Monday 14 December 2020

General Computer Test - 163

 

1. Which of the following does not store data permanently?

(1) ROM

(2) RAM

(3) Floppy Disk

(4) Hard Disk

(5) None of these

ANSWER:2

2. Which of the following is the smallest storage?

(1) Megabyte

(2) Gigabyte

(3) Kilobyte

(4) Terabyte

(5) None of these

ANSWER:5

3. Which menu enables the user to choose toolbars?

(1) View

(2) Format

(3) Insert

(4) Edit

(5) Help

ANSWER: 1

4. By viewing the properties of the local hard disk of a computer, the user can find out

(1) the amount of space that has been used up and the remaining free space on the disk.

(2) the name of the user viewing the properties of the disk.

(3) nothing useful to the user.

(4) the number of programs available in the computer,

(5) None of these

ANSWER: 1

5. Pre-defined and built-in formulas in Excel are known as

(1) Autosheets

(2) Diagrams

(3) Charts

(4) Tables

(5) Functions

ANSWER:5

6. Which of the following contains permanent data and gets updated during the processing of transactions?

(1) Operating System File

(2) Transaction file

(3) Software File

(4) Master file

(5) Any File

ANSWER:4

7. The keyboard shortcut to centralise the selected text in Word is

(1) Ctrl + Esc

(2) Ctrl + C

(3) Alt + C

(4) There is no keyboard shortcut for this operation

(5) Ctrl + E

ANSWER: 5

8. Which of the following helps to protect floppy disks from data getting accidentally erased?

(1) Access notch

(2) Write-protect notch

(3) Entry notch

(4) Input notch

(5) None of these

ANSWER:2

9. A modem is connected to

(1) a telephone line

(2) a keyboard

(3) a printer

(4) a monitor

(5) a scanner

ANSWER:1

10. Large transaction processing systems in automated organisations use

(1) Online processing

(2) Batch Processing

(3) Once-a-day Processing

(4) End-of-day processing

(5) Once-a-week processing

ANSWER:2

11. The operation of combining two cells into a single cell in Excel is referred to as

(1) join cells

(2) merge cells

(3) merge table

(4) join table

(5) None of these

ANSWER:2

12. Which of the following can be used to store a large number of files in a small amount of storage space?

(1) File adjustment

(2) File copying

(3) File reading

(4) File compatibility

(5) File compression

ANSWER:5

13. In a computer, most processing takes place in

(1) memory

(2) RAM

(3) motherboard

(4) CPU

(5) None of these

ANSWER:4

14. Data is organized in a worksheet as

(1) charts and diagrams

(2) rows and columns

(3) tables and boxes

(4) graphs

(5) None of the above

ANSWER:2

15. Which of the following is an example of a binary number?

(1) 6AH1

(2) 100101

(3) 005

(4) ABCD

(5) 23456

ANSWER:2

16. Spell Check will find errors in which of the following?

(1) Today is a rainy day

(2) Today is a rainy a day

(3) Is a rainy

(4) Rainy today a day

(5) None of the above

ANSWER:5

17. Which of the following is not a storage medium?

(1) Hard disk

(2) Flash drive

(3) DVD

(4) CD

(5) Keyboard

ANSWER:5

18. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the menu, the user must

(1) select the Cells. choose Edit. and select Clear, then All

(2) select the Cells. and click Delete on the keyboard

(3) select the Cells. choose Tools. and select Clear. then Formats

(4) select the Cells. choose Tools. and select Formula Audit. then Delete

(5) None of the above

ANSWER:1

19. The computer abbreviation KB usually means

(1) Key Block

(2) Kernel Boot

(3) Kilo Byte

(4) Kit Bit

(5) None of these

ANSWER: 3

20. If an Excel Worksheet is to be linked for use in a PowerPoint presentation, the following should be clicked

(1) Edit, Paste Special

(2) Edit, Paste

(3) Edit, Copy

(4) File, Copy

(5) None of the above

ANSWER: 2

21. RAM stands for

(1) Random Access Memory

(2) Ready Application Module

(3) Read Access Memory

(4) Remote Access Machine

(5) None of the above

ANSWER: 1

22. Which of the following is the hardware and not the software? .

(1) Excel

(2) Printer driver

(3) Operating system

(4) Powerpoint

(5) Control Unit

ANSWER:5

23. In Word, which menu would the user select to print a document?

(1) Tools

(2) File

(3) View

(4) Wind0Vob

(5) None of these

ANSWER: 2

24. Which of the following is not true about computer files?

(1) They are collections of data saved to a Storage medium

(2) Every file has a filename

(3) A file extension is established by the user to indicate the date it was created

(4) Usually files contain data

(5) None of the above

ANSWER:5

25. The common name for a modulator-demodulator is

(1) modem

(2) joiner

(3) networker

(4) connector

(5) demod

ANSWER: 1

General Computer Test - 162

 

