) Both a and b 14. The process of confirming that someone or
e) Both b and c something is who or what it claims to be is
Answer: B known as _________________.
The term "output device" refers to a device that a) Integration
transmits computer-processed data results and b) Topology
transforms digital data into easily readable and c) Authentication
understandable human language. d) Security
e) Protocol
12. Which computer was built before the First Answer: C
Generation Computer? The process of confirming that someone or
a) Mechanical something is who or what it claims to be is
b) Electrical known as authentication.
c) Electro-mechanical
d) Magnetic 15. _______can be defined as a codified
e) Electronic representation of facts, concepts, or instructions
Answer: C that is suitable for human or electronic machine
Before the first generation of computers, electro- communication, interpretation, or processing.
mechanical computers were constructed. More a) Information
quickly than any other device at the time, this b) Data
computer can calculate. c) Memory

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


IBPS Clerk Prelims PDF Course 2023
GENERAL AWARENESS Day -25 (Eng)

d) Reports window that has been maximized cannot be


e) None of the above moved until it has been made smaller using the
Answer: B Restore button.
Data can be defined as a codified representation
of facts, concepts, or instructions that is suitable 18.Tablet PC is a type of _______ computer.
for human or electronic machine communication, a) Micro Computer
interpretation, or processing. b) Mini Computer
c) Mainframe Computer
16. _____________is a system programme d) Embedded Computer
created to help programmers identify and fix e) Nano Computer
mistakes or defects. Answer: A
a) Animator Tablet PC is a type of Microcomputer
b) Debugger
c) Computing 19. The file responsible for starting MS-Excel is
d) Router ___________.
e) Blogger a) MS.Excel
Answer: B b) MS.exe
The debugger is a system program created to c) Excel.exe
help programmers identify and fix mistakes or d) Excel.com
defects. e) None of these
Answer: C
17. When a window is ________, it can be made The file responsible for starting MS-Excel is
larger and will typically encompass the full Excel.exe.
screen or program window where it is located.
a) Escape 20. The ___________ layer's functions are
b) Minimize encryption and decryption.
c) Maximize a) Application Layer
d) Enter b) Presentation Layer
e) Control c) Physical Layer
Answer: C d) Data Link Layer
When a window is maximized, it can be made e) Network Layer
larger and will typically encompass the full Answer: B
screen or program window where it is located. A

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


IBPS Clerk Prelims PDF Course 2023
GENERAL AWARENESS Day -25 (Eng)

Data encryption and decryption take place in the 23. Which of the following is an application that
presentation layer as well. captures TCP/IP data packets, which can
maliciously be used to capture passwords and
21. A __________ turns off the power and erases other data while it is in transit either within the
any internal data and counters that the operating computer or over the network.
system and running apps create to keep track of a) Security exploit
operations from memory (RAM). b) Vulnerability Scanner
a) Warm Boot c) Packet sniffer
b) Fool Boot d) Rootkit
c) Reboot e) None of these
d) Normal Boot Answer: C
e) Cold Boot The packet sniffer is an application that captures
Answer: E TCP/IP data packets, which can maliciously be
A cold boot turns off the power and erases any used to capture passwords and other data while
internal data and counters that the operating it is in transit either within the computer or over
system and running apps create to keep track of the network.
operations from memory (RAM).
24. While going through the 4G network, we may
22.Which one allows objects with different come across the term ‘LTE’. What does E
internal structures to have a common external represent?
interface? a) Evolution
a) Encapsulation b) Improved
b) Inheritance c) Envelop
c) Polymorphism d) Enabled
d) Message passing e) None of these
e) None of these Answer: A
Answer: C ‘LTE’ à Long Term Evolution(LTE) is a 4G
Polymorphism wireless communications standard developed by
-> Polymorphism allows objects with different the 3rd Generation Partnership Project (3GPP)
internal structures to have a common external that's designed to provide up to 10x the speeds
interface. of 3G networks for mobile devices such as
smartphones, tablets, netbooks, notebooks and
wireless hotspots.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


IBPS Clerk Prelims PDF Course 2023
GENERAL AWARENESS Day -25 (Eng)

25. A computer system consisting of its b) Main memory


processor, memory and I/O devices accepts c) Logic unit
data, processes it and produces the output d) Arithmetic unit
results. Can you tell in which component is the e) None of these
raw data fed? Answer: B
a) Mass memory In main memory, the raw data can be updated.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -26 (Eng)

Computer Awareness

1. The input unit of a computer ______________. BINAC: Binary Automatic Computer.


a) Feeds data to the CPU or memory
b) Retrieves data from CPU 4. COBOL stands for
c) Directs all other units ________________________.
d) All of the above a) Common Business Oriented Language
e) None of the above b) Central Business Oriented Language
Answer: A c) Common Binary Oriented Language
The input unit of a computer feeds data to the d) Central Binary Oriented Language
CPU or memory. e) Common Business-Oriented Level
Answer: A
2. Write Through technique is used in which COBOL stands for Common Business Oriented
among the following memory for updating the Language.
data?
a) Virtual Memory 5. What are the roles performed by the brain of
b) Main Memory the computer Central Processing Unit?
c) Auxiliary Memory a) It performs all types of data processing
d) Cache Memory operations
e) None of these b) It stores data, intermediate results, and
Answer: D instructions (program)
Write-through is a storage method in which data c) It controls the operation of all parts of the
is written into the cache and the corresponding computer
main memory location at the same time. The d) Only (a) and (b)
cached data allows for fast retrieval on demand. e) All (a), (b) and (c)
Answer: E
3. What does A represent in BINAC on the CPU is considered the brain of the computer.
computer? CPU performs all types of data processing
a) Assembly operations. It stores data, intermediate results,
b) Automatic and instructions (program). It controls the
c) Assurance operation of all parts of the computer.
d) Access
e) Audio
Answer: B

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -26 (Eng)

6. _____________ is a type of computer memory d) Applet


that can hold saved data even if the power is e) Archie
turned off. Answer: B
a) Volatile memory A software program that is designed to run once
b) Non-volatile memory a web page has been accessed that is usually in
c) Sequential Memory the form of banner or popup advertisements is
d) Direct Storage called Adware.
e) Input Memory
Answer: B 9. What kind of resource in a computer network
Non-volatile memory (NVM) is a type of is most likely to be shared as a common
computer memory that can hold saved data even resource?
if the power is turned off. a) Speakers
b) Keyboards
7. _____________ are frequently intended to c) Printers
cause harm and are frequently sent to a PC as d) Disk Drives
an email attachment. e) Scanner
a) Portals Answer: C
b) Spams A network printer is a printer that may be used
c) Computer Viruses by numerous computers because it is connected
d) Email messages to a computer network.
e) All the above
Answer: C 10. Which of the following is one of the types of
Computer viruses are frequently intended to Databases?
cause harm and are frequently sent to a PC as a) Centralised Database
an email attachment. b) End-user Database
c) Relational Database
8. A software program that is designed to run d) Operational Database
once a web page has been accessed that is e) All the above
usually in the form of banner or popup Answer: E
advertisements is called _______________. There are the following types of databases
a) Spyware available in the market −
b) Adware  Centralized database.
c) Aero  Distributed database.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -26 (Eng)

 Personal database. 1956 through 1963, transistors were a common


 End-user database. component in computers. Because transistors
 Commercial database. were more compact than vacuum tubes,
 NoSQL database. computers could be made more compactly, more
 Operational database. quickly, and more affordably.
 Relational database.
 Cloud database. 13. A file is transferred from one computer
 Object-oriented database. system to another, or to a server so that others
 Graph database. can see or retrieve it is called
____________________.
11. The number of function keys in a keyboard is a) Download
_____________-. b) Upload
a) 14 c) Retrieval
b) 12 d) Sharing
c) 13 e) Software
d) 11 Answer: A
e) 15 A file is transferred from one computer system to
Answer: B another, or a server so that others can see or
PC keyboards have 12 function keys, F1 through retrieve it is called Download.
F12. Many Apple desktop computer keyboards
with a number pad have 19 function keys, F1 14. _____________ is a program in a system that
through F19. helps to link object modules of a program into a
single object file.
12. Which of the following is the Second a) Compiler
Generation of Computers? b) Linker
a) 1940-56 c) Assembler
b) 1956-63 d) Interpreter
c) 1964-71 e) None of these
d) 1971-1992 Answer: B
e) 1971-present A computer system application known as a linker
Answer: B or link editor combines one or more object files
Transistors were used in place of vacuum tubes into a single executable file, library file, or other
in the second generation of computers. From object file in computing.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -26 (Eng)

15. Which of the following is the earliest Select the text you want to copy and press
calculating device? Ctrl+C.
a) Analytical Engine
b) Calculator 18. Which of the following is a type of computer
c) Abacus classified based on the work?
d) Read Access Memory a) Analog Computer
e) Motherpad b) Hybrid Computer
Answer: C c) Supercomputer
Abacus is the earliest calculating device. d) Both (a) and (b)
e) Both (a) and (c)
16. A _________________ is a method for quietly Answer: D
determining whether a user has accessed There are three types of computer-based work.
particular content that is used on websites and in They are analog, digital, and hybrid computers.
emails.
a) Spam 19. When using Excel, the current cell's contents
b) Web Beacon are shown in the __________.
c) Topology a) Tool Bar
d) Protocol b) Menu Bar
e) Hardware c) Formula Bar
Answer: B d) Task Bar
A web beacon is a method for quietly e) Footer Bar
determining whether a user has accessed Answer: C
particular content that is used on websites and in The content of the active cell is shown in the
emails. formula bar.

17. The shortcut key for copying selected 20. Which is the lowest layer of the OSI model?
text/picture in MS Word is ______________. a) Data Link
a) Ctrl+C b) Application
b) Ctrl + V c) Network
c) Ctrl + X d) Physical
d) Ctrl + P e) Transport
e) Ctrl + S Answer: D
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -26 (Eng)

Physical. The lowest layer of the OSI model is specific length. The major disadvantage of
concerned with data communication in the form unpaged cache is that __________________.
of electrical, optic, or electromagnetic signals a) it allows cache domain to contain redundant
physically transmitting information between data
networking devices and infrastructure. b) it does not allow writes to be cached
c) its access time is greater than that of paged
21. A DOS is an operating system that runs from caching
a disk drive. DOS stands for _______________. d) read ahead cache domain blocks are
a) Disk Operating System necessarily fixed in size
b) Drive Operating System e) None of these
c) Durable Operating System Answer: A
d) Divided Operating System An unpaged cache associates disk domains with
e) Disk Opaque System the address of the read and continues for a
Answer: A specific length. The major disadvantage of
A DOS or disk operating system is an operating unpaged cache is that it allows cache domain to
system that runs from a disk drive. contain redundant data

22. Which property states that in a transaction 24.______ type of program controls the various
either all of its operations are executed or computer parts and allows the user to interact
nothing should be done? with the computer
a) Atomicity a) Application Software
b) Consistency b) Utility software
c) Isolation c) Middleware
d) Durability d) System software
e) None of These e) None of these
Answer: A Answer: B
Atomicity Utility software is type of program controls the
->Atomicity property states that in a transaction various computer parts and allows the user to
either all of its operations are executed or interact with the computer
nothing should be done.
25. Whenever there is a lack of communication
23. An unpaged cache associates disk domains between the customer and the software
with the address of the read and continues for a

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -26 (Eng)

company they move on to the concept called e) None of these


________________. Answer: C
a) Waterfall model Whenever there is a lack of communication
b) Spiral model between customer and software company they
c) Prototype model move on to the concept called Prototype model.
d) V &V model

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -27 (Eng)

Computer Awareness

1. Which of the following are the types of system d) Access


software? e) Audio
a) Operating System Answer: D
b) Utility Programs CDMA: Code Division Multiple Access
c) Device drivers
d) Language translators 4. What are the most used programming
e) All the above languages in embedded systems?
Answer: E a) C
Four types of system software are the following. b) C++
 Operating System c) JAVA
 Utility Programs d) Python
 Device drivers e) All the above
 Language translators. Answer: E
Different programming languages are used by
2. Which key is used to delete one character to the developers while creating embedded systems.
left of the current position of the cursor? The languages that are most frequently used are
a) Backspace C, C++, Python, MicroPython, and Java.
b) Ctrl
c) Insert 5. ______________ processes the information
d) Esc and commands received from the input devices
e) None of these before sending the processed information to the
Answer: A output devices.
The Backspace key is used to delete one a) RAM
character to the left of the current position of the b) ROM
cursor. Backspace is the keyboard key that c) Hard Disk
originally pushed one position backwards, and in d) CPU
modern computer systems moves the display e) Keyboard
cursor one position backwards. Answer: D
A CPU processes the information and
3. What does A represent in CDMA? commands received from the input devices
a) Assembly before sending the processed information to the
b) Automatic output devices.
c) Assurance

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -27 (Eng)

6. What is the name of the primary folder on a was designed to provide interactivity on web
storage device? pages.
a) Platform a) Algorithm
b) Root Directory b) Actuator
c) Interface c) Adware
d) Device Driver d) Applet
e) Soft Driver e) Aero
Answer: B Answer: D
The top-level directory in a file system is known An applet is a small program generally written in
as the root directory or root folder. The term the Java programming
"root" designates the top level of the directory the language that was designed to provide
structure, which can be visualized as an upside- interactivity on web pages.
down tree. The root directory is the parent
directory for all other directories present in a 9. A network configuration known as a
disc. ___________ has devices such as computers and
routers connected.
7. An _________ is a small program generally a) Ring Topology
written in the Java programming language that b) Bus Topology
was designed to provide interactivity on web c) Mesh Topology
pages. d) Star Topology
a) Algorithm e) Mixed Topology
b) Actuator Answer: C
c) Adware A network configuration known as a mesh
d) Applet topology has devices such as computers and
e) Aero routers connected.
Answer: D
An applet is a small program generally written in 10. Which of the following are the components of
the Java programming language that was a Database Management System?
designed to provide interactivity on web pages. a) Hardware
b) Software
8. An _________ is a small program generally c) Database Access Language
written in the Java programming language that d) Data
e) All the above

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -27 (Eng)

Answer: E 13. For successful and dependable data


Hardware, Software, Data, Database Access communication, the communicating parties must
Language, Procedures, and Users all together abide by a set of rules known as _____________.
form the components of a DBMS. a) Topology
b) IP address
11. Which key of the keyboard is used to make c) Hyperlink
characters either upper or lower case? d) URL
a) ESC e) Protocol
b) Return Answer: E
c) Shift For successful and dependable data
d) Alt communication, the communicating parties must
e) Both a and c abide by a set of rules known as a protocol.
Answer: C
The shift key of the keyboard is used to make 14. For successful and dependable data
characters either upper or lower case. communication, the communicating parties must
abide by a set of rules known as _____________.
12. A semiconductor wafer on which thousands a) Topology
or millions of tiny resistors, capacitors, and b) IP address
transistors are manufactured is known as an c) Hyperlink
integrated circuit (IC). Which element is used to d) URL
make computer chips and IC? e) Protocol
a) Copper Answer: E
b) Iron For successful and dependable data
c) Silicon communication, the communicating parties must
d) Aluminium abide by a set of rules known as a protocol.
e) Silver
Answer: C 15. A computer-punched card reader, also
The material silicon, which makes up the known as a computer card reader, is a computer
majority of ICs, is common in beach sand. At input device that reads data from punched cards
standard room temperature, pure crystalline and computer programs in source or executable
silicon exhibits extremely high resistance to form. Punched cards were first introduced by
electrical current, similar to other semiconducting ____________.
materials. a) Jacquard

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -27 (Eng)

b) Pascal b) Spreadsheet
c) Herman Hollerith c) Wordpad
d) Reynold Johnson d) Database
e) Gary Kildall e) Word Format
Answer: C Answer: A
A computer-punched card reader, also known as A word processor is a computer program that
a computer card reader, is a computer input provides special capabilities beyond that of a
device that reads data from punched cards and text editor such as the WordPad program that
computer programs in source or executable comes as part of Microsoft's Windows operating
form. Punched cards were first introduced by systems.
Herman Hollerith.
18. Analog computer works on the supply of
16. A _______________ is a specific kind of ______________.
computer network component that enables a) Continuous electrical pulses
communication with other bridge networks that b) Electrical pulses but not continuous
adhere to the same protocol. c) Magnetic strength
a) Assembler d) Physical strength
b) Interpreter e) Magnetic impulse
c) Hub Answer: A
d) Port Digital computers operate on discrete electrical
e) Bridge pulses while analogue computers operate on
Answer: E continuous electrical pulses.
A bridge is a specific kind of computer network
component that enables communication with 19. What phrase refers to the horizontal cells
other bridge networks that adhere to the same that can hold data?
protocol. a) Columns
b) Rows
17. ________________ is a computer program c) Cell
that provides special capabilities beyond that of d) Table
a text editor such as the WordPad program that e) Ribbon
comes as part of Microsoft's Windows operating Answer: B
systems. Rows are groups of information-containing
a) Word Processor horizontal cells. In spreadsheets, especially

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -27 (Eng)

Microsoft Excel, the working space is 22. Inwhich printers, Printing is achieved by
represented by cells. deflecting laser beam on to photosensitive
surface of a drum?
20. Which layer of the OSI model defines the a) Dot Matrix
type of transmission medium between two b) Daisy Wheel
devices? c) Laser printer
a) Physical d) Electromagnetic printer
b) Transport e) None
c) Data Link Answer: C
d) Session In Laser printers, Printing is achieved by
e) Application deflecting laser beam on to photosensitive
Answer: A surface of a drum.
Simplex, half-duplex and full-duplex are the
three transmission directions that are defined by 23. A computer that can be accessed by users
the physical layer between two devices. across a network mainly or exclusively for
Additionally, connecting gadgets to media is a storing and supplying data files is known as
concern. ______
a) application server
21. ___________ command is used to divide the b) data server
blank sector surface into a different partition. c) distributed server
a) Undo d) file server
b) Format e) None of these
c) Paste Answer: D
d) Copy A computer that can be accessed by users
e) Control across a network mainly or exclusively for
Answer: B storing and supplying data files is known as a file
Format command is used to divide the blank server
sector surface into a different partition. It also
assigns a unique address to each partition that is 24. A program which helps create written
divided. The format is the external command documents and lets you go back and make
because it is not commonly used. necessary corrections is _________.
a) Spreadsheet
b) Personal writer

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -27 (Eng)

c) Word printer a) Intelligent bots


d) Word processor b) Wiki
e) None of these c) Social network
Answer: D d) Blogs
A program which helps create written documents e) None of these
and lets you go back and make necessary Answer: B
corrections is a Word processor Wiki is the type of web technology allows its
community members to continuously change the

25. What type of web technology allows its contents on a website.

community members to continuously change the


contents of a website?

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -28 (Eng)

Computer Awareness

1. The primary software that powers a computer 3. What is the full form of CAD?
is called system software. The hardware is a) Computer-Aided Design
activated, controlled, and coordinated when the b) Computer-Aided Engineering
computer is turned on. The system software also c) ComputerAided Instruction
influences the application programs. What is the d) Common Information Model
other name of System Software? e) Command Line Interface
a) Application software Answer: A
b) Background software CAD: Computer-Aided Design
c) Primary Software
d) Property Software 4. FORTRAN programming language is more
e) None of these suitable for ____
Answer: B a) Business Applications
The primary software that powers a computer is b) Marketing Applications
called system software. The hardware is c) Scientific Applications
activated, controlled, and coordinated when the d) Education technology
computer is turned on. The system software also e) Government Applications
influences the application programs. It is also Answer: C
known as background software. Fortran is the industry standard since it was
created for scientists and engineers. For the past
2. Communication circuits that transmit data in 30 years, FORTRAN has been used for a variety
both directions but not at the same time are of tasks, including designing bridges and other
operating in _______. aeroplane-related structures, controlling factory
a) Simplex mode automation, designing storm drainage systems,
b) Half-duplex mode analyzing scientific data, and more.
c) Full-duplex mode
d) Asynchronous mode 5. A broad variety of data types are compatible
e) None of these with the _______ architecture.
Answer: B a) RISC
Half-duplex data transmission means that data b) ARM
can be transmitted in both directions on a signal c) IA-32
carrier, but not at the same time. d) SIMD
e) IA-42

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -28 (Eng)

Answer: C 8. A formal set of instructions that can be


A broad variety of data types are compatible with followed to perform a specific task, such as a
the IA-32 architecture. mathematical formula or a set of instructions in a
computer program is called _______________.
6. The two kinds of main memory are a) Algorithm
____________. b) Actuator
a) ROM and RAM c) Adware
b) Primary and secondary d) Applet
c) Floppy disk and hard disk e) Aero
d) Direct and sequential Answer: A
e) Software and Hardware A formal set of instructions that can be followed
Answer: A to perform a specific task, such as a
Main memory can be divided into two main types mathematical formula or a set of instructions in a
viz., Random Access Memory (RAM), and Read- computer program is called Algorithm.
only memory (ROM), and each of these is
divided into further sub-types. 9. __________________ is a network type in
which every computer and network device is
7. VIRUS stands for connected to a single cable.
__________________________. a) Ring Topology
a) Vital Information Resources Under Siege b) Bus Topology
b) Viral Important Record User Searched c) Mesh Topology
c) Very Interchanged Result Until Source d) Star Topology
d) Very Intelligent Resources Under Search e) Mixed Topology
e) None of the above Answer: B
Answer: A Bus topology is a network type in which every
Vital Information Recourse Under Siege is computer and network device is connected to a
referred to as VIRUS. A computer virus is single cable.
essentially harmful software, sometimes known
as "malware," which multiplies itself after 10. Which of the following is the function of a
infecting your system by altering other software database management system (DBMS)?
and adding its code. a) Data Dictionary Management
b) Data Storage Management
c) Multi-User Access Control

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -28 (Eng)

d) Data Integrity Management transistors are manufactured is known as an


e) All the above integrated circuit (IC), sometimes known as a
Answer: E chip or microchip. A microprocessor, oscillator,
The Database Management System performs timer, counter, computer memory, or amplifier
the following functions: are all examples of ICs.
 Data Dictionary Management
 Data Storage Management 13. A network communication between
 Data Transformation and Presentation applications is established and maintained
 Security Management according to the ___________ standard.
 Multi-User Access Control a) IP address
 Backup and Recovery Management b) HTTP
 Data Integrity Management c) Web
d) TCP
11. Ctrl, Shift, and Alt are known as e) URL
________________ keys. Answer: D
a) function Network communication between applications is
b) modifier established and maintained according to the
c) alphanumeric Transmission Control Protocol (TCP) standard.
d) adjustment
e) toggle 14. In order to move from one worksheet to
Answer: B another in MS Excel workbook one should click
Ctrl, Shift, and Alt are known as Modifier Keys ______________________.
a) Sheet Tab
12. Which of the following is sometimes called b) Spreadsheet
Chips or microchips? c) Active Cell
a) Vacuum tubes d) Scroll Bar
b) Transistors e) Tab Button
c) Microprocessor Answer: A
d) Integrated Circuits Excel provides a very easy way to move a sheet
e) Optical Cable from one place to another in the same workbook.
Answer: D Click the sheet tab you want to move. While
A semiconductor wafer on which thousands or holding down the mouse button, drag the sheet
millions of tiny resistors, capacitors, and tab to its new location.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -28 (Eng)

15. The practice of performing arithmetic using b) Ctrl + V


Napier's bones is called _________________. c) Ctrl + X
a) Naptologia d) Ctrl + P
b) Vibologia e) Ctrl + S
c) Rabdologia Answer: B
d) Semiconductor Place your cursor where you want to paste the
e) Napiologia copied text and press Ctrl+V.
Answer: C
Rabdologia was a set of rods inscribed with the 18. A hybrid computer is one having the
multiplication table, which was already widely combined properties of ________.
used at the time and was known as Napier's a) Digital and microcomputers
bones. b) Super and microcomputers
c) Analog and digital computers
16. A computer program known as d) Super and mini computers
_______________ in computer science, runs code e) Mini and microcomputers
written in a programming language or scripting Answer: C
language without first compiling it into a machine A computing system that combines both digital
language program. and analogue components is known as a hybrid
a) Assembler computer. Complex mathematical computations
b) Compiler have traditionally been handled by the analogue
c) Interpreter parts of computers. In addition to acting as the
d) Topology system's controller, the digital components
e) Software Piracy handle all logical and numerical operations.
Answer: C
A computer program known as an interpreter, in 19. The cell with a bold border is referred to as
computer science, runs code written in a ________ cell.
programming language or scripting language a) Relative
without first compiling it into a machine language b) Mixed
program. c) Absolute
d) Active
17. The shortcut key for pasting selected e) Passive
text/picture in MS Word is ____. Answer: D
a) Ctrl + C

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -28 (Eng)

The cell having a bold boundary is the active 22. Which one of the following is a two-
cell. dimensional where we can store data in row and
column-wise?
20. Which layer of the OSI model divides the a) Hierarchical model
stream of bits received from the network layer b) Network model
into data frames? c) Relational model
a) Physical d) All of these
b) Transport e) None of these
c) Data Link Answer: C
d) Session Relational Model
e) Application ->It is an two dimensional, here we can store
Answer: C data in row and column wise.
Data Link layer of OSI model divides the stream ->We can easily fetch the output by given inputs.
of bits received from the network layer into data
frames. 23. The technique that extends storage
capacities of main memory beyond the actual
21. While working with MS-DOS which size of the main memory is called _______
command transfers a specific file from one disk a) Additional storage
to another? b) Extra storage
a) Copy c) Virtual storage
b) Paste d) Stimulated storage
c) Control e) None of these
d) Cut Answer: C
e) Undo The technique that extends storage capacities of
Answer: A main memory beyond the actual size of the main
Use the Copy command to copy a specified file memory is called Virtual storage
from one disc to another. Disk copy transfers the
entire disc to a new disc. The Time command 24.________ is software which has its source
shows the current system time, while the code freely available for use, viewing,
Rename command renames a file. modification, and redistribution.
a) Source code
b) Free code
c) Open source

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -28 (Eng)

d) Free Software a) Application software


e) None of these b) Communication software
Answer: C c) Utility software
Open Source is software which has its source d) System software
code freely available for use, viewing, e) None of these
modification, and redistribution. Answer: D
System software works with end-user, application

25. Which type of software works with end-user, software, and computer hardware to handle the

application software, and computer hardware to majority of technical details

handle the majority of technical details?

