- Which of the following parameter passing mechanism(s) is/are supported by C++, but not by C?
A) Pass by result
B) Pass by value-result
C) Pass by reference
D) Pass by value
- Which of the following stores recently used information so that it can be quickly accessed at a later time?
A) Hard Disk
B) Cache
C) Virtual Memory
D) Cookie
- WORM is a data storage technology that prevents the drive from erasing the data. What is the full form of WORM?
A) Write Once, Read Many
B) Write Once, Read Much
C) Write Once, Read More
D) Write Out, Read Many
- Large transaction processing systems in automated organisations use ____?
A) Online Processing
B) Once-a-day Processing
C) Batch Processing
D) End-of-day Processing
- How are the four main components of a computer interconnected internally?
A) Cars
B) Buses
C) Lines
D) Rods
- Which of the following describes the maximum data transfer rate of a network or Internet connection?
A) Protocol
B) Speed
C) Bandwidth
D) ISP
- Which among the following is the shortcut key combination to copy formatting from text?
A) Ctrl + Shift + C
B) Tab + Shift + C
C) Alt + Shift + C
D) F1 + Shift + C
- On which of the following principle does the cache memory works?
A) Principal of spatial
B) Principle of memory
C) Principle of processing
D) Principle of locality
- Computer based record keeping system is known as the ____?
A) DMS
B) CRKS
C) DBMS
D) SQL
- ERP is an acronym for ______?
A) Enterprise Reorder Planning
B) Enterprise Resource Planning
C) Enterprise Relationship Planning
D) Enterprise Retirement Planning
Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts
Monday, October 18, 2021
Computer Awareness for Upcoming Exams Set 118
Sunday, October 17, 2021
Computer Awareness for Upcoming Exams Set 117
- Relational, equality, component selection, class member conditional and comma are _____ operator?
A) assignment
B) shift
C) binary
D) unary
Option C
- Which of the following provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data?
A) DBMS
B) Database
C) Tables
D) Centralization of data
Option A
Explanation: A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.
- “Myspace” is a name of _____?
A) Application Development Company
B) News Agency
C) Social Media Platform
D) Search Engine
Option C
Explanation:
- What are the small application program called that ensures form completion and providing of animation on a web page?
A) Applets
B) Flash
C) cookies
D) Bookmarks
Option A
Explanation: A small application program that is used to perform one or more small functions is known as an Applet. In web technology, an Applets is launched from a web page and then it is executed using a virtual machine to perform small functional on a web page like animations.
- Which was the world’s first electronic digital programmable computer?
A) Z2
B) Z3
C) Colossus
D) Enigma
Option C
Explanation: Colossus was the world’s first electronic digital programmable computer which used a large number of valves.
- Zip, Gzip, RAR, StuffIt, and 7z are examples of _____?
A) File Modifier
B) Decryption
C) Encryption
D) File Compression
Option D
Explanation: File compression is used to reduce the file size of one or more files.
- Distributed data processing configuration where all activities passes through a centrally located computer is?
A) spider network
B) hierarchical network
C) data control network
D) ring network
Option A
- What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
A) Malware
B) Key-logger
C) Spyware
D) Backdoors
Option A
Explanation: Malware is short for malicious software. Malware is a broad term that encompasses computer viruses, worms, Trojan horses, spyware, adware, and others. Malware is designed to interfere with normal computer operation, usually giving hackers a chance to gain access to your computer and collect sensitive personal information.
- A ___________ condition occurs when a software program depends on the timing of one or more processes to function correctly?
A) dead
B) fear
C) race
D) load
Option C
Explanation:
- If a piece of code can be implemented as a macro or as an inline function, which of the following factors favour implementation as an inline function?
A) Source code size
B) Interacting with other components in the correct way
C) Flexibility to manipulate as a pointer
D) Both B and C
Option D
Thursday, October 14, 2021
Computer Awareness for Upcoming Exams Set 116
- _________ is the process of carrying commands?