1. To change selected text to all capital letters, click the change case button, then click- (1) UPPERCASE

(2) UPPER ALL

(3) CAPS LOCK

(4) Lock Upper

(5) Large Size

ANSWER: 1

2. The basic unit of a worksheet into which you enter data in Excel is called a-

(1) tab

(2) cell

(3) box

(4) range

(5) None of these

ANSWER: 2

3. You can keep your personal files / folders in-

(1) My folder

(2) My Documents

(3) My Files

(4) My Text

(5) None of these

ANSWER: 2

4. In Word you can force a page break-

(1) By positioning your cursor at the appropriate place and pressing the F1 key

(2) By positioning your cursor at the appropriate place and pressing Ctrl + Enter

(3) By using the Insert/Section Break

(4) By changing the font size of your document

(5) None of these

ANSWER: 2

5. A DVD is an example of a(n)-

(1) hard disk

(2) optical disc

(3) output device

(4) solid-state storage device

(5) None of these

ANSWER:2

6. The default view in Excel is ......... view.

(1) Work

(2) Auto

(3) Normal

(4) Roman

(5) None of these

ANSWER:3

7. The process of transferring files from a computer on the Internet to your computer is called

(1) downloading

(2) uploading

(3) FTP

(4) JPEG

(5) downsizing

ANSWER: 1

8. .......... is the process of dividing the disk into tracks and sectors.

(1) Tracking

(2) Formatting

(3) Crashing

(4) Allotting

(5) None of these

ANSWER:2

9. Help Menu is available at which button?

(1) End

(2) Start

(3) Turnoff

(4) Restart

(5) Reboot

ANSWER:2

10. The contents of .......... are lost when the computer turns off.

(1) storage

(2) input

(3) output

(4) memory

(5) None of these

ANSWER: 5

11. When you enter text in a cell in Excel, it also appears in which of the following?

(1) Status bar

(2) Formula bar

(3) Row heading

(4) Name box

(5) None of these

ANSWER:2

12. Which elements of a Word document can be displayed in colour?

(1) Only graphics

(2) Only text

(3) Only the first word of each line

(4) All elements, but only if you have a colour printer

(5) All elements

13. A workbook is a collection of

(1) Page Setup

(2) Buttons

(3) Diagrams

(4) Charts

(5) Worksheets

ANSWER:5

14. appear at the bottom of the Excel Window.

(1) Sheet tabs

(2) Name Box

(3) Formula bar

(4) Title bar

(5) None of these

15. EPROM stands for

(1) Erasable Programmable Read-Only Memory

(2) Electronic Programmable Read-Only Memory

(3) Enterprise Programmable Read-Only Memory

(4) Extended Programmable Read-Only Memory

(5) Electrical Programmable Read-Only Memory

ANSWER: 1

16. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

(1) CISC

(2) RISC

3) CD-ROM

(4) Wi-Fi

(5) MISC

ANSWER: 2

17. Which is not a basic function of a computer?

(1) Store data

(2)Accept input

(3)Process data

(4) Copy text

(5) Accept and process data

ANSWER: 4

18. ASCII is a coding system that provides

(1) 256 different characters

(2) 512 different characters

(3) 1024 different characters

(4) 128 different characters

(5) 1000 different characters

ANSWER: 4

19. Which part of the computer is directly invoked in executing the instructions of the computer program?

(1) The scanner

(2) The main storage

(3) The secondary storage

(4) The printer

(5) The processor

ANSWER: 5

20. In order to create column data in Word, you need to

(1) tab consecutively until your cursor reaches the desired place

(2) set tabs or use the Table menu

(3) use Excel

(4) press the space bar until your cursor reaches the desired place

(5) None of these

ANSWER: 5

21. Files are organised by storing them in

(1) tables

(2) databases

(3) folders

(4) graphs

(5) diagrams

ANSWER:3

22. When a computer is switched on, the booting process performs

(1) Integrity Test

(2) Power-On Self-Test

(3) Correct Functioning Test

(4) Reliability Test

(5) Shut-down

ANSWER: 2

23. In Word, the feature that automatically detects common errors is called

(1) Autocorrect

(2) Autograph

(3) Spelling and Grammar

(4) Go to

(5) Thesaurus

ANSWER:1

24. A computer system that is old and perhaps not satisfactory is referred to as a(n)

(1) Ancient system

(2) Historical system

(3) Age old system

(4) Legacy system

(5) Legal System

ANSWER: 4

25. Which of the following is not a binary number?

(1) 001

(2) 101

(3) 202

(4) 110

(5) 011

ANSWER:3

General Computer Test - 161

 

1. A collection of program that controls how your computer system runs and processes information is called

1) Operating System

2) Computer

3) Office

4) Compiler

5) Interpreter

Ans:-1

2. Computer connected to a LAN (Local Area Network) can

1) run faster

2) go on line

3) share information and /or share peripheral equipment

4) E-mail

5) None

Ans:-3

3. Information travels between components on the mother board through

1) Flash memory

2) CMOS

3) Bays

4) Buses

5) Peripherals

Ans:-3

4. How are data organized in a spreadsheet?

1) Lines & spaces

2) Layers & Planes

3) Height & Width

4) Rows & Columns

5) None

Ans:-4

5. The blinking symbol on the computer screen is called the

1) mouse

2) logo

3) hand

4) palm

5) cursor

Ans:-5

6. When you are selecting a mouse for a particular computer system, what is the most important consideration?

(1) The type of drivers that come with the mouse

(2) The length of the mouse cord

(3) The type of connector the mouse is equipped with

(4) The number of buttons the mouse has

(5) None of these

Ans: (3)

