You are on page 1of 8

Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

COMPUTER AWARENESS
1. In which one of the following errors are displayed for every instruction?
1) Assembler 2) Both 3 and 4 3) Complier
4) Interpreter 5) None of these
2. What does dots per inch (DPI) measure?
1) Number of bits 2) Density of the pixels on a computer screen
3) The density of bits on a disk
4) Density of graphic files stored on a hard disk5) None of these

r’s
3. What is the full form of ‘MAN’?
1) Man Area Network 2) Meter Area Network
3) Metropolitan Area Network 4) Manage Area Network
5) Master Accesses Network
4. Which of the following is not a network protocol?
1) HTTP 2) FTP 3) SMTP 4) HTML 5) None of these
5. What is access time?
ha
1) It is the time taken by the memory to store or retrieve a piece of data.
2) It is the number marked on all memory chips.
3) It is the memory clock.

6.

E
4) It is the transaction period between the CPU and the memory5) None of these
The data are modified to specific code and protected in the sender side while
d
transferring, and the special key is used to retrieve the original data in the
receiver side. What is the process used in receiver side to retrieve the original
data?
ee

1) Decoding 2) Encoding 3) Encrypting 4) Decrypting 5) None of these


7. What is the term used to denote the repetition of data in DBMS?
1) Repeating 2) Restrict 3) Reappear 4) Redundancy 5) None of these
8. ______is the most important/powerful computer in a typical network.
C
1) Network client 2) Desktop 3) Network station
4) Network switch 5) Network server
Sr

9. The Artificial satellite which revolves around the earth and provide transmit
information from earth is basically called _____
1) Geosynchronous satellites 2) Geostationary satellites
3) Low Earth Orbits 4) Sun-Synchronous orbits 5) None of these
10. What is the name of the portal in computer, which allow additional devices to
connect?
1) Primary 2) Secondary 3) Peripheral 4) Optional 5) None of these
C
11. What is the short cut key to close currently opened document in Microsoft word?
1) Ctrl + W 2) Ctrl + D 3) Ctrl + T 4) Ctrl + B 5) None of these
12. In the C coding ‘<stdio.h>’ is used as a ____ file.
1) Subroutines 2) Footer 3) Header 4) Increment 5) None of these
13. Raw, unprocessed facts, including text, numbers, images, and sounds, are called
1) Applets 2) Data 3) Metaware 4) Product 5) Script
14. All of the following are TRUE of Safe Mode EXCEPT:
1) Safe Mode is a special diagnostic mode
2) Safe Mode loads all non-essential icons
3) Safe Mode allows users to troubleshoot errors.
4) Safe Mode loads only the most essential devices 5) None of these
15. Changing the appearance of a document is called
1) Proofing 2) Editing 3) Formatting 4) Correcting 5) All of the above
16. You can detect spelling and grammar errors by:
1) Press Shit + F7 2) Press Ctrl + F7 3) Press Alt + F7
4) Press F7 5) None of these

::1::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

17. Which of the following is necessary to track computer, while connecting to Internet?
1) System Number 2) Memory 3) IP 4) VP 5) DHCP
18. Which of following is not an example for simplex?
1) Radio broadcasting 2) Television broadcasting 3) Speaker
4) Walkie-talkie 5) None of these
19. Which of the following layer is responsible for converting electrical impulse to bit
streams?
1) Presentation 2) Physical 3) Data link 4) Network 5) None of these
20. What is the maximum number, that each of the four parts of an IP Address can
have?
1) 345 2) 255 3) 197 4) 301 5) 127

r’s
21. Which of the following extension is used to save image in the computer?
1) .cmd 2) .xls 3) .vlc 4) .jpeg 5) None of these
22. Machine language sometimes also referred as:
1) Binary language 2) High level language 3) Middle level language
4) Low level language 5) None of these
23. Which is an another name for functional language
1) Machine
4) High-level language
ha 2) Application
5) None of these
3) Low-level language

24. translates the semantic instructionsdeveloped by programmers into the machine


language

25.

