Sunday 13 December 2020

General Computer Test - 146

 

1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches.

A. 20

B. 75

C. 85

D. 99

Answer: C

2. The survey showed that these businesses lost more than due to security breaches.

A. $100,000 each

B. $377 million

C. five employees each

D. $1 million

Answer: B

3. The typical computer criminal is a(n):

A. young hacker.

B. trusted employee with no criminal record.

C. trusted employee with a long, but unknown criminal record.

D. overseas young cracker.

Answer: B

4. The majority of computer crimes are committed by:

A. hackers.

B. insiders.

C. overseas criminals.

D. young teenage computer geniuses.

Answer: B

5. The common name for the crime of stealing passwords is:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: B

7. Malicious software is known as:

A. badware.

B. malware.

C. maliciousware.

D. illegalware.

Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:

 

A. worm.

B. Trojan horse.

C. virus.

D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse.

B. virus.

C. time bomb.

D. time-related bomb sequence.

Answer: B

10. In 1999, the Melissa virus was a widely publicized:

A. e-mail virus.

B. macro virus.

C. Trojan horse.

D. Time bomb.

Answer: A

11. What type of virus uses computer hosts to reproduce itself?

A. Time bomb

B. Worm

C. Melissa virus

D. Macro virus

Answer: B

12. The thing that eventually terminates a worm virus is a lack of:

 

A. memory or disk space.

B. time.

C. CD drive space.

D. CD-RW.

Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

14. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus

B. Spybot

C. Logic bomb

D. Security patch

 

Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

A. more complicated.

B. more difficult.

C. easier.

D. slower.

Answer: C

17. HTML viruses infect:

A. your computer.

B. a Web page in the HTML code.

C. both a Web page and the computer that is viewing it.

D. No

Answer: B

18. Software programs that close potential security breaches in an operating system are known as:

A. security breach fixes.

B. refresh patches.

C. security repairs.

D. security patches.

Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

A. a virus.

B. a Trojan horse.

C. cracking.

 

D. a denial of service attack.

Answer: D

20. is the measurement of things such as fingerprints and retinal scans used for security access.

A. Biometrics

 B. Biomeasurement

C. Computer security

 D. Smart weapon machinery

Answer: A

21. What is the most common tool used to restrict access to a computer system?

A. User logins

B. Passwords

C. Computer keys

D. Access-control software

Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:

A. love.

B. Fred.

C. God.

D. 123.

Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

A. hacker-proof program.

B. firewall.

C. hacker-resistant server.

D. encryption safe wall.

Answer: B

24. The scrambling of code is known as:

A. encryption.

B. a firewall.

C. scrambling.

D. password proofing.

Answer: A

25. If you want to secure a message, use a(n):

A. cryptology source.

B. encryption key.

C. encryption software package.

D. cryptosystem.

Answer: D Reference: How It Works: 10.2 Cryptography

General Computer Test - 145

 

1. The term ‘Computer’ is derived from..........

a. Latin

b. German

c. Frenc         

 d. Arabic

1. A

2. Who is the inventor of “Difference Engine”?

a. Allen Turing

b. Charles Babbage

c. Simur Cray

d. Augusta Adaming

2.B

3. Who is the father of Computer?

a. Allen Turing

b. Charles Babbag

 c. Simur Cray

d. Augusta Adaming

3. B

4. Who is the father of Computer science?

a. Allen Turing

b. Charles Babbage

c. Simur Cray

 d. Augusta Adaming

4. A

5. Who is the father of personal computer?

a. Edward Robert

b. Allen Turing

c. Charles Babbage

d. None of these

5. A

6. A CPU contains

a. a card reader and a printing devic

 b. an analytical engine and a control unit

c. a control unit and an arithmetic logic unit

d. an arithmetic logic unit and a card reader

6. C

7. Which of the following controls the process of interaction between the user and the operating system?

a. User interface

 b. Language translator

c. Platform

d. Screen saver

7. A

8. The first computers were programmed using

a. assembly languag

 b. machine language

c. source code

 d. object code

8. B

9. ..........is a combination of hardware and software that facilitates the sharing of information between computing devices.

a. network

 b. periphera

 c. expansion boar

 d. digital device

9.A

10. Coded entries which are used to gain access to a computer system are called

a. Entry code

 b. Passwords

c. Security commands

d. Code words

10.B

11. Which of the following statements is true ?

a. Minicomputer works faster than Microcomputer

b. Microcomputer works faster than Minicomputer

c. Speed of both the computers is the same

d. The speeds of both these computers cannot be compared with the speed of advanced

