Thursday 3 December 2020

General Computer Test - 3


1. Many individuals create their own personal sites called Web logs, or………….

(a)    social networks

(b)    blogs

(c)     wikis

(d)    search engines

(e)    None of these

Ans : (b)

2. Programs that automatically submit your search request to several search engines simultaneously are called…………

(a)    metasearch engines

(b)    inclusive search engines

(c)     spiders

(d)    hits

(e)    None of these

Ans : (a)

3. cash is the Internet’s equivalent to traditional cash.

(a)    Universal

(b)    Web

(c)     Premium

(d)    Digital

(e)    None of these

Ans : (d)

4. These programs allow parents as well as organizations to block out selected sites and set time limits on Internet access.

(a)    plug-ins

(b)    filters

(c)     FTP

(d)    DSL

(e)    None of these

Ans : (b)

5. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.

(a)    application software

(b)    communications software

(c)     system software

(d)    Web software

(e)    None of these

Ans : (c)

6. ………….are narrowly focused on specific disciplines and occupations.

(a)    Basic applications

(b)    Business suites

(c)     Specialized applications

(d)    Utility programs

(e)    None of these

Ans : (c)

7. The primary purpose of this type of software is to create text-based documents.

(a)    spreadsheet

(b)    presentation

(c)     word processing

(d)    web development

(e)    None of these

Ans : (c)

8. Letters, memos, term papers, reports, and contracts are all examples of

(a)    models

(b)    spreadsheets

(c)     documents

(d)    menus

(e)    None of these

Ans : (c)

9. The acronym DBMS stands for what?

(a)    double-blind management setup

(b)    document binder management system

(c)     data binding and marketing structure

(d)    database management system

(e)    None of these

Ans : (d)

10. Database…………..are primarily used to enter new records and to make changes to existing records.

(a)    reports

(b)    tables

(c)     forms

(d)    queries

(e)    None of these

Ans : (c)

11. A     file that includes predefined settings that can be used to create many common types of presentations is called a

(a)    pattern

(b)    model

(c)     template

(d)    blueprint

(e)    None of these

Ans : (c)

12. A(n)……....is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more.

(a)    specialized application

(b)    integrated package

(c)     basic application

(d)    software suite

(e)    None of these

Ans : (b)

13. A Computer that is on the Network is a ……….

(a)    Node

(b)    Terminal

(c)     Client

(d)    Online

(e)    None of these

Ans : (a)

14. Network operating systems from Novell is ….……..

(a)    NOS

(b)    UNIX

(c)     NetWare

(d)    Solaris

(e)    None of these

Ans : (c)

15. NIC Stands for …………

(a)    Network Interface Card

(b)    Network Internal Card

(c)     Network Internet Client

(d)    Network Input Card

(e)    None of these

Ans : (a)

16. Older network often use another type of cable, called………..

(a)    Twisted-pair cable

(b)    Unshielded twisted-pair cable

(c)     Coaxial cable

(d)    Optical Fiber

(e)    None of these

Ans : (c)

17. Magnetic Media is an Example of ….. layer

(a)    Physical Layer

(b)    Data Link Layer

(c)     Network Layer

(d)    Application Layer

(e)    None of these

Ans : (a)

18. This power protection device includes a battery that provides a few minutes of power.

(a)    surge suppressor

(b)    line conditioner

(c)     generator

(d)    UPS

(e)    None of these

Ans : (d)

19. Which layer defines the mechanical, electrical, and timing interfaces to the network?

(a)    Physical Layer

(b)    Data Link Layer

(c)     Network Layer

(d)    Application Layer

(e)    None of these

Ans : (a)

20. SCSI port (pronounced skuzzy) stands for

(a)    System Computer Scanning Interface

(b)    Small Computer System Interface

(c)     Small Computer System Internet

(d)    System Computer, System Interfaced

(e)    None of these

Ans : (b)

21. LPT stands for

(a)    Laser Printer

(b)    Link Port

(c)     Line Printer

(d)    Line Port

(e)    None of these

Ans : (c)

22. Spool stands for

(a)    Serial Printer Object Oriented Language

(b)    Simultaneous Peripheral Output On-Line

(c)     System Protocol Optimization Outliner

(d)    Single Program Operating System Operation

(e)    None of these

Ans : (b)

23. Which of the following field is not a part of Frame?

(a)    kind

(b)    seq

(c)     header

(d)    info

(e)    None of these

Ans : (c)

24. The technique of temporarily delaying outgoing acknowledgments so that they can be hooked onto the next outgoing data frame is known as

(a)    Correcting

(b)    Piggybacking

(c)     Sliding

(d)    None of these

(e)    None of these

Ans : (b)

25. The data link layer is used for

(a)    Providing a well-defined service interface to the network layer.