E
1) Assembler 2) Interpreter 3) Loader
‘Chrome’ is a ____ software
4) Compiler 5) None of these
d
1) Operating System 2) Application 3) System 4) Utility 5) None of these
26. SRAM retains data as long as power is provided to the memory chip and need not
be refreshed periodically. What does ‘S’ represents?
ee

1) Stagnant 2) Storage 3) Simple 4) Static 5) None of these


27. The computer’s capability of distinguishing spoken words is called
1) Voice analysis 2) Speech acknowledgment 3) Speech interpretation
4) Voice recognition 5) Vocalization
C
28. While working in mail we may came under the ‘BCC’, what does B represents?
1) Blink 2) Black 3) Blind 4) Broad 5) None of these
Sr

29. Deleted mails from the Inbox can be found in


1) Trash 2) Spam 3) Promotions 4) All Mail 5) None of these
30. What is the components that are used in second generation computers?
1) Vacuum tube 2) LSI 3) Punch cards
4) Transistors 5) None of these
31. ______ is an artificial language designed to communicate instructions to a computer
1) Programming language 2) Machine Language 3) Software Language
4) Assembly Language 5) None of these
C
32. Expand “MODEM”?
1) Modern development 2) Medium Development
3) Modulation and Demolition 4) Modulation and Demodulation 5) None of these
33. What is the short cut to justify the paragraph?
1) Ctrl + R 2) Ctrl + J 3) Ctrl + U 4) Ctrl + E 5) Ctrl + P
34. Which of the following is a non-volatile memory?
1) RAM 2) ROM 3) Cache 4) Primary 5) None of these
35. Which one of the following command is used to display both query and output?
1) List 2) Select 3) Describe 4) R 5) None of these
36. OSI is an ISO standard for worldwide communications that defines a networking
framework for implementing protocols. What does ‘O’ stands for?
1) Operation 2) Open 3) Organisation 4) Optical 5) None of these
37. An operation in which data is moved to a different location is referred as .
1) Block move 2) Street move 3) Delete 4) Shift remove 5) None of these
38. Which among the following is not an Object Oriented Programming Language?
1) Python 2) C++ 3) Java 4) PASCAL 5) Ruby

::2::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

39. This is a standard way for a Web server to pass a Web user’s request to an
application program and to receive data back to forward to the user –
1) Interrupt request 2) Forward DNS lookup 3) Data-Link layer
4) File Transfer Protocol 5) Common gateway interface
40. This type of software is designed for users who want to customize the programs
they use.
1) Shareware 2) Open-source software 3) Freeware
4) Macros 5) None of these
41. The effect of the ROLLBACK command in a transaction is the following
1) Undo all changes to the data-base resulting from the execution of the transaction
2) Undo the effects of the last UPDATE command

r’s
3) Restore the content of the database to its state at the end of the previous day
4) Make sure that all changes to the database are in effect 5) None of these
42. A(n) -----system is a small, wireless handheld computer that scans an item’s tag
and pulls up the current price (and any special offers) as you shop.
1) PSS 2) POS 3) Inventory 4) data mining 5) None of these
43. Single party disk relying on the disk controller for finding out which disk has
failed is used by
ha
1) RAID level 5 2) RAID level 2 3) RAID level 4 4) RAID level 3 5) RAID level 1
44. What happens when you click on insert>Picture>Clip Art

E
1) It inserts a clipart picture into document
2) It lets you choose clipart to insert into document
d
3) It opens Clip Art taskbar 4) It insets symbols 5) None of these
45. Which one allows Movements in all directions (360 degree)?
1) Mouse 2) Joystick 3) Light pen 4) Track ball 5) None of these
ee

46. ____ and ____ refers to the action of clicking and holding down the mouse button
while moving the mouse and realising it
1) Drag, Click 2) Drop, Drag 3) Drag, Drop
4) Click, Right Click 5) None of these
C
47. File record length
1) Should always be fixed 2) Should always be variable
Sr