11.A

12. You organize files by storing them in

a. archive

 b. folder

 c. indexe

 d. lists

12.B

13. What type of resource is most likely to be a shared common resource in a computer Network?

a. Printers

b. Speaker

 c. Floppy disk drive

 d. Keyboards

13.A

14. Which device is required for the Internet connection?

a. Joystic

 b. Mode

 c. CD Drive

d. NIC Card

14.B

15. What is a light pen?

a. A Mechanical Input device

 b. Optical input device

c. Electronic input device

d. Optical output device

15.B

16. UNIVAC is

a. Universal Automatic Computer

 b. Universal Array Computer

c. Unique Automatic Computer

 d. Unvalued Automatic Computer

16.A

17. CD-ROM stands for

a. Compactable Read Only Memory

b. Compact Data Read Only Memory

c. Compactable Disk Read Only Memory

 d. Compact Disk Read Only Memory

17.A

18. ALU is

a. Arithmetic Logic Unit

b. Array Logic Unit

c. Application Logic Unit

d. None of above

18.A

19. VGA is

a. Video Graphics Array

 b. Visual Graphics Array

c. Volatile Graphics Array

d. Video Graphics Adapter

19.A

20. IBM 1401 is

a. First Generation Computer

 b. Second Generation Computer

c. Third Generation Computer

d . Fourth Generation Computer

20.B

21. MSI stands for

a. Medium Scale Integrated Circuits

 b. Medium System Integrated Circuits

c. Medium Scale Intelligent Circuit

 d. Medium System Intelligent Circuit

21.A

22. The capacity of 3.5 inch floppy disk is

a. 1.40 MB

b. 1.44 GB

 c. 1.40 GB

 d. 1.44 MB

22.D

23. WAN stands for

a. Wap Area Network

b. Wide Area Network

c. Wide Array Net

d. Wireless Area Network

23.B

24. MICR stands for

a. Magnetic Ink Character Reader

b. Magnetic Ink Code Reader

c. Magnetic Ink Cases Reader

d. None of  these

24.A

25. EBCDIC stands for

a. Extended Binary Coded Decimal Interchange Code

b. Extended Bit Code Decimal Interchange Code

c. Extended Bit Case Decimal Interchange Code

d. Extended Binary Case Decimal Interchange Code

25. A

General Computer Test - 144


Q.1 A computer communication technology that provides a way to interconnect multiple computer across short distance is

(A) LAN

(B) MAN

(C) WAN

 (D) Wireless network

Ans: A LAN

Q.2 Telnet is a service that runs

(A) Television on net

 (B) Remote program

(C) Cable TV network

(D) Telenext

Ans: B Remote program

Q.3. A device that forwards data packet from one network to another is called a

(A) Bridge

(B) Switch

(C) Hub

(D) Gateway

Ans: B Switch

Q.4 Which of the following is the fastest media of data transfer

(A) Co-axial Cable

(B) Untwisted Wire

(C) Telephone Lines

(D) Fibre Optic

Ans: D Fiber Optic.

Q.5 Tool that is used to transfer data/files among computers on the Internet

(A) FTP

 (B) Archie

(C) TCP

(D) Gopher

Ans: C TCP

Q.6 HTML is a

(A) Programming Language

 (B) Scripting Language

(C) Web Browser

 (D) Network Protocol

Ans: B Scripting Language

Q.7 Secret-key encryption is also known as

(A) Asymmetric encryption

(B) Symmetric encryption

(C) Secret-encryption

(D) Private encryption

Ans: D Private encryption

Q.8 The concept of electronic cash is to execute payment by

(A) Credit Card

(B) ATM Card

(C) Using computers over network

(D) Cheque

Ans: C Using computers over network.

Q.9 SMTP is a

(A) Networking Protocol

(B) Protocol used for transferring message between end user & Mail Server

(C) Protocol used for smart card message interchange

(D) Encryption Standard

Ans: B Protocol used for transferring message between end user & Mail Server.

Q.10 Digital Signature is

(A)Scanned Signature on Computer

(B) Code number of the sender.

(C)Public Key Encryption.

(D)Software to recognize signature.

Ans: D Software to recognize signature

Q.11 Telnet is a

(A) Network of Telephones

(B) Television Network

(C) Remote Login

(D) Remote Login.

Ans: C Remote Login.

Q.12 The internet is

(A) Network of networks

(B) Web site.

(C) Host

(D) Server

Ans: A Network of networks

Q.13 An e-business that allows consumer to name their own price for products and services is following which e-business model?

(A) B2B

(B) B2G

(C) C2C

(D) C2B

Ans: D C2B

Q.14 Kerberos is an encryption-based system that uses

(A) Secret key encryption

 (B) Public key encryption

(C) Private key encryption

 (D) Data key encryption

Ans: A Secret key encryption.

Q.15 The method(s) of payment for online consumers are

(A) Electronic cash

(B) Credit/debit

(C) Electronic checks

(D) All of the above

Ans: D All of the Above.

Q.16 DNS is

(A) The distributed hierarchical naming system

(B) The vertical naming system

(C) The horizontal naming system

(D) The client server system

Ans: C The horizontal naming system.

Q.17 A firewall is

(A) An established network performance reference point.

(B) Software or hardware used to isolate a private network from a public network.

(C) A virus that infects macros.

(D) A predefined encryption key used to encrypt and decrypt data transmissions.

Ans: B Software or hardware used to isolate a private network from a public network.

Q.18 A router

(A) Screens incoming information.

(B) Distributes information between networks

(C) Clears all viruses from a computer system

(D) Is a work virus.

Ans: B Distributes information between networks

Q.19 LDAP stands for

(A) Light weight Data Access Protocol.