7. How is power supplied to a low-power USB device?

(1) Through a power cable

(2) From an external power supply

(3) Directly from the computers power supply

(4) Through the USB cable

(5) None of these

Ans: (4)

8. All of the following are basic principles of net works, except —

(1) each computer must have a network card

(2) there must be communications media connecting the network hardware devices

(3) there must be at least one connecting device

(4) each computer must have software that supports the movement of information

(5) None of these

Ans: (2)

9. The.............data mining technique derives rules from real-world case examples.

(1) Rule discover

(2) Signal processing

(3) Neural nets

(4) Case-based reasoning

(5) None of these

Ans: (3)

10. ................are used to identify a user who returns to a Website.

(1) Cookies

(2) Plug-ins

(3) Scripts

(4) ASPs

(5) None of these

Ans: (1)

11. Computer uses the .......... number system to store data and perform calculations.

(1) binary

(2) octal

(3) decimal

(4) hexadecimal

(5) None of these

ANSWER: 1

12. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is-

(1) Memory-only

(2) Write-only

(3) Once-only

(4) Run-only

(5) Read-only

ANSWER: 5

13. Which of the following can be used to select the entire document?

(1) CTRL + A

(2) ALT + F5

(3) SHIFT + A

(4) CTRL + K

(5) CTRL + H

ANSWER: 1

14. .......... are attempts by individuals to obtain confidential information from you by falsifying their identity.

(1) Phishing

(2) Computer viruses

(3) Spyware scams

(4) Viruses

(5) None of the above

ANSWER: 1

15. Port number, port description, and number of ports ordered are examples of

(1) control

(2) output

(3) processing

(4) feedback

(5) input

ANSWER: 5

16. A Web site's main page is called its-

(1) Home Page

(2) Browser Page

(3) Search Page

(4) Bookmark

(5) None of these

ANSWER: 1

17. The simultaneous processing of two or more programs by multiple processors is-

(1) multiprogramming

(2) multitasking

(3) time-sharing

(4) multiprocessing

(5) None of these

ANSWER: 1

18. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

(1) an ASCII code

(2) a magnetic tape

(3) an OCR scanner

(4) a bar code

(5) None of these

ANSWER: 4

19. To instruct Word to fit the width of a column to the contents of a table automatically, click the..... button and then point to AutoFit Contents.

(1) Fit to Form

(2) Format

(3) Autosize

(4) Contents

(5) AutoFit

ANSWER: 5

20. Why is it unethical to share copyrighted files with your friends?

(1) It is not unethical, because it is legal.

(2) It is unethical because the files are being given for free.

(3) Sharing copyrighted files without permission breaks copyright laws.

(4) It is not unethical because the files are being given for free.

(5) It is not unethical-anyone can access a computer

ANSWER: 3

21. Reusable optical storage will typically have the acronym-

(1) CD

(2) DVD

(3) ROM

(4) RW

(5) ROS

ANSWER: 4

22. The most common type of storage devices are-

(1) persistent

(2) optical

(3) magnetic

(4) flash

(5) steel

ANSWER: 2

23. A device that connects to a network without the use of cables is said to be-

(1) distributed

(2) free

(3) centralized

(4) open source

(5) None of these

ANSWER:5

24. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

(1) hacker

(2) analyst

(3) instant messenger

(4) programmer

(5) spammer

ANSWER: 1

25. To access properties of an object, the mouse technique to use is-

(1) dragging

(2) dropping

(3) right-clicking

(4) shift-clicking

(5) None of these

ANSWER:3

General Computer Test - 160

 

1. To prevent the loss of data during power failures, use a(n):

A. encryption program.

B. surge protector.

C. firewall.

D. UPS.

Answer: D

2. A(n) can shield electronic equipment from power spikes.

A. encryption program

B. surge protector

C. firewall

D. UPS

Answer: B

3. All of these are suggestions for safe computing EXCEPT:

A. don‘t borrow disks from other people.

B. open all e-mail messages but open them slowly.

C. download shareware and freeware with caution.

D. disinfect your system.

Answer: B

4. Freeware encrypts data.

A. encryption

B. firewall software

C. PGP

D. private and public keys

Answer: C

5.is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

Answer: B

6. Most computer systems rely solely on for authentication.

A. logins

B. passwords

C. encryption

D. lock and key

Answer: B

7. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

A. privacy rights.

B. personal ethics.

C. the number of cookies downloaded to your personal computer.

D. personal space.

Answer: A

8. Over was spent by businesses and government to repair problems in regard to Y2K.

A. 20 million dollars

B. 100 million dollars

C. 1 billion dollars

D. 100 billion dollars

Answer: D

9. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision-making?

