THURSDAY, 12 JULY 2012
access time - The performance of a hard drive or other storage device - how long it takes to locate a file.
Questions 1:
Answers:
DBMS and Design Set 2
Questions
Questions 1:
Question 2:
Question 3:
Question 4:
Question 5:
Question 6:
Question 7:
Question 8:
Question 9:
Question 10:
Answers:
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11. ...... proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
SUNDAY, 26 FEBRUARY 2012
COMPUTER KNOWLEDGE QUESTIONS FOR RRB
1. The basic building block of a database that contains related record is____
A) Query
B) Form
C) Table
D) Edited Page
E) Report
2. Which is not a data source component?
A) mail merge toolbar
B) header row
C) data fields
D) data records
E) None Of these
3. ______ services are available free at portals on the web.
A) E-mail
B) FTP
C) Video Conferencing
D) Telephone
E) All Of the above
4. In correct information is generated by ____ in the Information System.
A) Unreliable hardware
B) Incorrect data
C) Untested software
D) Unskilled people
E) Inconvinient timing of work
5. The blinking symbol on the computer screen is called the _____
A) Mouse
B) Logo
C) Hand
D) Palm
E) Cursor
6. Choose the web browser among the following:
A) Yahoo
B) World Wide Web
C) Facebook
D) Google Chrome
E) None Of these
7. Pick the odd one ___
A) Printer
B) Keyboard
C) Mouse
D) Scanner
E) Microphone
8. Shimmer, Sparkle text, Blinking Background etc. are known as
A) font styles
B) font effects
C) word art
D) text effects
E) None Of these
9. Using antivirus software is _______
A) Detective measures
B) Preventive measures
C) Corrective measure
D) All Of the above
E) None Of the above
10. Which of the following is not available in Font Spacing?
A) Normal
B) Loosely
C) Condensed
D) Expanded
E) None Of these
11. Which of the following position is not available for fonts on MS Word?
A) Normal
B) Raised
C) Lowered
D) Centered
E) None Of these
12. What is the maximum scale percentage available in Scale drop down box?
A) 500
B) 200
C) 100
D) 90
E) None Of these
13. The communications device that allows the computer to access a network is called a ______ card.
A) Modem
B) Video
C) Sound
D) Network
E) None Of these
14. Bit is short for _______
A) Binary system
B) Digital byte
C) Binary digit
D) Binary Unit
E) None Of these
15. A computer can’t “boot” if it does not have the ________
A) Compiler
B) Loader
C) Operating System
D) Loader
E) None Of these
16. Which type of RAM is normally the fastest?
A) DRAM
B) VRAM
C) SRAM
D) WRAM
E) None Of these
17. The System BIOS and ROM chips are called ____
A) Software
B) Firmware
C) Hardware
D) Bootware
E) None Of these
18. In a document what is the maximum number of columns that can be inserted in MS Word Table?
A) 35
B) 15
C) 63
D) 65
E) None Of these
19. You can detect spelling and grammar errors by
A) Press Shift + F7
B) Press Ctrl + F7
C) Press Alt+ F7
D) Press F7
E) None Of these
20. A screen element of MS Word that is usually located below the title bar that provides categorized options is
A) Menu mar
B) Tool Bar
C) Status Bar
D) All of the above
E) None Of these
Answers
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
E
|
A
|
A
|
B
|
E
|
D
|
A
|
D
|
B
|
B
|
11
|
12
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
20
|
D
|
B
|
D
|
C
|
C
|
C
|
B
|
C
|
D
|
A
|
FRIDAY, 22 JUNE 2012
COMPUTER KNOWLEDGE QUESTIONS
FOR RRB
1. The task bar is located in_____
1) On the start menu
2) At the bottom of the screen
3) On the quick launch tool bar
4) At the top of the screen
5) None of these
1) On the start menu
2) At the bottom of the screen
3) On the quick launch tool bar
4) At the top of the screen
5) None of these
2. Another word for software is____
1) Input
2) Output
3) Program
4) System
5) None Of these
1) Input
2) Output
3) Program
4) System
5) None Of these
3. Generally, you access the Recycle
Bin through an icon located___
1) On the desktop
2) On the hard drive
3) On the shortcut menu
4) In the properties dialog box
5) None Of these
1) On the desktop
2) On the hard drive
3) On the shortcut menu
4) In the properties dialog box
5) None Of these
4. Which is not a basic function of
a computer?
1) Copy text
2) Accept input
3) Process data
4) Store data
5) None Of these
1) Copy text
2) Accept input
3) Process data
4) Store data
5) None Of these
5. ____bits equal one byte
1) Eight
2) Two
3)One thousand
4) One million
5) None Of these
1) Eight
2) Two
3)One thousand
4) One million
5) None Of these
6. A personal computer is___
1) MC
2) SC
3) YC
4) PC
5) None of these
1) MC
2) SC
3) YC
4) PC
5) None of these
7. A picture would be stored in a___
field in a database.
1) Text
2) Memo
3) Object
4) Hyperlink
5) None of these
1) Text
2) Memo
3) Object
4) Hyperlink
5) None of these
8. The unit that transforms input
into output is known as the:
1) RAM Chip
2) BIOS Chip
3) CPU
4) Motherboard
5) None Of these
1) RAM Chip
2) BIOS Chip
3) CPU
4) Motherboard
5) None Of these
9. The function of key F4 is
1) To repeat the last action
2) Undo the last action
3) To check spelling
4) Both 1 and 2
5) None Of these
1) To repeat the last action
2) Undo the last action
3) To check spelling
4) Both 1 and 2
5) None Of these
10. A dot-matrix printer is
1) An input-output device
2) An output device only
3) An input device only
4) All of the above
5) None of these
1) An input-output device
2) An output device only
3) An input device only
4) All of the above
5) None of these
11. Computers collects data, that
means it allows users to_____data
1) Present
2) Transmit
3) Output
4) Store
5) Input
1) Present
2) Transmit
3) Output
4) Store
5) Input
12. The _____ of a system includes
the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these
1) Hardware
2) Icon
3) Information
4) Software
5) None of these
13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these
14. Error in a computer program is
called
1) Crash
2) Failure Of Power
3) Bugger
4) Bug
5) Virus
1) Crash
2) Failure Of Power
3) Bugger
4) Bug
5) Virus
15. Tape drive gives _____ access to
data.
1) Timely
2) Sporadic
3) Random
4) Sequential
5) Disastrous
1) Timely
2) Sporadic
3) Random
4) Sequential
5) Disastrous
16. A blinking indicator that shows
you where your next action will happen ____
1) CPU
2) Tool bar
3) Cursor
4) Boot
5) None of these
1) CPU
2) Tool bar
3) Cursor
4) Boot
5) None of these
17. Which of the following is an
example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these
18. Which is the part of a computer that
one can touch and feel?
1) Programs
2) Software
3) Hardware
4) Output
5) None of these
1) Programs
2) Software
3) Hardware
4) Output
5) None of these
19. Screen that comes on when you
turn on your computer that shows all the icons ____
1) Face to Face
2) Viewer
3)View Space
4) Icon Space
5) Desktop
1) Face to Face
2) Viewer
3)View Space
4) Icon Space
5) Desktop
20. Devices that let the computer
communicate with you _____
1) Input
2) Output
3) Type
4) Print
5) None Of these
1) Input
2) Output
3) Type
4) Print
5) None Of these
21. A hard copy of a document is
_____
1) Stored in the hard disk
2) Stored on a floppy
3) Stored on a CD
4) Printed on the printer
5) None of these
1) Stored in the hard disk
2) Stored on a floppy
3) Stored on a CD
4) Printed on the printer
5) None of these
22. _____is the science that
attempts to produce machines that display the same type of intelligence that
humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these
23. A program that works like a
calculator for keeping track of money and making budgets ____
1) Calculator
2) Spreadsheet
3) Budgeter
4) Financier
5) None of these
1) Calculator
2) Spreadsheet
3) Budgeter
4) Financier
5) None of these
24. Computers use the _____ number
system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these
25. To move down a page in a
document _______
1) Scroll
2) Jump
3) Wriggle
4) Fly
5) None of these
1) Scroll
2) Jump
3) Wriggle
4) Fly
5) None of these
26. Data is recorded in floppy disk
in _____ rings.