(B) Light weight Directory Access Protocol.

(C) Large Data Access Protocol.

(D) Large Directory Access Protocol.

Ans: B -> Light weight Directory Access Protocol.

Q.20 E-Commerce is not suitable for

(A) Sale/Purchase of expensive jewellery and antiques.

(B) Sale/Purchase of mobile phones.

(C) Sale/Purchase of branded clothes.

(D) Online job searching.

Ans: D Online job searching

Q.21 Amazon.com comes under the following model

(A) B2B

 (B) B2C

(C) C2C

 (D) C2B

Ans: B B2C

Q.22 Hubs are present in the network

(A) to diagnose line failures, measure and manage traffic flow and simplify re configuring of LANs.

(B) to interconnect the LAN with WANs.

(C) to interconnect the WANs with WANs.

(D) to interconnect the WANs with LANs.

Ans: B to interconnect the LAN with WANs.

Q.23 Firewalls operate by

(A)The pre-purchase phase.

(B) isolating Intranet from Extranet.

(C)Screening packets to/from the Network and provide controllable filtering of network traffic.

(D)None of the above.

Ans: C Screening packets to/from the Network and provide controllable filtering of network traffic.

Q.24 The mercantile process model consists of the following pahase(s):

(A) The pre-purchase phase.

(B) Purchase consummation phase.

(C) Post-purchase Interaction phase.

(D) All of the above.

Ans: D All of the Above.

25. To access a mainframe or supercomputer, users often use a __________.

A) terminal

B) node

C) desktop

D) handheld

Answers: A  Terminal

General Computer Test - 143

 

1. The operation of combining two cells into a single cell in Excel is referred to as

(1) join cells

(2) merge cells

(3) merge table

(4) join table

(5) None of these

ANSWER:2

2. Which of the following can be used to store a large number of files in a small amount of storage space?

(1) File adjustment

(2) File copying

(3) File reading

(4) File compatibility

(5) File compression

ANSWER:5

3. In a computer, most processing takes place in

(1) memory

(2) RAM

(3) motherboard

(4) CPU

(5) None of these

ANSWER:4

4. Data is organized in a worksheet as

(1) charts and diagrams

(2) rows and columns

(3) tables and boxes

(4) graphs

(5) None of the above

ANSWER:2

5. Which of the following is an example of a binary number?

(1) 6AH1

(2) 100101

(3) 005

(4) ABCD

(5) 23456

ANSWER:2

6. Spell Check will find errors in which of the following?

(1) Today is a rainy day

(2) Today is a rainy a day

(3) Is a rainy

(4) Rainy today a day

(5) None of the above

ANSWER:5

7. Which of the following is not a storage medium?

(1) Hard disk

(2) Flash drive

(3) DVD

(4) CD

(5) Keyboard

ANSWER:5

8. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the menu, the user must

(1) select the Cells. choose Edit. and select Clear, then All

(2) select the Cells. and click Delete on the keyboard

(3) select the Cells. choose Tools. and select Clear. then Formats

(4) select the Cells. choose Tools. and select Formula Audit. then Delete

(5) None of the above

ANSWER:1

9. The computer abbreviation KB usually means

(1) Key Block

(2) Kernel Boot

(3) Kilo Byte

(4) Kit Bit

(5) None of these

ANSWER: 3

10. If an Excel Worksheet is to be linked for use in a PowerPoint presentation, the following should be clicked

(1) Edit, Paste Special

(2) Edit, Paste

(3) Edit, Copy

(4) File, Copy

(5) None of the above

ANSWER: 2

11. RAM stands for

(1) Random Access Memory

(2) Ready Application Module

(3) Read Access Memory

(4) Remote Access Machine

(5) None of the above

ANSWER: 1

12. Which of the following is the hardware and not the software? .

(1) Excel

(2) Printer driver

(3) Operating system

(4) Powerpoint

(5) Control Unit

ANSWER:5

13. In Word, which menu would the user select to print a document?

(1) Tools

(2) File

(3) View

(4) Wind0Vob

(5) None of these

ANSWER: 2

14. Which of the following is not true about computer files?

(1) They are collections of data saved to a Storage medium

(2) Every file has a filename

(3) A file extension is established by the user to indicate the date it was created

(4) Usually files contain data

(5) None of the above

ANSWER:5

15. The common name for a modulator-demodulator is

(1) modem

(2) joiner

(3) networker

(4) connector

(5) demod

ANSWER: 1

16. What do you see when you click the right mouse button?

(1) The same effect as the left click

(2) A special menu

(3) No effect

(4) A mouse cannot be right clicked

(5) Computer goes to sleep mode

ANSWER:2

17. In order to choose the font for a sentence in a Word document,

(1) select Font in the Format menu

(2) select Font in the Edit menu

(3) select Font in the Tools menu

(4) select Font in the Insert menu

(5) None of the above

ANSWER:1

18. The ALU performs .......... operations.

(1) logarithm-based

(2) ASCII

(3) algorithm-based

(4) arithmetic

(5) None of the above

ANSWER:4

19. Excel is a program that is used to prepare a

(1) Database

(2) Text Document

(3) Spreadsheet

(4) Slide Presentation

(5) None of the above

ANSWER:3

20. .......... consists of volatile chips that temporarily store data or instructions.