A) Executing
B) Decoding
C) Fetching
D) Storing
Option A
Explanation:
- Which of the following refers to an electronic document used to prove the ownership of a public key?
A) Password
B) Token
C) PDF
D) Digital Certificate
Option D
Explanation:
- Internet domains are classified by their functions. In that regard “.com” represents___?
A) Organisation
B) Company
C) Commercial
D) Government
Option C
Explanation: ‘.com’ represents the word "commercial" and is the most widely used extension in the world. Most businesses prefer a .com domain name because it is a highly recognized symbol for having a business presence on the Internet.
- Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?
A) Adware
B) Malware
C) Spyware
D) Bots
Option A
Explanation: Some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
- Which of the following is India’s fastest Super Computer in India?
A) Sahasra
B) Pratyush
C) Mihir
D) Both B and C
Option D
Explanation:
- In Power Point, the Header & Footer button can be found on the Insert tab in what group?
A) Object group
B) Tables group
C) Text group
D) None of these
Option C
- What is the use of Digitizer as an input device?
A) To convert graphic and pictorial data into analog inputs
B) To Convert graphic and pictorial data into binary inputs
C) Debuging
D) None of the above
Option B
- A router is a networking device that forwards data packets and is connected to two or more data lines from different networks. Which among the following was the earliest device which had almost the same functionality as that of a router?
A) Interface Message Processor
B) Interface Delay Device
C) Interface Data Manager
D) Interface Routing Processor
Option A
Explanation: The very first device that had fundamentally the same functionality as a router does today was the Interface Message Processor (IMP); IMPs were the devices that made up the ARPANET, the first TCP/IP network.
- _____ is a type of streaming in which audio or video is broadcast live over the Internet?
A) Open streaming
B) Broad streaming
C) App streaming
D) Live streaming
Option
- While working on Microsoft Word, which among the following is the command for “Undo”?
A) Cntrl +C
B) Cntrl +Y
C) Cntrl +Z
D) Cntrl +X
Option C
Explanation: Undo is an interaction technique which is implemented in many computer programs. Cntrl +Z is the is for Undo in Microsoft word.
Sunday, October 10, 2021
Computer Awareness for Upcoming Exams Set 115
- A computer program that translates one program instructions at a time into machine language is called a/an _____?
A) Simulator
B) Compiler
C) CPU
D) Interpreter
Option D
- Which type of software creates a smaller file that is faster to transfer over the Internet?
A) Compression
B) Extract
C) Unzipped
D) Zig Zag
Option A
- Which of the following are the two basic types of graphics used in MS-Word?
A) Autoshapes and ClipArt
B) Header and Footer
C) Spelling and Grammar
D) Drawing Objects and Pictures
Option D
Explanation: There are two basic types of graphics that you can use in Microsoft Word documents: drawing objects and pictures.
- The time it takes a device to locate data and instructions and make them available to the CPU is known as _______?
A) CPU speed
B) Clock speed
C) Access time
D) Processing cycle
Option C
- Which command can be used to delete an item permanently in windows PC?
A) Delete Button
B) Shift + Delete
C) Ctrl + Delete
D) Alt + Delete
Option B
- The term 128-bit era refers to ______?
A) Laptops
B) Super computers
C) Sixth generation Computers
D) Video game Consoles
Option D
- What is the theoretical maximum data transfer rate of 5G?
A) 100 gigabits per second
B) 10 gigabits per second
C) 10 terabits per second
D) 100 terabits per second
Option A
Explanation: While 4G tops out at a theoretical 100 megabits per second (Mbps), 5G tops out at 10 gigabits per second (Gbps).
- Which of the following is a saving process?
A) To copy the document from memory to storage medium
B) To develop the document by recording the text with the use of keyboard
C) To bring change in present status of the document
D) To change the face or entire form
Option A
- To access a website which of the following is not required?
A) Internet device
B) Internet connection
C) Data Cable
D) Browser
Option C
Explanation:
- ______ refers to programs that are designed to display advertisements on your computer?