(b)    Dealing with transmission errors

(c)     Regulating the flow of data so that slow receivers are not swamped by fast senders

(d)    All of these

(e)    None of these

Ans : (d)

General Computer Test - 2


1. The memory address of the first element of an array is called

(a)   floor address

(b)   foundation address

(c)   first address

(d)   base address

(e)   None of these

Ans : (d)

2. The term “push” and “pop” is related to the

(a)   array

(b)   lists

(c)   stacks

(d)   all of these

(e)   None of these

Ans : (c)

3. What does Router do in a network?

(a)   Forwards a packet to all outgoing links

(b)   Forwards a packet to the next free outgoing link

(c)   Determines on which outing link a packet is to be forwarded

(d)   Forwards a packet to all outgoing links except the original link

(e)   None of these

Ans : (c)

4. Repeater operates in which layer of the OSI model?

(a)   Physical layer

(b)   Data link layer

(c)   Network layer

(d)   Transport layer

(e)   None of these

Ans : (a)

5. GIF images can have only upto …………. colors

(a)   128

(b)   256

(c)   512

(d)   1024

(e)   None of these

Ans : (b)

6. …………is stored on a client and contains state information of the website visited

(a)   Cookies

(b)   Servelet

(c)   History

(d)   Resident Page

(e)   None of these

Ans : (a)

7. ………..are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.

(a)   Applets

(b)   Java Bean

(c)   Sockets

(d)   Java Component

(e)   None of these

Ans : (a)

8. Encryption is the conversion of data in some intelligible format into an unintelligible format called to prevent the data from being understood if read by an unauthorized party.

(a)   Clear Text

(b)   Encrypted Text

(c)   Cipher Text

(d)   Coded Text

(e)   None of these

Ans : (c)

9. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as :

(a)   Spooling

(b)   Contention

(c)   I/O wait

(d)   Buffering

(e)   None of these

Ans : (d)

10. Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the…………..

(a)   cell’s column label

(b)   cell’s column label and worksheet tab name

(c)   cell’s row and column labels

(d)   cell’s row label

(e)   None of these

Ans : (c)

11. The lowest form of computer language is called

(a)   BASIC

(b)   FORTRAN

(c)   Machine Language

(d)   COBOL

(e)   None of these

Ans : (c)

12. The portion of the application that you work with in an application software package is the

(a)   user interface

(b)   utility interface

(c)   processing interface

(d)   analytical interface

(e)   None of these

Ans : (a)

13. A……………provides access to features of the program.

(a)   menu bar

(b)   browser

(c)   Office Assistant

(d)   feature presentation

(e)   None of these

Ans : (a)

14. Menus are a part of the

(a)   hardware

(b)   monitor

(c)   Status Bar

(d)   user interface

(e)   None of these

Ans : (d)

15. Which of the following is the term for a request for specific data contained in a database?

(a)   question

(b)   query

(c)   inquiry

(d)   quiz

(e)   None of these

Ans : (b)

16. Windows 7 is an example of a(n)

(a)   application software

(b)   browser

(c)   Operating system

(d)   shareware

(e)   None of these

Ans : (c)

17. The most powerful type of computer.

(a)   mainframe computers

(b)   microcomputers

(c)   minicomputers

(d)   supercomputers

(e)   None of these

Ans : (d)

18. The system component that controls and manipulates data in order to produce information is called the

(a)   keyboard

(b)   microprocessor

(c)   monitor

(d)   mouse

(e)   None of these

Ans : (b)

19. Which of the following is not an operating system for mobile phones?

(a)   Android

(b)   Symbian

(c)   iOS

(d)   Bada

(e)   All of these are OS for mobile phones

Ans : (e)

20. This type of file is created by word processors.

(a)   worksheet

(b)   document

(c)   database

(d)   presentation

(e)   None of these

Ans : (b)

21. Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use computer technology.

(a)   graphics

(b)   input

(c)   memory

(d)   wireless

(e)   None of these

Ans : (d)

22. The Internet was launched in 1969 when the United States funded a project that developed a national computer network called

(a)   Web

(b)   ISP

(c)   CERN

(d)   ARPANET

(e)   None of these

Ans : (d)

23. A(n) …….. program provides access to Web resources.

(a)   Web

(b)   ISP

(c)   browser

(d)   URL

(e)   None of these

Ans : (c)

24. Rules for exchanging data between computers are called

(a)   programs

(b)   procedures

(c)   protocols

(d)   hyperlinks

(e)   None of these

Ans : (c)

25. The last part of the domain name following the dot(.) is the top………domain

(a)   Level

(b)   link

(c)   locator

(d)   language

(e)   None of these

Ans : (a)

Tuesday 1 December 2020

General Computer Test - 1


1.   ………….is a technique of improving the priority of process waiting in Queue for CPU allocation

a)    Starvation                    

b)    Ageing

c)    Revocation                  

d)    Relocation

e)    None of these

Ans : (b)