1) Sectors
2) Ringers
3) Tracks
4) Rounders
5) Circles
1) Sectors
2) Ringers
3) Tracks
4) Rounders
5) Circles
27. _____is the process of finding
errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
28. You can ______ from/ to CD.
1) Read
2) Write
3) Read or Write
4) Either Read or Write
5) None Of these
1) Read
2) Write
3) Read or Write
4) Either Read or Write
5) None Of these
29. The main system board of a
computer is called the ______
1) Integrated Circuit
2) Processor
3) Motherboard
4) Microchip
5) Drive Board
1) Integrated Circuit
2) Processor
3) Motherboard
4) Microchip
5) Drive Board
30. A _____ contains specific rules
and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these
31. When sending an e-mail, the
_____ line describes the contents of the message.
1) To
2) From
3) Contents
4) CC
5) Subject
1) To
2) From
3) Contents
4) CC
5) Subject
32. _____ is a small picture on
screen that depicts program, file or folder.
1) Icon
2) Chip
3) Memory
4) Virus
5) Pixel
1) Icon
2) Chip
3) Memory
4) Virus
5) Pixel
33. Contents of ______ gets erased
when computer is turned off.
1) Input
2) Output
3) Storage
4) Memory
5) CD
1) Input
2) Output
3) Storage
4) Memory
5) CD
34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
35. .bas, .doc and .htm are examples
of____
1) Databases
2) Domains
3) Extensions
4) Protocols
5) URLs
1) Databases
2) Domains
3) Extensions
4) Protocols
5) URLs
36. ____Performs simple arithmetic
operation for CPU.
1) DIMM
2) ALU
3) BUS
4) Register
5) ROM
1) DIMM
2) ALU
3) BUS
4) Register
5) ROM
37. One advantage of
dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these
38. What is the term for unsolicited
e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam
39. Two or more computers connected
to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline
40. Computers that are portable and
convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these
ANSWERS:
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
20
|
2
|
3
|
1
|
1
|
1
|
4
|
1
|
3
|
1
|
2
|
5
|
4
|
2
|
4
|
4
|
3
|
1
|
3
|
5
|
2
|
21
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
31
|
32
|
33
|
34
|
35
|
36
|
37
|
38
|
39
|
40
|
4
|
4
|
2
|
4
|
1
|
1
|
4
|
3
|
3
|
1
|
5
|
1
|
4
|
2
|
3
|
2
|
2
|
5
|
1
|
2
|
WEDNESDAY, 04 APRIL 2012
Microsoft PowerPoint Multiple Choice Questions (MCQs)
SET - 1
1. Which file format can be
added to a PowerPoint show?
a.
.jpg
b.
.giv
c.
.wav
d.
All of the above
Correct Answer: d
2.
In Microsoft PowerPoint two kind of sound effects files that can be added to
the presentation are
a.
.wav files and .mid files
b.
.wav files and .gif files
c.
.wav files and .jpg files
d.
.jpg files and .gif files
Correct Answer: a
3.
Material consisting of text and numbers is best presented as
a.
A table slide
b.
A bullet slide
c.
A title slide
d.
All of the above
Correct Answer: a
4.
What is a motion path?
a.
A type of animation entrance effect
b.
A method of advancing slides
c.
A method of moving items on a slide
d.
All of the above
Correct Answer: c
5.
What is a slide-title master pair?
a.
The title area and text area of a specific slide
b.
a slide master and title master merged into a single slide
c.
A slide master and title master for a specific design template
d.
All of above
Correct Answer: c
6.
Which of the following should you use if you want all the slide in the
presentation to have the same “look”?
a.
the slide layout option
b.
add a slide option
c.
outline view
d.
a presentation design template
Correct Answer: d
7.
in the context of animations, what is a trigger?
a.
An action button that advances to the next slide
b.
An item on the slide that performs an action when clicked
c. The
name of a motion path
d.
All of above
Correct Answer: b
8.
If you have a PowerPoint show you created and want to send using email to
another teacher you can add the show to your email message as a (an)
a.
Inclusion
b.
Attachment
c.
Reply
d.
Forward
Correct Answer: b
9.
In order to edit a chart, you can
a.
Triple click the chart object
b.
Click and drag the chart object
c.
Double click the chart object
d.
Click the chart object
Correct Answer: c
10.
to exit the PowerPoint
a.
click the application minimize button
b.
click the document close button
c.
double click the applications control menu icon
d.
double click the document control menu icon
Correct Answer: c
11.
to preview a motion path effect using the custom animation task pane, you
should
e.
click the play button
f.
click the show effect button
g.
double click the motion path
h.
all of above
Correct Answer: a
12.
You can create a new presentation by completing all of the following
except
a.
Clicking the new button on the
standard toolbar
b.
Clicking file, new
c.
Clicking file open
d.
Pressing ctrl + N
Correct Answer: c
13.
You can embed a MS-Organization Chart in a slide by
a.
Clicking the object command on the edit menu
b.
Clicking the object command on the edit menu
c.
Clicking the insert new slide button the standard toolbar, then double click
the organization chart button on the formatting toolbar
d.
Clicking the MS-Organization Chart button
on the standard toolbar
Correct Answer: b
14.
To select one hyperlink after another during a slide presentation, what do you
press?
a.
Tab
b.
Ctrl + K
c.
Ctrl + h
d.
All of above
Correct Answer: a
15.
special effects used to introduce slides in a presentation are called
a.
effects
b.
custom animations
c.
transitions
d.
present animations
Correct Answer: c
16.
You can edit an embedded organization chart object by
a.
Clicking edit object
b.
Double clicking the organization chart object
c.
Right clicking the chart object, then clicking edit MS-Organizaiton Chart
object
d.
b and c both
Correct Answer: d
17.
What is the term used when you press and hold the left mouse key and more the
mouse around the slide?
a.
Highlighting
b.
Dragging
c.
Selecting
d.
Moving
Correct Answer: b
18.
Which of the following toolbars provide different options in various master
views?
a.
Common tasks toolbar
b.
Drawing toolbar
c.
Formatting toolbar
d.
Standard toolbar
Correct Answer: a
19.
How can you create a uniform appearance by adding a background image to all
slides?
a.
Create a template
b.
Edit the slide master
c.
Use the autocorrect wizard
d.
All of the above
Correct Answer: b
20.
How do you create speaker note pages that show the slides, related notes, and
your company logo on each page?
a.
Edit the notes master and add your company logy
b.
Edit the slide master and insert your company logo and notes pane
c.
Edit the handout master to include your company logo and one slide per page
with additional note space
d.
All of the above
Correct Answer: a
FRIDAY, 16 MARCH 2012
Computer Based Questions For Bank PO Exam
1. All of the following are examples of real
security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by
large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as
cash registers) are often connected to complex inventory and sales computer
systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small,
wireless handheld computer that scans an item’s tag and pulls up the current
price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or
damaged files from a criminal̢۪s computer is an example of a law enforcement
specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the
four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an
animal, can be used to record and track in a database all of the animal̢۪s
movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations
by manipulating devices through computers instead of manually. This technology
is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by
copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules
and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts
to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been
organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers
manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that
they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a
digital camera and processed appropriately, the actual print of the picture is
considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language
to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information
by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the
alphabet, each number and each special character is made up of a unique
combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one
billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million
bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer
that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are
located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of
input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of
an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of
storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the brain
of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and
photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer
programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs
that enables your computer’s hardware devices and ____________ software to work
together.
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple
Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use
different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources
to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based
servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed
computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
38. DSL is an example of a(n) ____________
connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access
to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
40. ____________ is the science revolving
around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct
order of the four major functions of a computer?
A. Process
Output Input Storage
B. Input Output Process Storage
C. Process Storage Input Output
D. Input
Process Output Storage
Answer: D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
43. The binary language consists of
____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which
the computer system functions and provides a means by which users can interact
with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common
type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer
chips that reside inside other devices, such as your car or your electronic
thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process
data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
50. The metal or plastic case that holds all
the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in
the Blank:
51. Between PCs and Macs, the ____________ is
the platform of choice for graphic design and animation.