A) Adsys
B) Playware
C) Playsys
D) Adware
Option D
Explanation: Adware is the software type, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
Friday, October 8, 2021
Computer Awareness for Upcoming Exams Set 113
- Java Script is a __________ scripting language?
A) modular
B) client-side
C) server-side
D) query
Option B
Explanation: JavaScript is a client-side scripting language, which means the source code is processed by the client’s web browser rather than on the web server.
- Which of the following decides if a function that is declared inline is indeed going to be treated inline in the executable code?
A) Compiler
B) Linker
C) Preprocessor
D) Loader
Option A
- Text documents come in two flavors – _________ and ________?
A) colored text and plain text
B) plain text and active text
C) rich text and plain text
D) hyper text and plain text
Option C
- A ___________ is a network tool used to show the route taken by packets across an IP network?
A) ping
B) tracebridge
C) network bridge
D) traceroute
Option D
Explanation: Traceroute is a TCP/IP utility that allows a user to trace a network connection from one location to another, recording every hop along the way.
- A ____________ refers to the address of a website or file on the Internet?
A) Webpage
B) URL
C) HTML
D) Source Code
Option B
Explanation: Uniform Resource Locator.
- The processor is a chip plugged onto the motherboard in a computer system?
A) LSI
B) VLSI
C) ULSI
D) XLSI
Option D
Explanation: The processor is a XLSI chip plugged onto the motherboard in a computer system.
- Instructions and memory addresses are represented by _____?
A) Binary Codes
B) Character Codes
C) Word Codes
D) None of these
Option A
- Who among the following person has define the term computer virus?
A) Tom Kilburn
B) Charles babbage
C) Frederick cohen
D) Konrad zuse
Option D
Explanation: Frederick B. Cohen is an American computer scientist and best known as the inventor of computer virus defense techniques. He gave the definition of “computer virus”.
- Where is a hub specified in the OSI model?
A) Session layer
B) Data Link layer
C) Application layer
D) Physical layer
Option D
Explanation: Hubs regenerate electrical signals, which are specified at the Physical layer.
- Data marker on a chart are linked to data points in a worksheet, therefore _______?
A) You can automatically apply formatting to a data series
B) You can change the position of a data marker and automatically change the data point value in the worksheet
C) You can change a data print value and automatically are draw the chart
D) A and B
Option B
Thursday, October 7, 2021
Computer Awareness for Upcoming Exams Set 112
- ______ search engine sends request for information to several search engines simultaneously and compiles the results?
A) Individual
B) Directory
C) Meta
D) Subjectdirectory
Option C
Explanation: A metasearch engine (or aggregator) is a search tool that uses another search engine’s data to produce their own results from the Internet. Metasearch engines take input from a user and simultaneously send out queries to third party search engines for results. Sufficient data is gathered, formatted by their ranks and presented to the users.
- How many types of drawing objects are available in drawing Toolbar in MS excel?
A) 8
B) 10
C) 12
D) 15
Option D
Explanation: There are almost 15 or 16 types of drawing objects are available in drawing toolbar in MS excel.
- Which of the following option may be used to change page-size and margins?
A) View
B) Data
C) Page Layout
D) Review
Option C
- Which protocol is used for sending status messages related to error in internet connection?
A) ICMP
B) ISP
C) IMP
D) TCP
Option A
Explanation: Internet Control Message Protocol
- All the keys on the IBM PC keyboard repeat as long as we hold them down. Such types of keys are known as ____________ keys.
A) Functional
B) Alphabetic
C) Typematic
D) Automatic
Option C
- A (n) __________ device is any hardware component that allows you to enter data and instruction into a computer.
A) Communications
B) Terminal
C) Output
D) Input
Option D
Explanation: Input devices are for giving input (entering data/instructions) to a computer.
- ______ files are useful for duplicating or backing up CDs and DVDs?
A) ISO
B) MPEG
C) IMJ
D) PNG
Option A
Explanation: ISO files are useful for duplicating or backing up CDs and DVDs because they copy every bit of data exactly from the disc.
- “HSF” in computer hardware is related to ______?