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -29 (Eng)

Computer Awareness

1. ___________ is a collection of instructions, a) Binary Purpose System


data, or computer programmes that are used to b) Bits Per Second
run machines and carry out particular activities. c) Beginners Purpose System
a) Network d) Bits Per System
b) Input Device e) Binary Project System
c) Software Answer: B
d) Interaction BPS: Bits Per Second.
e) Terminal
Answer: C 4. C++, Java, and PHP are ____ programming
Software is a collection of instructions, data, or languages.
computer programs that are used to run a) Procedure-oriented
machines and carry out particular activities. It is b) Object-oriented
the antithesis of hardware, which refers to a c) Font oriented
computer's external components. Applications, d) Visual Basic
scripts, and other programs that operate on a e) None of these
device are collectively referred to as "software." Answer: B
Languages that support objects, like C++ and
2. In the Internet Protocol Version 6 or IPv6, Java. However, both languages are very
Internet protocol is a ___ numerical address? different from one another. With elements of
a) 32 bits procedural and object-oriented programming
b) 64 bits languages, C++ is a descendant of C. For the
c) 128 bits development of systems and applications, C++
d) 256 bits was created.
e) None of these
Answer: C 5. The following instructions were carried out by
IPv6 (Internet Protocol version 6) is a set of the CPU despite an exception being raised;
specifications from the Internet Engineering Task hence the exception is handled as ____________.
Force (IETF) that's essentially an upgrade of IP a) Exception handling
version 4 (IPv4). The most obvious improvement b) Imprecise exceptions
in IPv6 over IPv4 is that IP addresses are c) Carry Save Addition
lengthened from 32 bits to 128 bits. d) Systems design
3. What is the full form of BPS? e) None of the above

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -29 (Eng)

Answer: B 8. _______________ is a parallel expansion card


The following instructions were carried out by the standard, designed for attaching a video card to
CPU despite an exception being raised, hence a computer system to assist in the acceleration
the exception is handled as imprecise. of 3D computer graphics.
a) TCP
6. Memory is made up of ____________. b) AGP
a) Set of wires c) IP
b) Set of circuits d) Applet
c) a Large number of cells e) Algorithm
d) Set of optical fiber Answer: B
e) None of these Accelerated Graphics Port (AGP) is a parallel
Answer: C expansion card standard, designed for attaching
Bits are placed in a two-dimensional grid and a video card to a computer system to assist in
makeup memory. The memory cell is the key the acceleration of 3D computer graphics.
component of a computer's memory. One binary
bit of data is kept in the memory cell, an 9. Large organisations employ a type of
electrical circuit. There are a large number of communication network known as
cells in memory. ________________ that spans regional, national,
or international boundaries.
7. The first PC virus was developed in a) LAN
________________. b) WAN
a) 1982 c) MAN
b) 1984 d) Internet
c) 1985 e) Networking
d) 1986 Answer: B
e) 1988 A major organization's utilization of a
Answer: D communication network across a regional,
In 1986, the 5.2" floppy discs were first infected national, or international area is referred to as a
by Brain, the first computer virus. According to WAN. A wide area network (WAN) is a type of
Secure list, two brothers who owned a computer data network that connects computers over a
store in Pakistan, Basit and Amjad Farooq Alvi, large geographic area.
were responsible.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -29 (Eng)

10. Which of the following feature is one among a) First


the Database Management System (DBMS)? b) Second
a) It stores data in one central location c) Third
b) It allows data to be shared by many users d) Fourth
c) It controls who can access and edit the data e) Fifth
d) It provides user interfaces to work with the Answer: C
data The third generation spanned the years 1965 to
e) All the above 1971. Third-generation computers substituted
Answer: E integrated circuits (ICs) for transistors.
It provides several key features: Numerous transistors, resistors, and capacitors,
 It stores data in one central location. as well as the related circuitry, are found in a
 It allows data to be shared by many single integrated circuit (IC). Jack Kilby was the
users. man who created the IC.
 It provides user interfaces to work with the
data. 13. _____________ is a unique address that
 It creates backups. identifies a device on the internet which is the
 It controls who can access and edit the set of rules governing the format of data sent via
data. the internet or local network.
a) HTTP
11. Which input device is/are used to move the b) IP address
cursor position on a monitor screen? c) WWW
a) Mouse d) URL
b) Joystick e) HTTPS
c) Light pen Answer: B
d) Both a and b An IP address is a unique address that identifies
e) Both a and c a device on the internet or a local network. IP
Answer: D stands for "Internet Protocol," which is the set of
Mouse &Joystick input device is/is used to move rules governing the format of data sent via the
the cursor position on a monitor screen. Internet or local network.

12. Which computer generation saw the 14. The foundation for successful computer
introduction of integrated Circuits, sometimes system construction is the __________.
known as ICs? a) Computer Memory

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -29 (Eng)

b) Computer Architecture d) Software Piracy


c) Computer Hardware e) Topology
d) Computer Model Answer: D
e) Computer Instructions The act of using, copying, or disseminating
Answer: B software without authorization or consent is
The foundation for successful computer system known as software piracy.
construction is computer architecture. The user
enters coded data into the computer via an input 17. The shortcut key for cutting selected
device. It is a tool used to provide the computer text/picture in MS Word is ____.
with the information it needs, such as a keyboard a) Ctrl + C
or mouse. b) Ctrl + V
c) Ctrl + X
15. Which of the following basic functions will be d) Ctrl + P
performed by the Abacus? e) Ctrl + S
a) Addition Answer: C
b) Subtraction Ctrl + X is the keyboard shortcut to cut selected
c) Multiplication text in MS Word. Ctrl + X short key is often used
d) Division to cut a selected section of the text or image.
e) All the above
Answer: E 18. What is the other name for Desktop and
An abacus is a computation tool that performs personal computers?
mathematical functions by sliding counters along a) Microcomputers
rods or grooves. The abacus can compute roots b) Supercomputers
up to the cubic degree in addition to the basic c) Minicomputers
functions of addition, subtraction, multiplication, d) Mainframe computers
and division. e) Hybrid computers
Answer: A
16. The act of using, copying, or disseminating A single chip (microprocessor) serves as the
software without authorization or consent is central processing unit in a PC or microcomputer
known as ____________________. (CPU). A PC is now the most common type of
a) Web Beacon "microcomputer," but it can also apply to any
b) Protocol other small computer, including a desktop
c) Domain

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -29 (Eng)

computer, laptop computer, tablet, smartphone, b) Error Detecting Aids


or wearable. c) Coordination between other software and
users
19. A ________ is the fundamental building block d) Device Management
of an Excel spreadsheet that you insert data. e) All the above
a) Data Answer: E
b) Tab  Security
c) Range  Control over system performance
d) Cell  Job Accounting
e) Box  Error detecting aids
Answer: D  Coordination between other software and
A cell is the fundamental building block of an users
Excel spreadsheet where we insert data. Each  Memory Management
worksheet is made up of countless cells, which  Processor Management
are rectangular shapes. A row and a column  Device Management
come together to form a cell.
22. If a transaction executes all its operations
20. Which of the following is the top layer of the successfully and all its effects are now
OSI model? permanently established on the database
a) Presentation system is known as____
b) Session a) Active
c) Application b) Partially Committed
d) Transport c) Committed
e) Data Link d) Abort
Answer: C e) None of These
The top layer of an OSI model (layer seven) is Answer: C
the application layer that delivers network Committed
services or protocols that comply with an end- ->If a transaction executes all its operations
user's data to the end-user. successfully, it is said to be committed. All its
effects are now permanently established on the
21. Which of the following are the important database system.
functions of the Operating System?
a) Job Accounting

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -29 (Eng)

23. Transforming of logic and data from design Answer: D


specifications (design descriptions) into a The process of transferring documents,
programming language is called _______. graphics, and other objects from your computer
a) Compatibility to a server on the Internet is called uploading
b) Compactness
c) Coding 25. Which of the following controls the way in
d) Communication which the computer system function and
e) None of these provides a means by which the user can interact
Answer: C with the computer?
Transforming logic and data from design a) Keyboard
specifications (design descriptions) into a b) Mouse
programming language is called Coding. c) Microphone
d) Application
24. The process of transferring documents, e) Operating system
graphics, and other objects from your computer Answer: E
to a server on the Internet is called _________ The operating system will control the way in
a) Downloading which the computer system function and provide
b) Buffering a means by which the user can be interacted
c) Streaming with the computer.
d) Uploading
e) None of these

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -30 (Eng)

Computer Awareness

1. The most common method of entering text d) Subject


and numerical data into a computer system is e) Service
through the use of a _______________. Answer: A
a) Motherboard BASIC: Beginner All-Purpose Symbolic
b) Keyboard Instruction Code.
c) Mouse
d) CPU 4. Programs are specifications of a calculation or
e) Scanner algorithm written in a notation known as a
Answer: B _______________.
The most common method of entering text and a) Binary Language
numerical data into a computer system is b) Assembly Language
through the use of a Keyboard. c) Machine Language
d) High-level Language
2. Which among the following combination of e) Programming Language
keys is used to switch between the open items? Answer: E
a) Ctrl + Tab Programs are specifications of a calculation or
b) Alt + Ctrl + Tab algorithm written in a notation known as a
c) Tab programming language.
d) Alt + Tab
e) Ctrl + (right or left arrow key) 5. ______________ is the portion of a computer
Answer: D that houses the main hardware components that
Alt + Tab is the common name for a keyboard carry out operations and generate output for
shortcut that has been in Microsoft Windows complicated calculations.
since Windows 3.0. This shortcut switches a) Input Unit
between application-level windows without using b) Output Unit
the mouse; hence it was named Task Switcher c) Storage Unit
(Flip in Windows Vista). d) Control Unit
e) System Unit
3. What does S represent in BASIC? Answer: E
a) Symbolic A system unit is the portion of a computer that
b) System houses the main hardware components that
c) Standard

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -30 (Eng)

carry out operations and generate output for b) Absolute Reference


complicated calculations. c) Access Point
d) Artificial Intelligence
6. Primary storage is .......... as compared to e) Actuator
secondary storage. Answer: E
a) Slow and inexpensive A Device that performs an action or outputs a
b) Fast and inexpensive signal in response to a signal
c) Fast and expensive from a computer is Actuator.
d) Slow and expensive
e) Both are Neutral 9. ________________ refers to the rate at which
Answer: C the monitor accepts data.
When compared to secondary storage, primary a) User Time
storage is quicker and more expensive. It is b) Bandwidth
compact and lightweight but also fairly pricey. c) Access Time
d) Interlacing
7. A self-replicating software on a computer e) Response Time
called a ___________ has code that specifically Answer: B
copies itself into other executable codes or Bandwidth refers to the rate at which the monitor
programs. accepts data.
a) Spam
b) Virus 10. In Which of the following formats does the
c) Worm database management system store data?
d) Cracker a) Image
e) Topology b) Text
Answer: B c) Table
A self-replicating software on a computer called d) Graph
a virus has code that specifically copies itself e) File
into other executable codes or programs. Answer: C
The information is kept in a table structure that is
8. A Device that performs an action or outputs a designed to control data storage and alter data
signal in response to a signal to provide information.
from a computer is ______________.
a) Absolute Address

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -30 (Eng)

11. Which input device is used for inputting text, e) All the above
numbers and commands to the computer? Answer: E
a) Mouse The uses of the Internet:
b) Keyboard  Electronic mail
c) Scanner  Research
d) All of the above  Downloading files
e) None of these  Discussion groups
Answer: B  Interactive games
The keyboard is used for inputting text, numbers,  Education and self-improvement
and commands into the computer.  Friendship and dating
 Electronic newspapers and magazines
12. What is the unit of Speed measured in the
First Generation computers? 14. A portable computer that can be held in the
a) Milli seconds hand is referred to as a handheld computer.
b) Nanoseconds What is the other name for Handheld Computer?
c) Microseconds a) Personal Computer
d) Both (a) and (b) b) Portable Computer
e) All the above c) Palmtop Computer
Answer: A d) Workstation Computer
The Electronic Computer (ENIAC), which had e) Desktop Computer
over 19000 vacuum tubes, weighed close to 30 Answer: C
tonnes and had a volume of 3000 cubic feet, is A portable computer can be easily carried
an example of a first-generation computer. around in a pocket and operated while you are
Computers from the first generation had speeds carrying it. Handheld computers are also known
measured in milliseconds (thousands of a as personal digital assistants (PDAs) or Palmtop
second). computers.

13. Which of the following are the Uses of the 15. A __________ is a type of integrated electrical
Internet? circuit that performs the calculations that allow a
a) Research computer to function.
b) Downloading files a) Information
c) Education and self-improvement b) Data Processing
d) Electronic mail c) Memory

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -30 (Eng)

d) Reports Microsoft's MS Word application is integrated


e) Processor with Windows and is used to browse web
Answer: E documents.
A Processor is a type of integrated electrical
circuit that performs the calculations that allow a 18. A supercomputer is a computer with a high
computer to function level of performance compared to a general-
purpose computer. Which of the following is the
16. A _________________ is a small hardware world’s first supercomputer invented in 1976?
device that allows data transfer to mobile a) Pratyush
devices within a certain range when used in the b) PARAM Siddhi
context of location-based services. c) CRAY-1
a) Beacon d) Fugaku
b) Software e) PARAM
c) Protocol Answer: C
d) Topology Cray Research created, produced, and sold the
e) System supercomputer known as the Cray-1. The first
Answer: A Cray-1 system, announced in 1975, was set up
A beacon is a small hardware device that allows at Los Alamos National Laboratory in 1976.
data transfer to mobile devices within a certain
range when used in the context of location- 19. In Excel, the intersection of a column and a
based services. row is called _______.
a) Grid
17. Microsoft's __________ application is b) Cell
integrated with Windows and used to browse c) Table
web documents. d) Intersect
a) Netscape e) Diagonal
b) MS Word Answer: B
c) MS Excel row and a column—in other words, where a row
d) MS Powerpoint and column meet. Columns are identified by
e) Microsoft Outlook letters (A, B, C), while rows are identified by
Answer: B numbers (1, 2, 3). Each cell has its name—or
cell address—based on its column and row.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -30 (Eng)

20. The _________ layer includes programmes a) Binary


like SMTP, FTP, and DNS. b) Full Binary
a) Application Layer c) Complete Binary
b) Transport Layer d) Extended Binary
c) Physical Layer e) None of these
d) Data Link Layer Answer: B
e) Network Layer Full Binary tree contains the maximum or
Answer: A possible number of nodes at all levels except a
Message passing between application leaf.
processes (clients and servers) operating on
various end systems is governed by an 23. Each record has its own address on the file
application layer protocol. Protocols for with by the help of which it can be directly
application layers are DNS, SMTP, POP, FTP, accessed for reading or writing _______.
and HTTP. a) Sequential access
b) Random access
21. Operating System is otherwise known as c) Direct access
________________. d) Both B and C
a) Database e) None of these
b) Application Software Answer: D
c) System Software Explanation:
d) Utility Software Random / Direct access -> Each record has its
e) Accounting Software own address on the file with by the help of which
Answer: C it can be directly accessed for reading or writing.
An operating system (OS) is the program that,
after being initially loaded into the computer by a 24. In which part of the computer does the data
boot program, manages all of the other is stored before entering into the CPU from the
application programs in a computer. The Main memory?
operating system is the best-known example of a) External hard disk
system software. b) Secondary memory
c) Cache memory
22.Which one of the following tree contains the d) In CPU
maximum or possible number of nodes at all e) None of these
levels except a leaf? Answer: C

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -30 (Eng)

c) Memory Allocation
The data is stored in Cache memory, before d) Paging
entering in to CPU from the Main memory. e) None of these
Answer: A
25. _______is a memory management technique Segmentation is a memory management
in which each job is divided into several technique in which each job is divided into
segments of different sizes, one for each module several segments of different sizes, one for each
that contains pieces that perform related module that contains pieces that perform related
functions
functions.
a) Segmentation
b) Fragmentation

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

Computer Awareness

1. The brain of any computer system is Answer: A


______________. CGI: Common Gateway Interface
a) Motherboard
b) Keyboard 4. Which of the following are the different types
c) Mouse of Programming Language?
d) CPU a) Object-Oriented Programming Language
e) Scanner b) Logic Programming Language
Answer: D c) Procedural Programming Language
The Central Processing Unit (CPU), which d) Functional Programming Language
houses all the circuitry required to process input, e) All the above
store data, and output results, is the brain of a Answer: E
computer. 5 Different Types of Programming Languages
 Object-Oriented Programming Language
2. In word processing, an efficient way to move  Logic Programming Language
the 3rd paragraph to place it after the 5th  Procedural Programming Language
paragraph is _____.  Functional Programming Language
a) Copy and paste  Scripting Programming Language
b) Copy and cut
c) Cut and copy 5. The ____________ instruction inserts the result
d) Cut and paste into one or more registers after reading data
e) None of these from memory using a segment or flat address
Answer: D expression.
Microsoft Word allows you to select text or a a) Load
graphic, cut it and paste it somewhere else in the b) Machine
same document or another document. c) Storage
d) Access
3. What do I represent in CGI? e) Arithmetic
a) Interface Answer: A
b) Information The load instruction (ld) inserts the result into
c) Insert one or more registers after reading data from
d) Interval memory using a segment or flat address
e) Intention expression.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

6. _____________ is a temporary memory bank responsibility of running specific applications


where your computer stores data it's currently within that network.
working on and keeps data easily accessible so a) Application Server
that it can be retrieved quickly, meaning your b) Arithmetic Server
processor doesn't have to go into long-term c) Algorithm
storage to complete immediate processing tasks. d) Applet
a) Storage e) Adware
b) RAM Answer: A
c) ROM An application Server is a specialized server
d) Joystick based in a client/server network that has the sole
e) Scanner responsibility of running specific applications
Answer: B within that network.
RAM is a temporary memory bank where your
computer stores data it's currently working on. 9. ____________ simply means linking with
RAM keeps data easily accessible so that it can another device without using a wire, or a
be retrieved quickly, meaning your processor physical connection.
doesn't have to go into long-term storage to a) Network
complete immediate processing tasks. b) Wireless
c) Protocol
7. The potential impact of a threat on a system is d) Interlacing
measured by its ______________. e) Open Source
a) Vulnerabilities Answer: B
b) Susceptibility Wireless simply means linking with another
c) Degree of Harm device without using a wire, or a physical
d) CounterMeasures connection.
e) None of these
Answer: C 10. What is information about data called?
The potential impact of a threat on a system is a) Hyperdata
measured by its Degree of Harm. b) Teradata
c) Metadata
8. _______________ is a specialized server d) Relation
based in a client/server network that has the sole e) Database
Answer: C

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

Meta Data provides information about other 3GLare C, C++, Java, JavaScript, and Visual
data. The basic data information is condensed Basic.
into metadata, which facilitates identifying and
interacting with specific instances of data. 13. The World Wide Web also referred to as the
Metadata can be generated automatically with Web, is an information system that makes it
more basic information or manually for greater possible to access papers and other web
accuracy. resources via the Internet. Who is the inventor of
WWW?
11. The first computer mouse was developed by a) Bill Gates
_____________. b) Lee. N. Feyong
a) Douglas Engelbart c) Tim Berners Lee
b) William English d) Tom Berners Lee
c) Daniel Cougher e) Tim Cook
d) Robert Zawaski Answer: C
e) William Henry The World Wide Web also referred to as the
Answer: A Web, is an information system that makes it
Development of the mouse began in the early possible to access papers and other web
1960s by SRI International's Douglas Engelbart, resources via the Internet. The web is another
while he was exploring the interactions between name for www. Tim Berners-Lee created it in
humans and computers. Bill English, then the 1989 at CERN in Geneva.
chief engineer at SRI, built the first computer
mouse prototype in 1964. 14. A file is transferred from one computer
system to another, or to a server so that others
12. In which generation is a high-level language can see or retrieve it is called
developed? ____________________.
a) First a) Download
b) Second b) Upload
c) Third c) Retrieval
d) Fourth d) Sharing
e) Fifth e) Software
Answer: C Answer: A
High-Level languages are developed in the third
generation. The third Generation languages, or

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

A file is transferred from one computer system to 17. Changing the appearance of a document is
another, or a server so that others can see or called ___
retrieve it is called Download. a) Aligning
b) Formatting
15. Who among the following is considered the c) Documenting
Father of the Computer? d) Copying
a) Charles Babbage e) Editing
b) Pascal Answer: B
c) Herman Hollerith The process of changing the appearance of the
d) Reynold Johnson text is called Formatting.
e) Gary Kildall
Answer: A 18. A ________ is the fundamental building block
Charles Babbage was considered to be the of an Excel spreadsheet that you insert data.
father of computing after his concept, and then a) Data
later the invention of the Analytical Engine in b) Tab
1837. c) Range
d) Cell
16. A ________________ is a network security e) Box
device used in computing that monitors and Answer: D
regulates incoming and outgoing network traffic A cell is the fundamental building block of an
by pre-established security rules. Excel spreadsheet where we insert data. Each
a) Bridge worksheet is made up of countless cells, which
b) Firewall are rectangular shapes. A row and a column
c) Port come together to form a cell.
d) Domain
e) Protocol 19. What are the basic rectangular building
Answer: B blocks of a spreadsheet?
A firewall is a network security device used in a) Columns
computing that monitors and regulates incoming b) Rows
and outgoing network traffic following pre- c) Cell
established security rules. d) Table
e) Ribbon
Answer: C

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

Each rectangle in a worksheet is called a cell. A d) Floppy Disk


cell is the intersection of a row and a column. e) None of these
Answer: C
20. Which layer of OSI model is responsible for Blue-ray Disk is an Optical disk storage medium
the delivery of individual packets from the source designed to recapture the data normally in DVD
host to the destination host? format and it contains 25 GB(23.31 GB) per
a) Physical layer space.
b) Network
c) Data Link 23. While studying networking, we may come to
d) Session know about the term SACK. What does SACK
e) Application represent?
Answer: B a) Selection Acknowledgement
The network layer of the OSI model is b) Selective Acknowledgement
responsible for the delivery of individual packets c) Supreme request
from the source host to the destination host. d) Suppress Data
e) None of these
21. ____________ is the maximum length of a Answer: B
DOS command using an optional parameter. SACK ⇒ Selective Acknowledgement
a) 26 characters
b) 87 characters 24. The Artificial satellite which revolves around
c) 127 characters the earth and provides transmit information from
d) 142 characters the earth is basically called _____
e) 163 characters a) Geosynchronous satellites
Answer: C b) Geostationary satellites
127 characters is the maximum length of a DOS c) Low Earth Orbits
command using an optional parameter. d) Sun-Synchronous orbits
e) None of these
22. Which one is an Optical disk storage medium Answer: B
designed to recapture the data normally in DVD The majority of communications satellites are in
format? fact geostationary satellites. Geostationary
a) Compact Disk satellites like geosynchronous satellites take 24
b) Digital Video Disk hours to complete a rotation. However,
c) Blue-ray Disk geostationary satellites are positioned directly

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

over the equator and their path follows the c) Drive imaging
equatorial plane of the Earth. d) Utility software
e) None of these
25 ______ is the software that creates a mirror Answer: C
image of the entire hard disk, including the Drive imaging is the software that creates a
operating system, application, files and data. mirror image of the entire hard disk, including the
a) Operating system operating system, application, files and data.
b) Backup software

