COMPUTER KNOWLEDGE

THURSDAY, 12 JULY 2012
COMPUTER KNOWLEDGE QUESTIONS FOR RRB

1. The basic building block of a database that contains related record is____
A) Query
B) Form
C) Table
D) Edited Page
E) Report
  
2. Which is not a data source component?
A) mail merge toolbar
B) header row
C) data fields
D) data records
E) None Of these
  
3. ______ services are available free at portals on the web.
A) E-mail
B) FTP
C) Video Conferencing
D) Telephone
E) All Of the above
  
4. In correct information is generated by ____ in the Information System.
A) Unreliable hardware
B) Incorrect data
C) Untested software
D) Unskilled people
E) Inconvinient timing of work
  
5. The blinking symbol on the computer screen is called the _____
A) Mouse
B) Logo
C) Hand
D) Palm
E) Cursor

 6. Choose the web browser among the following:
A) Yahoo
B) World Wide Web
C) Facebook
D) Google Chrome
E) None Of these


 7. Pick the odd one ___
 A) Printer
 B) Keyboard
 C) Mouse
 D) Scanner
 E) Microphone

  
8. Shimmer, Sparkle text, Blinking Background etc. are known as
 A) font styles
 B) font effects
 C) word art
 D) text effects
 E) None Of these

  
9. Using antivirus software is _______
 A) Detective measures
 B) Preventive measures
 C) Corrective measure
 D) All Of the above
 E) None Of the above

  
10. Which of the following is not available in Font Spacing?
 A) Normal
 B) Loosely
 C) Condensed
 D) Expanded
 E) None Of these

  
11. Which of the following position is not available for fonts on MS Word?
 A) Normal
 B) Raised
 C) Lowered
 D) Centered
 E) None Of these

  
12. What is the maximum scale percentage available in Scale drop down box?
 A) 500
 B) 200
 C) 100
 D) 90
 E) None Of these

13. The communications device that allows the computer to access a network is called a ______ card.
 A) Modem
 B) Video
 C) Sound
 D) Network
 E) None Of these

  
14. Bit is short for _______
 A) Binary system
 B) Digital byte
 C) Binary digit
 D) Binary Unit
 E) None Of these

  
15. A computer can’t “boot” if it does not have the ________
 A) Compiler
 B) Loader
 C) Operating System
 D) Loader
 E) None Of these


 16. Which type of RAM is normally the fastest?
 A) DRAM
 B) VRAM
 C) SRAM
 D) WRAM
 E) None Of these

17. The System BIOS and ROM chips are called ____
 A) Software
 B) Firmware
 C) Hardware
 D) Bootware
 E) None Of these
  
18. In a document what is the maximum number of columns that can be inserted in MS Word Table?
 A) 35
 B) 15
 C) 63
 D) 65
 E) None Of these

19. You can detect spelling and grammar errors by
 A) Press Shift + F7
 B) Press Ctrl + F7
 C) Press Alt+ F7
 D) Press F7
 E) None Of these

  
20. A screen element of MS Word that is usually located below the title bar that provides categorized options is
 A) Menu mar
 B) Tool Bar
 C) Status Bar
 D) All of the above
 E) None Of these

Answers
1
2
3
4
5
6
7
8
9
10
E
A
A
B
E
D
A
D
B
B
11
12
13
14
15
16
17
18
19
20
D
B
D
C
C
C
B
C
D
A

FRIDAY, 22 JUNE 2012

COMPUTER KNOWLEDGE QUESTIONS FOR RRB

1. The task bar is located in_____
1) On the start menu
2) At the bottom of the screen
3) On the quick launch tool bar
4) At the top of the screen
5) None of these

2. Another word for software is____
1) Input
2) Output
3) Program
4) System
5) None Of these

3. Generally, you access the Recycle Bin through an icon located___
1) On the desktop
2) On the hard drive
3) On the shortcut menu
4) In the properties dialog box
5) None Of these

4. Which is not a basic function of a computer?
1) Copy text
2) Accept input
3) Process data
4) Store data
5) None Of these

5. ____bits equal one byte
1) Eight
2) Two
3)One thousand
4) One million
5) None Of these

6. A personal computer is___
1) MC
2) SC
3) YC
4) PC
5) None of these

7. A picture would be stored in a___ field in a database.
1) Text
2) Memo
3) Object
4) Hyperlink
5) None of these

8. The unit that transforms input into output is known as the:
1) RAM Chip
2) BIOS Chip
3) CPU
4) Motherboard
5) None Of these

9. The function of key F4 is
1) To repeat the last action
2) Undo the last action
3) To check spelling
4) Both 1 and 2
5) None Of these

10. A dot-matrix printer is
1) An input-output device
2) An output device only
3) An input device only
4) All of the above
5) None of these