A. Autonomous system

B. Missile defense auto-system

C. Smart weapon

D. Independent system

Answer: D

10. Security procedures can:

A. will eliminate all computer security risk.

B. reduce but not eliminate risks.

C. are prohibitively expensive.

D. are inaccessible for the average home user.

Answer: B

11. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line

1) Compiler

2) Interpreter

3) Linker

4) Loader

5) None

Ans:-2

12. _ _ _ _ _ _ _ _ is an OOP principle

1) Structured programming

2) Procedural programming

3) Inheritance

4) Linking

5) None

Ans:-3

13. COBOL is widely used in _ _ _ _ _ _ _ applications

1) Commercial

2) Scientific

3) Space

4) Mathematical

5) None

Ans:-1

14. RAM stands for

1) Random origin money

2) Random only memory

3) Read only memory

4) Random access memory

5) None

Ans:-4

15. 1 Byte = ?

1) 8 bits

2) 4 bits

3) 2 bits

4) 9 bits

5) None

Ans:-1

16. SMPS stands for

1) Switched mode power supply

2) Start mode power supply

3) Store mode power supply

4) Single mode power supply

5) None

Ans:-1

17. The device used to carry digital data on analog lines is called as

1) Modem

2) Multiplexer

3) Modulator

4) Demodulator

5) None

Ans:-1

18. VDU is also called

1) Screen

2) Monitor

3) Both 1 & 2

4) printer

5) None

Ans:-3

19. BIOS stands for

1) Basic Input Output system

2) Binary Input output system

3) Basic Input Off system

4) all the above

5) None

Ans:-1

20. Father of ‘C’ programming language

1) Dennis Ritchie

2) Prof Jhon Kemeny

3) Thomas Kurtz

4) Bill Gates

5) None

Ans:-1

21. The 16 bit Microprocessor means that it has

1) 16 address lines

2) 16 Buses

3) 16 Data lines

4) 16 routes

5) None

Ans:-3

22. Data going into the computer is called

1) Output

2) algorithm

3) Input

4) Calculations

5) flow chart

Ans:-3

23. Which of the following refers to a small, single-site network?

1) LAN

2) DSL

3) RAM

4) USB

5) CPU

Ans:-1

24. Microsoft Office is

1) Shareware

2)Public domain software

3) Open-source software

4) A vertical market application

5) An application suite

Ans:-5

25. How many options does a BINARY choice offer

1) None

2) One

3) Two

4) it depends on the amount of memory on the computer

5) It depends on the speed of the computer‘s processor

Ans:-3

General Computer Test - 159

 

1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches.

A. 20

B. 75

C. 85

D. 99

Answer: C

2. The survey showed that these businesses lost more than due to security breaches.

A. $100,000 each

B. $377 million

C. five employees each

D. $1 million

Answer: B

3. The typical computer criminal is a(n):

A. young hacker.

B. trusted employee with no criminal record.

C. trusted employee with a long, but unknown criminal record.

D. overseas young cracker.

Answer: B

4. The majority of computer crimes are committed by:

A. hackers.

B. insiders.

C. overseas criminals.

D. young teenage computer geniuses.

Answer: B

5. The common name for the crime of stealing passwords is:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: B

7. Malicious software is known as:

A. badware.

B. malware.

C. maliciousware.

D. illegalware.

Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:

A. worm.

B. Trojan horse.

C. virus.

D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse.

B. virus.

C. time bomb.

D. time-related bomb sequence.

Answer: B

10. In 1999, the Melissa virus was a widely publicized:

A. e-mail virus.

B. macro virus.

C. Trojan horse.

D. Time bomb.

Answer: A

11. What type of virus uses computer hosts to reproduce itself?

A. Time bomb

B. Worm

C. Melissa virus

D. Macro virus

Answer: B

12. The thing that eventually terminates a worm virus is a lack of:

A. memory or disk space.

B. time.

C. CD drive space.

D. CD-RW.

Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer:

14. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus

B. Spybot

C. Logic bomb

D. Security patch

Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

A. more complicated.

B. more difficult.

C. easier.

D. slower.

Answer: C

17. HTML viruses infect:

A. your computer.

B. a Web page in the HTML code.

C. both a Web page and the computer that is viewing it.

D. No

Answer: B

18. Software programs that close potential security breaches in an operating system are known as:

A. security breach fixes.

B. refresh patches.

C. security repairs.

D. security patches.

Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

A. a virus.

B. a Trojan horse.

C. cracking.

D. a denial of service attack.

Answer: D

20. is the measurement of things such as fingerprints and retinal scans used for security access.