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -32 (Eng)

Computer Awareness

1. Which among the following is the major The gutter margin is a typographical term used
feature of the Central Processing Unit (CPU)? to designate an additional margin added to a
a) It performs all types of data processing page layout to compensate for the part of the
operations paper made unusable by the binding process. In
b) It stores data, intermediate results, and a facing pages layout (Word refers to this type of
instructions (program) layout as "mirror margins"), the gutter margin is
c) It controls the operation of all parts of the on the very inside of both pages.
computer
d) All the above 3. What is the full form of COBOL?
e) None of the above a) Complementary Metal Oxide Binary Language
Answer: D b) Common Business Objective Language.
Central Processing Unit (CPU) consists of the c) Common Business Oriented Language
following features − d) Cathode Ray Tube Language
 CPU is considered the brain of the e) Central Business Oriented Language
computer. Answer: C
 CPU performs all types of data COBOL: Common Business-Oriented Language
processing operations.
 It stores data, intermediate results, and 4. What is the name of the translator that
instructions (program). converts an assembly language program into
 It controls the operation of all parts of the machine language code?
computer. a) Compiler
b) Interpreter
2.______________ is applicable at the time of c) Assembler
taking printing and binding printouts from a d) Linker
computer document. e) None of these
a) .Aligned margin Answer: C
b) Text margin An assembler translator creates machine
c) Gutter language code from an input assembly language
d) Slated margin program. A program known as an assembler
e) None of the above transforms assembly language into machine
Answer: C code.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -32 (Eng)

5. Which of the following are the features of the because SRAM only requires a small steady
Memory Unit? current while DRAM requires bursts of power.
a) It stores all the data and the instructions
required for processing 7. Which of the following is the first Computer
b) It stores the final results of processing before Virus?
these results are released to an output device a) Mcafree
c) It stores intermediate results of processing b) Creepers
d) All inputs and outputs are transmitted through c) Firewall
the main memory d) Trojan
e) All the above e) Harle
Answer: E Answer: B
The functions of the memory unit are − The first computer virus is most frequently
 It stores all the data and the instructions referred to as the creeper virus.
required for processing.
 It stores intermediate results of 8. __________ is a program that allows you to
processing. search the files of all the Internet FTP servers
 It stores the final results of processing that offer anonymous FTP.
before these results are released to an a) Applet
output device. b) Adware
All inputs and outputs are transmitted through c) Algorithm
the main memory. d) Archie
e) Application
6. In comparison to static RAM, dynamic RAM Answer: D
consumes _______ power. Archie is a program that allows you to search the
a) Less files of all the Internet FTP servers that offer
b) More anonymous FTP.
c) Neutral
d) No 9. _____________ are communication processors
e) Unstable that link various networks by translating one set
Answer: B of protocols into another.
Typically, a Static RAM module consumes less a) Network
power than a Dynamic RAM module. This is b) Wireless
c) Gateway

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -32 (Eng)

d) Router 12. Database Management System is an


e) Bridge application of ______________- generation of
Answer: C Computers.
Gateways are communication processors that a) First
link various networks by translating one set of b) Second
protocols into another. c) Third
d) Fourth
10. The DBMS acts as an interface between e) Fifth
________________ and ________________ of an Answer: C
enterprise-class system. Database Management System is an application
a) User of the Third generation of Computers.
b) Database
c) SQL 13. The Internet is the network of networks and
d) Both (a) and (b) the network allows to exchange of data between
e) Both (a) and (c) two or more computers whereas ________ is a
Answer: D way to access information through the Internet.
A database management system is an a) Web
application that acts as an interface between the b) Protocol
user and the database. The user interacts with c) Topology
the application to access data. d) Intranet
e) Bus
11. Wireless mouse communicates through Answer: A
___________________. The Internet is the network of networks and the
a) radiowaves network allows to exchange of data between two
b) infrared wave or more computers. The Web is a way to access
c) microwaves information through the Internet.
d) Electromagnetic signal
e) electric signal 14. Any hardware part that enables you to enter
Answer: A information and commands into a computer is
Wireless mouse technology predominantly uses referred to as an ____________.
radio frequencies (RF) to send signals from the a) Network
mouse to the computer. b) Input Device
c) Software

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -32 (Eng)

d) Interaction A toggle key is a key that is used to turn a


e) Terminal function on or off or to switch between two
Answer: B functions. Examples of toggle keys are the caps
Any hardware part that enables you to enter lock key, number lock key, and scroll lock key. A
information and commands into a computer is toggle key can also be used as an accessibility
referred to as an input device. option to alternate the input mode of keys.

15. Analytical engines were originally introduced 17.What is the other name for Desktop and
in the first generation of computers. To store personal computers?
data, the first generation of computers used a) Microcomputers
_______ as memory units. b) Supercomputers
a) Counter Wheels c) Minicomputers
b) Microprocessor d) Mainframe computers
c) Transistors e) Hybrid computers
d) RAM Answer: A
e) Magnetic Tapes A single chip (microprocessor) serves as the
Answer: A central processing unit in a PC or microcomputer
During the first generation of computers, (CPU). A PC is now the most common type of
analytical engines were introduced. This first "microcomputer,"
generation of computers uses counter wheels as
a memory unit to store data. The analytical 18. Which of the following type of computer is an
engine was invented by Charles Babbage in integral component of most embedded systems,
1833. is it a combination of hardware and software that
is designated to perform a highly specific
16. Which among the following are the Toggle function?
Keys in the Keyboard? a) MicroComputer
a) Capslock b) Mini Computer
b) Number lock c) Mainframe Computer
c) Scroll Lock d) Embedded Computer
d) All the above e) Nano Computer
e) None of the above Answer: D
Answer: D An embedded computer, which is an integral
component of most embedded systems, is a

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -32 (Eng)

combination of hardware and software that is e) Ex


designated to perform a highly specific function. Answer: C
In computing, CLS (for the clear screen) is a
19. How many rows are there in MS Excel's command used by the command-line
older version? interpreter's COMMAND.
a) 65536
b) 65596 22. Each process must be waiting for a resource
c) 66535 which is being held by another process, which in
d) 66626 turn is waiting for the first process to release the
e) 66696 resource. then it is called as____
Answer: A a) Non preemptive
In older versions of Excel (2003 and prior), there b) Mutual exclusion
were 65,536 rows. c) Partial allocation
d) Circular wait
20. Which is the highest layer you are using to e) None of these
transmit data while using Telnet or FTP? Answer: D
a) Application Layer Circular wait
b) Transport Layer -> Each process must be waiting for a resource
c) Physical Layer which is being held by another process, which in
d) Data Link Layer turn is waiting for the first process to release the
e) Network Layer resource.
Answer: A
Even though Telnet and FTP are both 23. What resides on the motherboard and
Application layer protocols, they both employ connects the CPU to other components on the
TCP at the Transport layer. Motherboard?
a) System Bus
21. What command should be used to clear the b) Monitor
screen and show the operating system prompt c) ALU
on the screen's first line? d) CPU
a) Cd e) None of these
b) Md Answer: A
c) Cls
d) Clx

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -32 (Eng)

System Bus resides on the motherboard and 25. Which of the following devices have a
connects the CPU to other components on the limitation that we can only store information on it
Motherboard but cannot erase or modify it?
a) Floppy disk
24. Which one brings you through the process of b) Hard disk
creating a chart by displaying a series of dialog c) Tape drive
boxes? d) Pen drive
a) Chart area e) None of these
b) Chart title Answer: C
c) Chart wizard Tape drive devices have a limitation that we can
d) Legend only store information to it but cannot erase or
e) None of these modify it
Answer: C
Chart wizard brings you through the process of
creating a chart by displaying a series of dialog
boxes.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -33 (Eng)

Computer Awareness

1. ______________ is a type of system software system, which set a new standard for graphics
that controls how computer hardware and displays. Prior to the development of VRAM,
software resources are used and offer basic dual-ported memory was quite expensive,
services to other software applications. limiting higher resolution bitmapped graphics to
a) Operating System high-end workstations. VRAM improved the
b) Utility Programs overall frame-buffer throughput, allowing low
c) Device drivers cost, high-resolution, high-speed, color graphics.
d) Language translators Modern GUI-based operating systems benefitted
e) None of the above from this and thus it provided a key ingredient for
Answer: A proliferation of graphical user interfaces (GUIs)
An operating system (OS) is a type of system throughout the world at that time.
software that controls how computer hardware
and software resources are used and offer basic 3. What does S represent in CSI?
services to other software applications. a) Sentence
b) Simple
2. Which among the following is used for the c) Second
purpose of video and graphics in the computer ? d) System
a) ROM e) Separated
b) EEPROM Answer: D
c) EPROM CSI: Common System Interface.
d) V-RAM
e) SRAM 4. ___________ are specialized software tools
Answer: D that convert the source code of one
Video RAM, or VRAM, is a dual-ported variant of programming language into machine code,
dynamic RAM (DRAM), which was once bytecode, or another programming language.
commonly used to store the frame-buffer in a) Compiler
graphics adapters. It was invented by F. Dill, D. b) Interpreter
Ling and R. Matick at IBM Research in 1980, c) Assembler
with a patent issued in 1985 (US Patent d) Linker
4,541,075). The first commercial use of VRAM e) None of these
was in a high-resolution graphics adapter Answer: A
introduced in 1986 by IBM for the PC/RT

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -33 (Eng)

Compilers are specialized software tools that 6. _____________ is a non-volatile memory type
convert the source code of one programming that receives data and permanently writes it on a
language into machine code, bytecode, or chip and it lasts even after you turn off your
another programming language. computer.
a) RAM
5. Which of the following are the features of the b) ROM
Control Unit? c) Storage
a) It is responsible for controlling the transfer of d) Input
data and instructions among other units of a e) Output
computer Answer: B
b) It manages and coordinates all the units of the ROM (read-only memory) is a non-volatile
computer memory type that receives data and permanently
c) It obtains the instructions from the memory, writes it on a chip and it lasts even after you turn
interprets them, and directs the operation of the off your computer.
computer
d) It communicates with Input/Output devices for 7. Firewalls are employed to provide security
the transfer of data or results from storage from ________________.
e) All the above a) Fire Attacks
Answer: E b) Virus Attacks
Functions of this unit are − c) Data Driven Attacks
 It is responsible for controlling the transfer d) Unauthorised Attacks
of data and instructions among other units e) All the above
of a computer. Answer: D
 It manages and coordinates all the units A firewall is a type of security device used to
of the computer. stop unauthorized users from entering or leaving
 It obtains the instructions from the a computer network. Firewalls are frequently
memory, interprets them, and directs the used to prevent unauthorized users from
operation of the computer. connecting to private networks, or intranets,
 It communicates with Input/Output connected to the internet.
devices for the transfer of data or results
from storage. 8. An ________ is a collection of data moved to a
 It does not process or store data. repository for long-term retention, to be kept

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -33 (Eng)

separate for compliance reasons, or for moving Answer: B


off primary storage media. A hierarchical database is a type of data
a) Applet architecture in which information is kept in
b) Adware records and arranged into a parent-child
c) Algorithm structure that resembles a tree, with one parent
d) Archie node having several child nodes that are
e) Archive connected by links.
Answer: E
An archive is a collection of data moved to a 11. Which of the following is/are input devices?
repository for long-term retention, to be kept a) Trackball
separate for compliance reasons, or for moving b) Scanner
off primary storage media. c) Touch screen
d) Magnetic Ink Card Reader (MICR)
9. The quickest communication channel is a e) All of the above
___________, but the optical fiber is used for data Answer: E
transport rather than actual communication. The correct answer is Plotter, Printer, Monitor.
a) Microwave Plotter, Printer, Monitor are the output devices. A
b) Scanner scanner is an input device.
c) Radio Waves
d) Optical Fibre 12. Artificial Intelligence is developed during the
e) All the above _________ generation of computers.
Answer: E a) First
The quickest communication channel is a b) Second
microwave, but the optical fiber is used for data c) Third
transport rather than actual communication. d) Fourth
e) Fifth
10. Which database type organized the data like Answer: E
a tree with nodes? Artificial Intelligence is developed during the fifth
a) Network Database generation of computers.
b) Hierarchical Database
c) Relational Database 13. A/An _____________ is a unique identifier
d) Multiple Database used to locate a resource on the Internet.
e) Commercial Database a) WWW

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -33 (Eng)

b) URL 16. ____________ in computer science is the


c) Internet propensity of a processor to repeatedly access
d) Network the same set of memory locations during a brief
e) Protocol period.
Answer: B a) Locality of Reference
A URL (Uniform Resource Locator) is a unique b) Reference Point
identifier used to locate a resource on the c) Access Time
Internet. d) Principle of Axes
e) Distribution of Reference
14. Which of the following is the earliest Answer: A
calculating device? The locality of reference commonly referred to
a) Analytical Engine as the principle of locality in computer science is
b) Calculator the propensity of a processor to repeatedly
c) Abacus access the same set of memory locations during
d) Read Access Memory a brief period.
e) Motherpad
Answer: C 17. You can modify the organisation and layout
Abacus is the earliest calculating device. of pages in a Microsoft Word document using
_________________.
15. ENIAC (Electronic Numerical Integrator and a) Word Processor
Computer) was the world's first general-purpose b) Page Setup
computer. Who designed the first electronic c) Page Down
computer-ENIAC? d) Page Up
a) Von Neumann e) Spreadsheet
b) Presper Eckert Answer: B
c) John W Mauchly You can modify the organization and layout of
d) Both (a) and (b) pages in a Microsoft Word document using Page
e) Both (b) and (c) Setup. You can alter the page setup of the
Answer: E document using the buttons in the "Page Setup"
ENIAC (Electronic Numerical Integrator and group on the "Page Layout" tab of the Ribbon.
Computer) was the world's first general-purpose
computer. The credit for the invention of ENIAC
is given to J. Presper Eckert and John Mauchly.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -33 (Eng)

18. ____ are specially designed computer chips The device is operated at the physical layer by a
that reside in other devices such as your car or "repeater." By the transmission loss, it is utilized
your electronic thermostat. to retransmit the digital or analogue signal. While
a) Networks an analogue repeater just amplifies the signal, a
b) Client digital repeater reconstructs the signal at its
c) Mainframe original capacity.
d) Supercomputer
e) Embedded System 21. When a user clicks on a file icon, the system
Answer: E can immediately run an encoded set of
Embedded Systems are specially designed instructions contained in an _________ file.
computer chips that reside in other devices such a) Data
as your car or your electronic thermostat. b) Executable
c) Information
19. What function shows column data in a row or d) Application
row data in a column? e) End
a) Hyperlink Answer: B
b) Ribbon When a user clicks on a file icon, the system can
c) Transpose immediately run an encoded set of instructions
d) Hypertext contained in an executable file (EXE file).
e) Index
Answer: C 22.Which process of decomposing a problem
If you have a worksheet with data in columns (program) into a set of modules so as to reduce
that you need to rotate to rearrange it in rows, the overall complexity of the problem?
use the Transpose feature. a) Polymorphism
b) Modularity
20. A device operating at the physical layer is c) Hierarchy
called a _________. d) Abstraction
a) Router e) None of these
b) Server Answer: B
c) Repeater Modularity
d) Transmitter -> Modularity is the process of decomposing a
e) Integrator problem (program) into a set of modules so as to
Answer: C reduce the overall complexity of the problem.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -33 (Eng)

23. A device that attaches to both ends of an e) None of these


electrical bus and prevents reflection of echoes Answer: C
of signals that reach the end of the bus is called Character User interface (CUI) is a mechanism
________. of interacting with a computer system or
a) Terminator software by typing commands to perform specific
b) Connector tasks.
c) Processor
d) Compiler 25. The Delete key, Num Lock key, and Caps
e) None of these Lock key are considered___________ keys
Answer: A because their function changes each time you
A device that attaches to both ends of press them.
anelectrical bus and prevents reflection a) Function
of echoes of signals that reach the end of thebus b) Toggle
is called Terminator. c) Cursor Control
d) Control
24. _________ is a mechanism of interacting with e) None of these
a computer system or software by typing Answer: B
commands to perform specific tasks The Delete key, Num Lock key, and Caps Lock
a) User interface key are considered Toggle key keys because
b) Graphical User interface their function changes each time you press
c) Character User interface them.
d) Ms-dos

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -34 (Eng)

Computer Awareness

1. Which among the following is an example of a) World Wide Wizard


the Operating System? b) World Wide Web
a) Unix c) Wide World Web
b) Linux d) World Wide Wonder
c) Microsoft windows e) Wonder Wide Web
d) Google’s Android Answer: B
e) All the above WWW- World Wide web
Answer: E
Some examples of operating systems include 4. An________________ is a computer
Apple macOS, Microsoft Windows, Google's programme that runs scripts or programmes
Android OS, Linux Operating System, and Apple written in programming languages without first
iOS. Apple macOS is found on Apple personal compiling them into programmes written in
computers such as the Apple Macbook, Apple machine language.
Macbook Pro, and Apple Macbook Air. a) Compiler
b) Interpreter
2. A complete electronic circuit with transistors c) Assembler
and other electronic components on a small d) Linker
silicon chip is called a (n) _____. e) None of these
a) Workstation Answer: B
b) CPU An interpreter is a computer program that runs
c) Magnetic disk scripts or programs written in programming
d) Integrated circuit languages without first compiling them into
e) None of these programs written in machine language.
Answer: D
An integrated circuit (IC) is a semiconductor 5. Data retrieval from the computer's memory is
wafer on which thousands or millions of tiny made more effective by _________, a chip-based
resistors, capacitors, and transistors are computer component.
fabricated. An IC can function as an amplifier, a) Main Memory
oscillator, timer, counter, computer memory, or b) Cache Memory
microprocessor. c) Heaps
d) Stacks
3. WWW stands for _________________________. e) Accumulators

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -34 (Eng)

Answer: B A self-replicating software on a computer called


Data retrieval from the computer's memory is a virus has code that specifically copies itself
made more effective by cache memory, a chip- into other executable codes or programs.
based computer component.
8. ______________ is a mathematical core
6. Which of the following is one among the type circuitry that applies to all computers central
of ROM (read-only memory)? processing units (CPU).
a) Programmable Read Only Memory (PROM) a) Control Unit
b) Erasable Programmable Read Only Memory b) Arithmetic Logic Unit
(EPROM) c) Archie
c) Electrically Erasable Programmable Read d) Algorithm
Only Memory (EEPROM) e) Applet
d) All the above Answer: B
e) None of the above The arithmetic Logic Unit is a mathematical core
Answer: D circuitry that applies to all computer's central
ROM memory has several models such names processing units (CPU). ALU mathematically and
the following. logically calculates the results of binary data.
1. PROM: Programmable Read Only Memory
(PROM) 9. A ____________ is a collection of computers
2. EPROM: Erasable Programmable Read Only and related peripherals that connect wirelessly
Memory or over a wired network to a server located
3. EEPROM: Electrically Erasable within a specific geographical region.
Programmable Read Only Memory a) LAN
b) WAN
7. A _____________ software on a computer c) MAN
called a virus has code that specifically copies d) Internet
itself into other executable codes or programs. e) Networking
a) Self attach Answer: A
b) Self-replicating A local area network (LAN) is a collection of
c) Non-self-replicating computers and related peripherals that connect
d) Hacking wirelessly or over a wired network to a server
e) Trojan located within a specific geographical region.
Answer: B

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -34 (Eng)

10. Devices that could be used to input data into c) Third


a database are ___________. d) Fourth
a) Keyboard e) Fifth
b) Digital Cameras Answer: B
c) Scanners The newer IBM 7090 Second-generation
d) Mouse mainframe computer is an improvement over the
e) All the above earlier IBM 709 vacuum tube mainframe. The
Answer: E completely transistorized IBM 7090 was created
An input device is a piece of hardware used in in 1960.
computing to send data and control signals to a
system that processes information, like a 13. The term ______________ refers to a
computer or information appliance. Keyboards, connected internal network used only by
mice, scanners, digital cameras, joysticks, and businesses, such as banks and other financial
microphones are a few examples of input institutions, that uses web technology to share
devices. data or information.
a) Web
11. A projector is an ____________ device that b) Protocol
can take images generated by a computer and c) Topology
reproduce them on a large, flat surface. d) Intranet
a) input e) Bus
b) output Answer: D
c) input and output The term "intranet" refers to a connected internal
d) monitor input network used only by businesses, such as banks
e) None of the above and other financial institutions that uses web
Answer: B technology to share data or information.
A projector is an Output device that can take
images generated by a computer and reproduce 14. In a data communication system, the
them on a large, flat surface. information that needs to be transmitted is
referred to as ________________.
12. IBM 7090 was developed in _____________ a) Protocol
generation of computer. b) Transmission
a) First c) Message
b) Second d) Relation

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -34 (Eng)

e) Integration Software that is installed, hosted, and accessed


Answer: C from a distant server or location is referred to as
In a data communications system, the message hosted software.
is the information that has to be transmitted. In
data communication, messages are sent from 17. Which of the following type of computer is
one location to another using a network system the most powerful computer?
that is created to move data from one location to a) Microcomputers
another. b) Supercomputers
c) Minicomputers
15. ________________ is a large-scale electronic d) Mainframe computers
calculating computer that stores commands and e) Hybrid computers
numbers using ultrasonic delay units. Answer: B
a) UNIVAC A supercomputer is a type of computer that
b) ENIAC performs at a higher level than a general-
c) EDSAC purpose computer.
d) EDVAC
e) ACE 18. The ____________ computers are high-
Answer: C performance computers with large amounts of
The EDSAC is a large-scale electronic memory and processors that process billions of
calculating computer that stores commands and simple calculations and transactions in real-time.
numbers using ultrasonic delay units. a) Nano computer
b) Mini computer
16. Software that is installed, hosted, and c) Mainframe computer
accessed from a distant server or location is d) Super computer
referred to as _____________. e) Embedded Computer
a) Hardware Answer: C
b) Hosted Software Mainframe computers are high-performance
c) Access Time computers with large amounts of memory and
d) Local Reference processors that process billions of simple
e) Point of Contact calculations and transactions in real-time.
Answer: B
19. How many columns are there in the old
version of MS Excel?

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -34 (Eng)

a) 242 d) Sequential Hardware


b) 246 e) Operating System
c) 254 Answer: A
d) 256 Batch processing is the method through which a
e) 266 computer completes groups of tasks, frequently
Answer: D concurrently, continuously, and sequentially.
In older versions of Excel (2003 and prior), the
last column was IV which is 256 columns. 22.At least one resource must be held in a non-
shareable mode. Otherwise, the processes
20. The portion of the physical layer that would not be prevented from using the resource
interfaces with the media access control when necessary is known as ________
sublayer is called ___________ a) Non preemptive
a) physical signalling sublayer b) Mutual exclusion
b) physical data sublayer c) Partial allocation
c) physical address sublayer d) Circular wait
d) physical transport sublayer e) None of these
e) physical communication sublayer Answer: B
Answer: A Mutual exclusion
The portion of physical layer that interfaces with ->At least one resource must be held in a non-
the medium access control sublayer is Physical shareable mode. Otherwise, the processes
Signaling Sublayer. The main function of this would not be prevented from using the resource
layer is character encoding, reception, decoding when necessary. Only one process can use the
and performs optional isolation functions. It resource at any given instant of time.
handles which media connection the signal
should be forwarded to physically. 23. Each data item in a record may be a group
item composed of sub-items; those items which
21. _____________ is the method through which are indecomposable are called _______.
a computer completes groups of tasks, a) Elementary Items
frequently concurrently, continuously, and b) Atoms
sequentially. c) Scalars
a) Batch Processing d) All the above
b) Input Management e) None of these
c) Output Sourcing Answer: D

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -34 (Eng)

Each data item in a record may be a group item 25. Which scheduling is a non-preemptive, pre-
composed of sub-items; those items which are emptive scheduling algorithm and easy to
indecomposable are called Elementary items, understand and implement?
Atoms, and Scalars a) Priority scheduling
b) First-Come, First-Served
24. To read the system messages and warnings, c) Shortest-Job-Next
access in Windows, Which of the following files d) Round Robin
should be checked? e) None of these
a) System manager Answer: B
b) Even viewer Explanation:
c) Control panel First-Come, First-Served is a non-preemptive,
d) System message pre-emptive scheduling algorithm.
e) None of these Easy to understand and implement. Its
Answer: B implementation is based on FIFO queue.
In Even viewer, the user can read the system Poor in performance as the average wait time is
messages and warnings, access in Windows. high.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -35 (Eng)

Computer Awareness

1. Which of the following Keys are said to be a) Database


toggle keys? b) Data
a) Caps lock c) Direct
b) Number Lock d) Dynamic
c) Scroll Lock e) Distributed
d) Both (a) and (b) Answer: C
e) All (a), (b) and (c) DAP- Direct Access Protocol.
Answer: E
A toggle key is a key that is used to switch 4. _________________ is the term used to
between two functions or to turn one on or off. describe the process of creating computer code.
The caps lock key, number lock key, and scroll a) Instruction
lock key are a few examples of toggle keys. As b) Programming
an accessibility choice, a toggle key can be used c) Coding
to change the keyboard's input mode. d) Interpretation
e) Assembling
2. The main components of a computer Answer: C
communicate with each other through which Coding is the term used to describe the process
among the following? of creating computer code.
a) Universal Port
b) Private Bus 5. By just providing the subsequent column
c) System Bus address, the ________ makes it simple to
d) Universal Bus simultaneously ready numerous bytes of data
e) Traffic Bus from the same row.
Answer: C a) Cache
A system bus is a single computer bus that b) Heaps
connects the major components of a computer c) Stacks
system, combining the functions of a data bus to d) Latch
carry information, an address bus to determine e) Accumulators
where it should be sent, and a control bus to Answer: D
determine its operation. By just providing the subsequent column
address, the latch makes it simple to
3. What does D represent in DAP?