11. Computers collects data, that means it allows users to_____data
1) Present
2) Transmit
3) Output
4) Store
5) Input

12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these

14. Error in a computer program is called
1) Crash
2) Failure Of Power
3) Bugger
4) Bug
5) Virus

15. Tape drive gives _____ access to data.
1) Timely
2) Sporadic
3) Random
4) Sequential
5) Disastrous

16. A blinking indicator that shows you where your next action will happen ____
1) CPU
2) Tool bar
3) Cursor
4) Boot
5) None of these

17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these

18. Which is the part of a computer that one can touch and feel?
1) Programs
2) Software
3) Hardware
4) Output
5) None of these

19. Screen that comes on when you turn on your computer that shows all the icons ____
1) Face to Face
2) Viewer
3)View Space
4) Icon Space
5) Desktop

20. Devices that let the computer communicate with you _____
1) Input
2) Output
3) Type
4) Print
5) None Of these

21. A hard copy of a document is _____
1) Stored in the hard disk
2) Stored on a floppy
3) Stored on a CD
4) Printed on the printer
5) None of these

22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these

23. A program that works like a calculator for keeping track of money and making budgets ____
1) Calculator
2) Spreadsheet
3) Budgeter
4) Financier
5) None of these

24. Computers use the _____ number system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these

25. To move down a page in a document _______
1) Scroll
2) Jump
3) Wriggle
4) Fly
5) None of these

26. Data is recorded in floppy disk in _____ rings.
1) Sectors
2) Ringers
3) Tracks
4) Rounders
5) Circles

27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

28. You can ______ from/ to CD.
1) Read
2) Write
3) Read or Write
4) Either Read or Write
5) None Of these

29. The main system board of a computer is called the ______
1) Integrated Circuit
2) Processor
3) Motherboard
4) Microchip
5) Drive Board

30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these

31. When sending an e-mail, the _____ line describes the contents of the message.
1) To
2) From
3) Contents
4) CC
5) Subject

32. _____ is a small picture on screen that depicts program, file or folder.
1) Icon
2) Chip
3) Memory
4) Virus
5) Pixel

33. Contents of ______ gets erased when computer is turned off.
1) Input
2) Output
3) Storage
4) Memory
5) CD

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

35. .bas, .doc and .htm are examples of____
1) Databases
2) Domains
3) Extensions
4) Protocols
5) URLs

36. ____Performs simple arithmetic operation for CPU.
1) DIMM
2) ALU
3) BUS
4) Register
5) ROM

37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these

38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam

39. Two or more computers connected to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline

40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these

ANSWERS:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
2
3
1
1
1
4
1
3
1
2
5
4
2
4
4
3
1
3
5
2
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
4
4
2
4
1
1
4
3
3
1
5
1
4
2
3
2
2
5
1
2


WEDNESDAY, 04 APRIL 2012

Microsoft PowerPoint Multiple Choice Questions (MCQs)

 SET - 1
1. Which file format can be added to a PowerPoint show?
a. .jpg
b. .giv
c. .wav
d. All of the above
Correct Answer: d

2. In Microsoft PowerPoint two kind of sound effects files that can be added to the presentation are
a. .wav files and .mid files
b. .wav files and .gif files
c. .wav files and .jpg files
d. .jpg files and .gif files
Correct Answer: a

3. Material consisting of text and numbers is best presented as
a. A table slide
b. A bullet slide
c. A title slide
d. All of the above
Correct Answer: a

4. What is a motion path?
a. A type of animation entrance effect
b. A method of advancing slides
c. A method of moving items on a slide
d. All of the above
Correct Answer: c

5. What is a slide-title master pair?
a. The title area and text area of a specific slide
b. a slide master and title master merged into a single slide
c. A slide master and title master for a specific design template
d. All of above
Correct Answer: c

6. Which of the following should you use if you want all the slide in the presentation to have the same “look”?
a. the slide layout option
b. add a slide option
c. outline view
d. a presentation design template
Correct Answer: d

7. in the context of animations, what is a trigger?
a. An action button that advances to the next slide
b. An item on the slide that performs an action when clicked
c. The name of a motion path
d. All of above
Correct Answer: b

8. If you have a PowerPoint show you created and want to send using email to another teacher you can add the show to your email message as a (an)
a. Inclusion
b. Attachment
c. Reply
d. Forward
Correct Answer: b

9. In order to edit a chart, you can
a. Triple click the chart object
b. Click and drag the chart object
c. Double click the chart object
d. Click the chart object
Correct Answer: c

10. to exit the PowerPoint
a. click the application minimize button
b. click the document close button
c. double click the applications control menu icon
d. double click the document control menu icon
Correct Answer: c

11. to preview a motion path effect using the custom animation task pane, you should
e. click the play button
f. click the show effect button
g. double click the motion path
h. all of above
Correct Answer: a

12. You can create a new presentation by completing all of the following except
a. Clicking the new button on the standard toolbar
b. Clicking file, new
c. Clicking file open
d. Pressing ctrl + N
Correct Answer: c

13. You can embed a MS-Organization Chart in a slide by
a. Clicking the object command on the edit menu
b. Clicking the object command on the edit menu
c. Clicking the insert new slide button the standard toolbar, then double click the organization chart button on the formatting toolbar
d. Clicking the MS-Organization Chart button on the standard toolbar
Correct Answer: b