A) Mouse
B) Keyboard
C) CPU
D) RAM
Option C
Explanation: Heat Sink and Fan (HSF) Nearly all computers have heat sinks, which help keep the CPU cool and prevent it from overheating.
- Which type of network would use phone lines?
A) WAN
B) LAN
C) MAN
D) WWAN
Option A
Explanation: The wide area network i.e. the WAN covers a larger geographical area of systems and uses telephonic lines for the purpose.
- Which of the following is not a level of Database Implementation?
A) Physical Level
B) External Level
C) Relational Level
D) Conceptual Level
Option C
Explanation: There are three velels: a) Internal Level (Physical Level) b) Conceptual Level c) External Level (View Level)
Tuesday, October 5, 2021
Computer Awareness for Upcoming Exams Set 111
- _____ is the phonebook of the Internet?
A) DSL
B) IP Address
C) DNS
D) MAC
Option C
Explanation: Domain Name System
- Which among the following key combination can be used to search in Windows Explorer?
A) Ctrl+F
B) Ctrl+S
C) Ctrl+G
D) Alt+S
Option A
- _______ is a technique used by CPUs to increase the memory bandwidth available for an application?
A) DIMM
B) SIMM
C) Memory interleaving
D) Optimum interleaving
Option C
- Which keys will take you at the beginning or the end of a long document?
A) Ctrl + PageUp and Ctrl + PageDown
B) Ctrl + Home and Ctrl + End
C) Shift + Home and Shift + End
D) Alt+Home and Alt+End
Option B
- In a DBMS, data is arranged in rows and columns. This arrangement is known as?
A) Tuple
B) Attribute
C) Relation
D) Degree
Option C
- Which of the following items is not used in Local Area Network (LAN) system?
A) Computer
B) Modem
C) Printer
D) Data Cable
Option B
Explanation: A modem is used to convert the signals and is connected to lines which is not required to be done in LAN.
- A computer’s hard disk is _______?
A) Computer hardware
B) Computer software
C) Operating system
D) An arithmetic and logical unit
Option A
- Which of the following is not a protocol for e-mail?
A) POP
B) IMAP
C) SMTP
D) ICMP
Option D
Explanation: Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite.
- Which technology is used to convert XML into HTML?
A) XSL
B) XHTML
C) CSS
D) HTTP
Option A
- In computer, distributed processing involves ____?
A) Solving computer component problems from a different computer
B) Solving computing problems by breaking them into smaller parts that are separately processed by different computers
C) Allowing users to share files on a network
D) Allowing users to access network resources away from the office
Option B
Explanation: Distributed processing is a phrase used to refer to a variety of computer systems that use more than one computer (or processor) to run an application. This includes parallel processing in which a single computer uses more than one CPU to execute programs.
Monday, October 4, 2021
Computer Awareness for Upcoming Exams Set 110
- The blocks of code, included in the operating system, that software applications interact with are known as _______?
A) Application Programming Interfaces (APIs)
B) Device drivers
C) Complimentary Metal-Oxide Conductors (CMOS)
D) Bootstrap loaders
Option A
Explanation: An API specifies how software components should interact.
- Which feature of Microsoft Office allows multiple people to work on a single document at the same time?
A) Co-Editing
B) Co-Authoring
C) Co-Joining
D) Co-Linking
Option B
- Where can you find the Draw Table tool button?
A) Formatting toolbar
B) Drawing toolbar
C) Standard toolbar
D) Tables and Formatting toolbar
Option D
- Dynamic Adhoc Wireless Networks (DAWN) usually come under ____?
A) 2G
B) 3G
C) 4G
D) 5G
Option D
Explanation: The (DAWN) Dynamic Ad-hoc Wireless Networks project is developing a general theory of complex and dynamic wireless communication networks. It comes under 5G.
- _______ Search method is conducted for a specific title, domain, URL, or host.
A) Field
B) Logical
C) Boolean
D) Keyword
Option A
Explanation: Field searching on the Web is a very powerful tool. It allows you to specify exactly where you want the search engine to look in the Web document.
