Professional Documents
Culture Documents
COMPUTER AWARENESS
1. In which one of the following errors are displayed for every instruction?
1) Assembler 2) Both 3 and 4 3) Complier
4) Interpreter 5) None of these
2. What does dots per inch (DPI) measure?
1) Number of bits 2) Density of the pixels on a computer screen
3) The density of bits on a disk
4) Density of graphic files stored on a hard disk5) None of these
r’s
3. What is the full form of ‘MAN’?
1) Man Area Network 2) Meter Area Network
3) Metropolitan Area Network 4) Manage Area Network
5) Master Accesses Network
4. Which of the following is not a network protocol?
1) HTTP 2) FTP 3) SMTP 4) HTML 5) None of these
5. What is access time?
ha
1) It is the time taken by the memory to store or retrieve a piece of data.
2) It is the number marked on all memory chips.
3) It is the memory clock.
6.
E
4) It is the transaction period between the CPU and the memory5) None of these
The data are modified to specific code and protected in the sender side while
d
transferring, and the special key is used to retrieve the original data in the
receiver side. What is the process used in receiver side to retrieve the original
data?
ee
9. The Artificial satellite which revolves around the earth and provide transmit
information from earth is basically called _____
1) Geosynchronous satellites 2) Geostationary satellites
3) Low Earth Orbits 4) Sun-Synchronous orbits 5) None of these
10. What is the name of the portal in computer, which allow additional devices to
connect?
1) Primary 2) Secondary 3) Peripheral 4) Optional 5) None of these
C
11. What is the short cut key to close currently opened document in Microsoft word?
1) Ctrl + W 2) Ctrl + D 3) Ctrl + T 4) Ctrl + B 5) None of these
12. In the C coding ‘<stdio.h>’ is used as a ____ file.
1) Subroutines 2) Footer 3) Header 4) Increment 5) None of these
13. Raw, unprocessed facts, including text, numbers, images, and sounds, are called
1) Applets 2) Data 3) Metaware 4) Product 5) Script
14. All of the following are TRUE of Safe Mode EXCEPT:
1) Safe Mode is a special diagnostic mode
2) Safe Mode loads all non-essential icons
3) Safe Mode allows users to troubleshoot errors.
4) Safe Mode loads only the most essential devices 5) None of these
15. Changing the appearance of a document is called
1) Proofing 2) Editing 3) Formatting 4) Correcting 5) All of the above
16. You can detect spelling and grammar errors by:
1) Press Shit + F7 2) Press Ctrl + F7 3) Press Alt + F7
4) Press F7 5) None of these
::1::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
17. Which of the following is necessary to track computer, while connecting to Internet?
1) System Number 2) Memory 3) IP 4) VP 5) DHCP
18. Which of following is not an example for simplex?
1) Radio broadcasting 2) Television broadcasting 3) Speaker
4) Walkie-talkie 5) None of these
19. Which of the following layer is responsible for converting electrical impulse to bit
streams?
1) Presentation 2) Physical 3) Data link 4) Network 5) None of these
20. What is the maximum number, that each of the four parts of an IP Address can
have?
1) 345 2) 255 3) 197 4) 301 5) 127
r’s
21. Which of the following extension is used to save image in the computer?
1) .cmd 2) .xls 3) .vlc 4) .jpeg 5) None of these
22. Machine language sometimes also referred as:
1) Binary language 2) High level language 3) Middle level language
4) Low level language 5) None of these
23. Which is an another name for functional language
1) Machine
4) High-level language
ha 2) Application
5) None of these
3) Low-level language
25.
E
1) Assembler 2) Interpreter 3) Loader
‘Chrome’ is a ____ software
4) Compiler 5) None of these
d
1) Operating System 2) Application 3) System 4) Utility 5) None of these
26. SRAM retains data as long as power is provided to the memory chip and need not
be refreshed periodically. What does ‘S’ represents?
ee
::2::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
39. This is a standard way for a Web server to pass a Web user’s request to an
application program and to receive data back to forward to the user –
1) Interrupt request 2) Forward DNS lookup 3) Data-Link layer
4) File Transfer Protocol 5) Common gateway interface
40. This type of software is designed for users who want to customize the programs
they use.