(1) CPU

(2) ROM

(3)RMA

(4) RAM

(5) None of these

Q.21 Which of the following is not an scripting language ?

(A) HTML

(B) XML

(C) Postscript

(D) Javascript

Ans: C Postscript

Q.22 Which of the following is a platform free language

(A) Fortran

 (B) Assembly

(C) C

(D) Java

Ans: D Java

Q.23 A digital signature is

(A) scanned signature

 (B) signature in binary form

(C) encrypting information

 (D) handwritten signature

Ans: C encrypting information

Q.24 Mechanism to protect private networks from outside attack is

(A) Firewall

 (B) Antivirus

(C) Digital signature

(D) Formatting

Ans: A Firewall

Q.25 A computer system that permits multiple users to run programs at same time

(A) Real time system

(B) Multi programming system

(C) Time sharing system

 (D) Multi tasking system

Ans: D Multi tasking system

General Computer Test - 142

 

1. When you enter text in a cell in Excel, it also appears in which of the following?

(1) Status bar

(2) Formula bar

(3) Row heading

(4) Name box

(5) None of these

ANSWER:2

2. Which elements of a Word document can be displayed in colour?

(1) Only graphics

(2) Only text

(3) Only the first word of each line

(4) All elements, but only if you have a colour printer

(5) All elements

3. A workbook is a collection of

(1) Page Setup

(2) Buttons

(3) Diagrams

(4) Charts

(5) Worksheets

ANSWER:5

4. appear at the bottom of the Excel Window.

(1) Sheet tabs

(2) Name Box

(3) Formula bar

(4) Title bar

(5) None of these

5. EPROM stands for

(1) Erasable Programmable Read-Only Memory

(2) Electronic Programmable Read-Only Memory

(3) Enterprise Programmable Read-Only Memory

(4) Extended Programmable Read-Only Memory

(5) Electrical Programmable Read-Only Memory

ANSWER: 1

6. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

(1) CISC

(2) RISC

3) CD-ROM

(4) Wi-Fi

(5) MISC

ANSWER: 2

7. Which is not a basic function of a computer?

(1) Store data

(2)Accept input

(3)Process data

(4) Copy text

(5) Accept and process data

ANSWER: 4

8. ASCII is a coding system that provides

(1) 256 different characters

(2) 512 different characters

(3) 1024 different characters

(4) 128 different characters

(5) 1000 different characters

ANSWER: 4

9. Which part of the computer is directly invoked in executing the instructions of the computer program?

(1) The scanner

(2) The main storage

(3) The secondary storage

(4) The printer

(5) The processor

ANSWER: 5

10. In order to create column data in Word, you need to

(1) tab consecutively until your cursor reaches the desired place

(2) set tabs or use the Table menu

(3) use Excel

(4) press the space bar until your cursor reaches the desired place

(5) None of these

ANSWER: 5

11. Files are organised by storing them in

(1) tables

(2) databases

(3) folders

(4) graphs

(5) diagrams

ANSWER:3

12. When a computer is switched on, the booting process performs

(1) Integrity Test

(2) Power-On Self-Test

(3) Correct Functioning Test

(4) Reliability Test

(5) Shut-down

ANSWER: 2

13. In Word, the feature that automatically detects common errors is called

(1) Autocorrect

(2) Autograph

(3) Spelling and Grammar

(4) Go to

(5) Thesaurus

ANSWER:1

14. A computer system that is old and perhaps not satisfactory is referred to as a(n)

(1) Ancient system

(2) Historical system

(3) Age old system

(4) Legacy system

(5) Legal System

ANSWER: 4

15. Which of the following is not a binary number?

(1) 001

(2) 101

(3) 202

(4) 110

(5) 011

ANSWER:3

16. Which of the following does not store data permanently?

(1) ROM

(2) RAM

(3) Floppy Disk

(4) Hard Disk

(5) None of these

ANSWER:2

17. Which of the following is the smallest storage?

(1) Megabyte

(2) Gigabyte

(3) Kilobyte

(4) Terabyte

(5) None of these

ANSWER:5

18. Which menu enables the user to choose toolbars?

(1) View

(2) Format

(3) Insert

(4) Edit

(5) Help

ANSWER: 1

19. By viewing the properties of the local hard disk of a computer, the user can find out

(1) the amount of space that has been used up and the remaining free space on the disk.

(2) the name of the user viewing the properties of the disk.

(3) nothing useful to the user.