- Which device is used to control the cursor movement?
A) Light Pen
B) Trackball
C) Joystick
D) Plotter
Option C
- Which of the following is the most powerful type of computer ?
A) Micro
B) Super computer
C) Megaframe
D) Super conductor
Option B
- Ethernet, LAN, Token Ring and Token Bus are types of _____?
A) WAN
B) Communication channels
C) Physical medium
D) LAN
Option D
Explanation:
- All the keys on the IBM PC keyboard repeat as long as one holds them down. These keys are known as?
A) Typematic keys
B) Functional keys
C) Automatic keys
D) Alphabetic keys
Option A
- A virtual machine is an example of ________?
A) Desktop
B) Emulation
C) Server
D) Rotation
Option B
Explanation: Computer emulation is when one system imitates or reproduces another system.
Saturday, October 2, 2021
Computer Awareness for Upcoming Exams Set 109
- Magnetic tape is not practical for applications where data must be quickly recalled because tape is _____?
A) A random-access medium
B) A read-only medium
C) Fragile an easily damaged
D) A sequential-access medium
Option D
- In internet terminology what means of IP?
A) Internet Provider
B) Internet Procedure
C) Internet Protocol
D) Internet Processor
Option C
- Which of the following has no moving parts?
A) HDD
B) DVD Drive
C) CD Drive
D) SSD
Option D
Explanation: Solid state means “no moving parts. SSD memory has no moving parts.
- Android is an open-source platform founded by ____?
A) Andrew mark
B) Andy Rubin
C) Denial martin
D) William kang
Option B
- You can zoom a worksheet by using ____?
A) With the mouse pointer in Print Preview
B) With the zoom button on the Print Preview toolbar
C) With the Zoom command on the view menu
D) All of the above
Option D
- The connection between your computer at home and your local ISP is called?
A) The Home Page
B) The Vital Mile
C) The last Mile
D) None of the above
Option A
Explanation: Home page is the introductory page that opens when your device is connected to local ISP.
- Which of the following is not the part of standard office suite?
A) Database
B) File manager
C) Image Editor
D) Word Processor
Option B
- BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups?
A) ISDN
B) IRC
C) ISP
D) Icons
Option C
Explanation: All are internet service providers.
- After a credit card transaction has been authorized by the issuing bank by sending an authorization code to the merchant, the settlement stage of the process begins. Which of the following is a system type used to process such statements?
A) Multitasking
B) Memory Processing
C) Batch Processing
D) Online Processing
Option D
Explanation: After a credit card transaction has been authorized by the issuing bank by sending an authorization code to the merchant, the settlement stage of the process begins. This is called batch processing because a number (or batch) of transactions is settled all at one time.
- ______ is the standard unit of measurement for rack-mounted equipment like servers, hard drives, switches, routers?
A) Y
B) U
C) X
D) V
Option B
Explanation: U is the standard unit of measurement for rack-mounted equipment. Racks can be used to house servers, hard drives, switches, routers, and other computer hardware.
Thursday, September 30, 2021
Computer Awareness for Upcoming Exams Set 108
- Which of the following is done to force a page break in Word?
A) Position the cursor at the appropriate place and press F1
B) Use the Insert —>Section Break
C) Position the cursor at the appropriate place and press Shift + Enter
D) Change the colour of the document
Option B
Explanation: By using the Insert > Section Break (Page Break) command, the user can do a page break in Word.
- Text and graphs that have been cut or copied are stored in an area called _____?
A) Memory
B) Cookies
C) Paste Board
D) Clip Board
Option D
- _______ refers to the spacing between the characters of a font?
A) Halting
B) Lining
C) Kerning
D) Furinshing
Option C
Explanation: kerning is the process of adjusting the spacing between characters in a proportional font, usually to achieve a visually pleasing result. Kerning adjusts the space between individual letterforms, while tracking adjusts spacing uniformly over a range of characters.
- What is the extension of MS Dos command file?