14. To select one hyperlink after another during a slide presentation, what do you press?
a. Tab
b. Ctrl + K
c. Ctrl + h
d. All of above
Correct Answer: a

15. special effects used to introduce slides in a presentation are called
a. effects
b. custom animations
c. transitions
d. present animations
Correct Answer: c

16. You can edit an embedded organization chart object by
a. Clicking edit object
b. Double clicking the organization chart object
c. Right clicking the chart object, then clicking edit MS-Organizaiton Chart object
d. b and c both
Correct Answer: d

17. What is the term used when you press and hold the left mouse key and more the mouse around the slide?
a. Highlighting
b. Dragging
c. Selecting
d. Moving
Correct Answer: b

18. Which of the following toolbars provide different options in various master views?
a. Common tasks toolbar
b. Drawing toolbar
c. Formatting toolbar
d. Standard toolbar
Correct Answer: a

19. How can you create a uniform appearance by adding a background image to all slides?
a. Create a template
b. Edit the slide master
c. Use the autocorrect wizard
d. All of the above
Correct Answer: b

20. How do you create speaker note pages that show the slides, related notes, and your company logo on each page?
a. Edit the notes master and add your company logy
b. Edit the slide master and insert your company logo and notes pane
c. Edit the handout master to include your company logo and one slide per page with additional note space
d. All of the above
Correct Answer: a



FRIDAY, 16 MARCH 2012 
Computer Based Questions For Bank PO Exam
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal̢۪s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal̢۪s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C


20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the brain of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D


29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D


37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process  Output  Input  Storage
B. Input  Output Process  Storage
C. Process  Storage  Input  Output
D. Input  Process  Output  Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

Fill in the Blank:
51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system

53. The type of operating system software you use depends on your computer’s ____________.
Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application

55. ____________are the fastest and most expensive computers.
Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions

58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores

59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)

61. The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input
62. The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output

63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software

64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet

65. ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)

68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application

72. ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators
True and False
76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True

77. Data can be a number, a word, a picture, or a sound.
Answer: True

78. Strictly defined, a computer is a data processing device.
Answer: True

79. The discrepancy between the â€Å“haves” and â€Å“have-nots” with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True

84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True

87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False

89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.
Answer: True

92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)

Matching:
93. Match the following terms with their approximate size:
I. kilobyte                   A. one million bytes
II. byte                         B. eight bits
III. gigabyte    C. one thousand bytes
IV. megabyte             D. one billion bytes
V. terabyte                 E. one trillion bytes
Answer: C, B, D, A, E

94. Match the following terms with their meanings:
I. printer                      A. storage device
II. scanner                 B. output device
III. RAM                      C. Input device
IV. CPU                      D. a type of memory
V. CD drive    E. processor
Answer: B, C, D, E, A

95. Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B

96. Match the following terms with their meanings:
I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B

97. Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E

98. Match the following terms with their meanings:
I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A

99. Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A

100. Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E



THURSDAY, 08 MARCH 2012
COMPUTER TERMINOLOGY


access time - The performance of a hard drive or other storage device - how long it takes to locate a file. 
active program or window - The application or window at the front (foreground) on the monitor. 
alert (alert box) - a message that appears on screen, usually to tell you something went wrong.
alias
- an icon that points to a file, folder or application (System 7).
apple menu
- on the left side of the screen header. System 6 = desk accessories System 7 = up to 50 items.
application
- a program in which you do your work.
application menu
- on the right side of the screen header. Lists running applications.
ASCII
(pronounced ask-key ) - American Standard Code for Information Interchange. a commonly used data format for exchanging information between computers or programs.
background
- part of the multitasking capability. A program can run and perform tasks in the background while another program is being used in the foreground.
bit
- the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0).
backup
- a copy of a file or disk you make for archiving purposes.
boot
- to start up a computer.
bug
- a programming error that causes a program to behave in an unexpected way.
bus
- an electronic pathway through which data is transmitted between components in a computer.
byte
- a piece of computer information made up of eight bits.
card
- a printed circuit board that adds some feature to a computer.
cartridge drive
- a storage device, like a hard drive, in which the medium is a cartridge that can be removed.
CD-ROM
- an acronym for Compact Disc Read-Only Memory.
Chooser
- A desk accessory used to select a printer, or other external device, or to log onto a network.
Clipboard
- A portion of memory where the Mac temporarily stores information. Called a Copy Buffer in many PC applications because it is used to hold information which is to be moved, as in word processing where text is "cut" and then "pasted".
Clock Rate
(MHz) - The instruction processing speed of a computer measured in millions of cycles per second (i.e., 200 MHz).
command
- the act of giving an instruction to your Mac either by menu choice or keystroke.
command (apple) key
- a modifier key, the Command key used in conjunction with another keystroke to active some function on the Mac.
compiler
- a program the converts programming code into a form that can be used by a computer.
compression
- a technique that reduces the size of a saved file by elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)
control key
- seldom used modifier key on the Mac.
control panel
- a program that allows you to change settings in a program or change the way a Mac looks and/or behaves.
CPU
- the Central Processing Unit. The processing chip that is the "brains" of a computer.
crash
- a system malfunction in which the computer stops working and has to be restarted.
cursor
- The pointer, usually arrow or cross shaped, which is controlled by the mouse.
daisy chaining
- the act of stringing devices together in a series (such as SCSI).
database
- an electronic list of information that can be sorted and/or searched.
data
- (the plural of datum) information processed by a computer.
defragment
- (also - optimize) to concatenate fragments of data into contiguous blocks in memory or on a hard drive.
desktop
- 1. the finder. 2. the shaded or colored backdrop of the screen.
desktop file
- an invisible file in which the Finder stores a database of information about files and icons.
dialog box
- an on-screen message box that appears when the Mac requires additional information before completing a command.
digitize
- to convert linear, or analog, data into digital data which can be used by the computer.
disk
- a spinning platter made of magnetic or optically etched material on which data can be stored.
disk drive
- the machinery that writes the data from a disk and/or writes data to a disk.
disk window
- the window that displays the contents or directory of a disk.
document
- a file you create, as opposed to the application which created it.
DOS
- acronym for Disk Operating System - used in IBM PCs.
DPI
- acronym for Dots Per Inch - a gauge of visual clarity on the printed page or on the computer screen.
download
- to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ).
drag
- to move the mouse while its button is being depressed.
drag and drop
- a feature on the Mac which allows one to drag the icon for a document on top of the icon for an application, thereby launching the application and opening the document.
driver
- a file on a computer which tells it how to communicate with an add-on piece of equipment (like a printer).
Ethernet
- a protocol for fast communication and file transfer across a network.
expansion slot
- a connector inside the computer which allows one to plug in a printed circuit board that provides new or enhanced features.
extension
- a startup program that runs when you start the Mac and then enhances its function.
fibre channel
- as applied to data storage and network topology
file
- the generic word for an application, document, control panel or other computer data.
finder
- The cornerstone or home-base application in the Mac environment. The finder regulates the file management functions of the Mac (copying, renaming, deleting...)
floppy
- a 3.5 inch square rigid disk which holds data. (so named for the earlier 5.25 and 8 inch disks that were flexible).
folder
- an electronic subdirectory which contains files.
font
- a typeface that contains the characters of an alphabet or some other letterforms.
footprint
- The surface area of a desk or table which is occupied by a piece of equipment.
fragmentation
- The breaking up of a file into many separate locations in memory or on a disk.
freeze
- a system error which causes the cursor to lock in place.
get info
- a Finder File menu command that presents an information window for a selected file icon.
gig
- a gigabyte = 1024 megabytes.
hard drive
- a large capacity storage device made of multiple disks housed in a rigid case.
head crash
- a hard disk crash caused by the heads coming in contact with the spinning disk(s).
high density disk
- a 1.4 MB floppy disk.
highlight
- to select by clicking once on an icon or by highlighting text in a document.
icon
- a graphic symbol for an application, file or folder.
initialize
- to format a disk for use in the computer; creates a new directory and arranges the tracks for the recording of data.
insertion point
- in word processing, the short flashing marker which indicates where your next typing will begin.
installer
- software used to install a program on your hard drive.
interrupt button
- a tool used by programmers to enter the debugging mode. The button is usually next to the reset button.
K
- short for kilobyte.
keyboard shortcut
- a combination of keystrokes that performs some function otherwise found in a pulldown menu.
kilobyte
- 1024 bytes.
landscape
- in printing from a computer, to print sideways on the page.
launch
- start an application.
Measurements
(summary) -
*a bit = one binary digit (1 or 0) *"bit" is derived from the contraction b'it (binary digit) -> 8 bits = one byte
*1024 bytes = one kilobyte
*K = kilobyte
*Kb = kilobit
*MB = megabyte
*Mb = megabit
*MB/s = megabytes per second
*Mb/s = megabits per second
*bps = bits per second
i.e., 155 Mb/s = 19.38 MB/s