(4) the number of programs available in the computer,

(5) None of these

ANSWER: 1

20. Pre-defined and built-in formulas in Excel are known as

(1) Autosheets

(2) Diagrams

(3) Charts

(4) Tables

(5) Functions

ANSWER:5

21. Which of the following contains permanent data and gets updated during the processing of transactions?

(1) Operating System File

(2) Transaction file

(3) Software File

(4) Master file

(5) Any File

ANSWER:4

22. The keyboard shortcut to centralise the selected text in Word is

(1) Ctrl + Esc

(2) Ctrl + C

(3) Alt + C

(4) There is no keyboard shortcut for this operation

(5) Ctrl + E

ANSWER: 5

23. Which of the following helps to protect floppy disks from data getting accidentally erased?

(1) Access notch

(2) Write-protect notch

(3) Entry notch

(4) Input notch

(5) None of these

ANSWER:2

24. A modem is connected to

(1) a telephone line

(2) a keyboard

(3) a printer

(4) a monitor

(5) a scanner

ANSWER:1

25. Large transaction processing systems in automated organisations use

(1) Online processing

(2) Batch Processing

(3) Once-a-day Processing

(4) End-of-day processing

(5) Once-a-week processing

ANSWER:2

General Computer Test - 141

 

1. Computer uses the .......... number system to store data and perform calculations.

(1) binary

(2) octal

(3) decimal

(4) hexadecimal

(5) None of these

ANSWER: 1

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is-

(1) Memory-only

(2) Write-only

(3) Once-only

(4) Run-only

(5) Read-only

ANSWER: 5

3. Which of the following can be used to select the entire document?

(1) CTRL + A

(2) ALT + F5

(3) SHIFT + A

(4) CTRL + K

(5) CTRL + H

ANSWER: 1

4. .......... are attempts by individuals to obtain confidential information from you by falsifying their identity.

(1) Phishing

(2) Computer viruses

(3) Spyware scams

(4) Viruses

(5) None of the above

ANSWER: 1

5. Port number, port description, and number of ports ordered are examples of

(1) control

(2) output

(3) processing

(4) feedback

(5) input

ANSWER: 5

6. A Web site's main page is called its-

(1) Home Page

(2) Browser Page

(3) Search Page

(4) Bookmark

(5) None of these

ANSWER: 1

7. The simultaneous processing of two or more programs by multiple processors is-

(1) multiprogramming

(2) multitasking

(3) time-sharing

(4) multiprocessing

 (5) None of these

ANSWER: 1

8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

(1) an ASCII code

(2) a magnetic tape

(3) an OCR scanner

(4) a bar code

(5) None of these

ANSWER: 4

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the ..... button and then point to AutoFit Contents.

(1) Fit to Form

(2) Format

(3) Autosize

(4) Contents

(5) AutoFit

ANSWER: 5

10. Why is it unethical to share copyrighted files with your friends?

(1) It is not unethical, because it is legal.

(2) It is unethical because the files are being given for free.

(3) Sharing copyrighted files without permission breaks copyright laws.

(4) It is not unethical because the files are being given for free.

(5) It is not unethical-anyone can access a computer

ANSWER: 3

11. Reusable optical storage will typically have the acronym-

(1) CD

(2) DVD

(3) ROM

(4) RW

(5) ROS

ANSWER: 4

12. The most common type of storage devices are-

(1) persistent

(2) optical

(3) magnetic

(4) flash

(5) steel

ANSWER: 2

13. A device that connects to a network without the use of cables is said to be-

(1) distributed

(2) free

(3) centralized

(4) open source

(5) None of these

ANSWER:5

14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

(1) hacker

(2) analyst

(3) instant messenger

(4) programmer

(5) spammer

ANSWER: 1

15. To access properties of an object, the mouse technique to use is-

(1) dragging

(2) dropping

(3) right-clicking

(4) shift-clicking

(5) None of these

ANSWER:3

16. To change selected text to all capital letters, click the change case button, then click-

(1) UPPERCASE

(2) UPPER ALL

(3) CAPS LOCK

(4) Lock Upper

(5) Large Size

ANSWER: 1

17. The basic unit of a worksheet into which you enter data in Excel is called a-

(1) tab

(2) cell

(3) box

(4) range

(5) None of these

ANSWER: 2

18. You can keep your personal files / folders in-

(1) My folder

(2) My Documents

(3) My Files

(4) My Text

(5) None of these

ANSWER: 2

19. In Word you can force a page break-

(1) By positioning your cursor at the appropriate place and pressing the F1 key

(2) By positioning your cursor at the appropriate place and pressing Ctrl + Enter

(3) By using the Insert/Section Break

(4) By changing the font size of your document

(5) None of these

ANSWER: 2

20. A DVD is an example of a(n)-

(1) hard disk

(2) optical disc

(3) output device

(4) solid-state storage device

(5) None of these

ANSWER:2

21. The default view in Excel is ......... view.

(1) Work

(2) Auto

(3) Normal

(4) Roman

(5) None of these

ANSWER:3

22. The process of transferring files from a computer on the Internet to your computer is called

(1) downloading

(2) uploading

(3) FTP

(4) JPEG

(5) downsizing

ANSWER: 1

23. .......... is the process of dividing the disk into tracks and sectors.