3) Depends upon the size of file


4) Should bechosentomatchthedata characteristics. 5) None of these
48. Which one is used to open a document or program?
1) Click 2) Double Click 3) Right Click
4) Drag and Drop 5) None of these
49. _____is another pointing device which is an alternative to a mouse
1) Track ball 2) Joystick 3) Light pen 4) Touch Screen 5) None of these
50. Laser printer can print _____ pages of text per minute and their resolution ranges
C
from dpi
1) 5-25, 400-1300 2) 5-25, 400-1200 3) 5-24, 400-1200
4) 5-25, 500-1300 5) None of these
51. Electromagnetic printer can produce documents at a speed of over _____ lines
1) 10000 2) 20000 3) 30000 4) 40000 5) None of these
52. The main computer in a network is called
1) host processor 2) front-end processor 3) commentator
4) KIPS 5) None of these
53. Caps lock and Num lock Keys are called as ____ keys
1) Ctrl 2) Shift 3) Toggle 4) Window 5) None of these
54. If you change Windows 98 to Windows XP, you are actually performing?
1) Upstart 2) Update 3) Upgrade 4) Patch 5) None of these
55. Which one performs simply an informal way of describing a program and it does
not follow any Syntax Strictly?
1) Mnemonic 2) Opcode 3) Pseudocode 4) Operand 5) None of these

::3::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

56. Which one is a typical rectangular shaped monitor that you see on a desktop
computer?
1) CRT 2) LCD 3) LED 4) BIOS 5) None of these
57. A pixel is
1) Picture element or dot on a screen 2) Point of ink on a user printed paper
3) Point of ink on a inkjet printed page
4) Light beam used in printing paper 5) None of these
58. In which printers, Printing is achieved by deflecting laser beam on to photosensitive
surface of a drum?
1) Dot Matrix 2) Daisy Wheel 3) Laser printer
4) Electromagnetic printer 5) None

r’s
59. First generation computer were based on?
1) Vacuum tubes 2) ICs 3) Transistors 4) Conductors 5) None
60. Which language is directly understood by the computer without translation
Program?
1) Machine language 2) C# Language 3) High level language

61.
4) C language
ha 5) None of these
The speed of Which Generation Computer was in Pico Seconds?
1) First 2) Second 3) Fourth 4) Fifth 5) None of these
62. JS kilby developed which chips?

63.
1) Silicon

E
2) Silica
First Super computer of World is
3) Integrated 4) Iron oxide 5) None of these
d
1) PARAM 2) Siddhart 3) IBM -370 4) CRAY-1 5) None of these
64. Which one is example for Fifth Generation computer?
1) DBMS 2) Distributed System 3) Real time System
ee

4) Artificial Intelligence 5) None of these


65. Which Storage devices is used in Fourth Generation Computer?
1) Magnetic drum 2) Magnetic core technology
3) Semiconductor memory 4) Primary Storage medium 5) None of these
C
66. PDP-8 is an example for Which Generation Computer?
1) First 2) Second 3) Third 4) Fourth 5) Fifth
Sr

67. Which Operating System is used in Third Generation Computer?


1) Batch 2) Time Sharing System 3) Real-Time System
4) GUI Interface 5) None of these
68. Programming Language introduced in Which Generation?
1) First 2) Second 3) Third 4) Fourth 5) Fifth
69. Which one is generally used in banks to process the Cheques?
1) OMR 2) MICR 3) OCR 4) MIC 5) None of these
C
70. Which one is an Optical disk storage medium designed to recapture the data
normally in DVD format?
1) Compact Disk 2) Digital Video Disk 3) Blue-ray Disk
4) Floppy Disk 5) None of these
71. Who designed the first electronics computer-ENIAC?
1) Van Neuman 2) Joseph M Jacquard
3) J presper Eckert and John W Mauchly
4) Both (1) and (2) 5) None of these
72. _____ is a collection of web-pages and_____ is the very first page that we see on
opening of a website.
1) Home page, Web page 2) Website, Home page
3) Web page, Home page 4) Web page, Website 5) None of these
73. When we run program in HTML coding, ___is used as backend and___works as
frontend.
1) Notepad, Internet Explorer 2) Notepad, MSN messenger
3) MS Word, Internet Explorer 4) Both (1) and (3) 5) None of these

