Practice Computer Awareness Questions- Set 8

1. An operating system version designed for use with media Centre PC is Microsoft Windows XP ___.
(1) Home Edition
(2) Media Centre Edition
(3) Tablet PC Edition
(4) None of these
(5) None of these

2. Press the ___ button to have the window fill the entire screen.
(1) close
(2) Maximize
(3) Minimize
(4) All of the above
(5) None of these

3. What digits are representative of all binary numbers?
(1) 0
(2) 1
(3) both 0 and 1
(4) 3
(5) None of these

4. The ______ allows you to choose where to go and is located below the standards buttons toolbar.
(1) system menu
(2) Address bar
(3) Menu bar
(4) Task bar
(5) None of these

5. In windows XP, which shortcut is used you lock the computer?
(1) Ctrl + L
(2) Windows Key + k
(3) Ctrl + K
(4) Scroll Lock key
(5) Windows Key + L

6. A dot-matrix printer
(1) is an input-output device
(2) is an output device only
(3) is an input device only
(4) both 2 and 3
(5) None of these

7. A characteristic of card system is:
(1) slowness in processing data
(2) using cards as records of transactions
(3) needing a larger data staff
(4) all of these
(5) None of these

8. What is a ‘tuple’?
(1) another name for a table in an RDBMS.
(2) Another name for the key linking different tables in a database.
(3) Initial seed value of field.
(4) A row or record in a database table.
(5) An attribute attached to a record.

9. _______ is the ability of an operating system to control the activities of multiple programs at the same time.
(1) Multitasking
(2) Streamlining
(3) Multiuser
(4) Simulation
(5) None of these

10. A spooler is a(n):
(1) location in memory that maintains the contents of a document until it prints out
(2) Print job
(3) Program that coordinates the print jobs that are waiting to print
(4) Message sent from the printer to the operating system when a print job is completed
(5) None of these

11. Which of the following is not a protocol in the application layer of TCP/IP suit:
(1) HTTP
(2) TCP
(3) HTTPS
(4) Telnet
(5) None of these

12. All of the following statements concerning files are true EXCEPT:
(1) A file is a collection of related pieces of information stored together for easy reference.
(2) Files can be generated from an application
(3) Files are stored in RAM
(4) Files should be organized in folders.
(5) None of these

13. The four main functions of a computer are:
(1) Input, processing, output and storage
(2) Learning, thinking, intelligence and virtuosity
(3) Data, information, bits and bytes
(4) Hardware, software, modeling and operations
(5) None of these

14. A scientific institution performing intensive mathematical operations for a complex model that required extremely powerful computing capabilities will most likely use a(n):
(1) Supercomputer
(2) PC
(3) mainframe
(4) ISP
(5) None of these

15. The ‘brains’ of the computer which executes the instructions, is called the:
(1) CPU
(2) RAM
(3) Motherboard
(4) System Unit
(5) None of these

16. The process ___ involves automated study of consumer buying patterns in order to support marketing, inventory replenishment and pricing decisions.
(1) transaction processing
(2) Data mining
(3) Simulation
(4) information processing
(5) None of these

17. The Principle advantage of adding memory to a printer is to increase:
(1) resolution
(2) Print Speed
(3) Number of colors in output
(4) DPI
(5) None of these

18. The combination of the operating system and the processor is referred to as the computer’s :
(1) CPU
(2) Platform
(3) BIOS
(4) CMOS
(5) None of these

19. The function of Key F4 is
(1) Delete
(2) Repeat last function
(3) Refresh
(4) Copy
(5) None of these

20. Magnetic tape is not practical for applications where data must be quickly recalled because tape is:
(1) A random-access medium
(2) A sequential –access medium
(3) A read –only medium
(4) Fragile and easily damaged
(5) An expensive storage medium

1. 2
2. 2
3. 3
4. 2
5. 5
6. 2
7. 4
8. 4
9. 1
10. 3
11. 2
12. 3
13. 1
14. 1
15. 1
16. 2
17. 2
18. 2
19. 2
20. 5


Practice Computer Awareness Questions – Set 7

 

1. Which among the following is not a security/ private risk?
(1) Spam
(2) Hacking
(3) Virus
(4) Phishing
(5) None of these

2. When using characters in Windows, what code does a window use?
(1) ASCII
(2) UNICODE
(3) MORSE
(4) IDBC
(5) WESTRN

3. To avoid the wastage of memory, the instruction length should be
(1) Multiple of character size only
(2)Of word size only
(3)Of file size only
(4) Of word size which is multiple of character size
(5) None of these

4. What do you use to create a chart?
(1) Pie Wizard
(2) Excel Wizard
(3) Data Wizard
(4) Chart Wizard
(5) None of these

5. What is the full form of SDRM?
(1) Shift Dynamic random access memory
(2) Synchronous Dynamic random access memory
(3) System Dynamic random access memory
(4) Serial Dynamic random access memory
(5) None of these

6. Which of the following used in programming the first computers?
(1) Object code
(2) Source code
(3) Machine language
(4) Assembly language
(5) None of these

7. BSNL Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups?
(1) ISDN
(2) IRC
(3) ISP
(4) ICONS
(5) None of these

8. Which among the following is correct about 4GL?
(1) A computer brand
(2) A software brand
(3) A software program
(4) A programming language
(5) None of these

9. First microprocessor was used in which of the following?
(1) Computer
(2) Calculator
(3) Telephones
(4) Printers
(5) None of these

10. The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called?
(1) Response time
(2) Access Time
(3) Quick time
(4) Processing time
(5) None of these

11. Alerts are mostly appears in ____?
(1) Check box
(2) Combo box
(3) Dialog box
(4) Window box
(5) None of these

12. What is used in most programs that is a part of a program and guides the user’s through certain steps?
(1) Software
(2) Wizard
(3) Wiki
(4) operating
(5) None of these

13. Structured query language (SQL) is used in the following?
(1) Create database
(2) Create & Modify Databases
(3) Create, Modify & Query Databases
(4) Modify Database
(5) None of these

14. A file which has not been alerted, compressed, or manipulated in any way by the computer is called?
(1) temp file
(2) raw file
(3) permanent file
(4) distort file
(5) None of these

15. The word bandwidth is also used to mean ____?
(1) width of the data cable
(2) amount of data transferred
(3) number of the computers on a particular network
(4) Both 1 & 2
(5) None of these

16. Which of the following transforms input data into output data?
(1) Peripherals
(2) RAM
(3) ROM
(4) CPU
(5) None of these

17. In computer file systems which among the following is top or first in hierarchy?
(1) root directory
(2) parent directory
(3) home directory
(4) working directory
(5) None of these

18. IC chips used in computers are usually made of:
(1) Lead
(2) Silicon
(3) Chromium
(4) Gold
(5) None of these

19. One kilobyte is equal to:
(1) 1000 bytes
(2) 100 bytes
(3) 1024 bytes
(4) 1023 bytes
(5) None of these

20. The errors that can be pointed out by the compiler are:
(1) Syntax error
(2) Symantic error
(3) Logical error
(4) Internal error
(5) None of these

Question Number and Answer Option

1. 2
2. 4
3. 4
4. 2
5. 3
6. 3
7. 4
8. 2
9. 2
10. 3
11. 2
12. 3
13. 2
14. 2
15. 4
16. 1
17. 1
18. 2
19. 3
20. 1