(1) Tracking

(2) Formatting

(3) Crashing

(4) Allotting

(5) None of these

ANSWER:2

24. Help Menu is available at which button?

(1) End

(2) Start

(3) Turnoff

(4) Restart

(5) Reboot

ANSWER:2

25. The contents of .......... are lost when the computer turns off.

(1) storage

(2) input

(3) output

(4) memory

(5) None of these

ANSWER: 5

General Computer Test - 140

 

1. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line

1) Compiler

2) Interpreter

3) Linker

4) Loader

5) None

Answer:-2

2. _ _ _ _ _ _ _ _ is an OOP principle

1) Structured programming

2) Procedural programming

3) Inheritance

4) Linking

5) None

Answer:-

3

3. COBOL is widely used in _ _ _ _ _ _ _ applications

1) Commercial

2) Scientific

3) Space

4) Mathematical

5) None

Answer:-1

4. RAM stands for

1) Random origin money

2) Random only memory

3) Read only memory

4) Random access memory

5) None

Answer:-4

5. 1 Byte = ?

1) 8 bits

2) 4 bits

3) 2 bits

4) 9 bits

5) None

Answer:-1

6. SMPS stands for

1) Switched mode power supply

2) Start mode power supply

3) Store mode power supply

4) Single mode power supply

5) None

Answer:-1

7. The device used to carry digital data on analog lines is called as

1) Modem

2) Multiplexer

3) Modulator

4) Demodulator

5) None

Answer:-1

8. VDU is also called

1) Screen

2) Monitor

3) Both 1 & 2

4) printer

5) None

Answer:-3

9. BIOS stands for

1) Basic Input Output system

2) Binary Input output system

3) Basic Input Off system

4) all the above

5) None

Answer:-1

10. Father of ‘C’ programming language

1) Dennis Ritchie

2) Prof Jhon Kemeny

3) Thomas Kurtz

4) Bill Gates

5) None

Answer:-1

11. The 16 bit Microprocessor means that it has

1) 16 address lines

2) 16 Buses

3) 16 Data lines

4) 16 routes

5) None

Answer:-3

12. Data going into the computer is called

1) Output

2) algorithm

3) Input

4) Calculations

5) flow chart

Answer:-3

13. Which of the following refers to a small, single-site network?

1) LAN

2) DSL

3) RAM

4) USB

5) CPU

Answer:-1

14. Microsoft Office is

1) Shareware

2)Public domain software

3) Open-source software

4) A vertical market application

5) An application suite

Answer:-5

15. How many options does a BINARY choice offer

1) None

2) One

3) Two

4) it depends on the amount of memory on the computer

5) It depends on the speed of the computer‘s processor

Answer:-3

16. A collection of program that controls how your computer system runs and processes information is called

1) Operating System

2) Computer

 3) Office

 4) Compiler

 5) Interpreter

Answer:-1

17. Computer connected to a LAN (Local Area Network) can

1) run faster

2) go on line

3) share information and /or share peripheral equipment

4) E-mail

5) None

Answer:-3

18. Information travels between components on the mother board through

1) Flash memory

2) CMOS

 3) Bays

 4) Buses

 5) Peripherals

Answer:-3

19. How are data organized in a spreadsheet?

1) Lines & spaces

2) Layers & Planes

 3) Height & Width

4) Rows & Columns

 5) None

Answer:-4

20. The blinking symbol on the computer screen is called the

1) mouse

2) logo

3) hand

4) palm

 5) cursor

Answer:-5

21. When you are selecting a mouse for a particular computer system, what is the most important consideration?

(1) The type of drivers that come with the mouse

(2) The length of the mouse cord

(3) The type of connector the mouse is equipped with

(4) The number of buttons the mouse has

(5) None of these

Ans: (3)

22. How is power supplied to a low-power USB device?

(1) Through a power cable

(2) From an external power supply

(3) Directly from the computers power supply

(4) Through the USB cable

(5) None of these

Ans: (4)

23. All of the following are basic principles of net works, except —

(1) each computer must have a network card

(2) there must be communications media connecting the network hardware devices

(3) there must be at least one connecting device

(4) each computer must have software that supports the movement of information

(5) None of these

Ans: (2)

24. The………….data mining technique derives rules from real-world case examples.

(1) Rule discover

(2) Signal processing

(3) Neural nets

(4) Case-based reasoning

(5) None of these

Ans: (3)

25. …………….are used to identify a user who returns to a Website.

(1) Cookies

(2) Plug-ins

(3) Scripts

(4) ASPs

(5) None of these

Ans: (1)

General Computer Test - 139

 