::4::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

74. The main memory of a computer can also be called ___


1) primary storage 2) internal memory 3) primary memory
4) all of these 5) None of these
75. A GUI is
1) hardware 2) language interpreter 3) software interface
4) an operating system 5) None of these
76. Which one holds a block of data that is read or written at one time?
1) Data Transfer rate 2) Track 3) Sector
4) Hard disk 5) None of these
77. The rate at which data is written to disk or read from disk is called as
1) Data Transfer rate 2) Track 3) Sector

r’s
4) Hard disk 5) None of these
78. Which one records data bits as tiny magnetic spots?
1) Data Transfer rate 2) Track 3) Sector
4) Hard disk 5) None of these
79. BIOS Stands for?
ha
1) Basic Input Output Server 2) Basic Input Output Storage
3) Basic Input Output System 4) Basic Input Output Standard 5) None of these
80. Which one is used in a program to execute a particular set of statements
repeatedly?

E
1) Visual basic 2) Pseudocode 3) Condition 4) Looping 5) None of these
d
81. Which works on the supply of Continuous electrical pulses?
1) Analog Computer 2) Digital Computer 3) Both 1 and 2
4) Super Compute 5) None of these
ee

82. The Characteristics of any entity are called it as


1) Attributes 2) Relationship3) Entity set 4) Information 5) None of these
83. Which key must be Unique?
1) Alternate 2) Primary 3) Candidate 4) Foreign 5) None of these
C
84. ____are the actual data contained in the database at a particular point of line
1) Schema 2) Data mining3) Instances 4) Information 5) None of these
Sr

85. Dr EF Codd represented ____ rules for relational database management system
(RDBMS) in 1970
1) 9 2) 12 3) 14 4) 11 5) None of these
86. A set of possible data values is called as
1) Tuple 2) Attribute 3) Degree 4) Domain 5) None of these
87. Which one defines how the data are actually stored and organised on the storage
medium?
C
1) Physical level 2) Logical level 3) View level
4) Conceptual level 5) None of these
88. Which one defines what type of data is stored in the database?
1) Internal level 2) Physical level 3) View level
4) Logical level 5) None of these
89. A device needed to communicate with computers using telephone lines is
1) Disk 2) CPU 3) VDU 4) Modem 5) None of these
90. Which one of the following domain is used by Non-Profit Organisation?
1) .com 2) .gov 3) .org 4) .edu 5) None of these
91. In which one of the following errors are displayed after entire program is checked?
1) Assembler 2) Both 3 and 43) Complier 4) Interpreter 5) None of these
92. A ____ generator is used to print files on paper
1) Printer 2) Scanner 3) Both 1 and 2 4) Report 5) None of these
93. If we want to eliminate the duplicate values than___keyword is also to be used
1) Values 2) Groups 3) Distinct values4) Columns 5) None of these

::5::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

94. If we want to check the structure of the table ___Command is used


1) List 2) Select 3) Describe 4) R 5) None of these
95. A____’s main purpose is to prohibit unauthorized access to your computer via the
Internet.
1) popup blocker 2) firewall 3) spyware blocker
4) spam assassin 5) None of these
96. If configured correctly, the ___ willprevent interaction with your computer after a
specified time period.
1) firewall 2) filter 3) screen saver 4) popup blocker 5) None of these
97. What is the name of the series of Laptop computers manufactured by IBM called?
1) LapPad 2) Vaio 3) Aptiva 4) Thinkpad 5) Notepad

r’s
98. Which one of the following command is used to show only the last query?
1) List 2) Select 3) Describe 4) R 5) None of these
99. Which one is not a Necessary conditions for deadlock?
1) Non pre-emptive 2) Preemptive 3) Partial allocation
4) Circular wait 5) None of these
100. Which one is true about generation of computers?
ha
1) The first generation (1942-1954)
2) The second generation of computer (1954- 1964)
3) Third generation of computer (1965-71)
4) Fourth generation of computer (1975-1984) 5) None of these
101.