Answer: Mac
52. The ____________ is the program that
manages the hardware of the computer system, including the CPU, memory, storage
devices, and input/output devices.
Answer: operating system
53. The type of operating system software you
use depends on your computer’s ____________.
Answer: platform
54. ____________software helps you carry out
tasks, such as typing a document or creating a spreadsheet.
Answer: Application
55. ____________are the fastest and most
expensive computers.
Answer: Supercomputers
56. A ____________ is approximately 1,000
bytes.
Answer: kilobyte
57. Input devices are used to provide the
steps and tasks the computer needs to process data, and these steps and tasks
are called ____________.
Answer: instructions
58. A computer gathers data, processes it,
outputs the data or information, and ____________ the data or information.
Answer: stores
59. The binary language consists of two
digits: ____________ and ____________.
Answer: 0 and 1
60. A string of ____________ 0s and 1s is
called a byte.
Answer: eight (8)
61. The devices you use to enter data into a
computer system are known as ____________ devices.
Answer: input
62. The devices on a computer system that let
you see the processed information are known as ____________ devices.
Answer: output
63. ____________ is the set of computer
instructions or programs that enables the hardware to perform different tasks.
Answer: Software
64. When you connect to the ____________,
your computer is communicating with a server at your Internet service provider
(ISP).
Answer: Internet
65. ____________ are computers that excel at
executing many different computer programs at the same time.
Answer: Mainframes
66. ____________is the application of
computer systems and techniques to gather legal evidence.
Answer: Computer forensics
67. ____________ is the science that attempts
to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)
68. Macintosh computers use the Macintosh
operating system (Mac OS), whereas PCs generally run ____________ as an
operating system.
Answer: Microsoft Windows
69. A process known as ____________ tracks
trends and allows retailers to respond to consumer buying patterns.
Answer: data mining
70. Hard disk drives and CD drives are
examples of ____________ devices.
Answer: storage
71. You would use ____________ software to
create spreadsheets, type documents, and edit photos.
Answer: application
72. ____________ are computers that support
hundreds or thousands of users simultaneously.
Answer: Mainframes
73. ____________ is the term given to the act
of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft
74. Surgeons are using ____________ to guide
robots to perform delicate surgery.
Answer: computers
75. Patient ____________ are life-sized
mannequins that have a pulse and a heartbeat and respond to procedures just
like humans.
Answer: simulators
True
and False
76. Currently, the performance of tasks by
robots is based on preprogrammed algorithms.
Answer: True
77. Data can be a number, a word, a picture,
or a sound.
Answer: True
78. Strictly defined, a computer is a data
processing device.
Answer: True
79. The discrepancy between the â€Å“haves†and â€Å“have-nots†with regard to
computer technology is commonly referred to as the digital society.
Answer: False (digital divide)
80. One of the benefits of becoming computer
fluent is being a savvy computer user and consumer and knowing how to avoid
viruses, the programs that pose threats to computer security.
Answer: True
81. Trend-spotting programs, developed for
business, have been used to predict criminal activity.
Answer: True
82. Employers do not have the right to
monitor e-mail and network traffic on employee systems used at work.
Answer: False
83. Clicking on an icon with the mouse is a
form of giving an instruction to the computer.
Answer: True
84. Output devices store instructions or data
that the CPU processes.
Answer: False (memory)
85. The CPU and memory are located on a
special circuit board in the system unit called the motherboard.
Answer: True
86. Nanostructures represent the smallest
human-made structures that can be built.
Answer: True
87. The main difference between a
supercomputer and a mainframe is that supercomputers are designed to execute a
few programs as quickly as possible, whereas mainframes are designed to handle
many programs running at the same time (but at a slower pace).
Answer: True
88. Being computer fluent means that you
should be able to build a computer yourself.
Answer: False
89. Embedded computers are self-contained
computer devices that have their own programming and do not receive input.
Answer: True
90. A Web browser is a special device that is
installed in your computer that allows it to communicate with other devices on
a network.
Answer: False (network adapter)
91. With a wireless network, it is easier to
relocate devices.
Answer: True
92. The most common type of memory that the
computer uses to process data is ROM.
Answer: False (RAM)
Matching:
93. Match the following terms with their
approximate size:
I. kilobyte A.
one million bytes
II. byte B.
eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D.
one billion bytes
V. terabyte E.
one trillion bytes
Answer: C, B, D, A, E
94. Match the following terms with their
meanings:
I. printer A.
storage device
II. scanner B.
output device
III. RAM C.
Input device
IV. CPU D.
a type of memory
V. CD drive E.
processor
Answer: B, C, D, E, A
95. Match the following terms with their
meanings:
I. mainframe A. the most expensive computers
that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides
resources to other computers connected to a network
III. embedded computer C. a large, expensive
computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device
that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B
96. Match the following terms with their
meanings:
I. software A. transforming data into
information
II. hardware B. data that has been organized
or presented in a meaningful fashion
III. operating system C. any part of the
computer that you can physically touch
IV. processing D. a set of computer programs
that enables hardware to perform different tasks
V. information E. the most common type of
system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B
97. Match the following terms with their
meanings:
I. system software A. the set of programs
that enables computer hardware devices and application software to work
together
II. application software B. the kind of
operating system software you will use depends on this
III. platform C. operating system software
generally used on PCs
IV. Microsoft Windows D. a set of programs
used to accomplish a specific task
V. Mac OS E. operating system software used
on the Apple Macintosh
Answer: A, D, B, C, E
98. Match the following terms with their
meanings:
I. data A. the main circuit board in the
system unit
II. memory B. the representation of a fact or
idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data
that the CPU processes
V. motherboard E. data or information that
can be accessed again
Answer: B, D, C, E, A
99. Match the following terms with their
meanings:
I. bit A. the science revolving around the
use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains
the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks
necessary to process data into usable information
Answer: D, C, E, B, A
100. Match the following fields to the
related computer technology:
I. medicine A. Internet research and virtual
tours
II. business B. data mining
III. law enforcement C. robotics and
simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E
THURSDAY, 08 MARCH 2012
COMPUTER TERMINOLOGY
access time - The performance of a hard drive or other storage device - how long it takes to locate a file.
active program or window
- The application or window at the front
(foreground) on the monitor.
alert
(alert box) - a message that appears on screen, usually to tell
you something went wrong.
alias - an icon that points to a file, folder or application (System 7).
apple menu - on the left side of the screen header. System 6 = desk accessories System 7 = up to 50 items.
application - a program in which you do your work.
application menu - on the right side of the screen header. Lists running applications.
ASCII (pronounced ask-key ) - American Standard Code for Information Interchange. a commonly used data format for exchanging information between computers or programs.
background - part of the multitasking capability. A program can run and perform tasks in the background while another program is being used in the foreground.
bit - the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0).
backup - a copy of a file or disk you make for archiving purposes.
boot - to start up a computer.
bug - a programming error that causes a program to behave in an unexpected way.
bus - an electronic pathway through which data is transmitted between components in a computer.
byte - a piece of computer information made up of eight bits.
card - a printed circuit board that adds some feature to a computer.
cartridge drive - a storage device, like a hard drive, in which the medium is a cartridge that can be removed.
CD-ROM - an acronym for Compact Disc Read-Only Memory.
Chooser - A desk accessory used to select a printer, or other external device, or to log onto a network.
Clipboard - A portion of memory where the Mac temporarily stores information. Called a Copy Buffer in many PC applications because it is used to hold information which is to be moved, as in word processing where text is "cut" and then "pasted".
Clock Rate (MHz) - The instruction processing speed of a computer measured in millions of cycles per second (i.e., 200 MHz).
command - the act of giving an instruction to your Mac either by menu choice or keystroke.
command (apple) key - a modifier key, the Command key used in conjunction with another keystroke to active some function on the Mac.
compiler - a program the converts programming code into a form that can be used by a computer.
compression - a technique that reduces the size of a saved file by elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)
control key - seldom used modifier key on the Mac.
control panel - a program that allows you to change settings in a program or change the way a Mac looks and/or behaves.