MB
- short for megabyte.
megabyte
- 1024 kilobytes.
memory
- the temporary holding area where data is stored while it is being used or changed; the amount of RAM a computer has installed.
menu
- a list of program commands listed by topic.
menu bar
- the horizontal bar across the top of the Mac¹s screen that lists the menus.
multi finder
- a component of System 6 that allows the Mac to multi task.
multi tasking
- running more than one application in memory at the same time.
nanosecond
- one billionth of a second. ( or, the time between the theatrical release of a Dudley Moore film and the moment it begins to play on airplanes).
native mode
- using the computers original operating system; most commonly used when talking about the PowerPC can run software written for either the 80x0 systems, or the PowerPC¹s RISC code.
NuBus
- expansion slots on the Mac which accept intelligent, self-configuring boards. NuBus is a different bus achitecture than the newer PCI bus and the boards are not interchangable.
operating system
- the system software that controls the computer.
optical disk
- a high-capacity storage medium that is read by a laser light.
palette
- a small floating window that contains tools used in a given application.
partition
- a subdivision of a hard drives surface that is defined and used as a separate drive.
paste
- to insert text, or other material, from the clipboard or copy buffer.
PC
- acronym for personal computer, commonly used to refer to an IBM or IBM clone computer which uses DOS.
PCI
- acronym for Peripheral Component Interchange - the newer, faster bus achitecture.
peripheral
- an add-on component to your computer.
point
- (1/72") 12 points = one pica in printing.
pop-up menu
- any menu that does not appear at the top of the screen in the menu bar. (may pop up or down)
port
- a connection socket, or jack on the Mac.
Power PC
- a processing chip designed by Apple, IBM and Motorola (RISC based).
Power Mac
- a family of Macs built around the PowerPC chip.
print spooler
- a program that stores documents to be printed on the hard drive, thereby freeing the memory up and allowing other functions to be performed while printing goes on in the background.
QuickTime
- the Apple system extension that gives one the ability to compress, edit and play animation, movies and sound on the Mac.
RAM
- acronym for Random-Access Memory.
reset switch
- a switch on the Mac that restarts the computer in the event of a crash or freeze.
resize box
- the small square at the lower right corner of a window which, when dragged, resizes the window.
RISC
- acronym for Reduced Instruction Set Computing; the smaller set of commands used by the PowerPC and Power Mac.
ROM
- acronym for Read Only Memory; memory that can only be read from and not written to.
root directory
- the main hard drive window.
save
- to write a file onto a disk.
save as
- (a File menu item) to save a previously saved file in a new location and/or with a new name.
scroll
- to shift the contents of a window to bring hidden items into view.
scroll bar
- a bar at the bottom or right side of a window that contains the scroll box and allows scrolling.
scroll box
- the box in a scroll bar that is used to navigate through a window.
SCSI
- acronym for Small Computer System Interface.
SCSI address
- a number between zero and seven that must be unique to each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15 SCSI Ids (hexidecimal); however, the length restriction (3 meters) is such that it is virtually impossible to link 15 devices together.
SCSI port
- a 25 pin connector on the back of a Mac (native SCSI port); used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO) have a 68 pin connector.
SCSI terminator
- a device placed at the end of a SCSI chain to complete the circuit. (some SCSI devices are self-terminating, or have active termination and do not require this plug).
serial port
- a port that allows data to be transmitted in a series (one after the other), such as the printer and modem ports on a Mac.
server
- a central computer dedicated to sending and receiving data from other computers (on a network).
shut down
- the command from the Special menu that shuts down the Mac safely.
software
- files on disk that contain instructions for a computer.
spreadsheet
- a program designed to look like an electronic ledger.
start up disk
- the disk containing system software and is designated to be used to start the computer.
surge suppressor
- a power strip that has circuits designed to reduce the effects of surge in electrical power. (not the same as a UPS)
System file
- a file in the System folder that allows your Mac to start and run.
System folder
- an all-important folder that contains at least the System file and the Finder.
32 bit addressing
- a feature that allows the Mac to recognize and use more than 8MB of memory.
title bar
- the horizontal bar at the top of a window which has the name of the file or folder it represents.
upload
- to send a file from one computer to another through a network.
Uninterruptible Power Source
(UPS)- a constantly charging battery pack which powers the computer. A UPS should have enough charge to power your computer for several minutes in the event of a total power failure, giving you time to save your work and safely shut down.
UPS
- acronym for Uninterruptible Power Source.
vaporware
- "software" advertised, and sometimes sold, that does not yet exist in a releasable for.
virtual memory
- using part of your hard drive as though it were "RAM".
WORM
- acronym for Write Once-Read Many; an optical disk that can only be written to once (like a CD-ROM).
zoom box
- a small square in the upper right corner of a window which, when clicked, will expand the window to fill the whole screen.


SATURDAY, 03 MARCH 2012
DBMS and Design SET-1

Questions

Questions 1:

The ascending order of a data hirerchy is:
a. bit-byte-record-field-file-database
b. byte-bit-field-record-file-database
c. bit-byte-field-record-file-database
d. bit-byte-file-record-field-database
 Question 2:
Which of the following is true of a network structure?
a. t is a physical representation of the data
b. It allows a many-to-many relationship
c. It is conceptually simple
d. It will be dominant data base of the future
 Question 3:
Which of the following is a problem of file management system?
a. difficult to update
b. lack of data independence
c. data redundancy
d. program dependence
e. all of above
 Question 4:
One data dictionery software package is called
a. DB/DC dictionary
b. TOTAL
c. ACCESS
d. Datapac
e. Data Manager
 Question 5:
The function of a database is ...
a. to check all input data
b. to check all spelling
c. to collect and organize input data
d. to output data
 Question 6:
What is the language used by most of the DBMSs for helping their users to access data?
a. High level language
b. SQL
c. Query Language
d. 4GL
 Question 7:
The model for a record management system might be
a. handwritten list
b. a Rolodex card file
c. a business form
d. all of above
 Question 8:
Primitive operations common to all record management system include
a. print
b. sort
c. look-up
d. all of above
 Question 9:
In a large DBMS
a. each user can "see" only a small part of the entire database
b. each subschema contains every field in the logical schema
c. each user can access every subschema
Question 10:
Information can be transferred between the DBMS and a
a. spreadsheet program
b. word processor program
c. graphics program
d. all of the above