1) Shareware 2) Open-source software 3) Freeware
4) Macros 5) None of these
41. The effect of the ROLLBACK command in a transaction is the following
1) Undo all changes to the data-base resulting from the execution of the transaction
2) Undo the effects of the last UPDATE command
r’s
3) Restore the content of the database to its state at the end of the previous day
4) Make sure that all changes to the database are in effect 5) None of these
42. A(n) -----system is a small, wireless handheld computer that scans an item’s tag
and pulls up the current price (and any special offers) as you shop.
1) PSS 2) POS 3) Inventory 4) data mining 5) None of these
43. Single party disk relying on the disk controller for finding out which disk has
failed is used by
ha
1) RAID level 5 2) RAID level 2 3) RAID level 4 4) RAID level 3 5) RAID level 1
44. What happens when you click on insert>Picture>Clip Art
E
1) It inserts a clipart picture into document
2) It lets you choose clipart to insert into document
d
3) It opens Clip Art taskbar 4) It insets symbols 5) None of these
45. Which one allows Movements in all directions (360 degree)?
1) Mouse 2) Joystick 3) Light pen 4) Track ball 5) None of these
ee
46. ____ and ____ refers to the action of clicking and holding down the mouse button
while moving the mouse and realising it
1) Drag, Click 2) Drop, Drag 3) Drag, Drop
4) Click, Right Click 5) None of these
C
47. File record length
1) Should always be fixed 2) Should always be variable
Sr
::3::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
56. Which one is a typical rectangular shaped monitor that you see on a desktop
computer?
1) CRT 2) LCD 3) LED 4) BIOS 5) None of these
57. A pixel is
1) Picture element or dot on a screen 2) Point of ink on a user printed paper
3) Point of ink on a inkjet printed page
4) Light beam used in printing paper 5) None of these
58. In which printers, Printing is achieved by deflecting laser beam on to photosensitive
surface of a drum?
1) Dot Matrix 2) Daisy Wheel 3) Laser printer
4) Electromagnetic printer 5) None
r’s
59. First generation computer were based on?
1) Vacuum tubes 2) ICs 3) Transistors 4) Conductors 5) None
60. Which language is directly understood by the computer without translation
Program?
1) Machine language 2) C# Language 3) High level language
61.
4) C language
ha 5) None of these
The speed of Which Generation Computer was in Pico Seconds?
1) First 2) Second 3) Fourth 4) Fifth 5) None of these
62. JS kilby developed which chips?
63.
1) Silicon
E
2) Silica
First Super computer of World is
3) Integrated 4) Iron oxide 5) None of these
d
1) PARAM 2) Siddhart 3) IBM -370 4) CRAY-1 5) None of these
64. Which one is example for Fifth Generation computer?
1) DBMS 2) Distributed System 3) Real time System
ee
::4::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
r’s
4) Hard disk 5) None of these
78. Which one records data bits as tiny magnetic spots?
1) Data Transfer rate 2) Track 3) Sector
4) Hard disk 5) None of these
79. BIOS Stands for?
ha
1) Basic Input Output Server 2) Basic Input Output Storage
3) Basic Input Output System 4) Basic Input Output Standard 5) None of these
80. Which one is used in a program to execute a particular set of statements
repeatedly?
E
1) Visual basic 2) Pseudocode 3) Condition 4) Looping 5) None of these
d
81. Which works on the supply of Continuous electrical pulses?
1) Analog Computer 2) Digital Computer 3) Both 1 and 2
4) Super Compute 5) None of these
ee
85. Dr EF Codd represented ____ rules for relational database management system
(RDBMS) in 1970
1) 9 2) 12 3) 14 4) 11 5) None of these
86. A set of possible data values is called as
1) Tuple 2) Attribute 3) Degree 4) Domain 5) None of these
87. Which one defines how the data are actually stored and organised on the storage
medium?
