You are on page 1of 8

1. The daily processing of corrections to 6.

When did arch rivals IBM and Apple


customer accounts best exemplifies the Computers Inc. Decide to join hands
processing mode of: A. 1978 B. 1984 C. 1990 D. 1991
A. Batch processing Ans. 1991
B. Real-time processing
C. Time-sharing 7. A computer system consisting of its
D. Offline processing processor, memory and I/O devices
Ans. Batch Processing accepts data, processes it produces the
output results. Can you tell in which
2. An AND gate component is the raw data fed
A. implements logic addition A. Mass Memory B. Main Memory
B. is equivalent to series switching circuit C. Logic unit D. Arithmetic unit
C. is an any or all gate Ans. Main Memory
D. is equivalent to a parallel switching
circuit 8. Fifth generation computers are likely to
Ans. is equivalent to a series switching exhibit
circuit A. artificial intelligence
B. heuristic behavior
3. A memory bus is mainly used for C. advanced parallel processing
communication between D. All of the above
A. processor and memory Ans. All of the above
B. processor and I/O devices
C. I/O devices and memory 9.The central processor of a modern
D. input device and output device digital computer consist of
Ans. Processor and memory A. control unit
B. Primary memory
4. The memory sizes in mainframe C. control unit and primary memory
computers and advanced technology D. All of the above
micro computers are expressed as Ans. Control unit and primary memory
A. Bytes B. kilo-bytes
C. Bits D. Megabytes 10. The bubbles in a bubble memory
Ans. Megabytes pack are created with the help of
A. laser bream B. Magnetic field
5. The transistorized computer circuits C. X-ray D. Electric field
were introduced in the Ans. Magnetic field
A. First generation B. Second
generation 11. The function of CPU is
C. Third generation A. to provide a hard copy
D. Fourth generation B. to read, interpret and process the
Ans. Second generation information and instruction
C. to provide external storage of text C. Plotters D. Thermal devices
D. to provide external storage of text Ans. Plotters
Ans. To read, interpret and process the
information and instruction 18. The ALU and control unit of most of the
microcomputers are combined and
12. How many types of storage loops exist manufactured on a single silicon chip.
in magnetic bubble memory What is it called
A. 8 B. 4 C.16 D.2 A. Monochip B. Microprocessor
Ans. 2 C. ALU D. Control Unit
Ans. Microprocessor
13.Why is the width of the data bus so
important to the processing speed of a 19. A small film-plate which is used for
computer microfilming the output from a
A. The narrower it is, the greater the microcomputer screen is called
computer’s processing speed A. microfilm B. microfiche
B. The wider it is, the more data that can C. film card D. COM
fit into main memory Ans. Microfiche
C. The wider it is, the greater the
computer’s processing speed 20.What is the name of the logic circuit
D. The wider it is, the slower the which can add two binary digits
computer’s processing speed A. Full adder B. Half adder
Ans. The wider it is, the greater the C. Buffer D. Register
computer’s processing speed Ans. Half adder

14.One byte can be used to encode any 21.A memory space used for the
integer between ‘0’ and- inclusive temporary storage of data is
A.16 B.256 C.128 D. 255 A. PROM B. SAM
Ans. 255 C. Scratched storage D. Buffer
Ans. Scratched storage
15.Storage on PC allows you to store files
until something erases it, but memory 22. A laser printer does NOT use
loses its contents whenever A. A photo- conductive drum
its_____________ is lost B. A print head
A. static B. disk space C. A laser beam
C. power D. both A and B D. None of these
Ans. Power Ans. A print head

16.Which of the following registers is 23.What do you need for an ink jet printer
loaded with the contents of the memory A. A drum B. A cartridge
location pointed by the PC C. A ribbon D. All of these above
A. Memory Adress Register Ans. A cartridge
B. Memory Data Register
C. Instruction Register 24.A daisy wheel is a type of
D. Program Counter A. Storage device B. Pointing device
Ans. Instruction Register C. Scanning device D. Printer
Ans. Printer
17. Continuous line drawing are produced
using
A. Chain printers B. Daisy wheel printers
25.What are the individual dots which A. DPI B. LMP C. CPM D. PPM
make up a picture on the monitor screen Ans. DPI
called
A. Colored spots B. Pixies 33. If you want to secure a message, use
C. Pixels D. None of these a(n):
Ans. Pixels A. Cryptology source
B. Encryption key
26.What would be the best way to move C. Encryption software package
around a 3D environment D. Cryptosystem
A. Use a tracker ball Ans. Cryptosystem
B. Use a keyboard
C. Use a space mouse 34. The scrambling of code is known as:
D. Use a joystick A. Encryption B. A firewall
Ans. Use a tracker ball C. Scrambling D. Password-
proofing
27.What does a light pen contain Ans. Encryption
A. Refillable ink
B. Light sensitive elements 35.What is the most common tool used to
C. Pencil lead restrict access to a computer system
D. Blue ink A. User log in
Ans. Light sensitive elements B. Passwords
C. Computer keys
28.Where would you find the letters D. Access-control software
QWERTY Ans. Passwords
A. Mouse B. Screen
C. Numeric keypad D. Keyboard 36.is the measurement of things such as
Ans. Keyboard fingerprints and retinal scans used for
security access.
29. Which key on keyboard of a computer A. Biometrics
does not have its name printed on the key B. Bio measurement
A. ESC B. SHIFT C. Computer security
C. F1 D. SPACE D. Smart weapon machinery
Ans. SPACE Ans. Biometrics

30. Personal computers use a number of 37. HTML viruses infect:


chips mounted on a main circuit board. A. Your computer
What is the common name for such B. A Web page in the HTML code
boards C. Both a Web page and the computer
A. Daughter board B. Mother board that is viewing it
C. Father board D. Breadboard D. None of these
Ans. Motherboard Ans. A Webpage in the HTML code

31. A byte represents a group of 38. Standardization os Microsoft programs


A. 10 bits B. 40 bits and the Window operating system has
C. 8 bits D. 22 bits made the spread of viruses:
Ans. 8 bits A. More complicated B. More difficult
C. Easier D. Slower
32. Resolution of laser printer is specified Ans. Easier
in terms of
39. What is the name of an application 46. Ensuring that essential peripheral
program that gathers user information devices are attached and operational is
and sends it to someone through the the __________ Process.
internet A. Configuration B. CMOS
A. A virus B. Spybot C. POST D. ROM
C. Logic bomb D. Security patch Ans. POST
Ans. Spybot
47. To delete an incorrect character in a
40.When a logic bomb is activated by a document, __________ to erase to the right
time-related event, it is known as a: of the insertion point.
A. Time-related bomb sequence A. Press the left mouse key
B. Virus B. Double click the right mouse
C. Time bomb C. Press the BACKSPACE key
D. Trojan horse D. Press the delete key
Ans. Time horse Ans. Press the delete key

41.The thing that eventually terminates a 48. General purpose computer are those
worm virus is a lack of: that can be adopted to countless uses
A. Memory or disk space simply by changing its-
B. Time A. Output device B. Input device
C. CD drive space C. Processor D. Program
D. CD-RW Ans. Program
Ans. Memory or disk space
49. A websites main page is called its-
42.The majority of computer crimes are A. Home page B. Browser page
commited by: C. Bookmark page D. Search page
A. Hackers Ans. Home page
B. Insiders
C. Overseas criminals 50. A disk’s content that is recorded at the
D. Young teenage computer geniuses time of manufacture and cannot be
Ans. Insiders changed or erased by user is-
A. Read-only B. Memory-only
43. The common name for the crime of C. Run-only D. Write- only
stealing passwords is: Ans. Read-only
A. Spooling B. Identity theft
C. Spoofing D. Hacking 51. Measuring unit of capacity of hard
Ans. Spoofing drive is-
A. GHz B. GB
44. In 1999, the Melissa virus was a widely C. Gwatts D. G Newton
publicized: Ans. GB
A. e-mail Virus B. Macro virus
C. Trojan Horse D. Time Bomb 52.Protocols are
Ans. E-mail virus A. Sets of rules B. Sets of maps
45.A program that performs a useful task C. Sets of computers D. Sets of product
while simultaneously allowing destructive Ans. Sets of rules
acts is:
A. Worm B. Trojan Horse 53. Gmail, a free web-based email
C. Virus D. Macro Virus service operated by which company-
Ans. Trojan Horse A. Apple B. Google
C. Microsoft D. Yahoo 61. When a command is not available for
Ans. Google selection until certain other conditions are
met, it is called a(n):
54. Which of the following is not a search A. Dimmed command
engine B. Unavailable command
A. Google B. Yahoo C. Dialog Box
C. Examveda D. Duck Duck Go D. All of these
Ans. Examveda Ans. Dimmed command