2.   A grammar for a programming language is a formal description of

a)    Syntax                         

b)    Semantics

c)    Structure                      

d)    Code

e)    None of these

Ans : (c)

3.   …………is a technique of temporarily removing inactive programs from the memory of computer system

a)    Swapping            

b)    Spooling

c)    Semaphore             

d)    Scheduler

e)    None of these

Ans : (a)

4.   The memory allocation scheme subject to “external” fragmentation is

a)    segmentation

b)    swapping

c)    pure demand paging

d)    multiple fixed contiguous partitions

e)    None of these

Ans : (a)

5.Virtual memory is

a)    simple to implement

b)    used in all major commercial operating systems

c)    less efficient in utilization of memory

d)    useful when fast I/O devices are not available

e)    None of these

       Ans : (b)

6. Before proceeding with its execution, each process must acquire all the resources it needs is called

a)    hold and wait

b)    No pre-emption

c)    circular wait

d)    starvation

e)    None of these

Ans : (a)

7. The main reason to encrypt a file is to.................

a)    Reduce its size

b)    Secure it for transmission

c)    Prepare it for backup

d)    Include it in the start-up sequence

e)    None of these

Ans : (b)

8. ‘LRU’ page replacement policy is

a)    Last Replaced Unit

b)    Last Restored Unit

c)    Least Recently Used

d)    Least Required Unit

e)    None of these

Ans : (c)

9. Which  of   the  following   is  not   a  fundamental process state

a)    ready

b)    terminated

c)    executing

d)    blocked

e)    None of these

Ans : (d) 

10. ODBC stands for

a)    Object Database Connectivity

b)    Oral Database Connectivity

c)    Oracle Database Connectivity

d)    Open Database Connectivity

e)    None of these

Ans : (d)

11. Which two files are used during operations of the DBMS

a)    Query languages and utilities

b)    DML and query language

c)    Data dictionary and transaction log

d)    Data dictionary and query language

e)    None of these

Ans : (c)

12. A protocol is a set of rules governing a time sequence of events that must take place

a)    between peers

b)    between an interface

c)    between modems

d)    across an interface

e)    None of these

Ans : (a)

13. In communication satellite, multiple repeaters are known as

a)    detector

b)    modulator

c)    stations

d)    transponders

e)    None of these

Ans : (d)

14. Which of the following is required to communicate between two computers?

a)    communications software

b)    protocol

c)    communication hardware

d)    (d) all     of     above     including     access     to transmission medium

e)    None of these

Ans : (d)

15. Which of the following is an advantage to using fiber optics data transmission?

a)    resistance to data theft

b)    fast data transmission rate

c)    low noise level

d)    All of these

e)    None of these

Ans : (d)

16. Which of the following is not a transmission medium?

a)    Telephone lines

b)    Coaxial cables

c)    modem

d)    microwave systems

e)    None of these

Ans : (c)

17. A technique for direct search is

a)    Binary Search

b)    Linear Search

c)    Tree Search                 

d)    Hashing

e)    None of these

Ans : (d)

18. Two main measures for the efficiency of an algorithm are

a)    Processor and memory

b)    Complexity and capacity

c)    Time and Space

d)    Data and Space

e)    None of these

Ans : (c)

19. The space factor when determining the efficiency of algorithm is measured by

a)    Counting the maximum memory needed by the algorithm

b)    Counting the minimum memory needed by the algorithm

c)    Counting the average memory needed by the algorithm

d)    Counting the maximum disk space needed by the algorithm

e)    None of these

Ans : (a)

20. Which of the following does not affect the resolution of a video display image?

a)    Bandwidth

b)    Raster scan rage

c)    Vertical and horizontal lines of resolution

d)    Screen Size

e)    None of these

Ans : (a)

21. Latency time is

a)    Time to spin the needed data under head

b)    Time to spin the needed data under track

c)    Time to spin data under sector

d)    All of these

e)    None of these

Ans : (a)

22. DPI stands for

a)    Desktop projection Ink

b)    Dot per inch

c)    Dot-matrix printer ink

d)    Desktop pixel Inch

e)    None of these

Ans : (b)

23.  Databases software may be divided into

a)    five distinct categories

b)    four distinct categories

c)    three distinct categories

d)    two distinct categories

e)    None of these

Ans : (c)

24.  File record length

a)    Should always be fixed

b)    Should always be variable

c)    Depends upon the size of file

d)    Should be chosen to match the data characteristics.

e)    None of these

Ans : (d)

25.  ………….is the time required by a sector to reach below read/write heat

a)    Seek Time

b)    Latency Time

c)    Access Time

d)    None

e)    None of these

Ans : (b)