E
Servers are computers that provide resources to other computers connected to a
____.
d
1) Network 2) Mainframe 3) Supercomputer 4) Client 5) Port
102. In MS-Excel, all formula starts with the sign of______.
1) # 2) @ 3) = 4) + 5) None of these
ee

103. Where is printer attached?


1) serial port 2) parallel port 3) SCSI
4) Interface port 5) None of these
104. A character is represented in EBCDIC(Extended Binary Coded Decimal Interchange
C
Code)by___________.
1) one bit 2) four bits 3) eight bits 4) sixteen bits 5) None of the above
Sr

105. Firewalls are generally used to protectagainst___.


1) fire Attacks 2) data Driven Attacks 3) virus Attacks
4) unauthorized access 5) None of these
106. Which key is used in combination with anotherkey to perform a specific task?
1) Function 2) Control 3) Arrow 4) Space Bar 5) None of these
107. A website's main page is called it's _______.
1) home page 2) browser page 3) search page
4) index page 5) none of these
C
108. The network in which every node is connectedto two other nodes is called _____.
1) Bus Network Topology 2) Star Network Topology
3) Ring Network Topology 4) All of the above 5) None of these
109. Underlined text, such as text and foldernames is referred to as a __.
1) Hyperlink 2) Menu 3) Source drive
4) Resource locator 5) None of these
110. The smallest unit in a digital system is _____.
1) byte 2) kilobyte 3) word 4) character 5) bit
111. Which bar is usually located below the TitleBar that provides categorized options?
1) Menu Bar 2) Status Bar 3) Toolbar 4) Scroll Bar 5) None of the above
112. Portrait and Landscape are
1) Page Orientation 2) Paper Size 3) Page Layout
4) Both 3 and 4 5) All of the above
113. __________refers to the unauthorizedcopying and distribution of software.
1) Hacking 2) Software Piracy 3) Software literacy
4) Cracking 5) Copyright

::6::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

114. This type of software works with end-users, application software, and Computer
Hardwareto handle the majority of technical details:
1) Communications software 2) Application software
3) Utility software 4) System software 5) None of these
115. Which of the following keys is used to deletecharacters to the left of the cursor?
1) Alt + Delete 2) Shift 3) Esc 4) Delete 5) Backspace
116. A web site is a collection of_______.
1) graphics 2) programs 3) algorithms 4) web pages 5) charts
117. When a computer is switched on, the bootingprocess performs
1) Integrity Test 2) Power-On Self-Test 3) Correct Functioning Test
4) Reliability Test 5) Shut-down

r’s
118. The term ‘user interface’ refers to ______.
1) what the user sees on the screen and howthey can interact with it
2) how the operating system responds to usercommands
3) the means by which the user interacts withthe peripheral devices on the
computer
4) the monitor that is available for thecomputer 5) None of the above
ha
119. The keyword shortcut to launch taskmanager___.
1) Alt+ F4 2) Ctrl+ F4 3) Ctrl+ Alt+ Del 4) Alt+ Del 5) None of these
120. Which protocol provides e-mail facility amongdifferent hosts?
1) FTP 2) SMTP 3) TELNET 4) SNMP 5) None of these
121. LAN stands for
1) Local Area Nodes

E 2) Large Area Network 3) Large Area Nodes


d
4) Local Area Network 5) None
122. Macros stored In the global macro sheet canbe used
1) In the current document only 2) in any document
ee

3) can be used only with other macros of theglobal macro sheet


4) None of the above 5) All of the above
123. The topology with highest reliabilityis_______.
1) Bus topology 2) Star topology 3) Ring topology 4) Mesh topology 5) None of these
C
124. Which of the following is NOT a type ofbroadband internet connection?
1) Cable 2) DSL 3) Dial-up 4) Satellite 5) None of these
Sr

