Professional Documents
Culture Documents
11. We can only see and can‟t touch of computer parts are called _____
a) hardware b) software
c) both a and b d) none of these
Ans. B
These Questions Prepared by: SONU (GK EDITORIAL)
12. Which is a type of software ?
a) Application software b) System software
c) both a and b d) none of these
Ans. C
49. An ________ is the translation of high level language into machine languge.
Ans. Object Program
114. _____ is part of the laser printer should not be exposed to sunlight.
Ans. PC Drum
116. _________is designed to provide information needed for effective decision making by
managers.
a) mis b) information portel c) chart d) programming language
Ans. a
117. ________refers to the role people play in technology and the development of hardware or
software.
a) Firmware b) Peopleware c) company employee d) group of people
Ans. b
These Questions Prepared by: SONU (GK EDITORIAL)
118. JavaScript is also called _____ script.
Ans. ECMA
119. An error in softwareor hardware is called bug. What is the alternative computer jargon for it?
a) virus b) Glitch c) Bug d) Crash
Ans. b
121. The system unit of a Personal computer typically contains all of the following except:
a) microprocessor b)Disk controller c) Serial interface d) Modem
Ans. d
122. A program that convert instructions into a machine code or lower level form so that they can
be read and executed by a computer is called_________.
a) Compiler b) Assembler c) Language converter d) interpreter
Ans. a
123. ______is a computer program that directly executes instructions written in a programming or
scripting language, without requiring them previously to have been compiled into a machine
language program.
a) Compiler b) Assembler c) Language converter d) interpreter
Ans. d
128. The language translator which translate low level language into machine language is called
Ans. Assembler
129. The term __________device designates equipment that might be added to a computer
system to enhance its functionality.
a) input b) output c) peripheral d) external
Ans. c
133. _________store data or information temporarily and pass it on as directed by the control unit.
a) RAM b) ROM c) Register d) Cache
Ans. c
134. A ________is an additional set of commands that the computer displays after you make a
selection from the main menu.
a) Dialog box b) Command set c) Shortcut menu d) Quick access toolbar
Ans. a
135. Servers are computers that provide resources to other computers connected to a _______.
a) super computer b) mainframe computer c) mini computer d) client computer
Ans. b
136. When creating a computer program, the_________ designs the structure of the program.
a) System Analyst b) Compute programmer c) Computer designer d) Programmer
Ans. a
137. Computer Process data into info. By working exclusively with _________
a) Codes b) Numbers c) Programming language d) Processing language
Ans. b
139. Computer manipulates data in many ways, and this manipulation is called ________.
a) working b) processing c) executing d) booting
Ans. c
140. Where does most data go first with in a computer memory hierarchy?
a) RAM b) ROM c) Hard Disk d) Disk drive
Ans. a
141. The ______ data mining technique derives rules from real- world case examples.
a) memory process b) neural nets c) neuro system d) memory hierarchy
Ans. b
142. The data burned on a ____ cannot be changed, but it can be erased.
a) CD-RW b) USB c) Hard disk d) ROM
Ans. a
147. The technology that stores only the essential instructions on a microprocessor chip and thus
enhances its speed is referred to as_______.
a) Burning b) Loading c) RAID d) RISC
Ans. d
149. Which part of the computer is directly involved in executing the instructions of the computer
program.
a) hard disk b) Processor c) control unit d) memory unit
Ans. b
150. _______file contains permanent data and gets updated during the processing of transactions.
a) Master b) Reboot c) Main d) Boot
Ans. a
153. The common name for the crime of stealing password is ______.
a) Spooling b) Spoofing c) Phishing d) Vishing
Ans. b
156. _______is an Application Program that gathers user information and sends it to Someone
through the internet.
a) Spygot b) Spybot c) Spooler d) Boolean
Ans. b
164. A program that perform a useful task while simultaneously allowing destructive acts is a
______.
a) Trojan software b) Malware c) Utility software d) Verified application
Ans. a
168. Dark avenger, kilo fillip, c-brain, bloody, change mungu and desyare example of ______.
a) virus b) software c) device d) online software
Ans. a
170. _______is a program that converts assembly language into machine code
a) Assembler b) machine learning c) compiler d) interpreter
Ans. a
These Questions Prepared by: SONU (GK EDITORIAL)
171. Notebook computer usually weight less than _________.
a) 2 kg b) 6 Pound c) 1.2 kg d) 3 Kg
Ans. b
173. ________printer print image on area which selectively heating coated thermochromic paper
or thermal paper. The coating turns black in the area where it is heated, producing an image.
a) Daisy wheel b) Canon c) Thermal d) inkjet
Ans. c
181. Part number, description and number of parts ordered are example of.
a) arrangement b) processing c) controlling d) adjustment
Ans. b
195. _______device that can be either in one of the two possible states such as on or off, pulse or
no pulse, 0 or 1. example:- Transistor, Flip flop
a) Input device b) Bistable device c) output device d) flip device
Ans. b
198. _______ is located at the lower right corner of the ribbon in MS Word.
Ans. Dialog box launcher
199. Arch rivals IBM and Apple Computers Inc. Decided to join hands in ______.
Ans. 1991
213. A computer that is old and perhaps not satisfactory is referred to as a______ system.
Ans. Legacy
These Questions Prepared by: SONU (GK EDITORIAL)
214. Large transaction Processing systems in automated organizations use ____ Processing.
Ans. Batch
226. A light sensitive device that converts drawing, printed text or other images into digital form is
a) keyboard b) Plotter c) Scanner d) OMR
Ans. c
16. You can connect a maximum of _____ peripheral devices on a single USB port.
a) 100 b) infinite c) 120 d) 127
17. The clock rate of speed of a CPU‟s internal parts is measured in _____.
a) MB b) Rate c) Heartz d)decimal
21. Human beings are reffred to as Homosaphiens, which device is calledsillico Sapiens?
a) Computer b) IC c) Silicon chip d) Mobile
23. _________is a computer program that translate and executes program at run time line by line.
a) Compiler b) Assembler c) Language converter d) interpreter
24. Unwanted repetitious messages, such as unsolicited bulk email is known as ________.
a) spam b) Glitch c) Bug d) Crash
25. Data becomes ________ when it is presented in a format that people can understand.
a) information b) knowledge c) data source d) hard copy
26. ______can be treated as the waiting room for the computers processor.
a) RAM b) ROM c) Hard disk d) USB
27. The Gulf between those who have ready access to computers and the internet, and those who
do not is called.
a)Digital divide b) Digital distance c) Digital device d) Digital gulf