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -35 (Eng)

simultaneously ready numerous bytes of data 8. A _________ is a copy of important data that is
from the same row. stored in an alternative location, so it can be
recovered if deleted or it becomes corrupted.
6. The CPU may directly access the memory a) Malware
locations known as ________ which house the b) Archie
operands or instructions that are currently being c) Backup
processed. d) Bandwidth
a) Storage e) Baseband
b) Cache Answer: C
c) Registers A backup is a copy of important data that is
d) Input stored in an alternative location, so it can be
e) Output recovered if deleted or it becomes corrupted.
Answer: C
The CPU may directly access the memory 9. Devices that connect LANs include and work
locations known as registers, which house the at the data link layer is ______________.
operands or instructions that are currently being a) Hub
processed. The lowest form of integrated data b) Tunnel
storage in a CPU is a register. c) Bridges
d) HDLC
7. A ___________ is a type of computer e) All the above
application that a computer virus typically Answer: C
connects to. Bridge devices connect and facilitate
a) host program communication between two distinct networks at
b) target program the data link layer of the Open System
c) backdoor program Interconnect (OSI) model.
d) Bluetooth
e) trojan horse 10. ______________________________ means
Answer: E that the data contained in a database is
A Trojan Horse is a type of computer application accurate, consistent and reliable.
that a computer virus typically connects to. a) Data redundancy
b) Data reliability
c) Data Consistency
d) Data integrity

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -35 (Eng)

e) Data Transparency information available on an organization's


Answer: D intranet.
Data integrity refers to the reliability and a) Internet
trustworthiness of data throughout its lifecycle. b) Extranet
c) Telnet
11. Which of the following groups consists of d) Hypertext
only output devices? e) Hyperlink
a) Scanner, monitor, printer Answer: B
b) Mouse, monitor, printer An extranet is a restricted private network that
c) Keyboard, monitor, printer gives authorized customers, vendors, and
d) Monitor, printer, plotter partners access to a portion of the information
e) Joystick, Plotter, Printer available on an organization's intranet.
Answer: D
The correct answer is Plotter, Printer, Monitor. 14. The term ______________ refers to a
Plotter, Printer, Monitor are the output devices. A connected internal network used only by
scanner is an input device. businesses, such as banks and other financial
institutions, that uses web technology to share
12. When was the vacuum tube invented? data or information.
a) 1900 a) Web
b) 1903 b) Protocol
c) 1904 c) Topology
d) 1910 d) Intranet
e) 1915 e) Bus
Answer: C Answer: D
The simplest vacuum tube, the diode (i.e. The term "intranet" refers to a connected internal
Fleming valve), invented in 1904 by John network used only by businesses, such as banks
Ambrose Fleming, contains only a heated and other financial institutions that uses web
electron-emitting cathode and an anode. technology to share data or information.

13. An ____________ is a restricted private 15. The ______________ was the first general-
network that gives authorized customers, purpose electronic digital computer design for
vendors and partners access to a portion of the business application produced in the United
States.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -35 (Eng)

a) UNIVAC d) Auto Correct


b) ENIAC e) Insert Table
c) EDSAC Answer: A
d) EDVAC The header and footer are used to display
e) ACE information such as the title, and page number of
Answer: A the document.
The UNIVAC I was the first general-purpose
electronic digital computer design for business 18. The first supercomputer was installed at Los
applications produced in the United States. Alamos National Laboratory of USA and was
introduced in 1976. What was its name?
16. The on-demand availability of computer a) Altair
system resources, in particular data storage and b) Cray-1
processing power, without direct active c) Z1
supervision by the user is known as d) Tital-1
_____________. e) None of these
a) Point of Time Answer: B
b) Access Time Cray Research created, produced, and sold the
c) Local Reference supercomputer known as the Cray-1. The first
d) Cloud Computing Cray-1 system, announced in 1975, was set up
e) Computating at Los Alamos National Laboratory in 1976. The
Answer: D vector processor concept was first successfully
The on-demand availability of computer system implemented in the Cray-1 supercomputer.
resources, in particular data storage and
processing power, without direct active 19. What is the default width of the Excel
supervision by the user is known as cloud column?
computing. a) 5.5
b) 4.98
17. Which of the following options is used to c) 6.49
display information such as the title, and page d) 7.83
number of the document? e) 8.43
a) Header and Footer Answer: E
b) Thesaurus On an Excel spreadsheet, you can set a column
c) Spelling and Grammar width of 0 to 255, with one unit equal to the width

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -35 (Eng)

of one character that can be displayed in a cell Functions like printing a document, downloading
formatted with the standard font. On a new images, etc., can be performed only one at a
worksheet, the default width of all columns is time. Examples include MS-DOS, Palm OS, etc.
8.43 characters, which corresponds to 64 pixels.
22. From the child table foreign key is going to
20. The physical layer translates logical pointing the primary key of the foreign table so it
communication requests from the ______ into is called as____
hardware-specific operations. a) Primary key
a) data link layer b) Candidate key
b) network layer c) Referential integrity key
c) transport layer d) Alternate key
d) application layer e) None of these
e) None of the above Answer: C
Answer: A From child table foreign key is going to pointing
Physical layer accepts data or information from the primary key of foreign table so it is called as
the data link layer and converts it into hardware- Referential integrity key.
specific operations so as to transfer the
message through physical cables. Some 23. The process of confirming that someone or
examples of the cables used are optical fiber something is who or what it claims to be is
cables, twisted pair cables and co-axial cables. known as _________________.
a) Integration
21. An operating system that allows a single b) Topology
user to perform only one task at a time is called c) Authentication
a _______________________. d) Security
a) Single-user operating system e) Protocol
b) Multiuser operating system Answer: C
c) Single-tasking operating system The process of confirming that someone or
d) Multitasking operating system something is who or what it claims to be is
e) Real-time operating system known as authentication.
Answer: A
An operating system that allows a single user to 24. The program, which is used to gain
perform only one task at a time is called a administrative rights to someone’s computer is
Single-User Single-Tasking Operating System. known as ______.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -35 (Eng)

a) Boot a) Enqueue, Dequeue


b) Rootkit b) Dequeue, Enqueue
c) Virus c) Peek, Isempty
d) Executive d) Isempty, Peek
e) None of these e) None of these
Answer: B Answer: A
The program, which is used to gain In queue is open at both its ends. One end is
administrative rights to someone’s computer is always used to insert data (enqueue) and the
known as Rootkit. other is used to remove data (dequeue). Queue
follows First-In-First-Out methodology.
25. In queue One end is always used to insert
data is called as ________ and the other is used
to remove data is called as _______

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -36 (Eng)

Computer Awareness

1. Numerous chips installed on the main circuit b) Encryption


board are used by personal computers. What is c) Express
the slang term for these boards? d) Enduser
a) Keyboard e) Effects
b) Motherboard Answer: B
c) CPU DES: Data Encryption Standard
d) Mouse
e) Scanner 4. Programming language "Java" was created by
Answer: B ______________.
One of a computer system's most crucial a) Jack Simplot
components is the motherboard. The central b) John Nauchly
processing unit (CPU), memory, and connectors c) James Gosling
for input and output devices are only a few of the d)JoryHamington
essential parts it holds together. e) None of the above
Answer: C
2. Through ______ an administrator or another James Gosling created Java at Sun
user can access someone else’s computer Microsystems, where it was first released as a
remotely key element of the Java platform in May 1995.
a) Administrator
b) Web server 5. ____________ are CPUs that are created
c) Web application utilising integrated circuits.
d) HTTP a) Microprocessors
e) Telnet b) Arithmetic Logic Unit
Answer: E c) Control Unit
Telnet is a user command and an underlying d) Motherboard
TCP/IP protocol for accessing remote e) Memory Unit
computers. Through Telnet, an administrator or Answer: A
another user can access someone else's Microprocessors are CPUs that are created
computer remotely. utilizing integrated circuits.

3. What does E represent in DES?


a) Embedded

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -36 (Eng)

6. When you first turn on a computer, the CPU is In computing, bandwidth is the maximum rate of
preset to execute instructions stored in the data transfer across a given path.
___________.
a) RAM 9. What is the short name of modulator and
b) ROM demodulator?
c) Cache a) MODEM
d) ALU b) MAN
e) Flash memory c) LAN
Answer: B d) Bridge
The CPU starts and fetches instructions into e) Hub
RAM from the BIOS, which is stored in the ROM. Answer: A
The modem is a device that converts digital
7. __________ are viruses that trick users into signals produced by computers into analogue
downloading and running them by seeming to be signals so they can travel through phone lines.
helpful programs. The "modulator-demodulator" or modem can
a) host program connect to an ISP or function as a dial-up for
b) target program LAN.
c) backdoor program
d) Bluetooth 10. There is a set of allowable values known as
e) trojan horse the ___ of that attribute for each attribute of a
Answer: E relation.
Trojan horses are viruses that trick users into a) Schema
downloading and running them by seeming to be b) Relation
helpful programs. c) Domain
d) Set
8. In computing, ___________ is the maximum e) Integrity
rate of data transfer across a given path Answer: C
a) Malware The domain should contain the attribute's values.
b) Archie A domain is a range of acceptable values.
c) Backup
d) Bandwidth 11. The computer monitor is connected to the
e) Baseband CPU through ______________.
Answer: D a) Bus

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -36 (Eng)

b) Cable Answer: B
c) Wire An application program known as a browser
d) Line driver offers a way to see and engage with all of the
e) Adapter content on the World Wide Web.
Answer: B
The computer monitor is connected to the CPU 14. A physical component known as a
through a Cable. ___________ transfers data between
transmission media so that information can be
12. Which of the following statements is not true sent from one computer to another.
for first-generation computers? a) Internet
a) They are about the size of the room. b) Modem
b) They consume more power and generate c) CPU
more heat. d) Pen drive
c) They are made up of semiconductor e) Compact Disk
transistors. Answer: B
d) They often fail to operate. A physical component known as a modem
e) None is true transfers data between transmission media so
Answer: C that information can be sent from one computer
The first-generation computers are large, about to another.
the size of a room. They consume more power
and also generate enormous heat. Because they 15. The actions and procedures required to
use vacuum tubes as switching devices. process data, such as answering questions or
However, transistors are semiconductor devices selecting an icon, are referred to as
used in the second generation of computers. ________________.
a) Steps
13. An application program known as a b) Instructions
___________ offers a way to see and engage c) Information
with all of the content on the World Wide Web. d) Processor
a) Web e) Sets
b) Browser Answer: B
c) Hyperlink The actions and procedures required to process
d) Hypertext data, such as answering questions or selecting
e) Telnet an icon, are referred to as Instructions.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -36 (Eng)

16. The topmost row of keys on the standard The Indian Space Research Organization
keyboard contains ____________ keys and the (ISRO) constructed the supercomputer known as
longest key on the keyboard is _______________. SAGA-220 (Supercomputer for Aerospace with
a) alphabetic, space bar GPU Architecture-220 Teraflops).
b) number, enter key Dr. K. Radhakrishnan, the ISRO Chairman,
c) function, enter key unveiled it on May 2, 2011. It is no longer the
d) function, space bar fastest supercomputer in India as of January 8,
e) capslock, enter key 2018, having been eclipsed by the Pratyush
Answer: D supercomputer, which has a theoretical
The topmost row of keys on the standard maximum speed of 220 TFlops.
keyboard contains function keys and the longest
key on the keyboard is the spacebar. 19. In Excel, ......... allows users to bring together
copies of workbooks that other users gave
17. Changing the appearance of a document is worked on independently.
called ___ a) Copying
a) Aligning b) Editing
b) Formatting c) Merging
c) Documenting d) Formatting
d) Copying e) Creating
e) Editing Answer: C
Answer: B In Excel, merging allows users to bring together
The process of changing the appearance of the copies of workbooks that other users gave
text is called Formatting. worked on independently.

18. Which of the following organization 20. Which of the following tasks is not done by
developed a SAGA-220 supercomputer in 2011? the data link layer?
a) DRDO a) framing
b) NASA b) error control
c) BARC c) flow control
d) ISRO d) channel coding
e) C-DAC e) All the above
Answer: D Answer: D

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -36 (Eng)

Channel coding is the function of the physical ->It is used for any changes made during
layer. The data link layer mainly deals with transaction and it does not made to the
framing, error control and flow control. The data database.
link layer is the layer where the packets are
encapsulated into frames. 23. ______ is used to find physical address for a
given IP address and ___ is used to find an IP
21. An operating system's ________ feature address for a given physical address
enables a user to handle multiple computer a) RARP, ARP
tasks simultaneously, such as running b) ARP, RARP
application software. c) ICMP, IGMP
a) Multiprocessing d) IGMP, ICMP
b) Multithreading e) None of these
c) Multitasking Answer: B
d) Multicomputing Address Resolution Protocol (ARP) is used to
e) Multisetting find physical address for a given IP address and
Answer: C Reverse Address Resolution Protocol (RARP) is
An operating system's multitasking feature used to find IP address for a given physical
enables a user to handle multiple computer address.
tasks simultaneously, such as running
application software. 24. The process is to check and ensure the
components of the computer are operating and
22. In SQL Which one is used for any changes connected properly is known as ______
made during the transaction and it does not a) Repairing
make to the database? b) Checking
a) Save point c) Paring
b) Commit d) Booting
c) Truncate e) None of these
d) Abort Answer: D
e) None of These Booting is the process to check and ensure the
Answer: D components of the computer are operating and
Abort connected properly

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -36 (Eng)

25. The subsystem of the kernel and hardware e) None of these


that cooperates to translate virtual to physical Answer: B
address comprises _____ The subsystem of the kernel and hardware that
a) Process management subsystem cooperates to translate virtual to physical
b) Memory management subsystem address comprises the Memory management
c) Input / Output management subsystem subsystem
d) All the above

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -37 (Eng)

Computer Awareness

1. A device driver is designed to enable a) Distributed File System


interaction with hardware devices. It controls a b) Data File System
device that is attached to your computer. Which c) Division First System
among the following are the examples of the d) Distributed Find System
device driver? e) Data Finder System
a) Printers Answer: A
b) Disk Drives DFS: Distributed File System
c) Displays
d) CDROM readers 4. _____________refers to computer instructions
e) All the above that are written using the English language
Answer: E rather than binary machine code.
A device driver is designed to enable interaction a) Binary Code
with hardware devices. It controls a device that b) Symbolic Code
is attached to your computer. Printers, Displays, c) System Code
CDROM readers, and Disk drives are examples d) Machine Code
of device drivers. e) Operation Code
Answer: B
2. Different components in the motherboard of a Symbolic code refers to computer instructions
PC unit are linked together by sets of parallel that are written using the English language
electrical conducting lines. What are these lines rather than binary machine code.
called?
a) Conductors 5. _____________ is the fractional representation
b) Buses of the total number of successful memory
c) Connectors accesses.
d) Modems a) Access rate
e) Consecutives b) Hit rate
Answer: B c) Miss rate
A bus is a subsystem that is used to connect d) Success rate
computer components and transfer data e) None of the above
between them. Answer: B
The hit rate is the fractional representation of the
3. What is the full form of DFS in the computer? total number of successful memory accesses.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -37 (Eng)

6. What are the features of Register memory in a a) Malware


Computer? b) Archie
a) Register memory is the smallest and fastest c) Backup
memory in a computer d) Batch file
b) It is located in the CPU in the form of registers e) Baseband
c) A register temporarily holds frequently used Answer: E
data In terms of bandwidth, baseband is the highest
d) Instructions and a memory address that can frequency (measured in hertz) used by the
be quickly accessed by the CPU bandwidth or the upper bound of the bandwidth.
e) All the above
Answer: E 9. The device allows you to access data from
Register memory is the smallest and fastest other servers by connecting your computer to a
memory in a computer. It is located in the CPU phone line. It's called a __________________.
in the form of registers. A register temporarily a) MODEM
holds frequently used data, instructions, and b) MAN
memory addresses that can be quickly accessed c) LAN
by the CPU. d) Bridge
e) Hub
7. A_____________ is a little application that is Answer: A
integrated into a GIF picture. A hardware component known as a modem
a) Web bug enables a computer to transmit and receive data
b) cookie via a phone line, cable, or satellite connection.
c) spyware application Modulator-demodulator is referred to as
d) spam MODEM.
e) trojan
Answer: A 10. By combining two pairs of tuples one from
A web bug is a little application that is integrated each relation into a single tuple, the ___
into a GIF picture. operation enables the combining of two
relations.
8. In terms of bandwidth, _________ is the a) Join
highest frequency (measured in hertz) used by b) Union
the bandwidth or the upper bound of the c) Relation
bandwidth. d) Field

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -37 (Eng)

e) Query d) Process, Input, Output, Storage


Answer: A e) Input, Process, Storage, Output
Join finds the common tuple in the relations and Answer: C
combines it. Input, Process, Output, and Storage is the
correct order of the four major
11. The number of pixels displayed on the functions of a computer.
computer screen is called __________.
a) color depth 14. Internet address is a ______________
b) resolution number.
c) refresh rate a) 8 bit
d) viewing size b) 12 bit
e) portrait c) 16 bit
Answer: B d) 32 bit
The number of pixels displayed per unit of length e) 48 bit
in an image is called the image resolution, Answer: D
usually measured in pixels per inch (PPI). IPv4 chose 32-bit because it was the biggest
register found in any common processor at the
12. Napier’s Bones performs _____________. time.
a) Addition and subtraction
b) Only addition 15. Which of the following are the characteristics
c) Only subtraction of Pascaline invented by Blaise Pascal?
d) Age calculation a) First mechanical adding machine
e) Multiplication and division b) This machine worked on the principle of
Answer: E odometer and watch
The Napier bones, a calculator used for c) Mainly designed about the pressure of the
calculations, speeds up the process of liquid
multiplying numbers. d) Both (a) and (b)
e) All (a), (b) and (c)
13. Which of the following is the correct order of Answer: E
the four major functions of a computer? The characteristics of Pascaline are:
a) Input, Output, Storage, Process a) First mechanical adding machine
b) Storage, Process, Input, Output b) This machine worked on the principle of
c) Input, Process, Output, Storage odometer and watch

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -37 (Eng)

c) Mainly designed about the pressure of the c) Minicomputers


liquid d) Mainframe computers
e) Hybrid computers
16. Most email systems provide a feature called Answer: B
________ that allows users to distribute emails to Supercomputers are being increasingly used for
one or more recipients in addition to the intended accurate weather and climate-change
recipients. forecasting. Numerical modeling data for
a) Spam weather forecasting models are stored in NWS
b) Junk supercomputers. Almost all of the observational
c) Carbon Copy data that the NWS gathers is used by these
d) Trash computers. Satellites, weather balloons, buoys,
e) Blind Carbon Copy radar, and other sources provide this
Answer: E information.
Most email systems provide a feature called
blind carbon copy (BCC) that allows users to 19. What is the default row height of MS Excel?
distribute emails to one or more recipients in a) 8
addition to the intended recipients. b) 10
c) 11
17. To make the selected text bold, the shortcut d) 13
key is ____. e) 15
a) Ctrl + B Answer: E
b) Ctrl + V Rows can have a maximum height of 409. This
c) Shift + X number represents how many one-seventy
d) Shift + B seconds of an inch the row can hold. The default
e) Alt + B size of an Excel row is 15, which correlates to 20
Answer: A pixels or about one-fifth of an inch.
Ctrl + B is used to make the selected text bold in
MS Word. 20. The technique of temporarily delaying
outgoing acknowledgements so that they can be
18. Which of the following computer are used in hooked onto the next outgoing data frame is
Weather Forecasting? called ____________
a) Microcomputers a) piggybacking
b) Supercomputers b) cyclic redundancy check

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -37 (Eng)

c) fletcher’s checksum e) None of These


d) parity check Answer: A
e) Other than those given options Physical addresses
Answer: A ->The loader generates these addresses at the
Piggybacking is a technique in which the time when a program is loaded into
acknowledgement is temporarily delayed so as main memory.
to be hooked with the next outgoing data frame.
It saves a lot of channel bandwidth as in a non- 23. In the Windows operating system after you
piggybacking system, some bandwidth is double-click a character on the grid of
reserved for acknowledgement. characters, keyboard shortcut SPACEBAR is
used for _____
21. Which of the following terms explains the a) Move to the first character
execution of more than one file at the same on a b) Move to the last character
single processor? c) Switch between Enlarged and Normal mode
a) Multiprocessing when a character is selected
b) Multithreading d) Delete the character
c) Multitasking e) None of these
d) Multicomputing Answer: C
e) Multisetting In Windows operating system after you double-
Answer: A click a character on the grid of
As a broad word, "multiprocessing" can refer to characters,keyboard shortcut SPACEBAR is
either the dynamic assignment of a program to used for Switch between Enlarged and Normal
one of two or more computers working together modes when a character is selected
or too many computers working on the same
program concurrently (in parallel). 24. A program designed to destroy data on your
computer which can transfer to other computers
22. The loader generates these addresses at the and infect data is called a ______
time when a program is loaded into main a) virus
memory is known as _____ b) nfector
a) Physical address c) file
b) Logical address d) App
c) Relative address e) None of these
d) Symbolic address Answer: A

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -37 (Eng)

A computer virus is a type of malicious software b) Individual


that, when executed, replicates itself by c) Directory
modifying other computer programs and d) Sub Directory
inserting its own code. e) All of these
Answer: A
25. _____ search engine sends a request for Meta search engine sends requests for
information to several search engines information to several search engines
simultaneously and Compiles the result. simultaneously and Compiles the result
a) Meta

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -38 (Eng)

Computer Awareness

1. ____________ is a program that transforms c) Direct


basic computer instructions into a pattern of bits d) Dynamic
that the computer's processor may utilize to e) Distributed
carry out its fundamental functions. Answer: D
a) Assembler DHTML: Dynamic Hyper Text Markup Language
b) Compiler
c) Interpreter 4. In general, programming statements written
d) Language Translator by a programmer using a text editor or visual
e) Device Drivers programming tool and then saved in a file are
Answer: A referred to as _____________.
An assembler is a program that takes basic a) Binary Code
computer instructions and converts them into a b) Symbolic Code
pattern of bits that the computer's processor can c) Source Code
use to perform its basic operations. d) Machine Code
e) Operation Code
2. Which among the following involves rerouting Answer: C
the traffic of a particular website to a bogus one? In general, programming statements written by a
A. Spoofing programmer using a text editor or visual
B. Hacking programming tool and then saved in a file are
C. Cybersquatting referred to as source code.
D. Cyberacture
E. Pharming 5. Function of the arithmetic section is to perform
Answer: E _______________.
Pharming is a scamming practice in which a) Addition
malicious code is installed on a personal b) Subtraction
computer or server, misdirecting users to c) Multiplication
fraudulent Web sites without their knowledge or d) Division
consent. Pharming has been called "phishing e) All the above
without a lure." Answer: E
3. What does D represent in DHTML? The function of the arithmetic section is to
a) Database perform arithmetic operations like addition,
b) Data subtraction, multiplication, and division. All

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -38 (Eng)

complex operations are done by making b) Blog


repetitive use of the above operations. c) Batch File
d) Archie
6. Which of the following memory can store the e) Binary
information permanently? Answer: B
a) RAM A blog is a personal journal that can be
b) ROM accessed publicly and allow people to comment
c) Cache on previously posted comments.
d) ALU
e) Flash memory 9. What do we term a setup where two or more
Answer: B computers are physically connected by cables to
Information can be permanently stored in ROM share hardware or information?
(Read Only Memory). Memory can be accessed a) URL
randomly thanks to RAM. Data entry and exit b) Internet
from the memory are carried out by storage c) Server
cells. d) Modem
e) Network
7. In computing, unencrypted data is also known Answer: E
as ___________ and encrypted data is called The goal of a computer network is to transfer,
________________. exchange, or share data and resources between
a) secret key, public key two or more computers that are linked together
b) public key, secret key via WiFi or wires (wired).
c) plain text, the cipher text
d) cipher text, plain text 10. _________________ are unique objects that
e) None of these are meaningless to you in the context in which
Answer: C they are used.
In computing, unencrypted data is also known as a) Relation
plaintext and encrypted data is called ciphertext. b) Data
c) Field
8. A _______ is a personal journal that can be d) Query
accessed publicly and allow people to comment e) Domain
on previously posted comments. Answer: B
a) Vlog

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -38 (Eng)

Data are unique objects that are meaningless to Answer: C


you in the context in which they are used. Data Vacuum tubes served as the foundational parts
will have meaning once they are transformed of the memory and CPU circuits in the first
into information. To process the data, a variety of generation of computers. This generation
data analysis and data mining tools are primarily used operating systems for batch
available. processing.