A) .tmp
B) .bat
C) .bin
D) .dbf
Option B
Explanation: The BAT file format is implemented for DOS batch files that contain code for initializing and executing certain built-in Windows applications and resources.
- _______ a software program writes the necessary data for running the program on your hard drive?
A) Installing
B) Uninstalling
C) Activating
D) Encrypting
Option A
Explanation:
- Which of the following is not a DBMS tool?
A) MS- Access
B) Oracle Database
C) Turner Database
D) Ingres
Option C
Explanation:
- iTunes is an audio playback program developed by _______?
A) IBM
B) Google
C) Microsoft
D) Apple
Option D
Explanation: iTunes is a media player, media library, Internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store, developed by Apple Inc.
- Workbook is a collection of ______in MS Excel?
A) page set-up
B) worksheets
C) charts
D) diagrams
Option B
- Where you will find the configurations related to Operating System in a Windows PC?
A) Task Manager
B) Home Page
C) Control Panel
D) Desktop
Option C
- In order to create column data in Word you need to _____?
A) Tab consecutively until your cursor reaches the desired place
B) Set tabs or use the Table menu
C) Press the space bar until your cursor reaches the desired place
D) You need to use Excel
Option B
Explanation: Most Word users who are old enough to have used a typewriter will have had some experience in setting tab stops in order to position text to line up accurately without having to use multiple spaces.
Wednesday, September 29, 2021
Computer Awareness for Upcoming Exams Set 10
- The first mechanical computer designed by Charles Babbage was called?
A) Abacus
B) Analytical Engine
C) Processor
D) Calculator
Option B
- A function that does the same operation on different data types is to be implemented using ______?
A) Function templates
B) Overloading
C) Default arguments
D) Macros
Option A
- Read only memory (ROM) is permanently________________ in computers?
A) Output
B) Tapped
C) Input
D) Copy
Option C
- Which among the following is the largest space?
A) Gigabyte (GB)
B) Petabyte (PB)
C) Terabyte (TB)
D) Megabyte (MB)
Option B
- All of the following are examples of real security and privacy risks except _____?
A) Spam
B) Hackers
C) Viruses
D) None of these
Option A
- A ____________ organizes the web into categories?
A) Archive
B) History
C) Browser
D) Directory
Option D
- Automatic execution of high-priority computer programs that have been designed to preempt the use of computer resources is referred as ____?
A) Back ground processing
B) Fore ground processing
C) White processing
D) Black processing
Option B
- Name the set of computer programs used on a computer to help perform tasks?
A) Software
B) Processor
C) Memory
D) An instruction
Option A
- What is the term used in networking where the receiver waits and does not send the control frame back to the sender immediately rather waits until its network layer passes in the next data packet.
A) AP Model
B) Sliding Model
C) Sliding Protocol
D) Piggybacking
Option D
Explanation: The receiver waits until its network layer passes in the next data packet. The delayed acknowledgment is then attached to this outgoing data frame. This technique of temporarily delaying the acknowledgment so that it can be hooked with next outgoing data frame is known as piggybacking.
- Reload is a synonym for what command?
A) Restart
B) Retry
C) Refresh
D) Rework
Option C
Explanation: In computers, to reload is to start a program over again, usually because it has crashed or because it has begun to display aberrant behaviour. A common reason for some programs, such as word processors, to misbehave is because users inadvertently hit keystrokes that initiate an undesired action.
Sunday, September 26, 2021
Computer Awareness for Upcoming Exams Set 106
- Which of the following is a database language?
A) PHP
B) GPL
C) ASP.NET
D) SQL
Option D
Explanation: Structured Query Language
- The personal computers that we use for normal home and office purpose are known by which name?
A) Microcomputers
B) Minicomputers
C) Mainframe Computers
D) Embedded Computers
Option A
Explanation: Examples - PC, Laptops.
- ____ data type cannot hold fractional values?
A) double
B) float
C) char
D) int
Option D
- IPv4 addresses are _____ bit hexadecimal numbers?
A) 16 bits
B) 32 bits
C) 64 bits
D) 128 bits
Option B
Explanation: The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address.
- USB is a common interface that enables the communication between devices and a host controller such as a personal computer (PC). ‘S’ in USB stands for?
A) Simple
B) Series
C) Serial
D) Sorted
Option C
- ____ is a fraudulent attempt to obtain sensitive information such as passwords by disguising oneself as a trustworthy entity?
A) Phishing
B) Laying
C) Trusting
D) Hiding
Option A
- V-RAM is used for access of the following?
A) Text & Images
B) programs
C) Video & Graphics
D) None of the above
Option C
- Which of the following memory buffer is used to accommodate a speed differential?
A) RAM
B) SSD
C) Cache
D) ROM
Option C
- Information that comes from an external source and is fed into computer software is called ______?
A) Output
B) Throughput
C) Reports
D) Input
Option D
- Which of the following is India’s first super computer?
A) PARAM-8000
B) CDC 6600
C) SahasraT
D) CDC 6700
Option A
Monday, May 13, 2019
Computer Awareness for Upcoming Exams Set 105
Computer Awareness Questions for IBPS RRB PO/Assisstant, RBI Assistant, UIICL, OICL, NIACL, NICL, BoB and other competitive exams.
- A computer cannot "boot" if it does not have the ____________. A) Compiler B) Loader C) Operating System D) assembler [su_spoiler title=" View Answer " icon="chevron-circle"] Option C [/su_spoiler]
- The _________ digits are 0 to 9 and A to F. A) Decimal B) Hexadecimal C) Binomial D) Trinomial [su_spoiler title=" View Answer " icon="chevron-circle"] Option B [/su_spoiler]
- To access a mainframe or supercomputer, users often use a ___________. A) terminal B) node C) desktop D) handheld [su_spoiler title=" View Answer " icon="chevron-circle"] Option A Explanation: A computer terminal is an electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer or a computing system. [/su_spoiler]
- A computer is a box full of electronic: A) Switching devices A) Chips C) Circuits D) Registers [su_spoiler title=" View Answer " icon="chevron-circle"] Option C [/su_spoiler]
- Which out of the following is the least expensive computer ? A) Home computer B) Laptop microcomputer C) Personal computer D) Desktop computer [su_spoiler title=" View Answer " icon="chevron-circle"] Option A [/su_spoiler]
- The Central Processing Unit (CPU) consists of ___________. A) Registers and Airthmetic Logic Unit B) Instruction Decoding Circuit C) A control and timing section D) All of the above [su_spoiler title=" View Answer " icon="chevron-circle"] Option D Explanation: The central processing unit (CPU) is the computer component that's responsible for interpreting and executing most of the commands from the computer's other hardware and software. All sorts of devices use a CPU, including desktop, laptop, and tablet computers, smartphones... even your flat-screen television set.[/su_spoiler]
- ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A) Servers B) Embedded computers C) Robotic computers D) Mainframes [su_spoiler title=" View Answer " icon="chevron-circle"] Option B [/su_spoiler]
- An Integrated Circuit (IC) is: A) Fabricated on a tiny silicon chip B) A complicated circuit C) Much costlier than a single transistor D) An integrating device [su_spoiler title=" View Answer " icon="chevron-circle"] Option A [/su_spoiler]
- ________ is the process of dividing the disk into tracks and sectors. A) Tracking B) Formatting C) Crashing D) Allotting [su_spoiler title=" View Answer " icon="chevron-circle"] Option B [/su_spoiler]
- The _______ enables you to simultaneously keep multiple Web pages open in one browser window. A) tab box B) pop-up helper C) tab row D) address bar [su_spoiler title=" View Answer " icon="chevron-circle"] Option C Explanation: In interface design, a tabbed document interface (TDI) or Tab is a graphical control element that allows multiple documents or panels to be contained within a single window, using tabs as a navigational widget for switching between sets of documents.[/su_spoiler]
Click here for More Computer Awareness Questions
Subscribe to:
Posts (Atom)