Practice Computer Awareness Questions – Set 3

1. IP address contains ……….. bits.
(1) 8 bits
(2)16 bits

(3) 32 bits
(4) 40 bits
(5) None of these

2. The following are all computing devices , except………
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these

3. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these

4. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these

5. Which is the example of spread sheet ?
(1) MS word
(2) MS excel
(3) Power point
(4) MS Access
(5) None of these

6. Name of the executable file of MS word is-
(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these

7. ____________ are viruses that are triggered by the passage of time or on a certain date.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these

8. System software is the set of programs that enables your computer’s hardware devices and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these

9. ________ are specially designed computer chips which reside inside other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these

10. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft
(3) Windows
(4) Mac
(5) None of these

11. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these

12. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database,
(5) None of these

13. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these

14. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these

15._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these

16. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these

17.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these

18. The OSI model is divided into_______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these

19. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base

20.________ is an invalid type of database key.
1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these

1. correct option (3)
2. correct option(3)
3. correct option(4)
4. correct option(2)
5. correct option(2)
6. correct option(4)
7. correct option(3)
8. correct option(4)
9. correct option(2)
10. correct option(1)
11. correct option(4)
12. correct option(3)
13. correct option(2)
14. correct option(3)
15. correct option(1)
16. correct option(4)
17. correct option(3)
18. correct option(3)
19. correct option(3)
20. correct option(1)

Practice Computer Awareness Questions – Set 3

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top
error: Content is protected !!