55. The term ‘memory’ applies to which 62. Which of the following is an option
one of the following: when shutting down your computer?
A. Logic B. Storage A. Log Off B. Switch User
C. Input Device D. Output Device C. Stand By D. All of these
Ans. Storage Ans. All of these

56. A URL is: 63. ___________is usually recorded and


A. A computer program played, displayed, or accessed by
B. A type of web server information content processing devices,
C. The address of a document or page on which as computerized and electronic
the world wide web devices, but can also be part of live
D. An acronym for unlimited resources for performance.
learning A. Virus B. BIOS software
Ans. The address of a document or page C. Multimedia D. C++
on the world wide web Ans. Multimedia

57. Word BLOG is combination of two 64. _________is a superset of keywords


words- symbols and a system of rules for
A. Web-log B. Wave-log constructing statements by which human
C. Web-blog D. Web-lock can communicate the instruction to be
Ans. Web-log executed by a computer.
A. A computer program
58. The term ’Pentium’ is related to what B. A programming language
A. Mouse B. Hard-disk C. An assemble
C. Microprocessor D. DVD D. None of these
Ans. Microprocessor Ans. A programming language

59.What was the first general-purpose 65. Identify the volatile storage device
electronic computer amongst the following devices?
A. IBM 405 B. Zuse Z3 A. RAM B. Hard disc
C. ENIAC D. CSIRAC C. Magnetic tape D. ROM
Ans. ENIAC Ans. RAM