CPU - the Central Processing Unit. The processing chip that is the "brains" of a computer.
crash - a system malfunction in which the computer stops working and has to be restarted.
cursor - The pointer, usually arrow or cross shaped, which is controlled by the mouse.
daisy chaining - the act of stringing devices together in a series (such as SCSI).
database - an electronic list of information that can be sorted and/or searched.
data - (the plural of datum) information processed by a computer.
defragment - (also - optimize) to concatenate fragments of data into contiguous blocks in memory or on a hard drive.
desktop - 1. the finder. 2. the shaded or colored backdrop of the screen.
desktop file - an invisible file in which the Finder stores a database of information about files and icons.
dialog box - an on-screen message box that appears when the Mac requires additional information before completing a command.
digitize - to convert linear, or analog, data into digital data which can be used by the computer.
disk - a spinning platter made of magnetic or optically etched material on which data can be stored.
disk drive - the machinery that writes the data from a disk and/or writes data to a disk.
disk window - the window that displays the contents or directory of a disk.
document - a file you create, as opposed to the application which created it.
DOS - acronym for Disk Operating System - used in IBM PCs.
DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed page or on the computer screen.
download - to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ).
drag - to move the mouse while its button is being depressed.
drag and drop - a feature on the Mac which allows one to drag the icon for a document on top of the icon for an application, thereby launching the application and opening the document.
driver - a file on a computer which tells it how to communicate with an add-on piece of equipment (like a printer).
Ethernet - a protocol for fast communication and file transfer across a network.
expansion slot - a connector inside the computer which allows one to plug in a printed circuit board that provides new or enhanced features.
extension - a startup program that runs when you start the Mac and then enhances its function.
fibre channel - as applied to data storage and network topology
file - the generic word for an application, document, control panel or other computer data.
finder - The cornerstone or home-base application in the Mac environment. The finder regulates the file management functions of the Mac (copying, renaming, deleting...)
floppy - a 3.5 inch square rigid disk which holds data. (so named for the earlier 5.25 and 8 inch disks that were flexible).
folder - an electronic subdirectory which contains files.
font - a typeface that contains the characters of an alphabet or some other letterforms.
footprint - The surface area of a desk or table which is occupied by a piece of equipment.
fragmentation - The breaking up of a file into many separate locations in memory or on a disk.
freeze - a system error which causes the cursor to lock in place.
get info - a Finder File menu command that presents an information window for a selected file icon.
gig - a gigabyte = 1024 megabytes.
hard drive - a large capacity storage device made of multiple disks housed in a rigid case.
head crash - a hard disk crash caused by the heads coming in contact with the spinning disk(s).
high density disk - a 1.4 MB floppy disk.
highlight - to select by clicking once on an icon or by highlighting text in a document.
icon - a graphic symbol for an application, file or folder.
initialize - to format a disk for use in the computer; creates a new directory and arranges the tracks for the recording of data.
insertion point - in word processing, the short flashing marker which indicates where your next typing will begin.
installer - software used to install a program on your hard drive.
interrupt button - a tool used by programmers to enter the debugging mode. The button is usually next to the reset button.
K - short for kilobyte.
keyboard shortcut - a combination of keystrokes that performs some function otherwise found in a pulldown menu.
kilobyte - 1024 bytes.
landscape - in printing from a computer, to print sideways on the page.
launch - start an application.
Measurements (summary) -
*a bit = one binary digit (1 or 0) *"bit" is derived from the contraction b'it (binary digit) -> 8 bits = one byte
*1024 bytes = one kilobyte
*K = kilobyte
*Kb = kilobit
*MB = megabyte
*Mb = megabit
*MB/s = megabytes per second
*Mb/s = megabits per second
*bps = bits per second
i.e., 155 Mb/s = 19.38 MB/s
MB - short for megabyte.
megabyte - 1024 kilobytes.
memory - the temporary holding area where data is stored while it is being used or changed; the amount of RAM a computer has installed.
menu - a list of program commands listed by topic.
menu bar - the horizontal bar across the top of the Mac¹s screen that lists the menus.
multi finder - a component of System 6 that allows the Mac to multi task.
multi tasking - running more than one application in memory at the same time.
nanosecond - one billionth of a second. ( or, the time between the theatrical release of a Dudley Moore film and the moment it begins to play on airplanes).
native mode - using the computers original operating system; most commonly used when talking about the PowerPC can run software written for either the 80x0 systems, or the PowerPC¹s RISC code.
NuBus - expansion slots on the Mac which accept intelligent, self-configuring boards. NuBus is a different bus achitecture than the newer PCI bus and the boards are not interchangable.
operating system - the system software that controls the computer.
optical disk - a high-capacity storage medium that is read by a laser light.
palette - a small floating window that contains tools used in a given application.
partition - a subdivision of a hard drives surface that is defined and used as a separate drive.
paste - to insert text, or other material, from the clipboard or copy buffer.
PC - acronym for personal computer, commonly used to refer to an IBM or IBM clone computer which uses DOS.
PCI - acronym for Peripheral Component Interchange - the newer, faster bus achitecture.
peripheral - an add-on component to your computer.
point - (1/72") 12 points = one pica in printing.
pop-up menu - any menu that does not appear at the top of the screen in the menu bar. (may pop up or down)
port - a connection socket, or jack on the Mac.
Power PC - a processing chip designed by Apple, IBM and Motorola (RISC based).
Power Mac - a family of Macs built around the PowerPC chip.
print spooler - a program that stores documents to be printed on the hard drive, thereby freeing the memory up and allowing other functions to be performed while printing goes on in the background.
QuickTime - the Apple system extension that gives one the ability to compress, edit and play animation, movies and sound on the Mac.
RAM - acronym for Random-Access Memory.
reset switch - a switch on the Mac that restarts the computer in the event of a crash or freeze.
resize box - the small square at the lower right corner of a window which, when dragged, resizes the window.
RISC - acronym for Reduced Instruction Set Computing; the smaller set of commands used by the PowerPC and Power Mac.
ROM - acronym for Read Only Memory; memory that can only be read from and not written to.
root directory - the main hard drive window.
save - to write a file onto a disk.
save as - (a File menu item) to save a previously saved file in a new location and/or with a new name.
scroll - to shift the contents of a window to bring hidden items into view.
scroll bar - a bar at the bottom or right side of a window that contains the scroll box and allows scrolling.
scroll box - the box in a scroll bar that is used to navigate through a window.
SCSI - acronym for Small Computer System Interface.
SCSI address - a number between zero and seven that must be unique to each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15 SCSI Ids (hexidecimal); however, the length restriction (3 meters) is such that it is virtually impossible to link 15 devices together.
SCSI port - a 25 pin connector on the back of a Mac (native SCSI port); used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO) have a 68 pin connector.
SCSI terminator - a device placed at the end of a SCSI chain to complete the circuit. (some SCSI devices are self-terminating, or have active termination and do not require this plug).
serial port - a port that allows data to be transmitted in a series (one after the other), such as the printer and modem ports on a Mac.
server - a central computer dedicated to sending and receiving data from other computers (on a network).
shut down - the command from the Special menu that shuts down the Mac safely.
software - files on disk that contain instructions for a computer.
spreadsheet - a program designed to look like an electronic ledger.
start up disk - the disk containing system software and is designated to be used to start the computer.
surge suppressor - a power strip that has circuits designed to reduce the effects of surge in electrical power. (not the same as a UPS)
System file - a file in the System folder that allows your Mac to start and run.
System folder - an all-important folder that contains at least the System file and the Finder.
32 bit addressing - a feature that allows the Mac to recognize and use more than 8MB of memory.
title bar - the horizontal bar at the top of a window which has the name of the file or folder it represents.
upload - to send a file from one computer to another through a network.
Uninterruptible Power Source (UPS)- a constantly charging battery pack which powers the computer. A UPS should have enough charge to power your computer for several minutes in the event of a total power failure, giving you time to save your work and safely shut down.
UPS - acronym for Uninterruptible Power Source.
vaporware - "software" advertised, and sometimes sold, that does not yet exist in a releasable for.
virtual memory - using part of your hard drive as though it were "RAM".
WORM - acronym for Write Once-Read Many; an optical disk that can only be written to once (like a CD-ROM).
zoom box - a small square in the upper right corner of a window which, when clicked, will expand the window to fill the whole screen.
alias - an icon that points to a file, folder or application (System 7).
apple menu - on the left side of the screen header. System 6 = desk accessories System 7 = up to 50 items.
application - a program in which you do your work.
application menu - on the right side of the screen header. Lists running applications.
ASCII (pronounced ask-key ) - American Standard Code for Information Interchange. a commonly used data format for exchanging information between computers or programs.
background - part of the multitasking capability. A program can run and perform tasks in the background while another program is being used in the foreground.
bit - the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0).
backup - a copy of a file or disk you make for archiving purposes.
boot - to start up a computer.
bug - a programming error that causes a program to behave in an unexpected way.
bus - an electronic pathway through which data is transmitted between components in a computer.
byte - a piece of computer information made up of eight bits.
card - a printed circuit board that adds some feature to a computer.
cartridge drive - a storage device, like a hard drive, in which the medium is a cartridge that can be removed.
CD-ROM - an acronym for Compact Disc Read-Only Memory.
Chooser - A desk accessory used to select a printer, or other external device, or to log onto a network.
Clipboard - A portion of memory where the Mac temporarily stores information. Called a Copy Buffer in many PC applications because it is used to hold information which is to be moved, as in word processing where text is "cut" and then "pasted".
Clock Rate (MHz) - The instruction processing speed of a computer measured in millions of cycles per second (i.e., 200 MHz).
command - the act of giving an instruction to your Mac either by menu choice or keystroke.
command (apple) key - a modifier key, the Command key used in conjunction with another keystroke to active some function on the Mac.
compiler - a program the converts programming code into a form that can be used by a computer.
compression - a technique that reduces the size of a saved file by elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)
control key - seldom used modifier key on the Mac.
control panel - a program that allows you to change settings in a program or change the way a Mac looks and/or behaves.
CPU - the Central Processing Unit. The processing chip that is the "brains" of a computer.
crash - a system malfunction in which the computer stops working and has to be restarted.
cursor - The pointer, usually arrow or cross shaped, which is controlled by the mouse.
daisy chaining - the act of stringing devices together in a series (such as SCSI).
database - an electronic list of information that can be sorted and/or searched.
data - (the plural of datum) information processed by a computer.
defragment - (also - optimize) to concatenate fragments of data into contiguous blocks in memory or on a hard drive.
desktop - 1. the finder. 2. the shaded or colored backdrop of the screen.
desktop file - an invisible file in which the Finder stores a database of information about files and icons.
dialog box - an on-screen message box that appears when the Mac requires additional information before completing a command.
digitize - to convert linear, or analog, data into digital data which can be used by the computer.
disk - a spinning platter made of magnetic or optically etched material on which data can be stored.
disk drive - the machinery that writes the data from a disk and/or writes data to a disk.
disk window - the window that displays the contents or directory of a disk.
document - a file you create, as opposed to the application which created it.
DOS - acronym for Disk Operating System - used in IBM PCs.
DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed page or on the computer screen.
download - to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ).
drag - to move the mouse while its button is being depressed.
drag and drop - a feature on the Mac which allows one to drag the icon for a document on top of the icon for an application, thereby launching the application and opening the document.
driver - a file on a computer which tells it how to communicate with an add-on piece of equipment (like a printer).
Ethernet - a protocol for fast communication and file transfer across a network.
expansion slot - a connector inside the computer which allows one to plug in a printed circuit board that provides new or enhanced features.
extension - a startup program that runs when you start the Mac and then enhances its function.
fibre channel - as applied to data storage and network topology
file - the generic word for an application, document, control panel or other computer data.
finder - The cornerstone or home-base application in the Mac environment. The finder regulates the file management functions of the Mac (copying, renaming, deleting...)
floppy - a 3.5 inch square rigid disk which holds data. (so named for the earlier 5.25 and 8 inch disks that were flexible).
folder - an electronic subdirectory which contains files.
font - a typeface that contains the characters of an alphabet or some other letterforms.
footprint - The surface area of a desk or table which is occupied by a piece of equipment.
fragmentation - The breaking up of a file into many separate locations in memory or on a disk.
freeze - a system error which causes the cursor to lock in place.
get info - a Finder File menu command that presents an information window for a selected file icon.
gig - a gigabyte = 1024 megabytes.
hard drive - a large capacity storage device made of multiple disks housed in a rigid case.
head crash - a hard disk crash caused by the heads coming in contact with the spinning disk(s).
high density disk - a 1.4 MB floppy disk.
highlight - to select by clicking once on an icon or by highlighting text in a document.
icon - a graphic symbol for an application, file or folder.
initialize - to format a disk for use in the computer; creates a new directory and arranges the tracks for the recording of data.
insertion point - in word processing, the short flashing marker which indicates where your next typing will begin.
installer - software used to install a program on your hard drive.
interrupt button - a tool used by programmers to enter the debugging mode. The button is usually next to the reset button.
K - short for kilobyte.
keyboard shortcut - a combination of keystrokes that performs some function otherwise found in a pulldown menu.
kilobyte - 1024 bytes.
landscape - in printing from a computer, to print sideways on the page.
launch - start an application.
Measurements (summary) -
*a bit = one binary digit (1 or 0) *"bit" is derived from the contraction b'it (binary digit) -> 8 bits = one byte
*1024 bytes = one kilobyte
*K = kilobyte
*Kb = kilobit
*MB = megabyte
*Mb = megabit
*MB/s = megabytes per second
*Mb/s = megabits per second
*bps = bits per second
i.e., 155 Mb/s = 19.38 MB/s
MB - short for megabyte.
megabyte - 1024 kilobytes.
memory - the temporary holding area where data is stored while it is being used or changed; the amount of RAM a computer has installed.
menu - a list of program commands listed by topic.
menu bar - the horizontal bar across the top of the Mac¹s screen that lists the menus.
multi finder - a component of System 6 that allows the Mac to multi task.
multi tasking - running more than one application in memory at the same time.
nanosecond - one billionth of a second. ( or, the time between the theatrical release of a Dudley Moore film and the moment it begins to play on airplanes).
native mode - using the computers original operating system; most commonly used when talking about the PowerPC can run software written for either the 80x0 systems, or the PowerPC¹s RISC code.
NuBus - expansion slots on the Mac which accept intelligent, self-configuring boards. NuBus is a different bus achitecture than the newer PCI bus and the boards are not interchangable.
operating system - the system software that controls the computer.
optical disk - a high-capacity storage medium that is read by a laser light.
palette - a small floating window that contains tools used in a given application.
partition - a subdivision of a hard drives surface that is defined and used as a separate drive.
paste - to insert text, or other material, from the clipboard or copy buffer.
PC - acronym for personal computer, commonly used to refer to an IBM or IBM clone computer which uses DOS.
PCI - acronym for Peripheral Component Interchange - the newer, faster bus achitecture.
peripheral - an add-on component to your computer.
point - (1/72") 12 points = one pica in printing.
pop-up menu - any menu that does not appear at the top of the screen in the menu bar. (may pop up or down)
port - a connection socket, or jack on the Mac.
Power PC - a processing chip designed by Apple, IBM and Motorola (RISC based).
Power Mac - a family of Macs built around the PowerPC chip.
print spooler - a program that stores documents to be printed on the hard drive, thereby freeing the memory up and allowing other functions to be performed while printing goes on in the background.
QuickTime - the Apple system extension that gives one the ability to compress, edit and play animation, movies and sound on the Mac.
RAM - acronym for Random-Access Memory.
reset switch - a switch on the Mac that restarts the computer in the event of a crash or freeze.
resize box - the small square at the lower right corner of a window which, when dragged, resizes the window.
RISC - acronym for Reduced Instruction Set Computing; the smaller set of commands used by the PowerPC and Power Mac.
ROM - acronym for Read Only Memory; memory that can only be read from and not written to.
root directory - the main hard drive window.
save - to write a file onto a disk.
save as - (a File menu item) to save a previously saved file in a new location and/or with a new name.
scroll - to shift the contents of a window to bring hidden items into view.
scroll bar - a bar at the bottom or right side of a window that contains the scroll box and allows scrolling.
scroll box - the box in a scroll bar that is used to navigate through a window.
SCSI - acronym for Small Computer System Interface.
SCSI address - a number between zero and seven that must be unique to each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15 SCSI Ids (hexidecimal); however, the length restriction (3 meters) is such that it is virtually impossible to link 15 devices together.
SCSI port - a 25 pin connector on the back of a Mac (native SCSI port); used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO) have a 68 pin connector.
SCSI terminator - a device placed at the end of a SCSI chain to complete the circuit. (some SCSI devices are self-terminating, or have active termination and do not require this plug).
serial port - a port that allows data to be transmitted in a series (one after the other), such as the printer and modem ports on a Mac.
server - a central computer dedicated to sending and receiving data from other computers (on a network).
shut down - the command from the Special menu that shuts down the Mac safely.
software - files on disk that contain instructions for a computer.
spreadsheet - a program designed to look like an electronic ledger.
start up disk - the disk containing system software and is designated to be used to start the computer.
surge suppressor - a power strip that has circuits designed to reduce the effects of surge in electrical power. (not the same as a UPS)
System file - a file in the System folder that allows your Mac to start and run.
System folder - an all-important folder that contains at least the System file and the Finder.
32 bit addressing - a feature that allows the Mac to recognize and use more than 8MB of memory.
title bar - the horizontal bar at the top of a window which has the name of the file or folder it represents.
upload - to send a file from one computer to another through a network.
Uninterruptible Power Source (UPS)- a constantly charging battery pack which powers the computer. A UPS should have enough charge to power your computer for several minutes in the event of a total power failure, giving you time to save your work and safely shut down.
UPS - acronym for Uninterruptible Power Source.
vaporware - "software" advertised, and sometimes sold, that does not yet exist in a releasable for.
virtual memory - using part of your hard drive as though it were "RAM".
WORM - acronym for Write Once-Read Many; an optical disk that can only be written to once (like a CD-ROM).
zoom box - a small square in the upper right corner of a window which, when clicked, will expand the window to fill the whole screen.
SATURDAY, 03 MARCH 2012
DBMS and Design SET-1
Questions
Questions 1:
The ascending order of a data
hirerchy is:
a.
bit-byte-record-field-file-database
b. byte-bit-field-record-file-database
c.
bit-byte-field-record-file-database
d.
bit-byte-file-record-field-database
Question 2:
Which of the following is true
of a network structure?
a. t is a physical
representation of the data
b. It allows a many-to-many
relationship
c. It is conceptually simple
d. It will be dominant data
base of the future
Question 3:
Which
of the following is a problem of file management system?
a. difficult to update
b. lack of data independence
c. data redundancy
d. program dependence
e. all of above
Question 4:
One data dictionery software
package is called
a. DB/DC dictionary
b. TOTAL
c. ACCESS
d. Datapac
e. Data Manager
Question 5:
The function of a database is
...
a. to check all input data
b. to check all spelling
c. to collect and organize
input data
d. to output data
Question 6:
What is the language used by
most of the DBMSs for helping their users to access data?
a. High level language
b. SQL
c. Query Language
d. 4GL
Question 7:
The model for a record management system might be
a. handwritten list
b. a Rolodex card file
c. a business form
d. all of above
Question 8:
Primitive operations common to
all record management
system include
a. print
b. sort
c. look-up
d. all of above
Question 9:
In a large DBMS
a. each user can
"see" only a small part of the entire database
b. each subschema contains
every field in the logical schema
c. each user can access every
subschema
Question 10:
Information can be transferred
between the DBMS and a
a. spreadsheet program
b. word processor program
c. graphics program
d. all of the above
Answers:
1. c 2.
b 3. e 4. a
5. c 6. c 7. d 8.
c 9. a 10. d
DBMS and Design Set 2
Questions
Questions 1:
Which
of the following fields in a student file can be used as a primary key?
a. class
b. Social Security Number
c. GPA
d. Major
Question 2:
Which of the following is
not an advantage of the database approach
a. Elimination of data
redundancy
b. Ability of associate deleted
data
c. increased security
d. program/data
independence
e. all of the above
Question 3:
Which of the following
contains a complete record of all activity that affected the contents of a
database during a certain period of time?
a. report writer
b. query language
c. data manipulation
language
d. transaction log
e. none of the above
Question 4:
In the DBMS approach,
application programs perform the
a. storage function
b. processing functions
c. access control
d. all of the above
e. none of the above
Question 5:
A set of programs that
handle a firm's database responsibilities is called
a.
database management system (DBMS)
b. database processing
system (DBPS)
c. data management system (DMS)
d. all of above
Question 6:
Which is the make given to
the database management
system which
is able to handle full text data, image data, audio and video?
a. full media
b. graphics media
c. multimedia
d. hypertext
Question 7:
A record management system
a. can handle many files of
information at a time
b. can be used to extract
information stored in a computer file
c. always uses a list as
its model
d. both a and b
Question 8:
A command that lets you
change one or more fields in a record is
a. insert
b. modify
c. lookup
d. none of above
Question 9:
A transparent DBMS
a. can not hide sensitive
information from users
b. keeps its logical
structure hidden from users
c. keeps its physical
structure hidden from users
d. both b and c
Question 10:
A file produced by a
spreadsheet
a. is generally stored on
disk in an ASCII text fromat
b. can be used as is by the
DBMS
c. both a and b
d. none of the above
Answers:
1.b 2.e
3.d 4.b 5.d
6.c 7.b 8.b 9.c
10.a
SUNDAY, 26 FEBRUARY 2012
COMPUTER
KNOWLEDGE PRACTICE QUESTIONS
1.Which command devides
the surface of the blank disk into sectors and assign a unique address to each
one
1) Ver
2) Format
3) Fat
4) Chkdsk
5) None of these
2) Format
3) Fat
4) Chkdsk
5) None of these
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11. ...... proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
ANSWERS:
1) 2 2)
2 3) 5 4) 2 5)
2 6) 4 7)
1 8) 1 9) 3 10) 4
11) 1 12) 3 13) 1 14) 1 15) 4 16) 1 17) 4 18) 2 19) 2 20) 4
21) 4 22) 2 23) 1 24) 3 25) 3 26) 2 27) 4 28) 1 29) 2 30) 3
31) 1 32) 4 33) 5 34) 4 35) 3 36) 4 37) 3 38) 1 39) 2 40) 4
41) 3 42) 1 43) 4 44) 2 45) 4 46) 4 47) 1 48) 1 49) 2 50) 4
11) 1 12) 3 13) 1 14) 1 15) 4 16) 1 17) 4 18) 2 19) 2 20) 4
21) 4 22) 2 23) 1 24) 3 25) 3 26) 2 27) 4 28) 1 29) 2 30) 3
31) 1 32) 4 33) 5 34) 4 35) 3 36) 4 37) 3 38) 1 39) 2 40) 4
41) 3 42) 1 43) 4 44) 2 45) 4 46) 4 47) 1 48) 1 49) 2 50) 4
SUNDAY, 26 FEBRUARY 2012
COMPUTER
KNOWLEDGE QUESTIONS
1. The
instructions that tell a computer how to carry out the processing tasks are
referred to as computer .........
1) programs
2) processors
3) input devices
4) memory modules
5) None of these
2. An area of a computer that temporarily holds data waiting
to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these
3. To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these
4. To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these
5. To Copy a picture of the selected window to the clipboard
1) ALT + TAB
2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these
6. .......... is the key to close a selected drop - down
list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these
7. ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these
8. ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these
9. ............ is the combination of keys to switch between
the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these
10. ............ is the Keyboard shortcut key to insert auto
sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL
11. Data becomes ................ when it is presented in a
format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these
12. The term ............. designates equipment that might be
added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
13. A ............ is a microprocessor - based computing
device.
1) personal computer
2) mainframe
3) workstation
4) server
5) None of these
14. RAM can be thought of as the ......... for the computer's
processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these
15. Which of the following are the functions of a operating
system
1) Allocates resources
2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2
16. To move a copy of file from one computer to another over
a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these
17. The primary function of the ............ is to set up the
hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these
18. What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these
19. .......... is computer software designed to operate the
computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these
20. The ......... is the amount of data that a storage device
can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these
21. A device, which is not connected to CPU, is called as
.......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above
22. What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these
23. On-line real time systems become popular in ...........
generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes
24. You use a(n) ....., such as a keyboard or mouse, to input
information
1) output device
2) input device
3) storage device
4) processing device
5) None of these
25. ............ is the ability of a device to
"jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these
26. ............ provides process and memory management
services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these
27. The task of performing operations like arithmetic and
logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these
28. The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these
29. RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory
4) Both (1) and (2)
5) None of these
30. Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory
4) Both (1) and (2)
5) None of these
31. Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these
32. Each memory cell has a unique number, assigned to it is
called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these
33. RAM is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
34. ............ Store data or information temporarily and
pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these
35. Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these
36. A ............ is an additional set of commands that the
computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these
37. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
38. All of the following are examples of real security and
privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these
39. Which of the following is NOT one of the four major data
processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
40. All of the following are examples of storage devices
EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives
41. The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board
42. .............. is the science that attempts to produce
machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these
43. Servers are computers that provide resources to other
computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet
44. When creating a computer program, the ......... designs
the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these
45. A computer program that converts an entire program into
machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these
46. Computers process data into information by working
exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
47. The difference between people with access to computers
and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these
48. Computers manipulate data in many ways, and this
manipulation is calld ......
1) upgrading
2) processing
3) batching
4) utilizing
5) None of these
49. The ability to recover and read deleted or damaged files
from a criminal's computer is an example of a law enforcement speciality
called:
1) robotics
2) simulation
3) computer forensics
4) animation
5) None of these
50. Where does most data go first with in a computer memory
hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:
1)
1 2) 2 3) 4 4)
2 5) 3 6) 3 7) 3 8) 4 9)
1 10) 2
11) 3 12) 4 13) 1 14) 3
15) 4 16) 1 17) 2 18)
2 19) 2 20) 3
21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
31) 1 32) 1 33) 1 34)
2 35) 1 36) 1 37)
1 38) 2 39) 3 40) 2
41) 2 42) 4 43) 2 44)
2 45) 3 46) 4 47)
1 48) 2 49)
3 50) 1
TUESDAY, 15 FEBRUARY 2012
1 1. What Are
The Different Views To Display A Table
A) Datasheet View
B) Design View
C) Pivote Table & Pivot Chart View
D) All Of Above
2. Which Of The Following Creates A Drop Down List Of Values To Choose From?
A) Ole Object
B) Hyperlink
C) Memo
D) Lookup Wizard
3. The Command Center Of Access File That Appears When You Create Or Open The Ms Access Database File.
A) Database Window
B) Query Window
C) Design View Window
D) Switchboard
4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables
A) Relationship
B) Join
C) Query
D) None Of These
5. In A Database Table, The Category Of Information Is Called _____
A) Tuple
B) Field
C) Record
D) All Of Above
6. This Key Uniquely Identifies Each Record
A) Primary Key
B) Key Record
C) Unique Key
D) Field Name
7. It Is An Association Established Between Common
A) Line
B) Relationship
C) Primary Key
D) Records
8. This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project.
A) Data Definition
B) Data Refinement
C) Establishing Relationship
D) None Of The Above
9. A Database Language Concerned With The Definition Of The Whole Database Structure And Schema Is ________
A) DCL
B) DML
C) DDL
D) All Of Above
10. Which Of The Field Has Width 8 Bytes?
A) Memo
B) Number
C) Date/time
D) Hyperlink
A) Datasheet View
B) Design View
C) Pivote Table & Pivot Chart View
D) All Of Above
2. Which Of The Following Creates A Drop Down List Of Values To Choose From?
A) Ole Object
B) Hyperlink
C) Memo
D) Lookup Wizard
3. The Command Center Of Access File That Appears When You Create Or Open The Ms Access Database File.
A) Database Window
B) Query Window
C) Design View Window
D) Switchboard
4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables
A) Relationship
B) Join
C) Query
D) None Of These
5. In A Database Table, The Category Of Information Is Called _____
A) Tuple
B) Field
C) Record
D) All Of Above
6. This Key Uniquely Identifies Each Record
A) Primary Key
B) Key Record
C) Unique Key
D) Field Name
7. It Is An Association Established Between Common
A) Line
B) Relationship
C) Primary Key
D) Records
8. This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project.
A) Data Definition
B) Data Refinement
C) Establishing Relationship
D) None Of The Above
9. A Database Language Concerned With The Definition Of The Whole Database Structure And Schema Is ________
A) DCL
B) DML
C) DDL
D) All Of Above
10. Which Of The Field Has Width 8 Bytes?
A) Memo
B) Number
C) Date/time
D) Hyperlink
11. Which
Of The Following Statement Is True?
A) Foreign Key Fields Don\'t Allow Duplicate Values
B) In Primary Key Field You Can Enter Duplicate Value
C) In An Indexed Field You May Or May Not Enter Duplicate Value Depending Upon Setting
D) All Statements Are True
12. Following Is Not A Database Model
A) Network Database Model
B) Relational Database Model
C) Object Oriented Database Model
D) None
13. Microsoft Access Is A
A) RDBMS
B) OODBMS
C) ORDBMS
D) Network Database Model
14. DCL Provides Commands To Perform Actions Like
A) Change The Structure Of Tables
B) Insert, Update Or Delete Records And Data Values
C) Authorizing Access And Other Control Over Database
D) None Of Above
15. The Database Language That Allows You To Access Or Maintain Data In A Database
A) DCL
B) DML
C) DDL
D) None Of Above
16. What Is The Maximum Length A Text Field Can Be?
A) 120
B) 255
C) 265
D) 75
17. Which Of The Following Is Not A Database Object?
A) Tables
B) Queries
C) Relationships
D) Reports
18. A __________ Enables You To View Data From A Table Based On A Specific Criterion
A) Form
B) Query
C) Macro
D) Report
19. What Are The Columns In A Microsoft Access Table Called?
A) Rows
B) Records
C) Fields
D) Columns
20. Which Of The Following Is Not A Type Of Microsoft Access Database Object?
A) Table
B) Form
C) Worksheets
D) Modules
A) Foreign Key Fields Don\'t Allow Duplicate Values
B) In Primary Key Field You Can Enter Duplicate Value
C) In An Indexed Field You May Or May Not Enter Duplicate Value Depending Upon Setting
D) All Statements Are True
12. Following Is Not A Database Model
A) Network Database Model
B) Relational Database Model
C) Object Oriented Database Model
D) None
13. Microsoft Access Is A
A) RDBMS
B) OODBMS
C) ORDBMS
D) Network Database Model
14. DCL Provides Commands To Perform Actions Like
A) Change The Structure Of Tables
B) Insert, Update Or Delete Records And Data Values
C) Authorizing Access And Other Control Over Database
D) None Of Above
15. The Database Language That Allows You To Access Or Maintain Data In A Database
A) DCL
B) DML
C) DDL
D) None Of Above
16. What Is The Maximum Length A Text Field Can Be?
A) 120
B) 255
C) 265
D) 75
17. Which Of The Following Is Not A Database Object?
A) Tables
B) Queries
C) Relationships
D) Reports
18. A __________ Enables You To View Data From A Table Based On A Specific Criterion
A) Form
B) Query
C) Macro
D) Report
19. What Are The Columns In A Microsoft Access Table Called?
A) Rows
B) Records
C) Fields
D) Columns
20. Which Of The Following Is Not A Type Of Microsoft Access Database Object?
A) Table
B) Form
C) Worksheets
D) Modules
Answers
1-D, 2-D, 3-A, 4-A, 5-B, 6-A, 7-B, 8-A, 9-C, 10-C, 11-C, 12-D, 13-A, 14-C, 15-A, 16-B, 17-C, 18-B, 19-C, 20-C,
COMPUTER QUESTIONS ON BASICS
1. UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
2. CD-ROM stands for
a. Compactable Read
Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory
3. ALU is
a. Arithmetic Logic
Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
b. Array Logic Unit
c. Application Logic Unit
d. None of above
4. VGA is
a. Video Graphics
Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
5. IBM 1401 is
a. First Generation
Computer
b. Second Generation Computer
c. Third Generation Computer
d. Fourth Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d. Fourth Generation Computer
6. MSI stands for
a. Medium Scale
Integrated Circuits
b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit
d. Medium System Intelligent Circuit
b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit
d. Medium System Intelligent Circuit
7. The capacity of 3.5
inch floppy disk is
a. 1.40 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB
8. The first computer introduced in Nepal was
a. IBM 1400
b. IBM 1401
c. IBM 1402
d. IBM1402
b. IBM 1401
c. IBM 1402
d. IBM1402
9. WAN stands for
a. Wap Area Network
b. Wide Area Network
c. Wide Array Net
d. Wireless Area Network
b. Wide Area Network
c. Wide Array Net
d. Wireless Area Network
10. MICR stands for
a. Magnetic Ink
Character Reader
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. None
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. None
ANSWER:
1. UNIVAC is
Correct Answer: a. Universal Automatic Computer
Explanation: There are no computers with the name as in other options. UNIVAC was the first general purpose electronic digital computer designed for commercial use, produced by Universal Accounting Company of John Mauchly and J.P.Eckert in 1951.