C
1) Physical level 2) Logical level 3) View level
4) Conceptual level 5) None of these
88. Which one defines what type of data is stored in the database?
1) Internal level 2) Physical level 3) View level
4) Logical level 5) None of these
89. A device needed to communicate with computers using telephone lines is
1) Disk 2) CPU 3) VDU 4) Modem 5) None of these
90. Which one of the following domain is used by Non-Profit Organisation?
1) .com 2) .gov 3) .org 4) .edu 5) None of these
91. In which one of the following errors are displayed after entire program is checked?
1) Assembler 2) Both 3 and 43) Complier 4) Interpreter 5) None of these
92. A ____ generator is used to print files on paper
1) Printer 2) Scanner 3) Both 1 and 2 4) Report 5) None of these
93. If we want to eliminate the duplicate values than___keyword is also to be used
1) Values 2) Groups 3) Distinct values4) Columns 5) None of these
::5::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
r’s
98. Which one of the following command is used to show only the last query?
1) List 2) Select 3) Describe 4) R 5) None of these
99. Which one is not a Necessary conditions for deadlock?
1) Non pre-emptive 2) Preemptive 3) Partial allocation
4) Circular wait 5) None of these
100. Which one is true about generation of computers?
ha
1) The first generation (1942-1954)
2) The second generation of computer (1954- 1964)
3) Third generation of computer (1965-71)
4) Fourth generation of computer (1975-1984) 5) None of these
101.
E
Servers are computers that provide resources to other computers connected to a
____.
d
1) Network 2) Mainframe 3) Supercomputer 4) Client 5) Port
102. In MS-Excel, all formula starts with the sign of______.
1) # 2) @ 3) = 4) + 5) None of these
ee
::6::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
114. This type of software works with end-users, application software, and Computer
Hardwareto handle the majority of technical details:
1) Communications software 2) Application software
3) Utility software 4) System software 5) None of these
115. Which of the following keys is used to deletecharacters to the left of the cursor?
1) Alt + Delete 2) Shift 3) Esc 4) Delete 5) Backspace
116. A web site is a collection of_______.
1) graphics 2) programs 3) algorithms 4) web pages 5) charts
117. When a computer is switched on, the bootingprocess performs
1) Integrity Test 2) Power-On Self-Test 3) Correct Functioning Test
4) Reliability Test 5) Shut-down
r’s
118. The term ‘user interface’ refers to ______.
1) what the user sees on the screen and howthey can interact with it
2) how the operating system responds to usercommands
3) the means by which the user interacts withthe peripheral devices on the
computer
4) the monitor that is available for thecomputer 5) None of the above
ha
119. The keyword shortcut to launch taskmanager___.
1) Alt+ F4 2) Ctrl+ F4 3) Ctrl+ Alt+ Del 4) Alt+ Del 5) None of these
120. Which protocol provides e-mail facility amongdifferent hosts?
1) FTP 2) SMTP 3) TELNET 4) SNMP 5) None of these
121. LAN stands for
1) Local Area Nodes
::7::
Sreedhar’s CCE COMPUTER SPECIAL CLASS HANDOUT
r’s
1) operating system 2) system software 3) application software
4) management information systems 5) None of these
136. What is the most common tool used to restrictaccess to a computer system?
1) User logins 2) Passwords 3) Computer keys
4) Access-control software 5) None of these
1) Prints 9
ha
137. Pressing CTRL + 9 in Excel _____.
2) Prints 3) Prints 9 followed by spaces
4) Inserts 9 cells at the current location 5) Hides the current row
138. The letter and number of the intersecting column and row is the
1) Cell coordinates
4) Cell address
::8::