11. The output quality of a printer is measured in 13. Internet address is a ______________
_______________. number.
a) dots per sq a) 8 bit
b) dots per inch b) 12 bit
c) dots printer per inch c) 16 bit
d) All of these d) 32 bit
e) None of these e) 48 bit
Answer: B Answer: D
PPI (pixels per inch) is the input resolution of an IPv4 chose 32-bit because it was the biggest
image or photograph, and DPI (dots per inch) is register found in any common processor at the
the output resolution of a printer or imagesetter. time.
When an image is reproduced as a true physical
object, such as when printed onto paper, the 14. ______________ is a global, linked network of
term "DPI" refers to the physical dot density of computers that communicate with one another
the image. using a standard protocol.
a) Central Processing Unit
12. Vacuum tubes served as the foundational b) Internet
parts of the memory and CPU circuits in the first c) Processor
generation of computers. This generation d) Operating System
primarily used operating systems for e) Read Access Memory
___________. Answer: B
a) Multi-tasking The Internet is a global, linked network of
b) Networking computers that communicate with one another
c) Batch processing using a standard protocol.
d) Multi-tabulation
e) None of these

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -38 (Eng)

15. ________________ is a large-scale electronic d) Ctrl + N


calculating computer that stores commands and e) Shift + I
numbers using ultrasonic delay units. Answer: B
a) UNIVAC Ctrl+I is the shortcut key to make the selected
b) ENIAC text italic.
c) EDSAC
d) EDVAC 18. Who among the following invented the first
e) ACE electro-mechanical computer MARK1?
Answer: C a) John W Mauchly
The EDSAC is a large-scale electronic b) Howard Hathaway Aiken
calculating computer that stores commands and c) Clifford Berry
numbers using ultrasonic delay units. d) Charles Babbage
e) Pascal
16. The term ___________ refers to temporary Answer: B
storage for data that have been set aside by the Mark-1 was invented by Prof. Howard Aiken.
user for deletion but have not yet been The inventor of the Harvard Mark I, Howard
completely deleted in computing. Hathaway Aiken was born in 1901 in New
a) Spam Jersey, USA.
b) Junk
c) Carbon Copy 19. To quickly insert a new worksheet at the end
d) Trash of the existing worksheets, click the
e) Blind Carbon Copy _____________ at the bottom of the screen.
Answer: D a) Insert document tab
The term "trash" refers to temporary storage for b) Edit the worksheet tab
data that have been set aside by the user for c) Insert the Worksheet tab
deletion but have not yet been completely d) Open the Worksheet tab
deleted in computing. e) None of these
Answer: C
17. To make the selected text italic, the shortcut To quickly insert a new worksheet at the end of
key is____. the existing worksheets, click the Insert
a) Ctrl + B Worksheet tab at the bottom of the screen.
b) Ctrl + I
c) Ctrl + V

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -38 (Eng)

20. The network layer is concerned with 22.The database should be durable enough to
__________ of data. hold all its latest updates even if the system fails
a) bits or restarts is known as ______
b) frames A. Atomicity
c) packets B. Consistency
d) bytes C. Isolation
e) All the above D. Durability
Answer: C E. None of These
In computer networks, the data from the Answer: D
application layer is sent to the transport layer Durability
and is converted to segments. These segments ->The database should be durable enough to
are then transferred to the network layer and hold all its latest updates even if the system fails
these are called packets. These packets are or restarts.
then sent to data link layer where they are
encapsulated into frames. These frames are 23. Which of the following is responsible for
then transferred to physical layer where the deciding when the system can be released to
frames are converted to bits. customers,managing the process of creating the
release and distribution media and documenting
21. The _________ operating system enables the the release?
user to conduct multiple tasks simultaneously, A. System procurement
giving each one an equal amount of time to B. System quality assessment
complete. C. System release management
a) Multitasking D. System reliability
b) Multi setting E. None of these
c) Time sharing Answer: C
d) Time tracing System release management is responsible for
e) Time Setting deciding when the system can be released to
Answer: C customers, managing the process of creating the
The time-sharing operating system enables the release and distribution media and documenting
user to conduct multiple tasks simultaneously, the release
giving each one an equal amount of time to
complete.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -38 (Eng)

24. If in a computer, 16 bits are used to specify 25. Whenever there is a lack of communication
the address in a RAM, the number of addresses between the customer and the software
will be __________ bits company they move on to the concept called
A.216 ________________.
B.64K A. Waterfall model
C.65536 B. Spiral model
D.1028 C. Prototype model
E. None of these D.V &V model
Answer: C E. None of these
If in a computer, 16 bits are used to specify the Answer: C
address in a RAM, the number of addresses will Whenever there is a lack of communication
be 65536 bits between the customer and the software
company they move on to the concept called the
Prototype model.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -39 (Eng)

Computer Awareness

1. __________________ are specialised software From Windows 8, the program was renamed to
tools that convert the source code of one Defragment and Optimize Drives.
programming language into machine code,
bytecode, or another programming language. 3. What does V represent in DVI?
a) Assembler a) Video
b) Compiler b) Versatile
c) Interpreter c) Visual
d) Language Translator d) Version
e) Device Drivers e) Value
Answer: B Answer: C
Compilers are specialized software tools that DVI: Digital Visual Interface
convert the source code of one programming
language into machine code, bytecode, or 4. C, C++, JAVA, BASIC, and COBOL are
another programming language. Usually, a high- examples of ____ languages.
level, understandable language like Java or C++ a) Binary Language
is used to create the source code. b) Assembly Language
c) Machine Language
2. _______ is a Windows utility program that d) High-level Language
locates and eliminates unnecessary fragments e) Low-Level Language
and rearranges files and unused disk space to Answer: D
optimize operations. C, BASIC, COBOL, and Java are examples of
A. Backup high-level languages.
B. Disk cleanup
C. Disk defragmenter 5. Function of logic section is to perform logic
D. Restore operations such as ________.
E. Disk restorer a) Comparing of Data
Answer: C b) Selecting of Data
Disk Defragmenter is a utility in Microsoft c) Matching of Data
Windows designed to increase access speed by d) Merging of Data
rearranging files stored on a disk to occupy e) All the above
contiguous storage locations, a technique called Answer: E
defragmentation.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -39 (Eng)

The function of the logic section is to perform 8. ______________ is an optical disc format that
logic operations such as comparing, selecting, was developed to enable recording, playback,
matching, and merging data. and rewriting of high-definition (HD) video.
a) Blue-ray Disc
6. _____________ is a small-sized type of volatile b) Optical Fibre
computer memory that provides high-speed data c) Batch File
access to a processor and stores frequently d) Binary
used computer programs, applications, and data. e) Blogger
a) RAM Answer: A
b) ROM Blue Ray Disc is an optical disc format that was
c) Cache developed to enable the recording, playback and
d) ALU rewriting of high-definition (HD) video.
e) Flash memory
Answer: C 9. Which is the first network system that started
Cache memory is a small-sized type of volatile the Internet?
computer memory that provides high-speed data a) INTRANET
access to a processor and stores frequently b) ARPANET
used computer programs, applications, and data. c) INTERNET
d) HYPERNET
7. A malicious assault known as __________ e) HYDRANET
conceals the IP packets' true source to make it Answer: B
difficult to determine where they originated. The Advanced Research Projects Agency
a) spoofing Network, or ARPANET, was developed in the
b) forging late 1960s and served as the first functional
c) IP spoofing prototype of the Internet. ARPANET, which was
d) All of these first supported by the US Department of
e) None of these Defense, used packet switching to enable multi-
Answer: C computer communication across a single
A malicious assault known as Internet Protocol network.
(IP) spoofing conceals the IP packets' true
source to make it difficult to determine where 10. When projecting a set of tuples from a
they originated. relation, the relational algebra procedure that is
most frequently employed is _________________.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -39 (Eng)

a) Select memory and circuit boards with individual


b) Relation transistors.
c) Union
d) Join 13. What does S represent in HTTPS?
e) Projection a) System
Answer: A b) Security
Using a specified selection condition, the c) Secure
SELECT operation is used to choose a subset of d) Speciality
the tuples. e) Software
Answer: C
11. Which port is widely used on wireless HTTPS- Hypertext Transfer Protocol Secure
devices to connect with network devices for easy
communication? 14. What type of Data can be kept in the
a) Serial port database?
b) Parallel port a) Image-oriented data
c) Infrared port b) Text, files containing data
d) AGP port c) Data in the form of audio or video
e) Firewall port d) All of the above
Answer: C e) None of the above
An infrared port is widely used on wireless Answer: D
devices to connect with network devices for easy The database management system was
communication. developed to store enormous amounts of data,
which can take any form, including images, text,
12. What kind of memory was utilized to store audio files, and video files.
data in second-generation computers?
a) Magnetic Drum 15. Which part of a computer allows a user to
b) Magnetic Core put information into the computer?
c) Magnetic Tape a) Hardware
d) Magnetic Disk b) Output Device
e) All the above c) Input Device
Answer: B d) Operating System
Throughout the late 1950s and 1960s, second- e) Software
generation computers used magnetic core Answer: C

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -39 (Eng)

An input device is a piece of hardware used in 18. Which was the first fully electronic computer
computing to send data and control signals to a in the world?
system that processes information, like a a) EDSAC
computer or information appliance. b) UNIVAC
c) ENIAC
16. _____________ is the practice of sending d) Z1
unsolicited bulk communications via electronic e) MARK1
messaging platforms like e-mails, other digital Answer: C
delivery systems, and broadcast media. The first programmable general-purpose
a) Spamming electronic digital computer was created by the
b) Spooling US during World War II and is known as ENIAC,
c) Phishing or Electronic Numerical Integrator and
d) Cracking Computer.
e) Creeping
Answer: A 19. Press ____ to select all rows and columns in
Spamming is the practice of sending unsolicited the worksheet.
bulk communications via electronic messaging a) Ctrl + X
platforms like e-mails, other digital delivery b) Ctrl + A
systems, and broadcast media. c) Ctrl + P
d) Ctrl + V
17. To make the selected text underline, the e) Ctrl + E
shortcut key is____. Answer: B
a) Ctrl + B The full worksheet is selected using Control + A.
b) Ctrl + I Control + A, on the other hand, will select all of
c) Ctrl + U the cells in a group of adjacent cells where the
d) Ctrl + S cursor is now located.
e) Ctrl + V
Answer: C 20. Which one of the following is not a function
The quickest way to underline text is to press of the network layer?
Ctrl+U and start typing. When you want to stop a) routing
underlining, press Ctrl+U again. b) inter-networking
c) congestion control
d) error control

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -39 (Eng)

e) All the above are the functions NAND gates, NOR gates are called as "universal
Answer: D gates" that can be combined to form any other
In the OSI model, the network layer is the third kind of logic gate.
layer and it provides data routing paths for
network communications. Error control is a 23. Which is a special type of stored procedure
function of the data link layer and the transport that is automatically invoked whenever the data
layer. in the table is modified?
A. Tripped
21. _________________ is an ability of an B. Trigger
operating system that executes more than one C. Procedure
program using a single processor machine. D. Cursor
a) Multiprocessing E. None of these
b) Multithreading Answer: B
c) Multitasking The special type of stored procedure that is
d) Multicomputing automatically invoked whenever the data in the
e) Multiprogramming table is modified is known as Trigger.
Answer: E
Multiprogramming OS is an ability of an 24. SRAM retains data as long as power is
operating system that executes more than one provided to the memory chip and need not be
program using a single processor machine. More refreshed periodically. What does ‘S’ represent?
than one task or program or job is present inside A. Stagnant
the main memory at one point in time. B. Storage
C. Simple
22. AND gates, NOR gates are called ______ D. Static
that can be combined to form any other kind of E. None of these
logic gate Answer: D
A. Inverse gate SRAM retains data as long as power is provided
B. Combination gate to the memory chip and need not be refreshed
C. Both B and D periodically. SRAM stands for Static Random
D. Universal gate Access Memory.
E. None of these
Answer: D 25. A specialised network device that determines
the next network point to which it can forward a

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -39 (Eng)

data packet towards the destination of the E. repeater


packet is commonly known as __________ Answer: B
A. bridge A specialised network device that determines the

B. router next network point to which it can forward a data

C. switch packet towards the destination of the packet is

D. hub commonly known as Router.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -40 (Eng)

Computer Awareness

1. _______________ is a computer programme b) Fast Transmission Processor


that runs scripts or programmes written in c) Fast Text Processing
programming languages without first compiling d) File Transfer Protocol
them into programmes written in machine e) File Transfer Projector
language. Answer: D
a) Assembler FTP- File Transfer Protocol
b) Compiler
c) Interpreter 4. Fortran was originally developed by _________
d) Language Translator in the 1950s for scientific and engineering
e) Device Drivers applications, and subsequently came to
Answer: C dominate scientific computing.
An interpreter is a computer program that runs a) Intel Laboratories
scripts or programs written in programming b) IBM
languages without first compiling them into c) Texas Instrument
programs written in machine language. d) Bell Laboratories
e) Dell
2. What is the term given to software that has so Answer: B
many features that it requires considerable disk Fortran was originally developed by IBM in the
space and memory resources to run? 1950s for scientific and engineering applications
a) Spyware and subsequently came to dominate scientific
b) Freeware computing.
c) Bloatware
d) Adware 5. ________ Unit is a link between the computer
e) Delaware and the users.
Answer: C a) Input
The software comes to be known as Bloatware b) Output
when it becomes so unwieldy that its c) Storage
functionality is drowned out by its useless d) Memory
features. This is also known as software bloat. e) Simple
Answer: B
3. FTP stands for ____________. The gadgets that we use to extract information
a) File Transmission Program from the computer make up the output unit. This

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -40 (Eng)

device serves as a conduit between users and d) Rootkit


the computer. The computer's output is e) Trojan Horse
translated into a language that consumers can Answer: A
understand using output devices. A spoofing attack occurs when a person or
computer effectively assumes the identity of
6. Which among the following are the features of another by fabricating data to obtain an unfair
Cache Memory? advantage.
a) It is small in size but faster than the main
memory 8. ________________ refers to a diskette that is
b) It holds the data and programs frequently formatted to actually boot your computer from.
used by the CPU a) Boot Disk
c) It speeds up the system performance b) Boolean
d) If the CPU finds the required data or c) Blue Ray
instructions in cache memory it doesn't need to d) Bridge
access the primary memory (RAM) e) Buffer
e) All the above Answer: A
Answer: E Boot Disk refers to a diskette that is formatted to
Cache Memory is small in size but faster than boot your computer from.
the main memory. The CPU can access it more
quickly than the primary memory. It holds the 9. ____________________ are paths that provide
data and programs frequently used by the CPU. communication between the various electronic
So if the CPU finds the required data or components on the system board.
instructions in cache memory it doesn't need to a) Gateway
access the primary memory (RAM). Thus, it b) Processors
speeds up the system performance. c) Logic Paths
d) Bus Lines
7. A _________ occurs when a person or e) Network Lines
computer effectively assumes the identity of Answer: D
another by fabricating data to obtain an unfair Bus Lines are paths that provide communication
advantage. between the various electronic components on
a) Spoofing attack the system board.
b) Vulnerability scanner
c) Packet sniffer

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -40 (Eng)

10. The ________ offers a collection of Answer: E


operations that accept one or more relations as The features of first-generation computers −
input and output another relation.  It supported machine language.
a) Schematic representation  It had a slow performance
b) Relational algebra  It occupied a large size due to the use of
c) Scheme diagram vacuum tubes.
d) Relation flow  It had a poor storage capacity.
e) None of these  It consumed a lot of electricity and generated
Answer: B a lot of heat
Relational algebra is also procedural. It takes
instances of relations as input and gives 13. A_________ is a physical or virtual appliance
instances of relations as output. that passes information between two or more
packet-switched computer networks.
11. The most frequently used piece of hardware a) Modem
for inputting data is _______. b) Transistor
a) Keyboard c) Router
b) Mouse d) Scanner
c) Floppy Disk e) OMR
d) Cursor Answer: C
e) Software A router is a physical or virtual appliance that
Answer: A passes information between two or more packet-
The most frequently used piece of hardware for switched computer networks.
inputting data is Keyboard.
14. What is information about data called?
12. Which among the following are the features a) Hyperdata
of First Generation Computers? b) Teradata
a) It supported machine language. c) Metadata
b) It had slow performance d) Relation
c) It occupied a large size due to the use of e) Database
vacuum tubes. Answer: C
d) It consumed a lot of electricity and generated Meta Data provides information about other
a lot of heat data. The basic data information is condensed
e) All the above into metadata, which facilitates identifying and

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -40 (Eng)

interacting with specific instances of data. a) Ctrl + B


Metadata can be generated automatically with b) Ctrl + I
more basic information or manually for greater c) Ctrl + L
accuracy. d) Ctrl + J
e) Ctrl + V
15. An input device is a piece of hardware used Answer: D
in computing to send data and control signals to Ctrl + J is the shortcut key to justify text.
a system that processes information, like a
computer or information appliance. Which of the 18. Number crunchier is the informal name for
following is one example of input devices? _______.
a) Joysticks a) Mainframe Computer
b) Cameras b) Super computer
c) Keyboards c) Hybrid Computer
d) Mouse d) Digital computer
e) All the above e) Analog Computer
Answer: E Answer: B
Keyboards, mice, scanners, cameras, joysticks, A computer whose dominant characteristic is its
and microphones are a few examples of input ability to perform large amounts of numerical
devices. computations quickly. Supercomputers, for
example, are sometimes called number
16. Learning online through internet is also crunchers.
known as ______________.
a) E-teaching 19. The intersecting column and row's letter and
b) Chatting number are ______________.
c) E-learning a) Cell Location
d) Video Conferencing b) Cell Position
e) Video Calling c) Cell Coordinates
Answer: C d) Cell Address
Learning online through the internet is also e) Cell Alignment
known as E-learning. Answer: D
The letter and number of the intersecting column
17. To justify the selected text, the shortcut key and row is the cell address.
is ____.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -40 (Eng)

20. Transport layer aggregates data from 22. Which one of the following is the time
different applications into a single stream before required between the desired mode for a read or
passing it to ____________. write operation till the data is made available or
a) network layer written at the desired location?
b) data link layer a) Response time
c) application layer b) Access time
d) physical layer c) Average time
e) All the above d) Waiting time
Answer: A e) None of these
The flow of data in the OSI model flows in Answer: B
following manner Application -> Presentation -> Access time
Session -> Transport -> Network -> Data Link -> ->It is the time required between the desired
Physical. Each and every layer has its own set of mode for a read or write operation till the data is
functions and protocols to ensure efficient made available or written at the desired location.
network performance.
23. Multi user systems provided cost savings for
21. The first graphical user interface was small business because they use a single
developed at __________. processing unitto link several ______
a) Apple a) Personal Computer
b) Microsoft b) Workstation
c) Xerox Corporation c) Mainframes
d) Dell d) Dumb terminals
e) IBM e) None of these
Answer: C Answer: D
The GUI was first developed at Xerox PARC by Multi user systems provided cost savings for
Alan Kay, Larry Tesler, Dan Ingalls, David Smith, smallbusiness because they use a single
Clarence Ellis, and some other researchers. It processing unitto link several Dumb terminals
used windows, icons, and menus (including the
first fixed drop-down menu) to support 24. The data are modified to specific code and
commands such as opening files, deleting files, protected in the sender side while transferring,
moving files, etc. and the special key is used to retrieve the
original data in the receiver side. What is the

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -40 (Eng)

process used in receiver side to retrieve the It may also be performed with a set of keys or
original data? passwords.
a) Decoding
b) Encoding 25. Signals can be analog or digital and a
c) Encrypting computer that processes the both type of signals
d) Decrypting is known as ________
e) None of these a) Micro Computer
Answer: D b) Mainframe computer
Decryption is the process of transforming data c) Analog computer
that has been rendered unreadable through d) Digital Computer
encryption back to its unencrypted form. In e) Hybrid Computer
decryption, the system extracts and converts the Answer: E
garbled data and transforms it to texts and Signals can be analog or digital and a computer
images that are easily understandable not only that processes the both type of signals is known
by the reader but also by the system. Decryption as Hybrid Computer.
may be accomplished manually or automatically.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -43 (Eng)

Computer Awareness

1. Which of the following is used to measure a) It coordinates the sequence of data


CPU performance? movements into, out of, and between a
a) Access Time processor's many sub-units
b) Video Resolution b) It receives external instructions or commands
c) Clock Speed which it converts to the sequence of control
d) IPC signals
e) DPI c) It controls data flow inside the processor
Answer: C d) It regulates and integrates the operations of
The clock speed measures the number of cycles the computer
your CPU executes per second, measured in e) All the above
GHz (gigahertz). A “cycle” is technically a pulse Answer: E
synchronized by an internal oscillator, but for our The basic functions of the Control Unit are:
purposes, they're a basic unit that helps  It coordinates the sequence of data
understand a CPU's speed. movements into, out of, and between a
processor's many sub-units
2. The act of production involves the  It receives external instructions or
transformation of inputs into output is performed commands which it converts to the
by _____________. sequence of control signals
a) Memory  It controls data flow inside the processor
b) Central Processing Unit  It regulates and integrates the operations
c) Mouse of the computer
d) Keyboard  It interprets instructions
e) Storage
Answer: B 4. ________________ refers to the rate at which
The central processing unit, or CPU, converts the monitor accepts data.
input data into output. The computer's electrical a) User Time
circuit is responsible for carrying out the b) Bandwidth
program's instructions. c) Access Time
d) Interlacing
3. What are the basic functions of the Control e) Response Time
Unit? Answer: B

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -43 (Eng)

Bandwidth refers to the rate at which the monitor e) Low-Level Language


accepts data. Answer: D
A computer programming language that
5.______________ is responsible for coordinating resembles natural language or mathematical
various operations using timing signals. notation and is designed to reflect the
a) Control Unit requirements of a problem is called High-Level
b) Memory Unit Language.
c) Arithmetic and Logic Unit
d) Input Unit 8. Finding and fixing errors or issues that prohibit
e) Output Unit computer software or a system from operating
Answer: A correctly is the process of ________.
The Control Unit is responsible for coordinating a) Error
various operations using timing signals. b) Debugging
6. Which among the following are the examples c) Syntax
of interpreted Languages? d) Refixing
a) Ruby e) Problem-Solving
b) Python Answer: B
c) Java Script Finding and fixing errors or issues that prohibit
d) PHP computer software or a system from operating
e) All the above correctly is the process of debugging.
Answer: E
Examples of common interpreted languages are 9. _______ are used to write programs that relate
PHP, Ruby, Python, and JavaScript. to the specific architecture and hardware of a
particular type of computer.
7. A computer programming language that a) Binary Language
resembles natural language or mathematical b) Assembly Language
notation and is designed to reflect the c) Machine Language
requirements of a problem is called d) High-level Language
____________. e) Low-Level Language
a) Binary Language Answer: E
b) Assembly Language Low-level languages are used to write programs
c) Machine Language that relate to the specific architecture and
d) High-level Language hardware of a particular type of computer.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -43 (Eng)

a) Machine Code
10. Which of the following is the category of b) Instruction Code
Low-Level Language? c) Operation code
a) Machine Level Language d) Assembly Code
b) Assembly Language e) Language Code
c) Binary Language Answer: C
d) Both (a) and (b) In computing, an opcode (abbreviated from
e) Both (a) and (c) operation code, also known as instruction
Answer: D machine code, instruction code, instruction
The low-level language is a programming syllable, instruction parcel, or string) is the
language that provides no abstraction from the portion of a machine language instruction that
hardware, and it is represented in 0 or 1 forms, specifies the operation to be performed.
which are the machine instructions. The
languages that come under this category are 13. A ______ in computer architecture is a
Machine level language and Assembly location that a computer's central processing unit
language. may access fast.
a) RAMs
11. The sequence of events that occurs in the b) Caches
computer when it is interpreting and executing c) Registers
an instruction is known as _______________. d) Memory
a) Execution Cycle e) Graphics
b) Instruction Cycle Answer: C
c) Working Cycle A processor register in computer architecture is
d) Machine Cycle a location that a computer's central processing
e) None of the above unit may access fast.
Answer: B
The "Instruction Cycle" refers to the series of 14. A _____ is a sort of instruction that can
actions taken by a computer to interpret and generate many lines of machine language code.
carry out an instruction. a) Macro
b) Assembly
12. The instruction code used in machine or c) Registers
assembly language which specifies the basic d) Cache
operations of the CPU is ______________. e) Bus