A. Biometrics

B. Biomeasurement

C. Computer security

D. Smart weapon machinery

Answer: A

21. What is the most common tool used to restrict access to a computer system?

A. User logins

B. Passwords

C. Computer keys

D. Access-control software

Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:

A. love.

B. Fred.

C. God.

D. 123.

Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

A. hacker-proof program.

B. firewall.

C. hacker-resistant server.

D. encryption safe wall.

Answer: B

24. The scrambling of code is known as:

A. encryption.

B. a firewall.

C. scrambling.

D. password proofing.

Answer: A

25. If you want to secure a message, use a(n):

A. cryptology source.

B. encryption key.

C. encryption software package.

D. cryptosystem.

Answer: D

General Computer Test - 158

 

1. Who is called as Father of Computers‘‘?

(A) Charles Babage

(B) Blaise Pascal

(C) Hollirth

(D) All of these

(E) None of these

2. The first Digital Computer introduced, was named as :

(A) Univac

(B) Mark-I

(C) Eniac

(D) All of these

(E) None of these

3. How many generations, computer can be classified?

(A) 4

(B) 5

(C) 3

(D) 6

(E) None of these

4. First Generation Computers contain :

(A) Transistors

(B) Vacuum Tubes

(C) LSI

(D) VLSI

(E) None of these

5. II Generation Computers are made of :

(A) Vacuum Tubes

(B) Transistors

(C) LSI

(D) VLSI

(E) None of these

6. IV Generation Computers contain :

(A) LSI

(B) Vacuum Tubes

(C) All Technology

(D) Transistors

(E) None of these

7. Vth Generation Computers are based on:

(A) Artificial Intelligence

(B) Programming Intelligence

(C) System Knowledge

(D) All of these

(E) None of these

8. Computers, combine both measuring and counting, are called :

(A) Analog

(B) Digital

(C) Hybrid

(D) All of these

(E) None of these

9. In world today, most of the computers are :

(A) Digital

(B) Hybrid

(C) Analog

(D) Complex

(E) None of these

10. In any computer installation, how many elements consists.

(A) 2

(B) 4

(C) 3

(D) 1

(E) None of these

11. Physical structure of computer is called :

(A) Software

(B) Hardware

(C) Human ware

(D) All of these

(E) None of these

12. A computer can perform, which of the following tasks?

(A) Computation

(B) Communication

(C) Processing

(D) All of these

(E) None of these

13. CPU stands for :

(A) Computer Processing Unit

(B) Central Processing Unit

(C) Both (A) & (B)

(D) Communication Processing Unit

(E) None of these

14. In which type of computer, data are represented as discrete signals.

(A) Analog computer

(B) Digital computer

(C) both

(D) Digilog Computer

(E) None of these

15. Which of the following is available in the form of a PC now?

(A) Mainframe

(B) Microcomputer

(C) Minicomputer

(D) Both (B) & (C)

(E) None of these

16. PARAM is an example of:

(A) Super computer

(B) PC

(C) Laptop

(D) PDA

(E) None of these

17. Who developed the  ̳analytical engine‘?

(A) Jacquard loom

(B) Charles Babbage

(C) Shannon

(D) IBM

(E) None of these

18. ENIAC stands for :

(A) Electrical Numerical Integrator and Calculator

(B) Electronic Numerical Integrator and Computer

(C) Electronic Numerical Integrator and Calculator

(D) Electronic Number Integrator and Calculator

(E) None of these

19. First Generation of computer was based on which technology?

(A) Transistor

(B) Vacuum Tube

(C) LSI

(D) VLSI

(E) None of these

20. Microprocessor was introduced in which generation of computer?

(A) Second Generation

(B) Fourth Generation

(C) Both (A) & (B)

(D) Third Generation

(E) All of the above

21. GUI stands for :

(A) Graphical User Interface

(B) Graph Use Interface

(C) Graphical Universal Interface (D) None of these

22. The time taken by CPU to retrieve and interpret the instruction to be executed is called as:

(A) Instruction cycle

(B) Fetch cycle

(C) Both (A) & (B)

(D) All of these

(E) None of these

23. Which of the following is responsible for all types of calculations?

(A) ALU

(B) Control Unit

(C) Registers

(D) BUS

(E) None of these

24. Internal memory in a CPU is nothing but :

(A) A set of registers

(B) A set of ALU

(C) Microprocessor

(D) BUS

(E) None of these

25. Which of the following is permanent memory?

(A) SRAM

(B) DRAM

(C) ROM

(D) All of these

(E) None of these

Answers

1.       1 A  11 B  21 A

2.       2 B  12 D  22 A

3.       3 B  13 B  23 A

4.       4 B  14 B  24 A

5.       5 B  15 B  25 C

6.       6 A  16 A

7.       7 A  17 B

8.       8 C  18 B

9.       9 A  19 B

10.   10 C  20 B

General Computer Test - 157

 

1. Specilizd programs that assist users in locating information on the Web are called....

1) Information engines

2) Search engines

3) Web browsers

4) Resource locators

5) None of these

Answers:2

2. The background of any Word document...

1) Is always white colour

2) Is the colour you presect under the Options menu

3) Is always the same for the entire document

4) Can have any colour you choose 5) None of these

Answers:4

3.Correcting errors in a program is referred to as ...

1) Debugging

2) Bugging

3) Rectifying

4) Modifying

5) None of these

Answers:1

4.Any letter, number, or symbol found on the keyboard that you could type into the computer..........

1) Output

2) Character

3) Type

4) Print

5) Font

Answers:2

5.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ...

1) Scanner

2) Questionnaire

3) Prompt and dialog box

4) Information seeker

5) None of these

Answers:3

6.Commands at the top of a screen such as FILE-EDIT-FONT-TOOLS to operate and change things within programs ...