Answers:

1. c    2. b    3. e     4. a     5. c    6. c     7. d    8. c     9. a     10. d

DBMS and Design Set 2

Questions

Questions 1:

Which of the following fields in a student file can be used as a primary key?
a. class
b. Social Security Number
c. GPA
d. Major

Question 2:

Which of the following is not an advantage of the database approach
a. Elimination of data redundancy
b. Ability of associate deleted data
c. increased security
d. program/data independence
e. all of the above 

Question 3:

Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
a. report writer
b. query language
c. data manipulation language
d. transaction log
e. none of the above

Question 4:

In the DBMS approach, application programs perform the 
a. storage function
b. processing functions
c. access control
d. all of the above
e. none of the above

Question 5:

A set of programs that handle a firm's database responsibilities is called
a. database management system (DBMS)
b. database processing system (DBPS)
c. data management system (DMS)
d. all of above

Question 6:

Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
a. full media
b. graphics media
c. multimedia
d. hypertext 

Question 7:

A record management system
a. can handle many files of information at a time
b. can be used to extract information stored in a computer file
c. always uses a list as its model
d. both a and b 

Question 8:

A command that lets you change one or more fields in a record is
a. insert
b. modify
c. lookup
d. none of above 

Question 9:

A transparent DBMS
a. can not hide sensitive information from users
b. keeps its logical structure hidden from users
c. keeps its physical structure hidden from users
d. both b and c 

Question 10:

A file produced by a spreadsheet 
a. is generally stored on disk in an ASCII text fromat
b. can be used as is by the DBMS
c. both a and b
d. none of the above

Answers:

1.b     2.e     3.d      4.b      5.d     6.c      7.b     8.b      9.c      10.a 



SUNDAY, 26 FEBRUARY 2012
COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver
2) Format
3) Fat
4) Chkdsk
5) None of these

2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these

3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these

4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these

5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these

6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these

7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these

8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these

9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these

10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these

11. ...... proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these

12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these

13.A complier translates a program written in a high - level language into ........
1) Machine language
2) An algorithm
3) A debugged program
4) Java
5) None of these

14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these

15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these

16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these

17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these

18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these

19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these

20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these

21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that  a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these

22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these

23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these

24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these

25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these

26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these

27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these

28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these

29.Any letter, number, or symbol found on the keyboard that you can type into the computer ........
1) output
2) character
3) type
4) print
5) font

30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these

31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these

32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these

33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these

34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these

35.A ...... is a device that not only provdes surge protection, but also  furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these

36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these

38.When installing ............., the user must copy and usually decompress  program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these

39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these

40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these

41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these

42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these

43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these

44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these

45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these

46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these

47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these

48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these

49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these

50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
ANSWERS:
  1) 2      2) 2    3) 5      4) 2    5) 2      6) 4       7) 1     8) 1     9) 3    10) 4
11) 1   12) 3  13) 1    14) 1   15) 4   16) 1    17) 4   18) 2   19) 2    20) 4
21) 4   22) 2  23) 1    24) 3   25) 3   26) 2    27) 4   28) 1    29) 2   30) 3
31) 1   32) 4  33) 5    34) 4   35) 3   36) 4    37) 3   38) 1    39) 2   40) 4
41) 3   42) 1  43) 4    44) 2   45) 4   46) 4    47) 1   48) 1    49) 2   50) 4






SUNDAY, 26 FEBRUARY 2012
COMPUTER KNOWLEDGE QUESTIONS
1.    The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........

1) programs

2) processors

 3) input devices

4) memory modules

5) None of these



2.    An area of a computer that temporarily holds data waiting to be processed is ..........

1) CPU

2) Memory

3) Storage

4) File

5) None of these



3.    To select or unselect one word to the right

1) CTRL + SHIFT

2) CTRL + SHIFT + UP Arrow

3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these

4.    To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these

5.    To Copy a picture of the selected window to the clipboard
1) ALT + TAB
 2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these

6.    .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these

7.    ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these

8.    ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these

9.    ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these

10.    ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL

11.    Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these

12.    The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

13.    A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation   
4) server
5) None of these

14.    RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these

15.    Which of the following are the functions of a operating system
1) Allocates resources
 2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2

16.    To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these

17.    The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these

18.    What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these

19.    .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these

20.    The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these

21.    A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above

22.    What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these

23.    On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes

24.    You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these

25.    ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these

26.    ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these

27.    The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these

28.    The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these

29.    RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory   
4) Both (1) and (2)
5) None of these

30.    Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory   
4) Both (1) and (2)
5) None of these