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -43 (Eng)

Answer: A 17. The difference between memory and storage


A macro is a sort of instruction that can generate is that memory is _____ and storage is _______
many lines of machine language code. The a) Temporary, permanent
computer language VBA (Visual Basic for b) Permanent, temporary
Applications) is used to create macros in Excel. c) Slow, Fast
The purpose of employing a macro code is to d) All the above
automatically do an Excel task that would e) Large, Small
otherwise require manual labor. Answer: A
Memory temporarily saves the data and Storage
15. ______________ is a collection of wires that is to save the data permanently.
connects several devices.
a) Registers 18. What does DMA stand for?
b) System Bus a) Distinct Memory Access
c) Cache b) Direct Memory Access
d) Memory c) Direct Module Access
e) Lache d) Direct Memory Allocation
Answer: B e) None of these
A system Bus is a collection of wires that Answer: B
connects several devices. Direct memory access (DMA) is a means of
having a peripheral device control a processor's
16. What type of memory is not directly memory bus directly. DMA permits the
addressable by the CPU and required special peripheral, such as a UART, to transfer data
software to access it? directly to or from memory without having each
a) Main byte (or word) handled by the processor.
b) Conventional
c) Inbuilt 19. Which of the following is a permanent
d) Expanded memory?
e) All of these a) SRAM
Answer: D b) DRAM
The expanded type of memory is not directly c) ROM
addressable by the CPU and required special d) All the above
software to access the memory. e) None
Answer: C

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -43 (Eng)

Read-only Memory (ROM) is permanent e) Both b and c


memory. Answer: B
The next instruction to be fetched from memory
20. Which of the following memories has the is included in the address of the memory location
shortest access times? that the programme counter stores. After an
a) Cache memory instruction has been fetched, the PC is
b) Magnetic bubble memory automatically increased.
c) Magnetic core memory
d) RAM 23. Which of the following is used to overcome
e) None of these the difference in data transfer speeds of various
Answer: A devices?
The memories which can be accessed for the a) Speed enhancing circuit
shortest times are known as cache memory. b) Bridge circuit
c) Buffer register
21. Which of the following is/are special-purpose d) Combinational circuit
registers used by CPU? e) Integrated Circuit
a) Program counter (PC) Answer: C
b) Stack pointer (SP)
c) Instruction register 24. A CPU register that records programme
d) Memory address register execution and holds the instructions currently
e) All of the above being carried out is referred to as
Answer: E ________________.
A central processing unit, often known as a a) Index register
processor, has numerous special-purpose b) Memory address register
registers for various uses. They are the Memory c) Instruction register
address register, Instruction register and PC. d) Stack pointer
22. Which of the following special-purpose e) Buffer register
register keeps track of the address of the Answer: C
instruction which is to be executed next? A CPU register that records programme
a) Stack pointer execution and holds the instructions currently
b) Program counter being carried out is referred to as Instruction
c) ALU Register.
d) Both a and b

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -43 (Eng)

25. ____________ is a special register that stores d) Program counter


the address of the location to or from which data e) Buffer register
will be transferred. Answer: B
a) Memory data register Memory address register is a special register
b) Memory address register that stores the address of the location to or from
c) Index register which data will be transferred.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -42 (Eng)

Computer Awareness

1. _______________ memory is non-volatile, by holding an electrical current in a transistor


persistent computer memory that is not directly with an on / off mode.
accessible by a computer or processor.
a) Primary 3. CD, DVD and Blue-ray discs are
b) Secondary __________________.
c) Cache a) Solid state storage devices
d) Register b) Optical storage devices
e) Virtual c) Magnetic storage devices
Answer: B d) Virtual Storage Devices
Secondary memory is non-volatile, persistent e) None of these
computer memory that is not directly accessible Answer: B
by a computer or processor. Data that can be Optical storage devices(such as CDs, DVDs,
quickly and easily retrieved, transmitted, and and Blu-ray discs): Optical devices use a laser to
used by apps and services can be stored by the scan the surface of a spinning disc made from
user and then used in this manner. Secondary metal and plastic. The disc surface is divided
storage is another name for secondary memory. into tracks, with each track containing many flat
areas and hollows. The flat areas are known as
2. ____________ is faster than traditional hard lands and the hollows as pits.
disk drives because the data is stored electrically
in silicon chips called cells. 4. __________ is a non-removable storage device
a) Solid state storage devices containing magnetic disks or platters rotating at
b) Optical storage devices high speeds.
c) Magnetic storage devices a) Optical Disk
d) Virtual Storage Devices b) Hard Drive
e) None of these c) Magnetic Tape
Answer: A d) Floppy Disk
Solid state storage devices(such as USB e) Flash Memory
memory sticks): Solid state storage is also faster Answer: B
than traditional hard disk drives because the Hard Drive is a non-removable storage device
data is stored electrically in silicon chips called containing magnetic disks or platters rotating at
cells. Within the cells, the binary data is stored high speeds. The hard drives store data in

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -42 (Eng)

segments of concentric circles. It may spin at 7. Installing a ______________ is a good way to


5,400 to 15,000 RPM. safeguard yourself from computer hacker
attacks.
5. __________ is a type of disc storage that a) Firewall
contains a thin, flexible disk of a magnetic b) Trojan
storage media inside of a square or nearly c) Malware
square plastic case that is lined with fabric to d) Spyware
filter out dust from the spinning disk. e) Mailer
a) Optical Disk Answer: A
b) Hard Drive Installing a firewall is a good way to safeguard
c) Magnetic Tape yourself from computer hacker attacks.
d) Floppy Disk
e) Flash Memory 8. _________ are ciphered entries that are used
Answer: D to log into a computer system.
A floppy disk or floppy diskette, often known as a a) Entry codes
floppy or a diskette, is a type of disc storage that b) Passwords
contains a thin, flexible disk of a magnetic c) Codewords
storage media inside of a square or nearly d) Security Commands
square plastic case that is lined with fabric to e) Spycode
filter out dust from the spinning disk. Answer: B
Passwords are ciphered entries that are used to
6. ______________ is a planned application that log into a computer system.
exploits a vulnerability.
a) Security exploit 9. In order to move from one worksheet to
b) Vulnerability scanner another in MS-Excel workbook one should click
c) Packet sniffer ______________________.
d) Rootkit a) Sheet Tab
e) Trojan Horse b) Spreadsheet
Answer: A c) Active Cell
Security exploit is a planned application that d) Scroll Bar
exploits a vulnerability. e) Tab Button
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -42 (Eng)

Excel provides a very easy way to move a sheet A bridge is a computer networking device used
from one place to another in the same workbook. to make a connection and pass along packets of
Click the sheet tab you want to move. While data between two networking computers using
holding down the mouse button, drag the sheet the same protocol.
tab to its new location.
12. A ___________ is the software used for
10. A private communication, such as a phone viewing pages on the web.
call, instant message, videoconference, or fax a) Boot Disk
transmission, can be intercepted in real-time b) Browser
without the intended recipient's knowledge and c) Blue Ray
is known as _______________. d) Bridge
a) Replay e) Buffer
b) eavesdropping Answer: B
c) patches A browser is software used for viewing pages on
d) payloads the web.
e) None of these
Answer: B 13. A ____________is a data area shared by
Private communication, such as a phone call, hardware devices or program processes that
instant message, videoconference, or fax operate at different speeds or with different sets
transmission, can be intercepted in real-time of priorities.
without the intended recipient's knowledge and is a) Boot Disk
known as eavesdropping. b) Browser
c) Blue Ray
11. A _________ is a computer networking device d) Bridge
used to make a connection and pass along e) Buffer
packets of data between two networking Answer: E
computers using the same protocol. A buffer is a data area shared by hardware
a) Boot Disk devices or program processes that operate at
b) Boolean different speeds or with different sets of
c) Blue Ray priorities.
d) Bridge
e) Buffer
Answer: D

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -42 (Eng)

14. A __________ is a grouping of wires that the computer networking technology known as
allow the flow of data from one area of the Token Ring. IBM first made it available in 1984.
computer to another.
a) Bus 17. ______________ is a network security device
b) Bridge that monitors and filters incoming and outgoing
c) Buffer network traffic based on an organization's
d) Browser previously established security policies.
e) Boot Disk a) Wireless
Answer: A b) Open Source
A bus is a grouping of wires that allow the flow of c) Firewall
data from one area of the computer to another. d) LAN
e) Outsource
15. A _________ is a computer data transfer or Answer: C
data storage measurement A Firewall is a network security device that
a) Bus monitors and filters incoming and outgoing
b) Bridge network traffic based on an organization's
c) Buffer previously established security policies.
d) Byte
e) Boot Disk 18. Which of the following protocol provides a
Answer: D connection-oriented reliable service?
A byte is a computer data transfer or data a) IP
storage measurement. One byte equals 8 bits. b) UDP
c) TCP
16. Token ring, token bus, and Ethernet are d) All the above
examples of __________. e) None of the above
a) LAN Answer: C
b) WAN Through the establishment of an end-to-end
c) MAN connection between the transmitting and
d) Internet receiving sites, TCP may verify that a packet has
e) Networking arrived at its destination. As a result, TCP is
Answer: A referred to as a "reliable, connection-oriented"
LAN types include Ethernet and token rings protocol.
(Local Area Network). LANs are created using

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -42 (Eng)

19. A _____ is a hardware-and-software system c) Range


that enables information to be exchanged d) Table
between computing devices. e) Relation
a) Protocol Answer: D
b) Transmission The table contains information about a single
c) Wireless ‘entity’ in the database like a person, place,
d) Network event, or thing.
e) Topology
Answer: D 22. Which of the following best describes a
A network is a collection of hardware and group of one or more features used collectively
software that makes it easier for computing to identify a record in a certain way?
devices to share information. a) Candidate Key
b) Super Key
20. A _________ is a networking device that c) Sub Key
forwards data packets between computer d) Foreign Key
networks that perform the traffic directing e) Relation Key
functions on the Internet. Answer: B
a) Topology A super key is a set of one or more attributes
b) Protocol (columns), which can uniquely identify a row in a
c) Wireless table.
d) Router
e) Server 23. Relational database management systems'
Answer: D database task-specific code is referred to as
A router is a networking device that forwards ________________________.
data packets between computer networks. a) Oracle
Routers perform the traffic directing functions on b) SQL
the Internet. c) QBE
d) OLAP
21. Which of the following contains information e) Java
about a single ‘entity’ in the Answer: B
database like a person, place, event, or thing? SQL is the language that relational database
a) Query management systems use to program their
b) Tool

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -42 (Eng)

database functions. A database can be relationships with one another and with attributes
communicated using SQL. of physical objects.

24. A __________ is an abstract model that 25. The ____ database is the most widely used
describes, how the data are organized and database structure.
represented. a) Hierarchical
a) Database b) General
b) Instances c) Standard
c) Schema d) Table
d) DBMS e) Relational
e) Data Model Answer: E
Answer: E The most popular form of database is the
A data model is an abstract model used to relational database. Popular examples of
organize data items and standardize their relational databases are Microsoft Access,
MySQL, and Oracle.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -41 (Eng)

Computer Awareness

1. The CPU comprises of Control unit, Memory, 3. _____________ is a component or system that
and ____ unit. stores data for quick access in digital electronics
a) Input such as computers and related computer
b) Output hardware.
c) Microprocessor a) Storage
d) Arithmetic/Logic Unit b) Compiler
e) System c) Memory
Answer: D d) Software
The control unit (CU), memory, and e) Hardware
arithmetic/logic unit (ALU) make up the CPU. Answer: C
The CU retrieves instructions from memory (also Memory is a component or system that stores
known as main memory/primary memory/RAM), data for quick access in digital electronics such
decodes, and executes them, invoking the ALU as computers and related computer hardware.
when necessary. The ALU conducts arithmetic
and logic operations. 4.The CPU and memory are located on the
_____________.
2. ______________ is a piece of equipment used a) Motherboard
to provide data and control signals to an b) Integrated Circuit
information processing system, such as a c) Keyboard
computer or information appliance. d) Graphics Board
a) Input Device e) Sound Board
b) Hardware Answer: A
c) Software The motherboard is the main circuit board of the
d) Output computer. It is a small plate that houses your
e) Interpreter computer's CPU, RAM, hard disc and optical
Answer: A drive connectors, expansion cards for controlling
An input device is a piece of equipment used to the video and audio, and connections to the
provide data and control signals to an ports (such as USB ports).
information processing system, such as a
computer or information appliance. 5. Which of the following controls the operation
of all parts of the computer?
a) Keyboard

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -41 (Eng)

b) Mouse In 1959, a group of programmers devised


c) CPU COBOL, a COmmon, Business-Oriented
d) Motherboard Language.
e) Scanner
Answer: C 8. Incorrect labels, spelling and punctuation
The CPU is referred to as the computer's brain. issues, and other mistakes in the source code
All types of data processing tasks are carried out are known as _______ and they result in the
by the CPU. It keeps instructions, outcomes from compiler producing an error message.
intermediary steps, and data (program). All a) System Code
computer components are operated under its b) Syntax Error
direction. c) Syntax Code
d) Punctual Error
6. What is the Full Form of ‘FORTRAN’? e) System Error
a) Forward Transition Answer: B
b) Formula Transition Incorrect labels, spelling and punctuation issues,
c) Formula Translation and other mistakes in the source code are
d) Formate Transition known as syntax errors and they result in the
e) First Translation compiler producing an error message.
Answer: C
Formula Translation, or FORTRAN, is a 9. __________ is computer code that has been
computer programming language developed by converted into machine-readable code so that it
John Backus in 1957 that streamlined and can be executed on a certain computer.
democratized computer programming. a) Compiled Code
b) Symbolic Code
7. COBOL was introduced in the year ____ by c) Source Code
United States Government. d) Machine Code
a) 1956 e) Operation Code
b) 1957 Answer: A
c) 1958 Compiled code is computer code that has been
d) 1959 converted into machine-readable code so that it
e) 1962 can be executed on a certain computer.
Answer: D

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -41 (Eng)

10. ___________ converts the code from one b) Internal memory


programming language to another that mainly c) Non-volatile memory
converts the code into machine code. d) PROM
a) Compiler e) Volatile memory
b) Interpreter Answer: B
c) Assembler Internal memory, sometimes known as "main or
d) Linker primary memory," is a type of memory used by
e) Translator computers to store small quantities of data that
Answer: E may be readily accessed while the machine is in
A translator converts the code from one use.
programming language to another. It mainly
converts the code into machine code. 13. Which of the following memory is located
near the CPU?
11. A few million ___________ are fused on a a) Cache
semiconductor chip to form an integrated circuit b) Primary
(IC) known as a microprocessor. c) Secondary
a) Registers d) RAM
b) Chips e) ROM
c) Transistors Answer: A
d) Latch Copies of the data from frequently utilized main
e) Bus memory locations are kept in a cache, which is a
Answer: C smaller, quicker memory that is situated closer to
A few million transistors (semiconductor-based a processor core. The majority of CPUs contain
electronic devices) are fused on a a hierarchy of distinct cache levels (L1, L2,
semiconductor chip to form an integrated circuit frequently L3, and in rare cases even L4), with
(IC) known as a microprocessor. various instruction-specific and data-specific
caches at level 1.
12. _________ sometimes known as "main or
primary memory," is a type of memory used by 14. _____ is the main circuit board of the
computers to store small quantities of data that computer and is a small plate that houses your
may be readily accessed while the machine is in computer's CPU, RAM, hard disc and optical
use. drive connectors, expansion cards for controlling
a) Mass memory

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -41 (Eng)

the video and audio, and connections to the a) index register


ports (such as USB ports). b) memory address register
a) CPU c) memory data register
b) Keyboard d) ALU
c) Monitor e) Control Unit
d) Motherboard Answer: C
e) Mouse Memory Data Register is a special-purpose
Answer: D register that holds information that may be read
The motherboard is the main circuit board of the out of or written to the targeted location.
computer. It is a small plate that houses your
computer's CPU, RAM, hard disc and optical 17. A bus used to connect the monitor to CPU
drive connectors, expansion cards for controlling processor is _________________.
the video and audio, and connections to the a) PCI bus
ports (such as USB ports). b) SCSI bus
c) Memory bus
15. A ________ in computer architecture is a d) both a and b
communication system that carries data between e) Both b and c
components inside a computer or between Answer: B
computers. Small Computer System Interface (SCSI) is a
a) Register universal parallel i/o interface that allows you to
b) Bus connect a variety of peripheral devices to a
c) Cache single I/O bus.
d) Lache
e) Motherboard 18. __________________ is a collection of signals
Answer: B that are used to convey data simultaneously
A bus in computer architecture is a from one computer component to another.
communication system that carries data between a) Control bus
components inside a computer or between b) Data bus
computers. c) Address bus
d) Network
16. ___________ is a special-purpose register e) Register
that holds information that may be read out of or Answer: B
written to the targeted location.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -41 (Eng)

Data Bus is a collection of signals that are used refreshed periodically. What does ‘S’
to convey data simultaneously from one represents?
computer component to another. a) Stagnant
b) Storage
19. Which of the following button is utilized to c) Simple
extend the duration of the Presentation’s slides? d) Static
a) Slide show menu e) None of these
b) Rehearse timings button Answer: D
c) Slide transition button SRAM retains data as long as power is provided
d) All the above to the memory chip and need not be refreshed
e) None of the above periodically. SRAM stands for Static Random
Answer: B access memory.
Rehearse timings button is utilized to extend the
duration of the presentation’s slides. 22. Which of the following is non-volatile
memory?
20. While working with MS-DOS which a) RAM
command transfers a specific file from one disk b) ROM
to another? c) Cache
a) Copy d) Primary
b) Paste e) None of these
c) Control Answer: B
d) Cut ROM is a volatile memory.
e) Undo
Answer: A 23. In which part of the computer, does the data
Use the Copy command to copy a specified file stored before entering into the CPU from the
from one disc to another. Disk copy transfers the Main memory?
entire disc to a new disc. The Time command a) External hard disk
shows the current system time, while the b) Secondary memory
Rename command renames a file. c) Cache memory
d) In CPU
21. SRAM retains data as long as power is e) None of these
provided to the memory chip and need not be Answer: C

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -41 (Eng)

The data is stored in Cache memory, before size of the main memory is called Virtual
entering into the CPU from the Main memory. storage.

24. The technique that extends the storage 25. A(n)________ is a register or main memory
capacities of main memory beyond the actual location which contains the effective address of
size of the main memory is called _______. the operand.
a) Additional storage a) Special location
b) Extra storage b) Pointer
c) Virtual storage c) Pendrive
d) Stimulated storage d) Floppy
e) None of these e) Direct Indexed register
Answer: C Answer: A
The technique that extends the storage A(n) Special location is a register or main
capacities of main memory beyond the actual memory location which contains the effective
address of the operand.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -44 (Eng)

Computer Awareness

1. A physical memory storage area known as a a) Access Time


__________ is used to hold data momentarily b) Video Resolution
while it is being transferred between locations. c) Clock Speed
a) Storage d) IPC
b) Buffer e) DPI
c) Memory Answer: A
d) Processor Access time is the length of time it takes a
e) Register device to find data and instructions and make
Answer: B them available to the CPU.
A physical memory storage area known as a
data buffer (or simply buffer) is used to hold data 4. _____________ is a brief period of time given
momentarily while it is being transferred between to a process for CPU execution.
locations. a) Access Time
b) Clock Speed
2. ________________ are a type of computer c) DownTime
memory used to quickly accept, store, and d) Up Time
transfer data and instructions that are being e) Time Slice
used immediately by the CPU. Answer: E
a) Storage A time slice is a brief period that is assigned to a
b) Buffer CPU-based process. Processes are given a
c) Description period during which they can run on a
d) Processor preemptive multitasking CPU. Every single time
e) Register slice that the scheduler executes a process.
Answer: E
Registers are a type of computer memory used 5. For data collection from "fill-in-the-bubble"
to quickly accept, store, and transfer data and forms like educational examinations, surveys,
instructions that are being used immediately by assessments, evaluations and many other
the CPU. multiple choice forms, one common identification
technology is used. Which of the following is that
3. _____________ is the length of time it takes a kind of identification technology?
device to find data and instructions and make a) Optical Mark Recognition
them available to the CPU. b) Punch card reader

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -44 (Eng)

c) Optical scanners High-level programs require


d) Magnetic tapes compilers/interpreters to translate source code to
e) Stylus machine language. We can compile the source
Answer: A code written in a high-level language to multiple
For data collection from "fill-in-the-bubble" forms machine languages. Thus, they are machine-
like educational examinations, surveys, independent languages.
assessments, evaluations, and many other
multiple choice forms, one common identification 8. An _______________ is a specific procedure
technology is optical mark recognition. Since the for solving a well-defined computational problem.
1960s, OMR has been utilized extensively in a) Interpreter
education and is still frequently employed today. b) Assembler
c) Algorithm
6. Which generation of computer languages d) Compiler
includes SQL (Database Search)? e) Translator
a) First Answer: C
b) Second An algorithm is a procedure used for solving a
c) Third problem or performing a computation. Algorithms
d) Fourth act as an exact list of instructions that conduct
e) Fifth specified actions step by step in either hardware-
Answer: D or software-based routines. Algorithms are
Fourth-generation languages are commonly widely used throughout all areas of IT.
used in database programming and scripts
examples include Perl, PHP, Python, Ruby, and 9. _____________ is a detailed yet readable
SQL. description of what a computer program or
algorithm must do, expressed in a formally-
7. Which of the following languages are styled natural language rather than in a
machine-independent? programming language.
a) Binary Language a) System Code
b) Assembly Language b) Source Code
c) Machine Language c) Pseudo Code
d) High-level Language d) Machine Code
e) Low-Level Language e) Operation Code
Answer: D Answer: C

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -44 (Eng)

Pseudocode is a detailed yet readable 12. Bus mastership is handed to the device that
description of what a computer program or will be the next to assume it through a process
algorithm must do, expressed in a formally- called __________________.
styled natural language rather than in a a) Bus Control
programming language. b) Bus Transmission
c) Bus Arbitration
10. Programming languages can be categorized d) Bus Calculation
as ____. e) System Bus
a) Binary Language Answer: C
b) High-level Language Bus mastership is handed to the device that will
c) Low-Level Language be the next to assume it through a process
d) Both (a) and (b) called bus arbitration.
e) Both (b) and (c)
Answer: E 13. ___________ refers to the components of a
Programming languages are classified into two computer system where data may be stored.
main categories – Low-level language and High- a) Cache
level language. b) Memory
c) Register
11. The address in the main memory is known d) Graphics
as ________________. e) Design
a) Logical Address Answer: B
b) Physical Address Memory refers to the components of a computer
c) Memory Address system where data may be stored.
d) Arithmetic Address
e) Loop Address 14. The CPU stores the address of the following
Answer: B instruction to be executed in a special-purpose
A location or physical address is the name given register named ____________.
to an address in the main memory. The a) Programme Counter
collection of these places is referred to as the b) System Bus
memory space and includes the real main c) Process Register
memory locations that can be directly addressed d) Memory Bus
for processing. e) Assembly Calculator
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -44 (Eng)

The CPU stores the address of the following a) 8KB


instruction to be executed in the program b) 32MB
counter, or PC, a special-purpose register. c) 16MB
d) 64KB
15. A ___________ is a collection of details that e) None of these
outlines a process ‘ features in a way that will Answer: B
make its installation, commissioning, operation, 32MB is the minimum requirement of random
control, and maintenance efficient. access memory for internal access.
a) Programme Counter
b) Process Description 18. Which register is used to hold the current
c) Process Register instruction which is being executed?
d) System Register a) Program counter
e) System Counter b) Memory address
Answer: B c) Memory buffer
A process description is a collection of details d) Instruction
that outlines a process' features in a way that will e) None of these
make its installation, commissioning, operation, Answer: D
control, and maintenance efficient. Instruction register- It is used to hold the current
instruction which is being executed.
16. Any method for controlling access to or use
of memory is known ________. 19. Which one is used to holding the address of
a) Memory map active memory location?
b) Memory protection a) Program counter
c) Memory management b) Memory address
d) Memory instruction c) Memory buffer
e) None of these d) Instruction
Answer: B e) None of these
Any method for controlling access to or use of Answer: B
memory is known as Memory protection. Memory address- It holds the address of active
memory location
17. What should be the minimum requirement of
random access memory (RAM) for internet
access?