Explanation: There are no computers with the name as in other options. UNIVAC was the first general purpose electronic digital computer designed for commercial use, produced by Universal Accounting Company of John Mauchly and J.P.Eckert in 1951.
2. CD-ROM stands for
Correct Answer: d. Compact Disk Read Only
Memory
Explanation: There are no objects with the name as in other options. CD-ROM is a non-volatile optical data storage medium using the same physical format as audio compact disk, readable by a computer with a CD-ROM drive. The standard 12 cm diameter CD-ROM store about 660 megabytes.
Explanation: There are no objects with the name as in other options. CD-ROM is a non-volatile optical data storage medium using the same physical format as audio compact disk, readable by a computer with a CD-ROM drive. The standard 12 cm diameter CD-ROM store about 660 megabytes.
3. ALU is
Correct Answer: a. Arithmetic Logic Unit
Explanation: ALU is a unit in Central Processing Unit in a computer system that is responsible for arithmetic calculations and logical operations. Apart from ALU, the CPU contains MU (Memory Unit) and CU (Control Unit).
Explanation: ALU is a unit in Central Processing Unit in a computer system that is responsible for arithmetic calculations and logical operations. Apart from ALU, the CPU contains MU (Memory Unit) and CU (Control Unit).
4. VGA is
Correct Answer: a. Video Graphics Array
Explanation: VGA is a type of Graphics Adapter. Graphic Adapter is an electronic board that controls the display of a monitor. This device helps the motherboard to work with the monitor and in VGA and SVGA the last letter ‘A’ stands for ‘Array’ whereas in MDA, CGA, MCGA the last letter ‘A’ stands for ‘Adapter’.
Explanation: VGA is a type of Graphics Adapter. Graphic Adapter is an electronic board that controls the display of a monitor. This device helps the motherboard to work with the monitor and in VGA and SVGA the last letter ‘A’ stands for ‘Array’ whereas in MDA, CGA, MCGA the last letter ‘A’ stands for ‘Adapter’.
5. IBM 1401 is
Correct Answer: b. Second Generation Computer
Explanation: IBM 1401 is a Second Generation
Computer and is the first computer to enter Nepal in 2028 BS for census.
Government of Nepal had brought this computer on rent and later purchased for
data processing in Bureau of Statistics. After this computer, another ICL
2950/10, a British computer, was purchased by the fund of UNDP and UNFPA for
the census of 2038 BS is second computer in Nepal.
6. MSI stands for
Correct Answer: a. Medium Scale Integrated
Circuits
Explanation: After the invention of IC chips the development of computers plunged into next phase. Small Scale Integration and Medium Scale Integration (SSI and MSI) were used in third generation of computers and Large Scale Integration and Very Large Scale Integration (LSI and VLSI) are being used in fourth generation of computers. People are now expecting ULSI (Ultra Large Scale Integration) Circuits to be used for fifth generation computers.
Explanation: After the invention of IC chips the development of computers plunged into next phase. Small Scale Integration and Medium Scale Integration (SSI and MSI) were used in third generation of computers and Large Scale Integration and Very Large Scale Integration (LSI and VLSI) are being used in fourth generation of computers. People are now expecting ULSI (Ultra Large Scale Integration) Circuits to be used for fifth generation computers.
7. The capacity of 3.5 inch floppy disk is
Correct Answer: d. 1.44 MB
Explanation: Microfloppy disks (3.5 inch) if it is high density (MF2HD) can store 1.44 MB and if it is low density (MF2DD), it can store 720 KB. Mini Floppy disks (5.25 inch) if it is high density (MD2HD) can store 1.2 MB and low density (MD2DD) stores 360 KB of data.
Explanation: Microfloppy disks (3.5 inch) if it is high density (MF2HD) can store 1.44 MB and if it is low density (MF2DD), it can store 720 KB. Mini Floppy disks (5.25 inch) if it is high density (MD2HD) can store 1.2 MB and low density (MD2DD) stores 360 KB of data.
8. The first computer introduced in Nepal was
Correct Answer: b. IBM 1401
Explanation: IBM 1401, a second generation computer was brought in Nepal by the Government of Nepal paying One Lakh and twenty five thousands per month to use in the census in 2028 B.S. Before this computer, Nepal was using a calculating device called Facit for statistical tasks.
Explanation: IBM 1401, a second generation computer was brought in Nepal by the Government of Nepal paying One Lakh and twenty five thousands per month to use in the census in 2028 B.S. Before this computer, Nepal was using a calculating device called Facit for statistical tasks.
9. WAN stands for
Correct Answer: b. Wide Area Network
Explanation: There are three different classes of computer network namely, Local Area Network (LAN) that covers a small geographical area such as a room, a building or a compound; Metropolitan Area Network (MAN) that has a citywide coverage; and Wide Area Network (WAN) that covers the whole globe or beyond the globe.
Explanation: There are three different classes of computer network namely, Local Area Network (LAN) that covers a small geographical area such as a room, a building or a compound; Metropolitan Area Network (MAN) that has a citywide coverage; and Wide Area Network (WAN) that covers the whole globe or beyond the globe.
10. MICR stands for
Correct Answer: a. Magnetic Ink Character
Reader
Explanation: MICR (Magnetic Ink Character Reader) is kind of scanner that can scan and identify the writing of magnetic ink. This device is used in banks to verify signatures in Checks.
Explanation: MICR (Magnetic Ink Character Reader) is kind of scanner that can scan and identify the writing of magnetic ink. This device is used in banks to verify signatures in Checks.
1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart
3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom
5. Information travels between components on the mother board through-
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals
6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these
7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these
8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU
9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor
10. .....is collection of web pages and ......is the very first page that we see on opening of a web-site
1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these
11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error
12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these
13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these
14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None
15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these
16. The most important or powerful computer in a typical network is _____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these
17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these
18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these
19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these
20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these
21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these
22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these
23. Changing an existing document is called _____ the document.
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these
24. Computers use the _____ number system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these
25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these
26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these
27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these
29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these
30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these
31. When sending an e-mail, the _____ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) None of these
32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these
33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these
34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
35. Network components are connected to the same cable in the _____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed
36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these
37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these
38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam
39. Two or more computers connected to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline
40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these
41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these
42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN
43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL
44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation
45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks
46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code
47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these
48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface
49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these
50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart
3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom
5. Information travels between components on the mother board through-
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals
6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these
7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these
8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU
9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor
10. .....is collection of web pages and ......is the very first page that we see on opening of a web-site
1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these
11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error
12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these
13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these
14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None
15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these
16. The most important or powerful computer in a typical network is _____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these
17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these
18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these
19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these
20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these
21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these
22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these
23. Changing an existing document is called _____ the document.
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these
24. Computers use the _____ number system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these
25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these
26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these
27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these
29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these
30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these
31. When sending an e-mail, the _____ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) None of these
32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these
33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these
34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
35. Network components are connected to the same cable in the _____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed
36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these
37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these
38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam
39. Two or more computers connected to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline
40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these
41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these
42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN
43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL
44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation
45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks
46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code
47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these
48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface
49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these
50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these
ANSWERS:
1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2 11)2 12)4 13)2 14)4
15)2 16)3 17)1 18)1 19)2 20)1 21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)1 29)2 30)3
31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2 41)4 42)4 43)4 44)5 45)4 46)2
47)1 48)4 49)4 50)1
No comments:
Post a Comment