1. A table consists of

a. fields and columns

 b. rows and columns

c. rows and cells

 d. none of these

1. b

2. The purpose of an index is to provide ........... to the file it is indexing

a. strorage area

 b. access path

c. name

 d. number

2. b

3. The database environment has all of the following components execpt

a. users

 b. separate files

c. database

 d. database administrator

3. b

4. Which of the following is an advantage of the database approach

a. elimination of data redundancy

b. ability to associate related data

c. increased security

d. All of the above

4. d

5. When changes occur in a data item, if every file which contains that field should not be updated then, it leads to

a. data redundancy

b. data inconsistancy

c. data security

 d. data loss

5. b

6. When the same data field is stored more than once in a file, then it leads to

a. data redundancy

 b. data inconsistancy

c. data dependancy

d. data independency

6. a

7. Data security threats include

a. privacy invasion

 b. hardware failure

c. fraudulent manipulation of data

d. all of the above

7. d

8. Updating a database means

a. revising a file structure

b. reorganizing the database

c. modifying or adding records

d. all of the above

8. d

9. Firmware means

a. software

 b. hardware

c. software available on hardware

d. none of these

9. c

10. For each instructions of program in memory the CPU goes through a

a. decode - fetch - execute sequence

b. execute - store - decode sequence

c. fetch - decode - execute sequence

d. fetch - execute - decode sequence

10. c

11. Which of the following is the ascending order of data hierarchy

a. bit - byte - record - field - data base - file

b. bit - byte - field - record - file - database

c. bit - byte - file - field - record - database

d. bit - record - byte - field - file – database

11. b

12. A microcomputer consists of atleast an input unit, an output unit, microprocessor unit and a

a. stabilizer

 b. memory unit

c. printer

d. network

12. b

13. Magnetic tape can serve as

a. input media

b. output media

c. secondary storage media

d. all of the above

13. d

14. Super computers are mainly useful for

a. mathematical intensive scientific applications

b. data-retrieval operations

c. input-output intensive processing

d. all of the above

14. a

15. Which of the following storage is volatile

a. semiconductor memory

b. floppy disk

c. CD-ROM

d. core memory

15. a

16. RAM chips

a. allow the computer to store data electronically

b. store data indefinitely unless you delete it

c. are secondary memory

d. all of the above

16. a

17. EEPROM is

a. easily erasable

 b. non-erasable

c. effectively erasable

 d. electrically erasable

17.d

18. Multiprocessing

a. makes the operating system simpler

b. allows multiple processes to run simultaneously

c. is completely understood by all major computer vendors

d. allows the same computer to have multiple processors

18. d

19. How many units in a single bus structure will communicate at a time

a. 1

b. 2

c. 3

d. 14

19. b

20. Arithmetic logic unit

I. perform arithmetic operations

II. store data

III. perform comparison

IV. communicate with input devices of the above the correct one is

a. I only

b. II only

c. I and II only

d. I and III only

20. d

ANSWERS

21. __________ is processed by the computer into information.

A) numbers

B) processor

C) input

D) data

21:d

22. During the __________ portion of the Information Processing Cycle, the computer acquires data from some source.

A) processing

B) output

C) input

D) storage

22:c

23. Reusable optical storage will typically have the acronym __________.

A) CD

B) RW

C) DVD

D) ROM

23:b

24. The __________ tells the computer how to use its components.

A) utility

B) network

C) operating system

D) application program

24:c

25. The most common type of storage devices are __________.

A) magnetic

B) optical

C) flash

D) persistent

25:a

General Computer Test - 138

 

1. The binary representation 100110 is numerically equivalent to

a. the decimal representation 46

b. the octal representation 46

c. the hexadecimal representation 46

d. the binary representation 26

2. The Boolean expression A.B  A.B  A.B is equivalent to

a. A + B

 b. A.B

c. A  B

d. A . B

3. The greatest negative number which can be stored in a computer that has 8-bit wordlength and uses 2's complement arithmetic is

a. -256

 b. -255

 c. -128

 d. -127

4. By taking 2's complement again of the 2's complement of a binary, one gets

a. the 1's complement

 b. the 2's complement

c. the original number

d. the sign magnitude form of the numbers

5. The expression A(A + B) by writing the first term A as A + ) the expression is best simplified as

a. A + AB

 b. AB

c. A

d. A + B

6. In the sign magnitude representation, the leading bit

a. is a part of the number itself

b. is unit for positive numbers

c. is always unit

d. stands for the sign

7. Which of the following is equivalent to the Boolean expression Y  A B  B C  C A

a. AB BCCA

b. (A  B)  (B  C)  (A  C)

c. (A  B)(B C)(C  A)

d. (A  B) (BC) (C A)

8. The OSI reference model defines the function for seven layers of protocols

a. including the user and communication medium.

b. not including the user or communication medium

c. including the communication medium but not the user

d. including the user but not the communication medium

9. The OSI reference model is

a. worthless

 b. a protocol

c. not a protocol

 d. None of these

10. A data packet is a packet header together with

a. a network layer

b. an administrative layer

c. user data

d. a packet switch

11. The application layer of the OSI model is the

a. seventh layer

 b. sixth layer

c. fifth layer

 d. fourth layer

12. Working of the WAN generally involves

a. satellite

 b. frame delay

c. ATM

 d. user agent

13. Which of the following technique provides dedicated communication channel between two stations.

a. switch network

b. circuit switching

c. packet switching

 d. none of these

14. End-to-end conncectivity is provided from host-to-host in

a. network layer

 b. session layer

c. data link layer

 d. transport layer

15. Base band is

a. transmission of signals without modulation

b. a signal all of whose energy is contained within a finite frequency range.

c. the simultaneous transmission of data to a number of stations

d. all of the above

16. The simultaneous transmission of data to a number of stations is known as

a. broad cast

 b. bandwidth

c. Aloha

d. analog transmission

17. The communication mode that supports data in both directions

a. simplex

b. half duplex

c. duplex

d. multiplex

18. Modulation is the process of

a. sending a file from one computer to another computer

b. converting digital signals to analog signals

c. converting analog signals to digital signals

d. echoing every character that is received

19. A distributed network configuration in which all data/information pass through a central computer is

a. bus network

b. star network

c. duplex

 d. multiplex

20. To connect a computer with a device in the same room, you might be likely to use

a. a coaxial cable

 b. a dedicated time

c. a ground station

 d. all of the above

21. Administrative supervision of database activities is the responsibility of the

a. data base administrator

b. DP Manager

c. DB Manager

d. VP-DP administrator

22. Which of the following component of a computer system is the most important to a data base management system

a. mouse

b. high resolution video display

c. printer

d. high speed, large capacity disk

23. What is the serious problem(s) of file management systems

a. data redundancy

 b. difficult to update

c. program dependence

d. All of the above

24. Which of the following contains complete record of all activity that affected the contents of a database during a certain period of time

a. master file

 b. transaction file

c. report

 d. query file

25. In a database, related fields are grouped to form

a. record

 b. file

c. bank

 d. field group

1. b 2. A 3. c 4. c 5. c 6. d 7. c 8. b 9. c 10. c 11. a 12. a 13. b

14. d 15. a 16. a 17. b 18. b 19. b 20. a 21. a 22. d 23. d 24. B 25. a

General Computer Test - 137

 

1. Which of the following memory is volatile

a. RAM

b. ROM

c. EPROM

d. PROM

2. The memory which is programmed at the time it is manufactured is

a. ROM

b. RAM

c. PROM

d. EPROM

3. Which memory is non volatile and may be written only once.

a. RAM

 b. EE-PROM

c. EPROM

d. PROM

4. Which of the following statements is wrong

a. magnetic core memory, RAMs and ROMs have constant access time

b. magnetic tape is non volatile

c. semiconductor memories are used as mass memory medium

d. An EPROM can be programmed, erased and reprogrammed by the user with an EPROM programming instrument

5. The fastest type of memory is

a. tape

b. semiconductor memory

c. disk

 d. bubble memory

6. In magnetic disks data is organized on the platter in a concentric sets or rings called

a. sector

 b. track

c. head

 d. block

7. When we move from the outer most track to the innermost track in a magnetic disk, the density

a. increases

 b. decreases

c. remains the same

d. either remains constant or decreases

8. Which of the following device can be used to directly input printed text

a. OCR

b. Mouse

c. MIC

 d. Joystick

9. Which device can draw continuous lines

a. daisy wheel

 b. plotter

c. chain printer

d. impact printer

10. In which storage device, recording is done by burning tiny pits on a circular disk

a. punched cards

 b. floppy disk

c. magnetic tape

d. optical disk

11. Which of the following printers uses light beam and electrostatically sensitive black powder

a. dot matric printer

 b. daisy wheel printer

c. chain printer

 d. laser printer

12. The primary purpose of an operating system is

a. to make the most efficient use of the computer hardware

b. to allow people to use the computer

c. to keep system programmers employed

d. to make computers fast.

13. The operating system manages

a. memory

 b. processor

c. disk and I/O devices

d. all of the above

14. Scheduling is

a. allowing job to use the processor

b. unrelated performance considerations

c. quiet simple to implement, even on large main frames

d. the same regardless of the purpose of the system

15. Which of the following translator program converts assembly language program to object program

a. assembler

b. compiler

c. macroprocessor

d. linker

16. Multiprogramming systems

a. are easier to develop than single programming systems

b. execute each job faster

c. execute more jobs in the same time period

d. use only one large mainframe computer

17. What device is used for entering x – y cordinates

a. card reader

 b. joystick

c. keyboard

 d. all of the above

18. Impact printers

a. strike a ribbon against the paper to produce character images.

b. include ink-jet and thermal devices

c. are more expensive than laser printers

d. use optical technology

19. Bar codes stores information using

a. punched holes

 b. dots

c. thick and thin tines

 d. all of the above

20. How many types of storage loops exist in magnetic bubble memory

a. 8

b. 4

c. 3

 d. 2

21. In comparison to the internal (main) memory, tape or disk memory is

a. slower and more expensive

b. slower and less expensive

c. faster and more expensive

d. faster and less expensive

22. One of the main features that distinguish microprocessor from microcomputers is

a. words are usually larger in microprocessors

b. words are shorter in microprocessors

c. microprocessor doesnot contain I/O devices

d. computers are not fully integrated

23. microprocessor with 'n' address lines is capable of addressing

a. 2n locations

 b. 2(n + 1)locations

c. 2n locations

 d. n2 locations

24. Which technique is preferable for transferring a large amount of data to and from a memory in a short time

a. DMA

 b. Interrupt driven I/O

c. programmed I/O

 d. None of these

25. Boolean expression for the output of X-NOR (equivalence) logic gate with inputs A and B is

a. AB  AB

 b. AB AB

c. (A  B) (A  B)

 d. (A  B) (A  B)

1. a 2. a 3. d 4. c 5. b

6. b 7. a 8. a 9. b 10. d 11. d 12. a 13. d 14. a 15. b 16. c

17. b 18. a 19. c 20. d 21. b 22. c 23. c 24 a 25. c