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -44 (Eng)

20. Which memory allows the execution of d) Encryption


processes that are not completely in the main e) Malware
memory? Answer: D
a) Flash Encryption is the process of encrypting a
b) Buffer message or piece of information such that only
c) Primary people with the proper authorization may access
d) Virtual it and everyone else is prevented from doing so.
e) None of these
Answer: D 23. Which of the following information can be
Virtual memory- It allows the execution of used to estimate how frequently a user visits a
processes that are not completely in the main website?
memory. a) Cookies
b) Hacker
21. _____________is a type of fraud in which a c) Phish
perpetrator uses email or other forms of contact d) Spammer
to pose as a reliable organization or individual. e) All the above
a) Spoofing Answer: A
b) Phishing The modern Internet cannot function without
c) Spyware HTTP cookies, but they compromise your
d) Firewall privacy. HTTP cookies enable web developers to
e) Cracker provide you with more individualized, practical
Answer: B website visits as a fundamental component of
Phishing is a type of fraud in which a perpetrator web browsing.
uses email or other forms of contact to pose as a
reliable organization or individual. 24. A ___________ is someone who utilizes their
knowledge to break into someone else's
22. _____________ is the process of encrypting a computers to steal information or do harm.
message or piece of information such that only a) Spammer
people with the proper authorization may access b) Phisher
it and everyone else is prevented from doing so. c) Hacker
a) Decryption d) Instant Messenger
b) Spoofing e) All the above
c) Phishing Answer: C

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -44 (Eng)

A hacker is someone who utilizes their b) Cyber Terrorism


knowledge to break into someone else's c) Decryption
computers to steal information or do harm. d) Trojan Horse
e) Hacking
25. ______________ is the use of the Internet to Answer: B
carry out violent activities that cause or threaten Cyberterrorism is the use of the Internet to carry
serious physical harm or the loss of life to out violent activities that cause or threaten
advance political or ideological goals through serious physical harm or the loss of life to
intimidation or threat. advance political or ideological goals through
a) Encryption intimidation or threat.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -45 (Eng)

Computer Awareness

1. _____________ is a signal sent by a for an end user or, in some cases, for another
computer's internal program or a device application.
connected to the computer that instructs the a) System Application
operating system to pause and determine what b) Application Software
to do next. c) System Software
a) Break d) Input Device
b) Interrupt e) Register
c) Halt Answer: B
d) Storage An application also referred to as an application
e) Stylus program or application software is a computer
Answer: B software package that performs a specific
An interrupt is a signal sent by a computer's function directly for an end user or, in some
internal program or a device connected to the cases, for another application.
computer that instructs the operating system to
pause and determine what to do next. 4. The name of the location of a particular piece
of data is its____________.
2. A _______ is a communication system used in a) Bus
computer architecture that transports data b) Route
between computer components. c) Address
a) Cable d) Server
b) Bundle e) Register
c) Bus Answer: C
d) Stylus The address is the name of the address where a
e) Mouse specific piece of data is located.
Answer: C
A bus is a communication system used in 5. ______________ is a specific set of ordered
computer architecture that transports data operations for a computer to perform.
between computer components. a) Program
b) Buses
3. ___________________ is a computer software c) Register
package that performs a specific function directly d) Server
e) Processor

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -45 (Eng)

Answer: A d) Input Unit


A program is a predetermined set of sequential e) Registers
activities that a computer is programmed to carry Answer: E
out. The program provides a one-at-a-time One of the few data storage areas that are a part
series of instructions that the computer follows in of the computer processor is a processor
the modern computer that John von Neumann register (CPU register). An instruction, a storage
described in 1945. The application is often location, or any other type of data could be
stored in a location that the computer can stored in a register (such as a bit sequence or
access. individual characters).

6. ____________ in computing is a combinational 8. _____________ is the area of the CPU that


digital circuit that operates on integer binary coordinates the actions of all the other computer
integers mathematically and bitwise. parts.
a) Control Unit a) Control Unit
b) Arithmetic and Logic Unit b) Arithmetic and Logic Unit
c) Memory Unit c) Memory Unit
d) Input Unit d) Input Unit
e) Simple Unit e) Simple Unit
Answer: B Answer: A
An arithmetic logic unit (ALU) in computing is a The control unit is the area of the CPU that
combinational digital circuit that operates on coordinates the actions of all the other computer
integer binary integers mathematically and parts.
bitwise. A floating-point unit (FPU), on the other
hand, works with floating-point numbers. 9. What does the control unit generate to control
other units?
7. Which of the following describes a small group a) Control signal
of data storage areas that are a component of b) Timing signal
the computer processor and may store any form c) Transfer signal
of data, including instructions and storage d) Command signal
addresses? e) None of the above
a) Bus Answer: A
b) Arithmetic and Logic Unit The Control Unit transfers internal program
c) Memory Unit instructions from the main memory to the

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -45 (Eng)

processor instruction register. Based on the readable form to one that the computer can
information in this register, the control unit then interpret.
generates a control signal that controls how
these instructions are executed. 12. Conversion of computer-generated results
into human-readable format is the function of
10. A unique class of digital electrical circuit that _______________________.
is integrated into a ________ is referred to as a a) CPU
"microprocessor" in general. b) RAM
a) Logic Chip c) Output interface
b) Microchip d) Input interface
c) Control Chip e) Hardware
d) Macro chip Answer: C
e) All the above Conversion of computer-generated results into
Answer: B human-readable format is the function of the
A unique class of digital electrical circuits that is Output interface.
integrated into a microchip is referred to as a
"microprocessor" in general. Consequently, a 13. The hardware in which data is stored
microprocessor, which serves as the computer's permanently for a computer system is
brain, can also be referred to as a microchip. ____________.
a) Registers
11. The device used to fetch (or bring) b) Bus
instructions and data into a computer system is c) Secondary memory
called ___________________. d) Main memory
a) ALU e) Primary memory
b) Control unit Answer: C
c) Input device The hardware in which data is stored
d) Output device permanently for a computer system is
e) Hardware Secondary Memory.
Answer: C
The tools we use to enter data into the computer 14. The clock rate of the CPU is measured in
are known as input devices. They establish a link which unit?
between the user and the computer. Input a) Milliseconds
devices convert information from a human- b) Microhertz

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -45 (Eng)

c) Nanoseconds memory (RAM), it serves as a buffer. It is used


d) MHz or GHz to store the data and program components that
e) None of these the CPU uses most frequently.
Answer: D
17. Any data or instruction entered into the
15. Which of the following is used by ALU to memory of a computer is considered as
store intermediate results? ______________.
a) Registers a) Storage
b) Heap memory b) Cache
c) Stack memory c) Register
d) Accumulator d) Volatility
e) Modulator e) Bus
Answer: D Answer: A
After arithmetic and logical instructions have Any information or instruction put into a
been completed, the ALU stores the interim computer's memory is referred to as storage. A
result in the accumulator. The accumulator computer can keep data in storage either
serves as the conduit for all data transfers permanently or temporarily. For instance, RAM,
between the central processor unit and each ROM, Hard Drive, etc.
device or port.
18. ______________ is used to describe a
16. Cache memory is a very high-speed memory that has some limited non-volatile
semiconductor memory that can speed up the duration after power is removed, but then data is
processor or CPU. It acts as a buffer between ultimately lost.
_______ and ________. a) Cache Memory
a) CPU and RAM b) Register Memory
b) CPU and ROM c) Virtual Memory
c) RAM and ROM d) Semi-Volatile Memory
d) CPU and Hard disk e) Protected Memory
e) All the above Answer: D
Answer: A Semi-Volatile Memory is used to describe a
Cache memory is an extremely fast memory that has some limited non-volatile
semiconductor memory that can accelerate the duration after power is removed, but then data is
CPU or processor. Between the CPU and main ultimately lost.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -45 (Eng)

19. ___________________ is a memory damaging other currently running programs or


management technique where secondary risking the loss of saved data.
memory can be used as if it were a part of the
main memory and is a system where all physical 21. ________ are people's attempts to trick you
memory is controlled by the operating system. into giving them your personal information by
a) Cache Memory pretending to be someone else.
b) Register Memory a) Phishing trips
c) Virtual Memory b) Computer viruses
d) Semi-Volatile Memory c) Spyware scams
e) Protected Memory d) Viruses
Answer: C e) Phishing scams
Virtual Memory is a memory management Answer: E
technique where secondary memory can be Phishing scams are people's attempts to trick
used as if it were a part of the main memory and you into giving them your personal information
is a system where all physical memory is by pretending to be someone else.
controlled by the operating system.
22. _______ is the criminal practice of pretending
20. _______________ inhibits a process from to be a reliable entity in an electronic
accessing unallocated memory in the OS conversation to get sensitive information like
because it protects the software from taking over usernames, passwords, and credit card
an excessive quantity of memory and perhaps numbers.
damaging other currently running programs or a) Spoofing
risking the loss of saved data. b) Phishing
a) Memory map c) Stalking
b) Memory protection d) Hacking
c) Memory management e) None of these
d) Memory instruction Answer: B
e) None of these Phishing is the criminal practice of pretending to
Answer: B be a reliable entity in an electronic conversation
Memory protection inhibits a process from to get sensitive information like usernames,
accessing unallocated memory in the OS passwords, and credit card numbers.
because it protects the software from taking over
an excessive quantity of memory and perhaps 23. Junk E-mail is also called as __________.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -45 (Eng)

a) Spool Adware is a form of malware that hides on your


b) Spoof device and serves you advertisements.
c) Spam
d) Hack 25. A __________ is a group of computer
e) None of these programs, usually malicious, that is used to gain
Answer: C unauthorized access to computers or parts of its
Email spam, also known as junk email, refers to software. They frequently conceal their own or
unsolicited email messages, usually sent in bulk other programs' presence.
to a large list of recipients. a) Rootkit
b) Trojan
24. ___________ is a form of malware that hides c) Toolkit
on your device and serves you advertisements. d) Malware
a) Spyware e) Spyware
b) Adware Answer: A
c) Malware A rootkit is a group of computer programs,
d) Firewall usually malicious, that is used to gain
e) Trojan unauthorized access to computers or parts of its
Answer: B software. They frequently conceal their own or
other programs' presence.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -46 (Eng)

Computer Awareness

1. _______________ is used in recording sound, d) Both (a) and (b)


pictures, or computer data. e) All (a), (b) and (c)
a) Optical Disk Answer: E
b) Hard Drive Secondary memory is known as a Backup
c) Magnetic Tape memory Additional memory or Auxiliary memory.
d) Floppy Disk
e) Flash Memory 4. Which of the following is the key difference
Answer: C between Primary and Secondary Memory?
Magnetic Tape is used in recording sound, a) primary memory is categorized as volatile&
pictures, or computer data. non-volatile memories while secondary memory
is always non-volatile
2. ____________ is a non-volatile memory chip b) Data is directly accessed by the processing
used for storage and transferring data between a unit in primary memory while Data cannot be
personal computer (PC) and digital devices. accessed directly by the processor in secondary
a) Optical Disk memory
b) Hard Drive c) Primary memory can be accessed by the data
c) Magnetic Tape bus while Secondary memory is accessed by I/O
d) Floppy Disk channels
e) Flash Memory d) Primary memory is costlier than secondary
Answer: E memory while Secondary memory is cheaper
Flash memory is a non-volatile memory chip than primary memory
used for storage and transferring data between a e) All the above
personal computer (PC) and digital devices. It Answer: E
can be electronically reprogrammed and erased. The key difference between Primary and
It is often found in USB flash drives, MP3 Secondary Memory are:
players, digital cameras, and solid-state drives. a) The primary memory is categorized as
volatile& non-volatile memories while The
3. Which among the following is the other name secondary memory is always non-volatile
for Secondary Memory? b) Data is directly accessed by the processing
a) Backup memory unit in primary memory while Data cannot be
b) Additional memory accessed directly by the processor in secondary
c) Auxiliary memory memory

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -46 (Eng)

c) Primary memory can be accessed by the data A proxy server is used to intercept all messages
bus while Secondary memory is accessed by I/O entering and departing the network while
channels concealing the real network addresses.
d) Primary memory is costlier than secondary
memory while Secondary memory is cheaper 7. ________________ is a piece of software made
than primary memory to keep track of (log) each keystroke made on
the computer it is running on.
5. The most frequently used instructions of a a) Keylogger
computer program are likely to be fetched from b) Worm
________________ memory. c) Virus
a) Primary d) Cracker
b) Secondary e) Trojan
c) Cache Answer: A
d) Register Keylogger is a piece of software made to keep
e) Virtual track of (log) each keystroke made on the
Answer: C computer it is running on.
The information that the CPU is likely to need
next is stored in the cache memory together with 8. ____________ is the unauthorized use,
program instructions and data that are frequently copying or distribution of copyrighted software.
employed in the functioning of programs. Instead a) Hacking
of getting data from the computer's main b) Software piracy
memory, the CPU can quickly access this c) Software literacy
information from the cache. d) Cracking
e) Copyright
6. __________ is used to intercept all messages Answer: B
entering and departing the network while Software piracy is the unauthorized use,
concealing the real network addresses. copying, or distribution of copyrighted software.
a) Logic bomb
b) Firewall 9. ________ are upgrades to the software and
c) Patches operating systems (OS) that fix security flaws in
d) Proxy server a program or product.
e) None of these a) Fixes
Answer: D b) Trojan

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -46 (Eng)

c) Patches Answer: E
d) Logic Bomb A driver is a group of files that communicates
e) Firewall with the operating system of a computer to
Answer: C instruct a piece of hardware on how to operate.
Patches are upgrades to the software and
operating systems (OS) that fix security flaws in 12. Transforming plain text data (plaintext) into
a program or product. something that appears random and
meaningless(ciphertext) is the process of
10. Which of the following computer viruses ___________.
hijack the system when it boots and deletes a) Embed
data? b) Encryption
a) Trojan c) Decryption
b) System infectors d) Encoder
c) Stealth virus e) Ethernet
d) Boot infectors Answer: B
e) None of the above Transforming plain text data (plaintext) into
Answer: C something that appears random and
An operating system process-attacking computer meaningless(ciphertext) is the process of
virus that is disguised from standard anti-virus or encryption.
anti-malware scans is known as a stealth virus.
Stealth viruses are skilled at purposefully 13. The standard method for establishing
avoiding detection by hiding in files, partitions, connections between devices in a wired LAN or
and boot sectors. WAN is ________.
a) Embed
11. A ___________ is a group of files that b) Encryption
communicates with the operating system of a c) Decryption
computer to instruct a piece of hardware on how d) Encoder
to operate. e) Ethernet
a) Demodulation Answer: E
b) Decoder The standard method for establishing
c) Dongle connections between devices in a wired LAN or
d) Domain WAN is Ethernet.
e) Driver

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -46 (Eng)

14. An ______________ is a private network that b) Data filed


organizations utilize to give dependable outside c) Data dictionary
parties, such as partners, customers, suppliers, d) Data table
and vendors, secure, restricted access to e) None of these
business data or processes. Answer: C
a) Extranet Each component of your dataset and data model
b) Encryption is given a thorough definition in a data dictionary.
c) Decryption The documentation of significant and practical
d) Encoder information, such as a descriptive name, the
e) Ethernet data type, permitted values, units, and text
Answer: A description, is done using data dictionaries.
An extranet is a private network that
organizations utilize to give dependable outside 17. A set of possible data values is called
parties, such as partners, customers, suppliers, _________.
and vendors, secure, restricted access to a) Relation
business data or processes. b) Domain
c) Degree
15. Data retrieval by a software application, d) Attribute
script, or hardware component is referred to as e) Tuple
_____________. Answer: B
a) Ethernet A set of possible data values is called Domain.
b) Extranet
c) Fetching 18. In files, the _____________ key is associated
d) Encoder with each record which is used to differentiate
e) Encryption among different records for every file there is at
Answer: C least one unique set of keys.
Data retrieval by a software application, script, or a) Unique Key
hardware component is referred to as fetching. b) Secondary Key
c) Primary Key
16. Which of the following lists data descriptions d) Index Key
as well as the names, data types, and field e) Temporary Key
lengths for each database field? Answer: C
a) Data record

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -46 (Eng)

In files, there is a key associated with each 21. The most frequently used piece of hardware
record which is used to differentiate among for inputting data is _______.
different records. For every file, there is at least a) Keyboard
one unique set of keys. Such a key is called the b) Mouse
primary key. c) Floppy Disk
d) Cursor
19. ____________ refers to a key used to e) Software
represent relationships between tables. Answer: A
a) Unique Key The most frequently used piece of hardware for
b) Secondary Key inputting data is Keyboard.
c) Primary Key
d) Index Key 22. An optical mouse used _______________.
e) Foreign Key a) Infrared light
Answer: E b) Light emitting diode (LED)
A foreign key aids in defining the connection c) Sensor
between tables. In a relational database, this d) Microwave
special key transmits one or more relationships e) Infrared wave
between two or more tables. Answer: B
An Optical Mouse used a Light emitting diode.
20. ______________ denotes that the copied
values are not the same, whereas data 23. What is a QWERTY keyboard?
redundancy denotes data duplication. a) It is the most popular keyboard
a) Data Inconsistency b) It is the fastest keyboard
b) Data Consistency c) Is a keyboard that is rarely used
c) Data integrity d) All of the above
d) Data Model e) None of these
e) None of these Answer: A
Answer: A QWERTY is the most popular keyboard layout
Data inconsistency denotes that the copied for Latin-script alphabets.
values are not the same, whereas data
redundancy denotes data duplication. 24. When used with a computer's cathode-ray
tube display, __________ is an input device in the
shape of a light-sensitive wand.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -46 (Eng)

a) Light pen 25. A tool for turning handwritten impressions


b) Joystick into positional coordinates and coded characters
c) Magnetic pen for entry into a computer is _______________.
d) Mouse a) Writing Tablet
e) Scanner b) Light Pen
Answer: A c) Ball Point
When used with a computer's cathode-ray tube d) Joystick
display, a light pen is an input device in the e) Printer
shape of a light-sensitive wand. Answer: A
A tool for turning handwritten impressions into
positional coordinates and coded characters for
entry into a computer is a writing tablet.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -47 (Eng)

Computer Awareness

1. The method that increases the main memory's 4. Hard disk can be formatted at the time of
storage capacity beyond its physical size is ____________.
referred as ________________. a) RAM
a) multitasking b) Booting
b) multiprocessing c) disk reader
c) virtual storage d) All the above
d) multiprogramming e) None of these
e) multi stalking Answer: B
Answer: C Hard disk can be formatted at the time of
The method that increases the main memory's Booting.
storage capacity beyond its physical size is
referred as Virtual Storage. 5. Which of the following memories has the
fastest (or shortest) access time?
2. The memory that cannot be accessed directly a) RAM
by the processor (CPU) is _____________. b) ROM
a) internal memory c) Cache memory
b) external memory d) Magnetic core memory
c) cache memory e) All the above
d) system memory Answer: C
e) None of these Cache Memory is a memory unit placed between
Answer: B the CPU and main memory and is used to store
instructions, data, or both.
3. Higher the RAM of a computer, the faster its
processing speed. Since it eliminates 6. A _____________ is a device that generates
__________________. the original signal as output from the coded input
a) need for external memory signal and converts n lines of input into 2n lines
b) need for ROM of output.
c) need for cache memory a) Data Rate
d) All of these b) Data Communication
e) None of these c) Daughter Board
Answer: A d) DataBase
e) Decoder

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -47 (Eng)

Answer: E 9. A network of computers and other devices


A decoder is a device that generates the original under one single authority with predetermined
signal as output from the coded input signal and rules is known as a _____________.
converts n lines of input into 2n lines of output. a) Demodulation
b) Decoder
7. ______________ is the process of taking a c) Dongle
modulated carrier wave and retrieving the d) Domain
original information-carrying signal from it. e) Pitch
a) Daughter Board Answer: D
b) Data Rate A network of computers and other devices under
c) Demodulation one single authority with predetermined rules is
d) Decoder known as a domain.
e) DataBase
Answer: C 10. ____________ is a unit of measurement used
Demodulation is the process of taking a to specify how many fixed-width characters can
modulated carrier wave and retrieving the fit into an inch of space in a word processing or
original information-carrying signal from it. desktop publishing program.
a) Demodulation
8. A __________ is a small piece of computer b) Decoder
hardware that plugs into a port on another c) Dongle
device to add functionality to it or to permit a d) Domain
pass-through to a device that does so. e) Pitch
a) Demodulation Answer: E
b) Decoder Pitch is a unit of measurement used to specify
c) Dongle how many fixed-width characters can fit into an
d) Domain inch of space in a word processing or desktop
e) Pitch publishing program.
Answer: C
A dongle is a small piece of computer hardware 11. What is the name of the device that uses
that plugs into a port on another device to add telephone lines to connect your computer to
functionality to it or to permit a pass-through to a other computers and information services?
device that does so. a) Modem
b) Server

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -47 (Eng)

c) Router When devices are idle, it consists of a brief


d) Repeater message that travels in a logical way around the
e) Hub ring.
Answer: A
Modem device links our computer with other 14. National Internet Service Provider (ISP)
computers and information services through networks are connected to one another by a
telephone lines. private switching network is called
________________________.
12. A _________ is a piece of hardware or a) Peering Points
software that transmits messages across a b) Network Access Points
network. c) National ISP
a) Modem d) Access Points
b) Server e) None of these
c) Router Answer: B
d) Repeater National Internet Service Provider (ISP)
e) Hub networks are connected to one another by a
Answer: C private switching network called Network Access
The device or program that forwards messages Points.
between networks is known as a router. A router
is connected to at least two networks, commonly 15. The communication technique that allows
two LANs or WANs or a LAN and its ISP's data to be transmitted in both directions but only
network. one at a time is ____________________.
a) Simplex
13. A _______________is a brief communication b) Four-wire circuit
that can be sent between stations in a network. c) Half-duplex
a) Byte d) Full duplex
b) Token e) All the above
c) Ring Answer: C
d) Word Half-Duplex is the data transmission mode in
e) Bus which the data can flow in both directions but in
Answer: B one direction at a time.
In-ring networks, the token is a reliable method
of message transmission that is often employed.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -47 (Eng)

16. Which of the following command is a type of 18. In which one of the following, the multiple
Data Definition language command? lower entities are grouped (or combined)
a) Create together to form a single higher-level entity?
b) Update a) Specialization
c) Delete b) Generalization
d) Merge c) Aggregation
e) Alter d) Manipulation
Answer: A e) None of the above
The database structure is often defined or Answer: B
maintained using the Data Definition Language. The generalisation makes use of the bottom-up
Creating, deleting, and altering tables are a few methodology. A single higher-level entity is
examples. In a nutshell, we can say that the created by combining the several lower-level
database table schemas are worked on using sub-entities. We may sum it up by saying that it
data definition languages. is the exact opposite of specialisation.

17. Which of the following is a top-down 19. In a relational database, every tuple divided
approach in which the entity's higher level can into the fields are known as
be divided into two lower sub-entities? the________________.
a) Aggregation a) Queries
b) Generalization b) Domains
c) Specialization c) Relations
d) Manipulation d) Programs
e) All the above e) All of the above
Answer: C Answer: B
The top-down method is utilised in specialisation Tuples are the number of rows in a table in a
and is appropriate for generalisation. database, and domains are created by further
The higher-level entity in the specialty can be subdividing these tuples (or rows) into those
broken down into lower-level sub-entities. It is fields.
typically employed to determine the portion of an
entity set that shares distinctive qualities. 20. Which of the following is used in the
application programs to request data from the
database management system?
a) Data Manipulation language

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -47 (Eng)

b) Data Definition Language Second-generation computers made time-


c) Data Control Language sharing possible. A specialized computer can
d) Data Interpretaion now accommodate many users simultaneously.
e) All the above When computers first became widely available,
Answer: A even for businesses, this idea was offered in
The "select" command is typically used to 1960.
retrieve data from the database management
system. As a result, when the application 23. Large Scale Integration of chips was
programmes request data from the database introduced in ________ generations of
management system, they do it using the Data computers.
Manipulation Language. a) First
b) Second
21. The memory capacity of the First Generation c) Third
Computers was ______. d) Fourth
a) 4000 bits e) Fifth
b) 32000 bits Answer: D
c) 128000 bits The process of integrating or embedding a large
d) 100 million bits number of transistors on a single silicon
e) Unlimited semiconductor microchip is known as large-
Answer: A scale integration (LSI). Large Scale Integration
The memory capacity in the First Generation of chips was introduced in the fourth generation
Computers was 4000 bits. of computers.