31.    Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these

32.    Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these

33.    RAM is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
34.    ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these

35.    Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these

36.    A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these

37.    COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these

38.    All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these

39.    Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these

40.    All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives

41.    The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board

42.    .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these

43.    Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet

44.    When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these

45.    A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these

46.    Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these

47.    The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these

48.    Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading  
2) processing
3) batching  
4) utilizing
5) None of these

49.    The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics   
2) simulation
3) computer forensics
4) animation
5) None of these

50.    Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:

  1) 1      2) 2      3) 4      4) 2      5) 3      6) 3      7) 3      8) 4       9) 1    10) 2

11) 3    12) 4    13) 1    14) 3    15) 4    16) 1   17) 2    18) 2     19) 2   20) 3    
21) 3    22) 2    23) 3    24) 2    25) 2   26) 1    27) 1     28) 3    29) 2   30) 1   

31) 1    32) 1    33) 1    34) 2    35) 1    36) 1   37) 1    38) 2     39) 3   40) 2

41) 2    42) 4    43) 2    44) 2    45) 3    46) 4   47) 1    48) 2     49) 3   50) 1



TUESDAY, 15 FEBRUARY 2012

1    1. What Are The Different Views To Display A Table

 A) Datasheet View 
 B) 
Design View 
 C) Pivote Table & Pivot Chart View 
 D) All Of Above 

2. Which Of The Following Creates A Drop Down List Of Values To Choose From?

 A) Ole Object 
 B) Hyperlink 
 C) Memo 
 D) Lookup Wizard 

3. The Command Center Of Access File That Appears When You Create Or Open The Ms 
Access Database File.

 A) Database Window 
 B) Query Window 
 C) Design View Window 
 D) Switchboard 

4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables

 A) Relationship 
 B) Join 
 C) Query 
 D) None Of These 

5. In A Database Table, The Category Of Information Is Called _____

 A) Tuple 
 B) Field 
 C) Record 
 D) All Of Above 

6. This Key Uniquely Identifies Each Record

 A) Primary Key 
 B) Key Record 
 C) Unique Key 
 D) Field Name 

7. It Is An Association Established Between Common

 A) Line 
 B) Relationship 
 C) Primary Key 
 D) Records 

8. This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project.

 A) Data Definition 
 B) Data Refinement 
 C) Establishing Relationship 
 D) None Of The Above 

9. A Database Language Concerned With The Definition Of The Whole Database Structure And Schema Is ________

 A) DCL 
 B) DML 
 C) DDL 
 D) All Of Above 

10. Which Of The Field Has Width 8 Bytes?

 A) Memo 
 B) Number 
 C) Date/time 
 D) Hyperlink 

11. Which Of The Following Statement Is True?

 A) Foreign Key Fields Don\'t Allow Duplicate Values 
 B) In Primary Key Field You Can Enter Duplicate Value 
 C) In An Indexed Field You May Or May Not Enter Duplicate Value    Depending Upon Setting 
 D) All Statements Are True 

12. Following Is Not A Database Model

 A) Network Database Model 
 B) Relational Database Model 
 C) Object Oriented Database Model 
 D) None 

13. Microsoft Access Is A

 A) RDBMS 
 B) OODBMS 
 C) ORDBMS 
 D) Network Database Model 

14. DCL Provides Commands To Perform Actions Like

 A) Change The Structure Of Tables 
 B) Insert, Update Or Delete Records And Data Values 
 C) Authorizing Access And Other Control Over Database 
 D) None Of Above 

15. The Database Language That Allows You To Access Or Maintain Data In A Database

 A) DCL 
 B) DML 
 C) DDL 
 D) None Of Above 

16. What Is The Maximum Length A Text Field Can Be?

 A) 120 
 B) 255 
 C) 265 
 D) 75 

 
17. Which Of The Following Is Not A Database Object?


 A) Tables 
 B) Queries 
 C) Relationships 
 D) Reports 

18. A __________ Enables You To View Data From A Table Based On A Specific Criterion

 A) Form 
 B) Query 
 C) Macro 
 D) Report 

19. What Are The Columns In A Microsoft Access Table Called?

 A) Rows 
 B) Records 
 C) Fields 
 D) Columns 

20. Which Of The Following Is Not A Type Of Microsoft Access Database Object?

 A) Table 
 B) Form 
 C) Worksheets 
 D) Modules 

Answers

1-D, 2-D, 3-A, 4-A, 5-B, 6-A, 7-B, 8-A, 9-C, 10-C, 11-C, 12-D, 13-A, 14-C, 15-A, 16-B, 17-C, 18-B, 19-C, 20-C, 



COMPUTER QUESTIONS ON BASICS
1. UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
2. CD-ROM stands for
a. Compactable Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory
3. ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
4. VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
5. IBM 1401 is
a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d. Fourth Generation Computer
6. MSI stands for
a. Medium Scale Integrated Circuits
b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit
d. Medium System Intelligent Circuit

7. The capacity of 3.5 inch floppy disk is
a. 1.40 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB
8. The first computer introduced in Nepal was
a. IBM 1400
b. IBM 1401
c. IBM 1402
d. IBM1402
9. WAN stands for
a. Wap Area Network
b. Wide Area Network
c. Wide Array Net
d. Wireless Area Network
10. MICR stands for
a. Magnetic Ink Character Reader
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. None

ANSWER:
1. UNIVAC is
Correct Answer: a. Universal Automatic Computer

Explanation: There are no computers with the name as in other options. UNIVAC was the first general purpose electronic digital computer designed for commercial use, produced by Universal Accounting Company of John Mauchly and J.P.Eckert in 1951.