60.what Does BIOS Stand Foe 66. Computer gathers data, which means
A. Better integrated operating system that they allow user to _________data.
B. Basic input Output System A. Present B. Input
C. Battery integrated Operating Setup C. Output D. Erase
D. Backup Input Output System Ans. Input
Ans. Basic input Output System
67. The smallest unit of information a 73. What does JAR stand for?
computer can understand and process is A. jQuery Application Rapid-
known as________. development
A. Digit B. Byte B. Java Application Resolution
C. Megabyte D. Bit C. Java Archive
Ans. Bit D. jQuery Application Resolution
Ans. Java Archive
68. A _______ is a property of the entire
relation, rather than of the individual 74. Which among the following type of
tuples in which each tuple is unique. computers is also known informally as
A. Rows B. Key number crunchier?
C. attribute D. Fields A. Mini computer B. Super Computer
Ans. Key C. Micro Computer D. Mainframe
computer
69. A __________ is abstract model that Ans. Super Computer
describes, how the data are organised
and represented. 75. Which among the following
A. data model B. instances organisation developed a SAGA-220
C. schemes D. database computer in 2011?
Ans. Data model A. ISRO B. NASA
C. C-DAC D. BARC
70. Which of the following is a storage Ans. ISRO
device that uses rigid permanently
installed magnetic disks to store 76. Which of the following is the activity of
data/information? purchasing items and products from
A. Loss Disk B. Hard Disk different websites on the Internet and
C. Permanent Disk D. Optical Disk using online modes, such as credit cards
Ans. Hard Disk and debit cards to make the payments ?
A. E-banking B. Online shopping
71. A vacuum tube (also called a VT, C. Online reservation D. M-reservation
electron tube, a valve)is a device Ans. Online shopping
sometimes used to amplify electronic
signals vacuum tubes were used in which 77. C was developed by?
generation of computers? A. Ada Byron B. Bill Gates
A. 1st Generation B. 2nd Generation C. Blaise Pascal D. Dennis Ritchie
C. 3rd Generation D. 4th Generation Ans. Dennis Ritchie
Ans. 1st Generation
72. In Computer programming API is set of 78. Which of the following is programming
subroutine definitions protocols and tools language?
definitions, protocols, and tools for A. Lotus B. Pascal
building software and applications. Which C. MS-Excel D. Netscape
among of the following is an application Ans. Pascal
programming interface for the
programming language Java which 79. BIOS stands for:
defines how a client may access a A. Basic Input Output Service
database? B. Basic inner Output System
A. J2EE B. JDK C. Better Input Output Service
C. JAVA SE D. JDBC D. Basic Input Output System
Ans. JDBC Ans. Basic Input Output System
80. Who was the inventor of Tabulating 87. A_________ is a component of
Machine? motherboard which absorbs the heat
A. Charles Babbage B. Blaise Pascal produced by the processor and other
C. Ada Byron D. Heman Hollerith components of a computer?
Ans. Herman Hollerith A. Heat sink B. Northbridge
C. CPU socket D. CMOS Battery
81. To delete the selected item Ans. Heat sink
permanently, press_________.
A. Alt + Delete B. Shift + D 88. Who acts as master software that
C. Shift + Delete D. Alt + D works as a mediator between a computer
Ans. Shift + Delete user and hardware of a computer?
A. Application Program
82. Commands at the top of a screen B. Hardware
such as File-Edit, Format and Tools to C. Software
operate and change things are D. Operating System
incorporated in: Ans. Operating System
A. Menu bar B. Tool bar
C. User friendly D. Word processor 89. __________ is an essential program
Ans. Menu bar which makes it easy to use a computer
for end-user.
83. The simultaneous processing of A. Operating System B. Application
executing two or more programs by C. Utility D. Network
multiple processors is- Ans. Operating System
A. multiprogrammingB. multitasking
C. time-sharing D. multiprocessing 90. Which disk is used to cold boot a PC?
Ans. Multiprocessing A. Setup disk B. System disk
C. Diagnostic disk D. Program disk
84. Help Menu is available at which Ans. System disk
button?
A. End B. Start 91. In second generation, which type of
C. Turnoff D. Restart memory was used to store data?
Ans. Start A. Paper tapes B. Magnetic drum
C. Magnetic core D. Magnetic Tape
85. The_______records the name and Ans. Magnetic Core
exact location of every file on a disk.
A. partition master 92. Which is the blinking symbol on the
B. file allocation table screen that shows where the next
C. disc controller character will appear?
D. boot sector A. Cursor B. Delete key
Ans. File allocation table C. Arrow key D. Return key
Ans. Cursor
86. Which of the following devices used
‘set of beads’ to represent the unit of 93. Which type of device is used by
data? banking websites to enter the password
A. ENIAC B. EDVAC and prevent keystroke legging?
C. Abacus D. MARK-I A. Scanner B. Reader
Ans. Abacus C. Virtual keyboard D. Light Pen
Ans. Virtual keyboard
94. Artificial intelligence is used in which 97. Pressing Windows logo key + E will
of the following generations of open which of the following?
computers? A. My Computer B. My document
A. Second B. Third C. Recycle Bin D. Control Panel
C. Fourth D. Fifth Ans. My Computer
Ans. Fifth
98. An input device that utilizes a light-
95. Which of the following computers sensitive detector to select objects on a
exhibits the features of both analog and display screen is known as________.
the digital computers? A. Optical scanner B. Touch screen
A. Hybrid computer B. Mini computer C. Light Pen D. Mouse
C. Laptop D. Mainframe Ans. Light Pen
computer
Ans. Hybrid computer 99. Which of the following returns
computer memory in large amounts?
96. These printers do not establish any A. Imaging B. Graphics
mechanical contact between the print C. Voice D. All of the above
head and the paper. The examples of Ans. All of the above
such types of printers are
A. line printers, drum printers 100. Which of the following is used by the
B. drum printers and dot-matrix printers tablet PC to write on the screen?
C. line printers and dot-matrix printers A. Finger B. Mouse
D. inkjet and laser printers C. Digitalizer D. Stylus
Ans. Inkjet and laser printers Ans. Stylus

You might also like