125. A computer on a network that accessresources provided by another computercalled


_____.
1) A Server 2) A computer 3) A Brewers
4) A Beta test and Beker call 5) None of these
126. What is the full form of HTTP?
1) Hyper Text Transfer Protocol 2) Hyper Text Transition Protocol
3) Hyper Text Transfer Program 4) Hyper Text Transition Program
5) Hyper Text Trivial Protocol
C
127. Why are headers and footers used indocument?
1) To enhance the overall appearance of thedocument
2) To mark the starting and ending of a page
3) To make large document more readable
4) To allow page headers and footers toappear on document when it is printed
5) None of these
128. Which is the following shortcut key is used tochecking spelling?
1) F1 2) F2 3) F7 4) F9 5) None of these
129. Which part of the system software alwaysresides in main memory?
1) Text editor 2) Assembler 3) Linker 4) Loader 5) None of these
130. Which of the following is not a web browser?
1) MOSAIC 2) Chrome 3) Facebook
4) Netscape navigator 5) None of these
131. ________ is when the computer is turned onand the operating system is loading.
1) Booting 2) Spoofing 3) Formatting 4) Initiating 5) Loading

::7::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT

132. A (n)__________ allows sharing of abroadband Internet connection.


1) hub 2) adapter 3) router 4) switch 5) plug
133. SMPS stands for________.
1) Switched Mode Power Supply 2) Start Mode Power Supply
3) Store Mode Power Supply 4) Single Mode Power Supply
5) None of these
134. Electronic funds transfer is the exchange ofmoney______.
1) From one place to another 2) From one account to another
3) From one bank to another 4) All of above 5) None of these
135. Programs designed specifically to addressspecial purpose applications are called
_______.

r’s
1) operating system 2) system software 3) application software
4) management information systems 5) None of these
136. What is the most common tool used to restrictaccess to a computer system?
1) User logins 2) Passwords 3) Computer keys
4) Access-control software 5) None of these

1) Prints 9
ha
137. Pressing CTRL + 9 in Excel _____.
2) Prints 3) Prints 9 followed by spaces
4) Inserts 9 cells at the current location 5) Hides the current row
138. The letter and number of the intersecting column and row is the
1) Cell coordinates
4) Cell address

E 2) Cell location 3) Cell position


5) None of these
d
139. In computer _____ is a process by which two devices initiate communications
1) Protocol 2) Handshaking 3) Topology 4) Networking 5) Cable
140. Which of the following unit is not used to count the speed of a printer
ee

1) CPS 2) DPI 3) PPM 4) LPM 5) None


141. Device on one network can communicate with device on another network via
1) File server 2) Utility server 3) Printer server 4) Gateway 5) None
C
142. Which of the following is not a function of an operating system
1) Executing and providing servers for applications software
Sr

2) Managing the computers resources


3) Establish a user interface 4) Formatting a word document 5) none
143. what kind of server converts ip address to domain names
1) file 2) DNS 3) Email 4) P2P 5) HTTP
144. What is a modulator/demodulator that is connected to a circuit board or
motherboard
1) Fax modem 2) NIC 3) Internal modem 4) External modem 5) Router
145. Which device cannot be shared in network
C
1) Floppy 2) Keyboard 3) Computer 4) Printer 5) none
146. what is the function of recylebin
1) store selected file 2) store temporary file 3) store corrupted file
4) store document file 5) none
147. to insert in a new slide in the current presentation, we ca use ___ key
1) ctrl + m 2) ctrl + n 3) ctrl + o 4) ctrl + f 5) none
148. the usage of using spreadsheet is
1) calculations can be done automatically
2) changing data automatically updates calculations
3) more flexibility 4) all of the above 5) none of the above
149. a person who used his.her expertise to gain access to other peoples computers to
get information illegally or do damage is a ____
1) hacker 2) analyst 3) instant messenger 4) programmer 5) spammer
150. what is the storage area for email messages called
1) a folder 2) a directory 3) a mailbox 4) hdd 5) none

::8::

You might also like