1) Menu bar

2) Tool bar

3) User friendly

4) Word processor

5) None of these

Answers:1

7.The primary device that a computer uses to store information ...

1) Monitor

2) Memory

3) Disk

4) Hard drive

5) None of these

Answers:4

8.A file extension is separated from the main file name with a(n)..., but no spaces

1) Question nark

2) Exclamation mark

3) Underscore

4) Period

5) None of these

Answers:5

9.Application software is designed to accomplish ...

1) Real -world tasks

2) computer-centric tasks

3) Gaming tasks

4) Operating system tasks

5) None of these

Answers:4

10. A ... is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage

1) Surge strip

2) USB

3) UPS

4) Battery strip

5) None of these

Answers:3

11.The term ............. designates equipment that might be added to a computer system to enhance, its functionality

1) Digital device

2) System add-on

3) Disk pack

4) Peripheral device

5) None of these

Answers:4

12........... this is the act of copying or downloading a program from a network and making multiple copies of it.

1) Network piracy

2) Plagiarism

3) Software piracy

4) Site-license piracy

5) None of these

Answers:3

13.When installing ..., the user must copy and usually decompressprogram files from a CDROM or other medium to the hard disk

1) Programming software

2) System hardware

3) Applications hardware

4) Applications software

5) None of these

Answers:1

14.Which one of the following would be considered as a way that a computer virus can enter a computer system ?

1) Opening an application previously installed on the computer

2) Borrowed an illegal copy of software

3) Viewing a website without causing any additional transactions

4) Running antivirus programs

5) None of these

Answers:2

15.Programs such as Mozilla Firefox that serve as navigable windows into the Web are called..........

1) Hypertext

2) Networks

3) Internet

4) Web browsers

5) None of these

Answers:4

16.What is the main difference between a mainframe and a super computer ?

1) Super computer is much larger than mainframe computers

2) Super computers are much smaller than mainframe computers

3) Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently

4) Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible

5) None of these

Answers:3

17.What is the function of Recycle Bin ?

1) Store deleted file

2) Store temporary file

3) Store corrupted file

4) Store Document file

5) None of these

Answers:1

18.Which is the latest version of MS Office ?

1) Office XP

2) Windows XP

3) Office 2007

4) Office 2010

5) None of these

Answers:4

19.Which device cannot be shared in network ?

1) Floppy

2) Keyword

3) Computer

4) Printer

5) None of these

Answers:2

20.What is the purpose of query ?

1) Input data

2) Output data

3) Sort & filter

4) All of above

5) None of these

Answers:4

21.Which port doesn't exist in computer ?

1) USB

2) Parallel

3) Com1 / Com2

4) RAW

5) None of these

Answers:4

22.What is the name of excel files ?

1) Workbook

2) Worksheet

3) Spreadsheet

4) Spread book

5) None of these

Answers:1

23.Workgroup means

1) Computers in network

2) Individual user

3) Individual computer

4) All of the above

5) None of these

Answers:1

24.Synonym can be reviewed with

1) Spelling and grammar

2) Thesaurus

3) Both

4) Synonym viewer

5) None of these

Answers:2

25. Which command allows you to reduce fragments of file and optimize the performance of disk ?

1) Scandisk

2) Diskcomp

3) Chkdsak

4) Defrag

5) None of these

Answers:4

General Computer Test - 156

 

1. Which command divides the surface of the blank disk into sectors and assign a unique address to each one

1) Ver

2) Format

3) Fat

4) Check disk

5) None of these

Answers:2

2. If you need to duplicate the entire disk, which command will you use?

1) Copy

2) Disk copy

3) Chkdsk

4) Format

5) None of these

Answers:2

3. A............. sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk

1) System virus

2) Trojan horse virus

3) File virus

4) Macro virus

5) None of these

Answers:5

4. A result of a computer virus cannot lead to...

1) Disk Crash

2) Mother Board Crash

3) Corruption o f program

4) Deletion of files

5) None of these

Answers:2

5. Every computer connected to an intranet or extranet must have a distinct...

1) Firewall

2) Proxy server

3) IP address

4) Domain name

5) None of these

Answers:2

6. Programming language built into user programs such as Word and Excel are known as...

1) 4GLs

2) Macro languages

3) object-oriented languages

4) Visual programming languages

5) None of these

Answers:4

7. Firewalls are used to protect against...

1) Unauthorized Attacks

2) Virus Attacks

3) Data Driven Attacks

4) Fire Attacks

5) None of these

Answers:1

8. Which of the following extensions suggest that the file is a backup copy?

1) Bak

2) Bas

3) Com

4) Txt

5) None of these

Answers:1

9. Computer programs are written in a high - level programming language; however, the human readable version of a program is called...

1) Cache

2) Instruction set

3) Source code

4) Word size

5) None of these

Answers:3

10. The software tools that enable a user to interact with a computer for specific purposes are known as...

1) Hardware

2) Networked Software

3) Shareware

4) Applications

5) None of these

Answers:4

11...............processing is used when a large mail-order company accumulates orders and processes them together in one large set

1) Batch

2) Online

3) Real-time

4) Group

5) None of these

Answers:1

12. When a file contains instructions that can be carried out by the computer, it is often called a (n) ... file

1) Data

2) Information

3) Executable

4) Application

5) None of these

Answers:3

13. A complier translates a program written in a high - level language into...

1) Machine language

2) An algorithm

3) A debugged program

4) Java

5) None of these

Answers:1

14. A set of step - by - step procedures for accomplishing a task is known as a (n)...

1) Algorithm

2) Hardware program

3) Software bug

4) Firmware program

5) None of these

Answers:1

15. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a (n)...

1) Workstation

2) CPU

3) Magnetic disk

4) Integrated circuit

5) None of these

Answers:4

16. A saved document is referred to as a...

1) File

2) Word

3) Folder

4) Project

5) None of these

Answers:1

17. What is output?

1) What the processor takes from the user

2) What the user gives to the processor

3) What the processor gets from the user

4) What the processor gives to the user

5) None of these

Answers:4

18. When you turn on the computer, the boot routine will perform this test...

1) RAM test

2) Disk drive test

3) Memory test

4) Power - on self-test

5) None of these

Answers:2

19. Which of the following storage media provides sequential access only?

1) Floppy disk

2) Magnetic disk

3) Magnetic tape

4) Optical disk

5) None of these

Answers:2

20. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is...

1) Copy and paste

2) Copy, cut and paste

3) Cut, copy and paste

4) Cut and paste

5) None of these

Answers:4

21. Hardware includes..........

1) All devices used to input data into a computer

2) Sets of instructions that a computer runs or executes

3) The computer and all the devices connected to it that are used to input and output data

4) All devices involved in processing information including the central processing unit, memory and storage

5) None of these

Answers:4

22. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ... command

1) Replace

2) Find

3) Lookup

4) Search

5) None of these

Answers:2

23. The term 'user interface' refers to............

1) What the user sees on the screen and how they can interact with it

2) How the operating system responds to user commands

3) The means by which the user interacts with the peripheral devices on the computer

4) The monitor that is available for the computer

5) None of these

Answers:1

24. For creating a document, you use... command at File Menu.

1) Open

2) Close

3) New

4) Save

5) None of these

Answers:3

25. The.............. Becomes different shapes depending on the task you are performing

1) Active tab

2) Insertion point

3) Mouse pointer

4) Ribbon

5) None of these

Answers:3

General Computer Test - 155

 

1. ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

1) Multitasking

2) Multithreading

3) Multiprocessing

4) Multicoputing

5) None of these

Answers:1

2.The task of performing operations like arithmetic and logical operations is called ......

1) Processing

2) Storing

3) Editing

4) Sorting

5) None of these

Answers:3

3.The ALU and Control Unit jointly known as

1) RAM

2) ROM

3) CPU

4) PC

5) None of these

Answers:2

4. RAM is an example of

1) Secondary memory

2) Primary memory

3) Main memory

4) Both (1) and (2)

5) None of these

Answers:1

5.Magnetic disk is an example of

1) Secondary memory

2) Primary memory

3) Main memory

4) Both (1) and (2)

5) None of these

Answers:1

6. Which one of the following is NOT a computer language /

1) MS-Excel

2) BASIC

3) COBOL

4) C++

5) None of these

Answers:1

7.Each memory cell has a unique number, assigned to it is called as the....... of the cell

1) Address

2) Register

3) Number

4) Path

5) None of these

Answers:1

8.RAM is also called as

1) Read / Write Memory

2) Long Memory

3) Permanent Memory

4) Primary Memory

5) None of these

Answers:2

9. ............ Store data or information temporarily and pass it on as directed by the control unit

1) Address

2) Register

3) Number

4) Memory

5) None of these

Answers:2

10.Select the Odd one

1) Operating system

2) Interpreter

3) Compiler

4) Assembler

5) None of these

Answers:1

11. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu

1) dialog box

2) submenu

3) menu selection

4) All of the above

5) None of these

Answers:1

12. COBOL is an acronym for .............

1) Common Business Oriented Language

2) Computer Business Oriented Language

3) Common Business Operated Language

4) Common Business Organized Language

5) None of these

Answers:1

13.All of the following are examples of real security and privacy risks EXCEPT

1) hackers

2) Spam

3) viruses

4) identity theft

5) None of these

Answers:2

14. Which of the following is NOT one of the four major data processing functions of a computer?

1) gathering data

2) processing data into information

3) analyzing the data or information

4) storing the data or information

5) None of these

Answers:3

15.All of the following are examples of storage devices EXCEPT :

1) hard disk drives

2) printers

3) floppy disk drives

4) CD drives

5) Pen drives

Answers:2

16.The CPU and memory are located on the :

1) expansion board

2) motherboard

3) storage device

4) output device

5) display board

Answers:2

17............... is the science that attempts to produce machines that display the same type of intelligence that humans do

1) Nanoscience

2) Nanotechnology

3) Simulation

4) Artificial intelligence (Al)

5) None of these

Answers:4

18.Servers are computers that provide resources to other computers connected to a :

1) networked

2) mainframe

3) supercomputer

4) client

5) internet

Answers:2

19.When creating a computer program, the ......... designs the structure of the program

1) End user

2) System Analyst

3) Programmer

4) All of the above

5) None of these

Answers:2

20.A computer program that converts an entire program into machine language at one time is called a/ an

1) interpreter

2) simulator

3) characters

4) numbers

5) None of these

Answers:3

21.Computers process data into information by working exclusively with :

1) multimedia

2) words

3) characters

4) numbers

5) None of these

Answers:4

22.The difference between people with access to computers and the Internet and those without this access is known as the :

1) digital divide

2) Internet divide

3) Web divide

4) broadband divide

5) None of these

Answers:1

23. Computers manipulate data in many ways, and this manipulation is called......

1) upgrading

2) processing

3) batching

4) utilizing

5) None of these

Answers:2

24.The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

1) robotics

2) simulation

3) computer forensics

4) animation

5) None of these

Answers:3

25.Where does most data go first with in a computer memory hierarchy ?

1) RAM

2) ROM

3) BIOS

4) CACHE

5) None of these

Answers:1

General Computer Test - 154

 

1. The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........

1) programs

2) processors

3) input devices

4) memory modules

5) None of these

Answers:1

2.An area of a computer that temporarily holds data waiting to be processed is..........

1) CPU

2) Memory

3) Storage

4) File

5) None of these

Answers:2

3.To select or unselect one word to the right

1) CTRL + SHIFT

2) CTRL + SHIFT + UP Arrow

3) CTRL + SHIFT + Down Arrow

4) CTRL + SHIFT + Right Arrow

5) None of these

Answers:4

4.To maximize or restore a selected window

1) CTRL + F7

2) CTRL + F10

3) CTRL + F8

4) CTRL + F9

5) None of these

Answers:2

5.To Copy a picture of the selected window to the clipboard

1) ALT + TAB

2) Ctrl + TAB

3) ALT + Print Screen

4) Both (1) and (2)

5) None of these

Answers:3

6........... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.

1) TAB

2) SHIFT

3) ESC

4) F10

5) None of these

Answers:3

7.......... is the key we use to run the selected command.

1) SHIFT

2) TAB

3) ENTER

4) CTRL

5) None of these

Answers:3

8............. is the functional key to display save-as box.

1) F5

2) F6

3) F9

4) F12

5) None of these

Answers:4

9............. is the combination of keys to switch between the last four places that you have edited

1) ALT + CTRL + Z

2) ALT + CTRL + Y

3) ALT + TAB + Z

4) ALT + SHIFT + Z

5) None of these

Answers:1

10............. is the Keyboard shortcut key to insert auto sum

1) ALT

2) ALT=

3) ALT+

4) ALT–

5) ALT+CTRL

Answers:3

11.Data becomes ................ when it is presented in a format that people can understand and use

1) processed

2) graphs

3) information

4) presentation

5) None of these

Answers:4

12.The term ............. designates equipment that might be added to a computer system to enhance its functionality.

1) digital device

2) system add-on

3) disk pack

4) peripheral device

5) None of these

Answers:1

13.A ............ is a microprocessor - based computing device.

1) personal computer

2) mainframe

3) workstation

4) server

5) None of these

Answers:3

14.RAM can be thought of as the ......... for the computer's processor

1) factory

2) operating room

3) waiting room

4) planning room

5) None of these

Answers:4

15.Which of the following are the functions of a operating system

1) Allocates resources

2) Monitors Activities

3) Manages disks and files

4) All of the above

5) Only 1 and 2

Answers:1

16.To move a copy of file from one computer to another over a communication channel is called ?

1) File transfer

2) File encryption

3) File modification

4) File copying

5) None of these

Answers:2

17.The primary function of the ............ is to set up the hardware and load and start an operating system

1) System Programs

2) BIOS

3) CP

4) Memory

5) None of these

Answers:2

18.What kind of memory is both static and non - volatile ?

1) RAM

2) ROM

3) BIOS

4) CACHE

5) None of these

Answers:2

19........... is computer software designed to operate the computer hardware and to provide platform for running application software

1) Application software

2) System software

3) Software

4) Operating system

5) None of these

Answers:3

20.The ......... is the amount of data that a storage device can move from the storage medium to the

Computer per second

1) data migration rate

2) data digitizing rate

3) data transfer rate

4) data access rate

5) None of these

Answers:3

21.A device, which is not connected to CPU, is called as .......

1) land-line device

2) On-line device

3) Off-line device

4) Device

5) None of the above

Answers:2

22.What is the other name for programmed chip?

1) RAM

2) ROM

3) LSIC

4) PROM

5) None of these

Answers:3

23.On-line real time systems become popular in ........... generation

1) First Generation

2) Second Generation

3) Third Generation

4) Fourth Generation

5) None of these

Answers:2

24.You use a(n) ....., such as a keyboard or mouse, to input information

1) output device

2) input device

3) storage device

4) processing device

5) None of these

Answers:2

25............. is the ability of a device to "jump" directly to the requested data

1) Sequential access

2) Random access

3) Quick access

4) All of the above

5) None of these

Answers:1