22. Time-sharing and online computation 24. ___________ is an emerging branch in


became possible in the ____ generation of computer science, which interprets means and
Computer. methods of making computers think like human
a) First beings.
b) Second a) Blockchain
c) Third b) VR
d) Fourth c) AI
e) Fifth d) Cloud computing
Answer: B e) Microchips
Answer: C

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -47 (Eng)

Artificial Intelligence is an emerging branch of c) 5th


computer science, which interprets means and d) 4th
methods of making computers think like human e) 3rd
beings. Answer: D
The fourth generation of computers is marked by
25. In ___________ generation Time sharing, the use of Very Large Scale Integrated (VLSI)
Real-time, Networks, and Distributed Operating circuits. In this generation Time sharing, Real-
System was used. time, Networks, and Distributed Operating
a) 1st System was used.
b) 2nd

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -48 (Eng)

Computer Awareness

1. The secondary storage units can only store Answer: A


data; they are unable to do ____________. In computers and digital technology, a nibble is
a) Arithmetic operations four binary digits or half of an eight-bit byte.
b) Logic operations
c) Fetch operations 4. 1 Megabyte = 1024 _______.
d) All the above a) Bytes
e) None of the above b) Kilobytes
Answer: D c) Gigabyte
Arithmetic, logic, and fetching operations are not d) Terrabyte
available on secondary storage systems such as e) Petabyte
flash memory, hard drives, floppy discs, Answer: B
magnetic tape, paper tape, etc. 1 Megabyte = 1024 Kilobytes.

2. Which among the following are the main 5. Which of the following is the correct
categories of storage devices? chronological order of the memory unit?
a) Optical a) Bit, Nibble, Byte, Kilobyte (KB), Megabyte
b) Magnetic (MB), GigaByte (GB), TeraByte (TB), PetaByte
c) Semiconductor (PB), Exa Byte, Zetta Byte, Yotta Byte
d) All the above b) Byte, Nibble, Bit, Kilobyte (KB), Megabyte
e) None of the above (MB), GigaByte (GB), TeraByte (TB), PetaByte
Answer: D (PB), Exa Byte, Yotta Byte, Zetta Byte
There are three main categories of storage c) Bit, Nibble, Byte, Kilobyte (KB), GigaByte
devices: optical, magnetic, and semiconductor. (GB), Megabyte (MB), TeraByte (TB), Exa Byte,
The earliest of these was the magnetic device. PetaByte (PB), Zetta Byte, Yotta Byte
d) Bit, Byte, Kilobyte (KB), Megabyte (MB),
3. ______ is four binary digits or half of an eight- GigaByte (GB), PetaByte (PB), Exa Byte, Zetta
bit byte. Byte, Yotta Byte, TeraByte (TB)
a) Nibble e) None of these
b) Bits Answer: A
c) Cache The correct chronological order of the memory
d) Zettabyte unit:
e) Petabyte

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -48 (Eng)

Bit, Nibble, Byte, Kilobyte (KB), Megabyte (MB),


GigaByte (GB), TeraByte (TB), PetaByte (PB), 8. A _______ is a model for message-based
Exa Byte, Zetta Byte, Yotta Byte inter-process synchronization and
communication in computing.
6. _________________ is a chip-based computer a) Modem
component that makes retrieving data from the b) Cascade
computer's memory more efficient. c) Channel
a) Cable Modem d) Cache
b) Cache Memory e) Clipboard
c) Cascade Answer: C
d) Channel A channel is a model for message-based
e) Clipboard interprocess synchronization and communication
Answer: B in computing. A message can be transmitted
Cache memory is a chip-based computer over a channel, and another process or thread
component that makes retrieving data from the that has a reference to the channel can receive
computer's memory more efficient. messages sent over it as a stream.

7. A __________ is a hardware or software 9. Any computer hardware or software device


component in computing that stores data so that that seeks access to a service offered by a
requests for it in the future can be processed server is referred to as a ________ in home and
more quickly. business networks.
a) Modem a) Channel
b) Cascade b) Cache
c) Channel c) Client
d) Cache d) Cascade
e) Clipboard e) Clipboard
Answer: D Answer: C
A cache is a hardware or software component in Any computer hardware or software device that
computing that stores data so that requests for it seeks access to a service offered by a server is
in the future can be processed more quickly. The referred to as a client in home and business
cached data may be the output of a previous networks. In a client-server architecture, clients
computation or a copy of data that is stored are often thought of as the requesting program
elsewhere. or user.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -48 (Eng)

accessible for the one-speed device to send


10. A ____________ is a temporary storage area data to another speed device
for data that the user wants to copy from one e) All the above
area or application to another. Answer: E
a) Channel Advantages of LAN
b) Cache Inexpensive transmission media. It can simplify
c) Client the physical association of a device to the
d) Cascade media. It is used for high data transmission
e) Clipboard rates. Network data transmission is independent
Answer: E of the connected devices' rates, making it
A clipboard is a temporary storage area for data accessible for the one-speed device to send
that the user wants to copy from one area or data to another speed device.
application to another.
13. Which of the following services allow LAN
11. Which of the following forms of data transfer users to share data?
is the quickest? a) Communication Server
a) Co-axial Cable b) File Server
b) Untwisted Wire c) Print Server
c) Telephone Lines d) Wireless Server
d) Fiber Optic Cable e) All the above
e) All the above Answer: B
Answer: D Users on a local area network (LAN) can share
Fiber Optic cable is the fastest media of data files and software through a file server.
transfer. 14. What is the use of a bridge in the network?
a) It is a Link Layer device that forwards traffic
12. Which of the following are the advantage of a between network segments
Local Area Network (LAN)? b) It connects two or more different LANs that
a) It is used for high data transmission rates have a similar protocol
b) It can simplify the physical association of a c) It provides communication between the
device to the media devices (nodes) in them
c) Inexpensive transmission media d) All the above
d)Network data transmission is independent of e) None of the above
the connected devices' rates, making it Answer: D

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -48 (Eng)

In terms of networking, a bridge network is a (Structured Query Language)is referred to as


Link Layer device that forwards traffic between cardinality.
network segments. Bridges connect two or more
different LANs that have a similar protocol and 17. Which key from the list below is necessary to
provide communication between the devices handle the data when encryption is used to
(nodes) in them. prevent unauthorized access to the data?
a) Primary Key
15. An application known as an ________ server b) Authorised Key
makes it easier for an entity trying to enter a c) Encryption Key
network to be authenticated. d) Decryption Key
a) Authentication e) Foreign Key
b) File Answer: C
c) Application The message is encrypted using the encryption
d) Database key. Even if an enemy intercepts the message,
e) Merge he won't be able to decrypt it and understand
Answer: A what it means because he doesn't have the key.
An application known as an authentication
server makes it easier for an entity trying to enter 18. Which of the following regular forms is
a network to be authenticated. regarded as suitable for creating a standard
RDBMS?
16. The uniqueness of data values contained in a) 2NF
a single column (attribute) in a table in SQL b) 3NF
(Structured Query Language)is referred to as c) 4NF
____________. d) 5NF
a) Redundancy e) None of these
b) Inconsistency Answer: B
c) Cardinality An RDBMS table may be referred to as
d) Overload "normalized" if it is in the Third Normal Form
e) Integrity since the majority of 3NF tables are free of
Answer: C insertion, update, and deletion abnormalities.
The uniqueness of data values contained in a
single column (attribute) in a table in SQL 19. The oldest Database model is
_______________.

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -48 (Eng)

a) Network When using client software to access a website,


b) Physical a domain name is a string of characters that
c) Relational corresponds to a numeric IP address.
d) Hierarchial
e) Operational 22. A __________ is a group of related web
Answer: A pages (and any supporting resources) that have
Data is kept in a network model's hierarchical the same domain name.
network flow. The data is kept in the form of a) Web
tables in a relational DBMS. Parent-Child b) Website
Relationships Create Hierarchy. c) Web link
d) Hyperlink
20. __________ is widely used today for e) Hypertext
protecting data in transit in a variety of Answer: B
applications such as data transfer on the A website is a group of related web pages (and
Internet, and cellular phone networks. any supporting resources) that have the same
a) Decryption domain name.
b) Encryption
c) Integration 23. What is the full form of DNS in a computer
d) Data Mining network?
e) Interpretation a) Domain Name System
Answer: B b) Decimal Number System
Encryption is also used to carry out other tasks, c) Domain Numeric System
such as authentication. d) Dual Name System
e) Dual Number System
21. When using client software to access a Answer: A
website, __________ is a string of characters that With Domain Name System, DNS holds a variety
corresponds to a numeric IP address. of data. A domain name (also known as a
a) Domain Name computer hostname) is converted to an IP
b) HTML address using DNS.
c) URL
d) WWW 24. A ________ is a computer system that makes
e) Web resources, information, services, or programs
Answer: A

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -48 (Eng)

available across a network to other computers, 25. A __________ is a piece of information from a
sometimes known as clients. website that is saved in a web browser for
a) Web subsequent retrieval by the website.
b) Server a) Cookies
c) Protocol b) Server
d) Hypertext c) Router
e) Hyperlink d) Cache
Answer: B e) Web
A server is a computer system that makes Answer: A
resources, information, services, or programs A cookie is a piece of information from a website
available across a network to other computers, that is saved in a web browser for subsequent
sometimes known as clients. retrieval by the website.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -49 (Eng)

Computer Awareness

1. The Boot sector files of the system are stored Answer: C


in which computer memory? Cache memory is a tiny, extremely fast
a) RAM semiconductor memory that aids in CPU
b) ROM acceleration. As a buffer, it sits between the
c) Cache CPU and RAM.
d) Register
e) Hardware 4. Which process is used to map logical
Answer: B addresses of variable length onto physical
The software instructions needed to start the memory?
computer are kept in ROM. Only reading is a) Paging
permitted. b) Overlays
c) Segmentation
2. Which of the following is the lowest in the d) Paging with segmentation
computer memory hierarchy? e) Interpretation
a) Cache Answer: C
b) RAM Memory is divided into groups of varying lengths,
c) Secondary memory or segments, via a technique or mechanism
d) CPU registers called segmentation.
e) None of the above
Answer: C 5. Which of the following is used to transfer data
The secondary memory is the lowest in the between the processor (CPU) and memory?
memory hierarchy. The Harddisks, USD, USB, a) Cache
Memory card,and SSD are the examples of b) TLB
secondary memory c) Buffer
d) Registers
3. Which memory acts as a buffer between CPU e) RAM
and main memory? Answer: D
a) RAM Several registers are present on a processor
b) ROM (CPU) to store data momentarily while a
c) Cache programme is running.
d) Storage
e) Register

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -49 (Eng)

6. The frequency at which a processor's clock including the date, time, and some system setup
generator can produce pulses, which are needed parameters.
to coordinate the actions of its components, is
referred to as the ____________ in computing 8. ______________ is an application that converts
and is used as an indicator of the processor's a programming language into a machine
speed. language program.
a) Clipboard a) Assembler
b) Clock Speed b) Compiler
c) Channel c) Critical Mass
d) Cache d) Cursor
e) Cascade e) Clock Speed
Answer: B Answer: B
The frequency at which a processor's clock The compiler is an application that converts a
generator can produce pulses, which are needed programming language into a machine language
to coordinate the actions of its components, is program.
referred to as the clock speed in computing and
is used as an indicator of the processor's speed. 9. A ____________ is a device used in computer
user interfaces to indicate where the user can
7. When a computer system is shut off, a now interact on a computer screen or other
battery-operated chip called ______________ on display device and which response to input from
the motherboard is in charge of maintaining a text input or pointing device.
some system data, including the date, time, and a) Assembler
some system setup parameters. b) Compiler
a) Cache c) Critical Mass
b)CMOS d) Cursor
c) Cascade e) Clock Speed
d) Clock Speed Answer: D
e) Channel A cursor is a device used in computer user
Answer: B interfaces to indicate where the user can now
When a computer system is shut off, a battery- interact on a computer screen or other display
operated chip called CMOS on the motherboard device and which response to input from a text
is in charge of maintaining some system data, input or pointing device.

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -49 (Eng)

10. The term ____________ describes the virtual  It connects different networks and sends
computing environment, and more particularly, a data packets from one network to
type of electronic media used to support online another.
communication.  A router can be used both in LANs (Local
a) Assembler Area Networks) and WANs (Wide Area
b) Compiler Networks).
c) Critical Mass  It transfers data in the form of IP packets.
d) Cyber Space To transmit data, it uses the IP address
e) Clock Speed mentioned in the destination field of the IP
Answer: D packet.
The term "cyberspace" describes the virtual  Routers have a routing table in them that
computing environment, and more particularly, a is refreshed periodically according to the
type of electronic media used to support online changes in the network. To transmit data
communication. packets, it consults the table and uses a
routing protocol.
11. Which of the following are the functions of a  To prepare or refresh the routing table,
Router in a Computer Network? routers share information.
a) They are responsible for receiving, analyzing,  Routers protect against broadcast storms.
and forwarding data packets among the
connected computer networks 12. A computer network is known as a ____that
b) Managing traffic between these networks by usually spans a city or a large campus.
forwarding data packets to their intended IP a) LAN
addresses b) WAN
c) Allowing multiple devices to use the same c) MAN
Internet connection d) Protocol
d) Routers protect against broadcast storms e) SPAN
e) All the above Answer: C
Answer: E A computer network called a metropolitan area
Features of Routers network (MAN) typically covers a whole city or a
 A router is a layer 3 or network layer sizable campus. A MAN often connects several
device. LANs using a high-capacity backbone
technology, including fiber-optic cables and
offers uplink services to WANs and the Internet.

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -49 (Eng)

e) None of these
13. What type of network address translation can Answer: C
be applied to allow multiple users to connect to LAN stands for Local Area Network
the global internet using a single IP address?
a) LAN 16. When a key is pressed on the keyboard,
b) MAN which standard is used for converting the
c) WAN keystroke into the corresponding bits?
d) PAT a) ANSI
e) NAT b) ASCII
Answer: D c) EBCDIC
Network address translation can be done one-to- d) ISO
many using port address translation (PAT). e) ACET
Answer: B
14. A system of rules and digital message When a key is pressed on the keyboard, the
formats for sending messages in or across ASCII standard is used for converting the
computing systems and in telecommunications is keystroke into the corresponding bits.
known as a ____________________.
a) Router 17. When a key is pressed, a keyboard interacts
b) Modem with _________________.
c) Server a) Sensor
d) Communications Protocol b) Keyboard controller
e) Topology c) Keyboard buffer
Answer: D d) Both (b) and (c)
A system of rules and digital message formats e) Both (a) and (b)
for sending messages in or across computing Answer: D
systems and in telecommunications is known as
a Communication Protocol. 18. To select text by shading as you drag the
mouse arrow over the text is referred to as
15. LAN stands for _______________________ ________.
a) Lane Area Network a) Clip art
b) Local Army Network b) Highlight
c) Local Area Network c) Fetch
d) Local Area Networking d) Decode

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -49 (Eng)

e) Smart Art 21. The most commonly used internet


Answer: B connection wirelessly are ______________.
To select text by shading as you drag the mouse a) Wireless (WiFi stands for Wireless Fidelity)
arrow over the text is referred to as Highlight. b) Mobile and Hotspots
c) Satellite
19. ______________ is a technique used in d) ISDN
computer networking and telecommunications to e) All of the above
combine several analogue or digital signals into Answer: E
a single signal via a common medium.
a) Interpreter 22. Which industry-recognized network protocol
b) Assembler is used to move computer data between hosts
c) Multiplexing on a TCP-based network like the Internet?
d) Compiler a) TCP
e) Manipulation b) FTP
Answer: C c) WWW
Multiplexing is a technique used in computer d) URL
networking and telecommunications to combine e) LEI
several analogue or digital signals into a single Answer: B
signal via a common medium. Transmission Control Protocol/Internet Protocol
(TCP/IP) connections can be used to send files
20. A light-sensitive device that converts between computers using the FTP (File Transfer
drawing, printed text or other images into digital Protocol) network protocol.
form is __________________.
a) Plotter 23. What does the second T represent in HTTP?
b) Scanner a) Text
c) Keyboard b) Telecommunication
d) mouse c) Transfer
e) Light Pen d) Transmitted
Answer: B e) Transferring
A light-sensitive device that converts drawing, Answer: C
printed text, or other images into digital form is HTTP- Hypertext Transfer Protocol
Scanner.

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -49 (Eng)

24. ____________ is the text that is displayed on 25. A word, phrase, or image that contains a
a computer screen or other electronic device and ___________ allows you to navigate to a different
has links to other texts the reader can view right document or section within the one you're
away. currently reading.
a) Web a) Web
b) Server b) Server
c) Protocol c) Protocol
d) Hypertext d) Hypertext
e) Hyperlink e) Hyperlink
Answer: D Answer: E
Hypertext is the text that is displayed on a A word, phrase, or image that contains a
computer screen or other electronic device and hyperlink allows you to navigate to a different
has links to other texts the reader can view right document or section within the one you're
away. currently reading.

Click Here For Bundle PDF Course | [email protected] Page 6 of 6


Computer Awareness Bundle PDF Course Day -50 (Eng)

Computer Awareness

1. In which type of memory, once the program or After a power outage, permanent data storage or
data is written, cannot be changed? information retention is referred to as Non-
a) EPROM volatile storage.
b) PROM
c) EEPROM 4. The process of dividing the disk into tracks
d) RAM and sectors is called ______________.
e) None of these a) Tracking
Answer: B b) Crashing
If there is a mistake when writing instructions or c) Dicing
data to Programmable Read-Only Memory d) Formatting
(PROM), the mistake cannot be fixed. PROM e) Caching
chip stops working. Answer: D
The process of dividing the disk into tracks and
2. The computer’s internal memory consists of sectors is called Formatting.
_______________.
a) Cache memory, registers 5. The main memory of a personal computer can
b) CPU registers, main memory, cache memory also be called as ________________.
c) Main memory, secondary memory a) Primary storage
d) Virtual memory, cache memory b) Internal memory
e) None of these c) Primary memory
Answer: B d) All of these
e) None of these
3. After a power outage, permanent data storage Answer: D
or information retention is referred to as The term memory is used as a synonym for
____________________. primary memory or as an abbreviation for a
a) Volatile storage specific type of primary memory called random
b) Non-volatile storage access memory (RAM).
c) Sequential storage
d) Both a and b 6. A standardized representation of facts, ideas,
e) Both a and c or instructions that is suitable for human or
Answer: B electronic machine processing, interpretation,
and transmission is known as ____________.

Click Here For Bundle PDF Course | [email protected] Page 1 of 6


Computer Awareness Bundle PDF Course Day -50 (Eng)

a) Data e) Database
b) Database Answer: B
c) Data Rate Data communications refer to the transmission
d) Decoder of this digital data between two or more
e) Demodulation computers and a computer network or data
Answer: A network is a telecommunications network that
A standardized representation of facts, ideas, or allows computers to exchange data.
instructions that is suitable for human or
electronic machine processing, interpretation, 9. The amount of data transmitted via a network
and transmission is known as data. in a given amount of time is known as the
_____________.
7. A __________ is a planned grouping of a) Data Rate
material that has been arranged and is often b) Data Communication
kept electronically in a computer system. c) Decoder
a) Data d) Demodulation
b) Database e) Database
c) Data Rate Answer: A
d) Decoder Explanation:
e) Demodulation The amount of data transmitted via a network in
Answer: B a given amount of time is known as the data
A database is a planned grouping of material rate.
that has been arranged and is often kept 10. A _____________ is a circuit board that
electronically in a computer system. connects to another circuit board and expands
its circuitry.
8. __________________ refers to the transmission a) Data Rate
of this digital data between two or more b) Data Communication
computers and a computer network or data c) Daughter Board
network is a telecommunications network that d) DataBase
allows computers to exchange data. e) Decoder
a) Data Rate Answer: C
b) Data Communication A daughterboard is a circuit board that connects
c) Decoder to another circuit board and expands its circuitry.
d) Demodulation

Click Here For Bundle PDF Course | [email protected] Page 2 of 6


Computer Awareness Bundle PDF Course Day -50 (Eng)

11. Which one of the following refers to the "data c) Entity


about data"? d) All the above
a) Directory e) None of these
b) Sub Data Answer: D
c) Warehouse A table, which is a collection of rows and
d) MetaData columns, serves as the representation of a
e) Hexa Data relation in SQL. As a result, the collection of
Answer: D rows and columns is referred to as a table, but in
When we talk about the term "Mata Data," we SQL, a table is referred to as a relation. Rows in
mean the kind of data that describes other data a relation (or table, depending on your
or information. preference) are known as tuples. Therefore,
The only thing a generic file or document is a tuples will be the right response.
series of bytes that includes information like the
file name, file size, and the date and time the 14. _________ refers to the number of tuples of
document was generated or edited. relation because cardinality represents the
number of tuples in a relation.
12. In general, a file is basically a collection of all a) Entity
related_____________. b) Column
a) Rows & Columns c) Cardinality
b) Fields d) Tuples
c) Database e) None of the above
d) Records Answer: C
e) Programs Cardinality refers to the number of tuples of
Answer: D relation because cardinality represents the
Every time we have related data, information, or number of tuples in a relation.
records, we gather them together, combine
them, store them in a single location, and give 15. Which one of the following is a type of Data
the collection a name that is known as a file. Manipulation Command?
a) Create
13. Rows of a relation are known as the b) Alter
_________________. c) Delete
a) Degree d) Shift
b) Tuples e) All the above

Click Here For Bundle PDF Course | [email protected] Page 3 of 6


Computer Awareness Bundle PDF Course Day -50 (Eng)

Answer: C In information technology, a protocol is an


The commands select, insert, update, and delete agreement between the communicating parties
are used in data manipulation languages to on how communication is to proceed.
manipulate information (or data, records), for
example, to build, update, and delete tables. 18. _________________ is a system in which
computers are inter-connected and the
16. Which is a commonly used protocol for geographical spread may be within a building to
exchanging files over any network that supports 1 kilometer.
the TCP/IP protocol? a) MAN
a) FTP b) WAN
b) TCP c) LAN
c) HTTP d) Router
d) SMTP e) Protocol
e) All the above Answer: C
Answer: A A local Area Network (LAN) can be defined as a
The File Transfer Protocol (FTP) is a standard collection of computers and peripherals
communication protocol used for the transfer of interconnected within a limited geographical
computer files from a server to a client on a area. This area may be one building or one
computer network.FTP, the File Transfer campus within a few kilometers.
Protocol, enables users to transfer files between
computers. 19. A ____ is a data communications network
that covers a relatively broad geographic area
17. A________________ is a contract outlining the and that often uses transmission facilities
terms and conditions of communication between provided by common carriers, such as telephone
the parties. companies.
a) Protocol a) MAN
b) Router b) WAN
c) Server c) LAN
d) Networking d) Router
e) Topology e) Protocol
Answer: A Answer: B
A wide-area network (WAN) uses a
communications channel that incorporates many

Click Here For Bundle PDF Course | [email protected] Page 4 of 6


Computer Awareness Bundle PDF Course Day -50 (Eng)

media, including cables, telephone lines, and


radio waves. Common carriers, including phone 22. Which of the following provides the ability to
companies, offer transmission facilities that are query information from the database and insert
frequently used by WANs. tuples into, delete tuples from, and modify tuples
in the database?
20. Which of the following components connects a) DML (Data Manipulation Language)
numerous PCs to a single LAN? b) Query
a) Repeater c) Relational Schema
b) Switch d) DDL (Data Definition Language)
c) Hub e) Relational Database
d) Router Answer: A
e) Server The Data Manipulation Language, or "DML," is
Answer: B what is utilised to make the necessary
A network switch is a little hardware component modifications to the values of the relation.
that connects numerous computers to a local
area network (LAN). Multiple Ethernet devices 23. A Database Management System is a type
are linked via a hub, which makes them function of _________software.
as a single segment. a) It is a type of system software
b) It is a kind of application software
21. Which of the following is generally used for c) It is a kind of general software
performing tasks like creating the structure of the d) Both a and b
relations, or deleting relation? e) Both a and c
a) DML (Data Manipulation Language) Answer: A
b) Query A type of system software called a DBMS, or
c) Relational Schema database management system, is used for many
d) DDL (Data Definition Language) tasks like building tables and databases, storing
e) Relational Database data, and administering databases. Additionally,
Answer: D it enables editing of the database's data.
The phrase "DDL" stands for Data Definition
Language, which is utilised to carry out all other 24. The term "FAT" is stands for_____________.
crucial functions, such erasing associated a) File Allocation Tree
schemas and relational relationships when b) File Allocation Table
constructing a structural relation. c) File Allocation Graph

Click Here For Bundle PDF Course | [email protected] Page 5 of 6


Computer Awareness Bundle PDF Course Day -50 (Eng)

d) All the above e) Data Interpretation


e) None of these Answer: C
Answer: B A data warehouse is a sizable collection of
various sorts of data/information gathered from
25. A huge collection of information or data numerous sources and kept in one location. It
accumulated from several different sources is functions exactly like a regular warehouse, which
known as _________________. is typically a holding area or facility used to store
a) Data Mining numerous various types of items until they are
b) Data Management disseminated further. Data Warehouse is the
c) Data Warehousing appropriate response.
d) Data Manipulation

Click Here For Bundle PDF Course | [email protected] Page 6 of 6

You might also like