2. CD-ROM stands for
Correct Answer: d. Compact Disk Read Only Memory

Explanation: There are no objects with the name as in other options. CD-ROM is a non-volatile optical data storage medium using the same physical format as audio compact disk, readable by a computer with a CD-ROM drive. The standard 12 cm diameter CD-ROM store about 660 megabytes.
3. ALU is
Correct Answer: a. Arithmetic Logic Unit

Explanation: ALU is a unit in Central Processing Unit in a computer system that is responsible for arithmetic calculations and logical operations. Apart from ALU, the CPU contains MU (Memory Unit) and CU (Control Unit).
4. VGA is
Correct Answer: a. Video Graphics Array

Explanation: VGA is a type of Graphics Adapter. Graphic Adapter is an electronic board that controls the display of a monitor. This device helps the motherboard to work with the monitor and in VGA and SVGA the last letter ‘A’ stands for ‘Array’ whereas in MDA, CGA, MCGA the last letter ‘A’ stands for ‘Adapter’.
5. IBM 1401 is
Correct Answer: b. Second Generation Computer
Explanation: IBM 1401 is a Second Generation Computer and is the first computer to enter Nepal in 2028 BS for census. Government of Nepal had brought this computer on rent and later purchased for data processing in Bureau of Statistics. After this computer, another ICL 2950/10, a British computer, was purchased by the fund of UNDP and UNFPA for the census of 2038 BS is second computer in Nepal.
6. MSI stands for
Correct Answer: a. Medium Scale Integrated Circuits

Explanation: After the invention of IC chips the development of computers plunged into next phase. Small Scale Integration and Medium Scale Integration (SSI and MSI) were used in third generation of computers and Large Scale Integration and Very Large Scale Integration (LSI and VLSI) are being used in fourth generation of computers. People are now expecting ULSI (Ultra Large Scale Integration) Circuits to be used for fifth generation computers.

7. The capacity of 3.5 inch floppy disk is
Correct Answer: d. 1.44 MB

Explanation: Microfloppy disks (3.5 inch) if it is high density (MF2HD) can store 1.44 MB and if it is low density (MF2DD), it can store 720 KB. Mini Floppy disks (5.25 inch) if it is high density (MD2HD) can store 1.2 MB and low density (MD2DD) stores 360 KB of data.
8. The first computer introduced in Nepal was
Correct Answer: b. IBM 1401

Explanation: IBM 1401, a second generation computer was brought in Nepal by the Government of Nepal paying One Lakh and twenty five thousands per month to use in the census in 2028 B.S. Before this computer, Nepal was using a calculating device called Facit for statistical tasks.
9. WAN stands for
Correct Answer: b. Wide Area Network

Explanation: There are three different classes of computer network namely, Local Area Network (LAN) that covers a small geographical area such as a room, a building or a compound; Metropolitan Area Network (MAN) that has a citywide coverage; and Wide Area Network (WAN) that covers the whole globe or beyond the globe.
10. MICR stands for
Correct Answer: a. Magnetic Ink Character Reader

Explanation: MICR (Magnetic Ink Character Reader) is kind of scanner that can scan and identify the writing of magnetic ink. This device is used in banks to verify signatures in Checks.

1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart
3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom
5. Information travels between components on the mother board through-
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals
6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these
7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these
8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU
9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor
10. .....is collection of web pages and ......is the very first page that we see on opening of a web-site
1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these
11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error
12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these
13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these
14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None
15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these
16. The most important or powerful computer in a typical network is _____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these
17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these
18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these
19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these
20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these
21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these
22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these
23. Changing an existing document is called _____ the document.
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these
24. Computers use the _____ number system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these
25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these
26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these
27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these
29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these
30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these
31. When sending an e-mail, the _____ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) None of these
32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these
33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these
34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
35. Network components are connected to the same cable in the _____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed
36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these
37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these
38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam
39. Two or more computers connected to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline
40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these
41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these
42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN
43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL
44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation
45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks
46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code
47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these
48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface
49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these
50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these
ANSWERS:
1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2 11)2 12)4 13)2 14)4 15)2 16)3 17)1 18)1 19)2 20)1 21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)1 29)2 30)3 31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2 41)4 42)4 43)4 44)5 45)4 46)2 47)1 48)4 49)4 50)1

No comments: