You are on page 1of 24

Computer Questions for UIIC Assistant Exam

Q1. Which of the following techniques can be used to store a Q7. Which organization developed MS DOS?
large number of files in a small amount of storage space? (a) Apple
(a) File adjustment (b) Microsoft
(b) File copying (c) Google
(c) File compatibility (d) IBM
(d) File compression (e) None of the above
(e) None of the above
Q8. Which among the following term is used for those
Q2. Which among the following is software application hardware devices that are not part of the main computer
commonly used to prepare a presentation/slide show?
system and are often added later to the system?
(a) Adobe
(a) clip art
(b) Power Point
(b) highlight
(c) Outlook Express
(c) execute
(d) Internet Explorer
(d) peripheral
(e) None of the above
(e) None of the above
Q3. Which among the following is a language directly
understood by CPU? Q9. What is the technology used to read pencil or pen marks
(a) Machine on a multiple-choice answer sheet called?
(b) C (a) OMR
(c) C++ (b) MICR
(d) Java (c) OCR
(e) None of the above (d) CPU
(e) None of the above
Q4. Which of the following cable technologies covert electrical
signals into optical signals? Q10.What are different views to display a table in MS Access?
(a) Coaxial (a) Pivot Table & Pivot Chart View
(b) STP (b) Design View
(c) UTP (c) Datasheet View
(d) Fiber optic (d) All of the above
(e) None of the above (e) None of the above

Q5. What is the most popular online payment method around


the globe?
(a) Debit/Credit Cards
(b) Online Transfer
(c) Cash in hand
(d) Digital/Mobile Wallets
(e) None of the above

Q6. What does RDBMS stand for?


(a) Relational Database Management System
(b) Relational Data Management System
(c) Relational Database Management Software
(d) Relational Data Management Software
(e) None of the above

1 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q11. The CPU comprises of Control Memory, and ………………… Q18. Which one of the following words is the odd one out?
Units? (a) UNIX
(a) Microprocessor (b) MS-DOS
(b) Arithmetic/Logic (c) WINDOWS
(c) Output (d) MS ACCESS
(d) ROM (e) None of the above
(e) None of the above
Q19. Which of the following is the most important/powerful
Q12. Moves the cursor one space to the right or puts spaces in computer in a typical network?
between words ………………….? (a) Desktop
(a) Control key (b) Network client
(b) Space bar (c) Network server
(c) Printer (d) Network station
(d) Mouse (e) None of the above
(e) None of the above
Q20. What is an alternate name for the completely
interconnected network topology?
Q13. Which of the following memory chip is faster?
(a) Mesh
(a) Registers
(b) Star
(b)Cache Memory
(c) Tree
(c) RAM
(d) Ring
(d) Flash Memory
(e) None of the above
(e) ROM
Q21. A device that connect to a network without the use of
Q14. Which of the following is a graphic presentation of the cables is said to be ……………….?
sequence of steps needed to solve a programming problem? (a) distributed
(a) program flowchart (b) wireless
(b) step chart (c) centralized
(c) rule diagram (d) open source
(d) program graph (e) None of the above
(e) None of the above
Q22. What type of resource is most likely to be a shared
Q15. Computer programs are written in a high-level common resource in a computer network?
programming language; however, the human readable (a)Keyboards
version of a program is called? (b) Speakers
(a) Cache (c) Floppy disk drives
(b) Instruction set (d) Printers
(c) Source code (e) None of the above
(d) Word size
(e) None of the above Q23. ………….is a Windows utility program that locates and
eliminates unnecessary fragments and rearranges files and
Q16. Computer language COBOL is appropriate for? unused disk space to optimize operations?
(a) Commercial purpose (a) Backup
(b) Graphic purpose (b) Disk Cleanup
(c) Scientific purpose (c) Disk Defragmenter
(d) All of the Above (d) Restore
(e) None of the above (e) None of the above

Q17. The function of an assembler is …………….? Q24.A computer hacker is?


(a) To convert basic language into machine language (a) A person who maintains computer security
(b) To convert high level language into machine language (b) A person who violates computer security with malicious
(c) To convert assemble language into machine language intention for personal gain
(d) To convert assemble language into high level language (c) A person responsible for safe computer operation
(e) None of the above (d) A person who repairs computer
(e) None of the above

2 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q25. If your computer keeps rebooting itself, then it is likely Q32. Inheritance is the ability of an object to pass on its
that? characteristics to its ____________?
(a) It has a virus (a) subclasses
(b) It does not have enough memory (b) off-spring
(c) There is no printer (c) super classes
(d) There has been a power surge (d) parents
(e) None of the above
(e) None of the above
Q26. Which of the following can be used to select the entire
Q33. What does the computer Motherboard contain that
document?
(a) CTRL + A house setting configurations and is powered by the onboard
(b) ALT + F5 battery?
(c) SHIFT + A (a) CMOS
(d) CTRL + K (b) RAM
(e) None of the above (c) DRAM
(d) CPU
Q27....... shows all the websites and pages that are visited over (e) None of the above
a period of time?
(a) Home page Q34. System software is the set of programs that enables your
(b) Toolbar computer’s hardware devices and __________ software to work
(c) Task bar together?
(d) History
(a) Management
(e) None of the above
(b) Processing
(c) Utility
Q28. What does the ".com" in the URL: www.abcd.com
indicate? (d) Application
(a) Commercial (e) None of the above
(b) Corporate
(c) Co-operative Q35. The default and maximum size of text filed in Access is
(d) Conceal ______?
(e) None of the above (a) 266 characters & 6400 characters
(b) 288 characters & 6880 characters
Q29. The taskbar is located ………...? (c) 299 characters & 6499 characters
(a) on the Start menu (d) 50 and 255 characters
(b) at the bottom of the screen (e) None of the above
(c) on the Quick Launch toolbar
(d) at the top of the screen
Q36. Which among the following term is used for:
(e) None of the above
Unauthorized copying of software to be used for personal gain
Q30. A …………… is an icon on the desktop that provides a user instead of personal backups?
with immediate access to a program or file? (a) program thievery
(a) Kernel (b) data snatching
(b) Buffer (c) software piracy
(c) Shortcut (d) program looting
(d) Spooler (e) None of the above
(e) None of the above
Q37. Type _______to start a numbered list, and then press
Q31. Which bar is usually located below the Title Bar that SPACEBAR or the TAB key?
provides categorized options? (a) 1#
(a) Menu Bar
(b) 1$
(c) Toolbar
(c) 1.
(b) Status bar
(d) Scroll Bar (d) 1*
(e) None of the above (e) None of the above

3 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q38. A ___________ is an object embedded in a web page or Q45. ______ users a standard called IEEE802.6?
email, which unobtrusively (usually invisibly) allows (a) LAN
checking that a user has accessed the content? (b) WAN
(a) email (c) MAN
(b) virus (d) Internet
(c) web beacon (e) None of the above
(d) spam
(e) None of the above Q46. Which of the following must be contained in a URL?
(a) A protocol identifier
Q39. In which process, each program is split into fixed size (b) The letters, www
program components called pages? (c) The unique registered domain name
(a) Multitasking (d) A protocol identifier, www and the unique registered
(b) Logging on domain name
(c) Paging (e) None of the above
(d) Scheduling
(e) None of the above Q47. The process of a computer receiving information from a
server on the internet is known as _______?
Q40. How many rows are there in latest version of MS Excel? (a) Browsing
(a) 65536 (b) Download
(b) 16,384 (c) Upload
(c) 1,048,576 (d) All of the above
(e) None of the above
(d) 1,050,000
(e) None of the above
Q48. What converts high-level languages into machine
language?
Q41. Which among the following is true about HTML and XML
(a) Complier
markup languages?
(b) Assembler
(a) They are specially development for the web
(c) Operating System
(b) They are based on SGML
(d) CPU
(c) They are versions of SGML
(e) None of the above
(d) They are independent of SGML
(e) None of the above
Q49. The altering of data so that it is not usable unless the
changes are undone is _______?
Q42. Which among the following layer is the layer closest to (a) Biometrics
transmission medium? (b) Compression
(a) Transport Layer (c) Encryption
(b) Network Layer (d) Ergonomics
(c) Data link Layer (e) None of the above
(d) Physical Layer
(e) None of the above Q50. Only OS independent complier is?
(a) Turbo C complier
Q43. To create a table in MS-Access? (b) Pascal complier
(a) Table can be created using Table Templates (c) Java complier
(b) You should allow at least one Primary key in a table (d) Visual basic complier
(c) Database should be created before creating a table (e) None of the above
(d) All of the above
(e) None of the above Q51. The ability to recover and read deleted or damaged files
from a criminal’s computer is an example of a law
Q44. IP addresses are converted to ______________? enforcement specialty called:
(a) A binary string (a) Robotics
(b) Alphanumeric string (b) Simulation
(c) A hierarchy of domain names (c) Computer forensics
(d) A decimal string (d) Animation
(e) None of the above (e) None of the above

4 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q52. Word processing, spreadsheet, and photo-editing are Q59. Zip is a -----file.
examples of which type of software? (a) Executable File
(a) Application software (b) Compressed File
(b) System software (c) System File
(c) Operating system software (d) Processing File
(d) Platform software
(e) None of the above
(e) None of the above

Q53. The difference between people with access to computers Q60.What is the meaning of MICR?
and the Internet and those without this access is known as (a) Magnetic Ink Character Recognition
the: (b) Magnetic Intelligence Character Recognition
(a) digital divide (c) Magnetic Information Cable Recognition
(b) Internet divide (d) Magnetic Insurance Cases Recognition
(c) Web divide (e) None of the above
(d) broadband divide
(e) None of the above Q61. Which of the following is an intersection of a row and
column in a spreadsheet?
Q54. Which of the following scrambles a message by applying (a) Formula
a secret code?
(b) Worksheet
(a) Encryption
(c) Address
(b) Audits
(c) Firewalls (d) Cell
(d) UPS (e) None of the above
(e) None of the above
Q62. Which of the following is a set of rules computers use to
Q55. Changing an existing document is called _____ the talk to each other?
document. (a) Syntax
(a) Creating (b) HTML
(b) Deleting (c) DOS command
(c) Editing (d) Protocol
(d) Adjusting
(e) None of the above
(e) None of the above

Q56. Which of the following software allows the user to speak Q63. Which of the following topology have a central controller
into the computer rather than type in text? or hub?
(a) CHAT (a) Star
(b) Message (b) Mesh
(c) Speech recognition (c) Ring
(d) All of the above (d) Bus
(e) None of the above (e) None of the above

Q57. Which are specially designed computer chips that reside Q64. Which tracking program records every keystroke you
inside other devices, such as your car or your electronic make on the computer?
thermostat?
(a) ITrack/ULead
(a) Servers
(b) Key logging
(b) Embedded computers
(c) Robotic computers (c) eFollow
(d) Mainframes (d) Stalking software
(e) None of the above (e) None of the above

Q58. ____________ are computers that support hundreds or Q65. What database key links one table to another?
thousands of users simultaneously. (a) Primary key
(a) Mainframe computer (b) Secondary key
(b) Super computer (c) Foreign key
(c) Mini computer (d) Relational key
(d) Micro computer
(e) None of the above
(e) None of the above

5 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q66. To place your image into a live video conference, a Q73. In MS-Word, _____is a series of commands and
__________ is usually used. instructions that you group together as a single command to
(a) Webcam accomplish a task automatically.
(b) Video camera (a) Macro
(c) Digital camera (b) Template
(d) Scanner (c) Structure
(e) None of the above (d) Balloons
(e) None of the above
Q67. What are general purpose computers used for?
(a) Accounting Q74. Compiler in a computer system is:
(b) Creating a small database (a) Program
(c) Performs calculation (b) System software
(d) All of the above (c) Application software
(e) None of the above (d) Process
(e) None of the above
Q68. Palmtop computer is also known as _______?
(a) Personal computer
Q75. Which of the following key are used to open file menu of
(b) Notebook computer
current program?
(c) Tablet PC
(a) Ctrl+F
(d) Handheld computer
(b) Shift+F
(e) None of the above
(c) Alt+F
(d) Ctrl+Alt+F
Q69. What is the sequence of events that occurs in the
(e) None of the above
computer when it is interpreting and executing an instruction
known as?
Q76. Ctrl+K are used to_______.
(a) Execution cycle
(b) Instruction cycle (a) Insert a hyperlink
(c) Working cycle (b) Print a document
(d) Machine cycle (c) Close the current active program
(e) None of the above (d) Goes to beginning of current line.
(e) None of the above
Q70. C++, Java and PHP are _______ programming languages.
(a) Procedure-oriented Q77.A proxy server is used as the computer?
(b) Object oriented (a) With external access
(c) Font oriented (b) Acting as a backup
(d) Visual Basic (c) Performing file handling
(e) None of the above (d) Access user permissions
(e) None of the above
Q71. Generally, web address is located by _________.
(a) Hyperlink
(b) HTTP
(c) URL
(d) Locator
(e) None of the above

Q72. Functions of control unit are:


(a) It is responsible for controlling the transfer of data and
instructions among other units of a computer
(b) It manages and coordinates all the units of the computer
(c) It obtains the instructions from the memory, interprets
them, and directs the operation of the computer
(d) All of the above
(e) None of the above

6 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q78. In second generation, which type of primary memory (a) Table
was used to store data? (b) Symbol
(a) Paper tapes (c) WordArt
(b) IC (d) Image
(c) Magnetic core (e) None of the above
(d) Magnetic tape
(e) None of the above Q85. What is a named area on a disk that is used to store
related subfolders and files called?
Q79. Which is of the following terms is used for unsolicited e- (a) Desktop
mail? (b) Folder
(a) News Group (c) Menu
(b) Usenet (d) Safari
(c) Backbone (e) None of the above
(d) Spam
(e) None of the above Q86. __________ operation is not performed by a general
computer.
Q80. Web pages are created by using which among the (a) Processing
following? (b) Controlling
(a) SMTP (c) Sorting
(b) HTML (d) Thoughtful
(c) Usenet (e) None of the above
(d) Internet
(e) None of the above Q87. Bridge is a _________ device.
(a) layer 4
Q81. Which of the following terms is associated with (b) layer 2
network? (c) layer 5
(a) MS Excel (d) layer 7
(b) Mouse (e) None of the above
(c) Word
(d) Connectivity Q88. A high quality CAD system uses which of the following
(e) None of the above for printing drawing and graphs.
(a) Dot matrix printer
Q82. _____ is a Windows utility program that located and (b) Digital plotter
eliminates unnecessary fragments and rearranges filed and (c) Line printer
unused to disk space to optimize operations. (d) All of the above
(a) Backup (e) None of the above
(b) Disk cleanup
(c) Disk defragmenter Q89. The CPU, also called the _____ when talking about PCs
(d) Restore does the vast majority of the processing for a computer.
(e) None of the above (a) Macro-processor
(b) RAM
Q83. If a word is typed that is not in MS Word's dictionary, a (c) Memory System
wavy underline appears below the word. What is the color of (d) Microprocessor
the underline that appears in this situation? (e) None of the above
(a) Blue
(b) Red Q90.The original ASCII code used …………… bits of each byte,
(c) Green reserving that last bit for error checking
(d) Black (a) 5
(e) None of the above (b) 6
(c) 7
Q84. What is decorative text called, that you can add to a (d) 8
document? (e) None of the above

7 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q91. The term megahertz or MHz means___________. Q98. Which type of operation in the given options can be
(a) millions of cycles per minute performed a CD-RW?
(b) thousands of cycles per second (a) read and write information
(c) billions of cycles per second (b) read, write and rewrite information
(d) millions of cycles per second (c) only write information
(e) None of the above (d) only read information
(e) None of the above
Q92. A computer language that consists of binary digits is
called _________. Q99. Which of the following is a folder that retains copies of
(a) high-level language messages have started but are not yet send to the recipient?
(b) machine language (a) Inbox
(c) hypertext language (b) Outbox
(d) low-level language (c) CC
(e) None of the above (d) Drafts
(e) None of the above
Q93. Stored data in which of the following remains intact even
after the computer is turned off? Q100. In first generation of computers, they used ______.
(a) RAM (a) batch processing
(b) Motherboard (b) multithreading
(c) Secondary Storage Device (c) multiprogramming
(d) Primary Storage Device (d) networking
(e) None of the above
(e) None of the above

Q101. Which of the following is any malicious computer


Q94. To move to the bottom of a document, press______.
program which is used to hack into a computer by misleading
(a) Insert key
users of its true intent?
(b) Home key
(a) Worm
(c) Ctrl key + End key
(b) Spyware
(d) End key
(c) Trojan horse
(e) None of the above
(d) Keylogger
(e) None of the above
Q95. A computer checks the ________ of usernames and
passwords for a match before granting access.
Q102. What is periodically adding, changing and deleting file
(a) website records called?
(b) network (a) renewing
(c) backup file (b) upgrading
(d) database (c) restructuring
(e) None of the above (d) updating
(e) None of the above
Q96. Which part of the computer is used for calculating and
comparing? Q103. Which of the following is the fastest type of computer?
(a) ALU (a) Laptop
(b) Control unit (b) Notebook
(c) Disk unit (c) Personal computer
(d) Modem (d) Supercomputer
(e) None of the above (e) None of the above

Q97. Through ______ an administrator or another user can Q104. Which of the following file format can be added to a
access someone else’s computer remotely PowerPoint show?
(a) Administrator (a) .jpg
(b) Web server (b) .gif
(c) Web application (c) .wav
(d) Telnet (d) All of these
(e) None of the above (e) None of the above

8 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q105. ______ is a collection of circuitry functions that together Q112. Which of the following is the second layer of OSI
makes an important part of a computer system. Model?
(a) The platform (a) Physical Layer
(b) Application software (b) Datalink Layer
(c) Operating system (c) Transport Layer
(d) The motherboard (d) Network Layer
(e) None of the above (e) None of the above

Q113. Which of the following allows to make copies of the


Q106. Computer mouse is also known as __________.
database periodically to help in the cases of crashes and
(a) Pointing Device
disaster?
(b) Scanning Device (a) Recovery Utility
(c) Sensing Device (b) Monitoring Utility
(d) Moving Device (c) Backup Utility
(e) None of the above (d) Data loading Utility
(e) None of the above
Q107. When a logic bomb is activated by a time-related event,
it is known as a ______ Q114. Which of the following shortcut key is used to move the
(a) Time-related bomb sequence. beginning of a line?
(b) Virus. (a) End
(c) Time bomb. (b) Insert
(d) Trojan horse (c) Home
(e) None of the above (d) Enter
(e) None of the above
Q108. What type of virus uses computer hosts to reproduce
Q115. Which of the following shortcut keys is used to restart
itself?
the computer?
(a) Time bomb
(a) Ctrl+Alt+Esc
(b) Worm
(b) Shift+Alt+Del
(c) Melissa virus
(c) Ctrl+Alt+Del
(d) Macro virus (d) Ctrl+Shift+Esc
(e) None of the above (e) None of the above

Q109. When a computer is switched on, the booting process Q116. Which one of the following allows a user at one site to
performs ______ establish a connection to another site and then pass
(a) Integrity Test keystrokes from local host to remote host?
(b) Power-On Self-Test (a) HTTP
(c) Correct Functioning Test (b) FTP
(d) Reliability Test (c) Telnet
(e) None of the above (d) POP3
(e) None of the above
Q110. A compact disc is a data storage system of type_____.
(a) magnetic Q117. Formatting a disk result in all the data being...........?
(a) Saved to the disk
(b) optical
(b) Copied from the disk
(c) electrical
(c) Deleted from the disk
(d) electromechanical
(d) All of the above
(e) None of the above
(e) None of the above

Q111. Which of the following is not associated with Q118. Which bus controls the sequencing of read/write
hardware? operations?
(a) CPU (a) Control bus
(b) Monitor (b) Address bus
(c) Keyboard (c) Data bus
(d) COBOL (d) All of the above
(e) None of the above (e) None of the above

9 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q119. _____terminals (formerly known as cash registers) are Q126. Surgeons can perform delicate operations by
often connected to complex inventory and sales computer manipulating devices through computers instead of manually.
systems. This technology is known as:
(a) Point-of-sale (POS) (a) robotics
(b) Data (b) computer forensics
(c) Sales (c) simulation
(d) Query (d) forecasting
(e) None of the above (e) None of the above

Q120.Which generation of computer developed using Q127. When we run a program in HTML coding _____ is used
integrated circuits? as backend and ____ works as front-end.
(a) Second generation (a) Notepad - Internet-Explorer
(b) Notepad - Msn-messenger
(b) Fifth generation
(c) MS-Word - Internet Explorer
(c) Third generation
(d) Both (a) and (b)
(d) All of the above
(e) None of the above
(e) None of the above
Q128. In a relational database, this is a data structure that
Q121. Which computers are used in the weather forecasting organizes the information about a single topic into rows and
industry? columns.
(a) Super computers (a) Block
(b) Notebook computers (b) Record
(c) Jon Von Neumann computers (c) Tuple
(d) All of the above (d) Table
(e) None of the above (e) None of the above

Q122. NIC Stands for ________. Q129. Which of the following requires computer memory in
(a) Network Interface Card large amounts?
(b) Network Internal Card (a) Imaging
(c) Network Internet Client (b) Graphics
(d) Network Input Card (c) Voice
(e) None of the above (d) All of above
(e) None of the above
Q123. _____is the science that attempts to produce machines
that display the same type of intelligence that humans do. Q130. Flash drives are plugged into a /an:
(a) Micro science (a) Expansion slot
(b) Nanotechnology (b) Serial port
(c) Simulation (c) USB port
(d) Artificial intelligence (AI) (d) Drive bay
(e) None of the above (e) None of the above

Q131. What term is used to identify people coming together


Q124. What database key uniquely identifies a record within
from various geographical locations to complete some tasks
a table?
online?
(a) Primary key
(a) I-team
(b) Foreign key
(b) Virtual team
(c) Secondary key
(c) Online workgroup
(d) Relational key (d) Distributed team
(e) None of the above (e) None of the above

Q125. Network components are connected to the same cable Q132. …………… represents raw facts, whereas ………………. is
in the _____ topology. data made meaningful.
(a) Star (a) Information, reporting
(b) Ring (b) Data, information
(c) Bus (c) Information, bits
(d) Mesh (d) Records, bytes
(e) None of the above (e) None of the above

10 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q133. First super computer developed in India is— Q140. ________ is a technique that is used to send more than
(a) Param one call over a single line.
(b) Aryabhatt (a) Multiplexing
(c) Buddha (b) Infrared transmission
(d) Ram (c) Streaming
(e) None of the above (d) Digital transmission
(e) None of the above
Q134. Which type of computer could be found in a digital
watch? Q141. SMTP, FTP and DNS are applications/protocols of the
(a) Mainframe _____ layer?
(b) Supercomputer (a) Data link
(c) Embedded computer
(b) Network
(d) Notebook computer
(c) Transport
(e) None of the above
(d) Application
(e) None of the above
Q135. Which of the following is the combination of numbers,
alphabets along with username used to get access to a user
account? Q142. Two or more computers connected to each other for
(a) Password sharing information form a ________?
(b) Username (a) Router
(c) Title name (b) Server
(d) Host-id (c) Network
(e) None of the above (d) Tunnel
(e) None of the above
Q136. In a word processor application, the user might want
to cut text from one part of a document and paste it in another Q143. What is the sequence of events that occurs in the
part of the document or somewhere else. When the user computer when it is interpreting and executing an instruction
copies the selected content, it's stored in the________. known as?
(a) Cache Memory (a) Execution cycle
(b) RAM (b) Instruction cycle
(c) Virtual Memory (c) Working cycle
(d) Clipboard (d) Machine cycle
(e) None of the above (e) None of the above

Q137. Which software allows a user to perform calculations Q144. What is the base or radix of the Hexadecimal number
on row and columns of data? system?
(a) An electronic spreadsheet (a) 2
(b) A Workbook
(b) 8
(c) An Analyzer
(c) 10
(d) A calculator
(d) 16
(e) None of the above
(e) None of the above
Q138. What term refers to the small web page that opens
automatically with an ad when you visit some web sites? Q145. Which of the following is a term for the process of
(a) Marketing page trading goods over the Internet?
(b) I-ad (a) e-selling-n-buying
(c) Affiliate ad (b) e-trading
(d) Pop-up ad (c) e-finance
(e) None of the above (d) e-commerce
(e) None of the above
Q139. _______ is a security process that relies on the unique
biological characteristics of an individual to verify. Q146. What does a Bug mean?
(a) CAPTCHA (a) Logical error in a program
(b) AADHAR (b) Syntax error in a program
(c) PAN CARD (c) Run time error
(d) BIOMETRICS (d) Both (a) and (b)
(e) None of the above (e) None of the above

11 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q147. Codes consisting of varying widths and spacing of Q154. Example of telecommunication device is a ________?
parallel lines, which may be optically read, is known as _____? (a) modem
(a) mnemonic (b) printer
(b) Bar code (c) keyboard
(c) Decoder (d) scanner
(d) All of the above (e) None of the above
(e) None of the above
Q155. What is the maximum zoom percentage in Microsoft
Q148. Which of the following is a server that saves Web pages PowerPoint?
that users have requested so that successive requests for (a) 100%
these pages do not require the use of the Internet? (b) 200%
(a) dedicated server (c) 400%
(b) virtual server
(d) 500%
(c) Off-Line Services
(e) None of the above
(d) cache server
(e) None of the above
Q156. Which of the following is/are file extension(s) in DOS?
(a) EXE
Q149. Which of the following is often used in conjunction
(b) BAT
with phishing in an attempt to steal your information?
(a) Zombie (c) COM
(b) Computer Worm (d) All of the above
(c) Spoofing (e) None of the above
(d) Rootkit
(e) None of the above Q157. ______ is a set of keywords, symbols and a system of
rules for constructing statements by which human can
Q150.which of the following device translates sound communicate the instructions to be executed by a computer?
vibrations in the air into electronic signals? (a) A computer programs
(a) Hub (b) A programming language
(b) Switch (c) An assemble
(c) Microphone (d) Syntax
(d) All of the above (e) None of the above
(e) None of the above
Q158. The first electronic digital computer contained
Q151. Internet Explorer and Safari are examples of ………...? _________?
(a) Web pages (a) Electronic valves
(b) Web browsers (b) Neural Networks
(c) Web servers (c) Fuzzy Logic
(d) Web sites (d) Semiconductor memory
(e) None of the above (e) None of the above

Q152. Arranging of data in a logical sequence is known as?


(a) Classifying
(b) Searching
(c) Sorting
(d) Reproducing
(e) None of the above

Q153. Which bar is usually located below the Title Bar that
provides categorized options?
(a) Menu Bar
(c) Toolbar
(b) Status bar
(d) Scroll Bar
(e) None of the above

12 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q159. The software that is used to create text-based Q166. Which part of the hardware compensates the
documents is referred as? difference between the speeds of CPU and peripherals?
(a) DBMS (a) Scanner
(b) Suits (b) Printer
(c) Spreadsheets (c) Video card
(d) Word processor (d) Motherboard
(e) None of the above (e) None of the above

Q160.Which of the following is web browser? Q167. Which of the following fields of an e-mail hides the
(a) Netscape identity of the recipients?
(b) Chrome (a) To
(c) Firefox (b) From
(d) All of the above (c) Cc
(e) None of the above (d) Bcc
(e) None of the above
Q161. FORTRAN is a programming language. It is more
suitable for _______? Q168.A commonly used graphic format for the Web is?
(a) business applications (a) GIF
(b) marketing applications (b) BMP
(c) scientific applications (c) TXT
(d) statically calculative applications (d) LMP
(e) None of the above (e) None of the above

Q162. ________device is any hardware component that allows Q169. What is the technical term for the devices connected in
you to enter data and instructions into a computer? a network?
(a) Interaction (a) Hubs
(b) Nodes
(b) Input
(c) Sections
(c) Communication
(d) Attachment units
(d) Output
(e) None of the above
(e) None of the above
Q170. MS Word is a text or document editing application
Q163. What types of devices are CDs are DVDs?
program that comes in the package of MS Office Suite. Which
(a) Input
among the given options is not related with MS Word?
(b) Output
(a) Page Layout
(c) Software
(b) Antivirus
(d) Optical Storage
(c) Mailings
(e) None of the above
(d) Format Painter
(e) None of the above
Q164. The speed of clock frequency of a microprocessor is
measured in ____________?
Q171. What resides on the motherboard and connects the
(a) hertz CPU to other components on the motherboard?
(b) baud rate (a) Input unit
(c) CPS (b) System bus
(d) bits (c) ALU
(e) None of the above (d) Primary memory
(e) None of the above
Q165. To start a computers system, which of the following is
not required necessarily? Q172. Which of the following is Open-Source Software?
(a) RAM (a) Windows
(b) Flash Drive (b) Linux
(c) Accumulator (c) IOS
(d) Motherboard (d) Adobe Photoshop
(e) None of the above (e) None of the above

13 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q173. Which is the full form of VoIP? Q180. Which among the given options is a graphical
(a) Voice of Internet Power representation of an application?
(b) Voice over Internet Protocol (a) Windows Explorer
(c) Voice on Internet Protocol (b) Task Bar
(d) Very optimized Internet Protocol (c) Icon
(e) None of the above (d) Microsoft Explorer
(e) None of the above
Q174. An act of sending e-mails or creating web pages that
are designed to collect an individual's online bank, credit card, Q181. Which of the following must be contained in a URL?
or other login information? (a) A protocol-identifier
(a) Phishing (b) The letters, www
(b) Spam (c) The unique registered domain name
(c) Hacking (d) A protocol-identifier, www, and the unique registered
(d) Cracking domain name
(e) None of the above (e) None of the above

Q175. ____________ is the process that transforms data such as Q182. Which number system is used by computers to store
voice, text, graphics, audio, and video into digital form. data and perform calculations?
(a) Wireless data transmission (a) Binary
(b) Digitization (b) Octal
(c) Convergence (c) Decimal
(d) Analog transfer (d) Hexadecimal
(e) None of the above (e) None of the above

Q176. Which of the following is the simplest way of applying Q183. Which of the following kind of devices allows the user
changes to the entire slide? to add components and capabilities to a computer system?
(a) Slide Sorter (a) System boards
(b) Slide Master (b) Storage devices
(C) Handout Master (c) Input devices
(d) Reading View (d) Expansion slots
(e) None of the above (e) None of the above

Q177. What is the full form of SIM? Q184. Which shortcut key is used to create a new folder in MS
(a) Station Identity Module Windows?
(b) System Identity Module (a) Right Click Button+W+Enter
(c) Subscriber Identity Module (b) Ctrl+W+Shift
(d) Subscriber Trunk Dialing (c) Right Click Button+F+Enter
(e) None of the above (d) Ctrl+Shift+N
(e) None of the above
Q178. Generally, to copy data from remote server/device to a
local computer/device is called __________. Q185. What is a half byte also called as?
(a) Downloading (a) Nibble
(b) Uploading (b) Bit
(c) E-mailing (c) Bits
(d) Editing (d) Data
(e) None of the above (e) None of the above

Q179. What are programs such as Internet Explorer that Q186. The point at which the flow of text in a document
serve as navigable windows into the Web called as? moves to the top of a new page–
(a) Hypertext (a) Page insert
(b) Web browsers (b) Page break
(c) Internet (c) Page format
(d) Networks (d) All of the above
(e) None of the above (e) None of the above

14 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q187. Which of the following is not a valid memory unit? Q194. What is a small arrow or blinking symbol i.e., a movable
(a) ILB indicator on a desktop is called?
(b) KB (a) Logo
(c) YB (b) Mouse
(c) Cursor
(d) PB
(d) Palm
(e) None of the above
(e) None of the above

Q188. What is another name for additive manufacturing? Q195. Which among the following is not a legitimate type of
(a) 3-D printing computer virus?
(b) 2-D printing (a) Macro Virus
(c) CPU Assembly (b) File infector Virus
(d) Memory management (c) Resident Virus
(d) Hangout Virus
(e) None of the above
Q189. What is ‘Trend Micro’?
(a) Virus program
Q196. What does MODEM stand for?
(b) Anti-virus software (a) Modulator-Demodulator
(c) Just a program (b) Multiplexing Other Device Encoding Message
(d) All of these (c) Main of Domain End Machine
(e) None of the above (d) Multiplexing On Demultiplexed Embedded Machine
(e) None of the above
Q190.Main memory works in conjunction with _________.
(a) Special function cards Q197. The first computers were programmed using which of
the following language?
(b) RAM
(a) Assembly language
(c) CPU
(b) Machine language
(d) Intel (c) Source code
(e) None of the above (d) Object code
(e) None of the above
Q191.A bit refers to ____________.
(a) A farm of storage Q198. Which of the following is not an example of Utility
(b) A value equal to a kilobyte Software?
(c) A value equal to a megabyte (a) Backup software
(b) Antivirus software
(d) The smallest unit of digital information
(c) Disk tools
(e) None of the above
(d) Media Players
(e) None of the above
Q192. Which of the following is a requisite to ‘boot’, the
system? Q199. Copying a process from memory to disk to allow space
(a) Complier for other processes is called __________.
(b) Loader (a) Swapping
(c) Operating system (b) Deadlock
(d) Assembler (c) Demand Paging
(d) Page Fault
(e) None of the above
(e) None of the above

Q193. Which of the following is a binary number? Q200.Which of the following menu types is also called a drop-
(a) 10101011 down menu?
(b) 5600 (a) Fly-list
(c) 2020 (b) Cascading
(d) 021 (c) Pop-down
(e) None of the above (d) Pull-down
(e) None of the above

15 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


Solutions
S1. Ans.(d) S12. Ans.(b)
Sol. File compression is the technique used to store the large Sol. Spacebar key is used to puts space in between two words.
file in a small storage space. It compresses to content of the
file in such a way that there is no harm done on the file content S13. Ans.(a)
and quality. Sol. Registers are the fastest memory chips, located directly in
the CPU, providing nearly instantaneous data access. They are
S2. Ans.(b) used for high-speed data storage and manipulation during
Sol. PowerPoint is used to make presentations/slide shows. CPU operations.

S3. Ans.(a) S14. Ans.(a)


Sol. CPU doesn’t understand the C++ language (or any high- Sol. Program flowchart is a diagram which uses a set of
level programming language). All the High-level language standard graphic symbols to represent the sequence of coded
statements must be translated into machine code before they instructions fed into a computer, enabling it to perform
can be executed. specified logical and arithmetical operations.

S4. Ans.(d) S15. Ans.(c)


Sol. Fiber optic cables transmit signals in the form of optical Sol. Source code is the fundamental component of a computer
signals over a narrow glass fiber stand. program that is created by a programmer. It can be read and
easily understood by a human being.
S5. Ans.(d)
Sol. Digital/Mobile Wallets (PayPal, Apple Pay etc.) is the S16. Ans.(a)
most popular online payment method around the globe. Sol. COBOL (Common Business Oriented Language) is a
programming language that reads like regular English and is
S6. Ans.(a) often used for business and administrative purposes.
Sol. RDBMS stands for Relational Database Management
System. S17. Ans.(c)
Sol. An assembler is a type of computer program that
S7. Ans.(b) interprets software programs written in assembly language
Sol. MS DOS stands for Microsoft Disk Operating System it is into machine language, code and instructions that can be
a discontinued operating system for x86-based personal executed by a computer.
computers mostly developed by Microsoft.
S18. Ans.(d)
S8. Ans.(d) Sol. all of these are type of operating system, except MS
Sol. A peripheral device is generally defined as any auxiliary Access. It is a database.
device such as a computer mouse or keyboard that connects
to and works with the computer in some way. S19. Ans.(c)
Sol. A network server is a computer system, which is used as
S9. Ans.(a) the central repository of data and various programs that are
Sol. Optical Mark Recognition What is the technology used to shared by users in a network.
read pencil or pen marks on a multiple-choice answer sheet.
S20. Ans.(a)
S10. Ans.(d) Sol. A mesh topology is a network topology in which all the
Sol. In Microsoft Access, you can view a table in various ways, network nodes are individually connected to most of the other
including Pivot Table & Pivot Chart View, Design View, and nodes.
Datasheet View.
S21. Ans.(b)
S11. Ans.(b) Sol. Wireless networks are computer networks that are not
Sol. the CPU (central processing unit) is the brains of the connected by cables of any kind. The use of a wireless network
computer where most calculations take place. enables enterprises to avoid the costly process of introducing
Control unit and arithmetic logic unit is two main components cables into buildings or as a connection between different
of CPU. equipment locations.

16 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S22. Ans.(d) S34. Ans.(d)
Sol. Printer is a shared common resource in a computer Sol. System software is the set of programs that enables your
network. computer’s hardware devices and application software to
work together.
S23. Ans.(c)
Sol. Disk Defragmenter is a utility in Microsoft Windows S35. Ans.(d)
designed to increase access speed by rearranging files stored Sol. The default and maximum size of text filed in Access is 50
on a disk to occupy contiguous storage locations, a technique and 255 characters.
called defragmentation.
S36. Ans.(c)
S24. Ans.(b) Sol. Software piracy is the illegal copying, distribution, or use
Sol. Hacking is an attempt to exploit a computer system or a of software.
private network inside a computer. It is the unauthorized
access to or control over computer network security system S37. Ans.(c)
for some illicit purpose. Computer hacker is a skilled person Sol. 1. -> Spacebar -> enter, will start numbered list.
who violates computer security with malicious intent for
personal gain. S38. Ans.(c)
Sol. Common uses of web beacon are email tracking and page
S25. Ans.(a) tagging for web analytics. Its alternative names are web bug,
Sol. If a computer rebooting itself, then it is likely that it has a tracking bug, tag, or page tag.
virus.
S39. Ans.(c)
S26. Ans.(a)
Sol. Paging is a process in which each program is split into
Sol. Ctrl + A is used to select the entire document.
fixed size program components called pages. Some pages of it
are loaded in the main memory, depending upon the storage
S27. Ans.(d)
availability and requirement to execute program.
Sol. History Show all the website and pages that are visited
over a period of time.
S40. Ans.(c)
Sol. In latest version there are 1,048,576 rows by 16,384
S28. Ans.(a)
columns.
Sol. ".com" is indicates commercial.

S29. Ans.(b)
Sol. Taskbar is located on the bottom of the screen. It shows S41. Ans.(b)
which programs are currently running. Sol. HTML and XML are based on SGML. SGML (Standard
Generalized Markup Language) is a standard for how to
S30. Ans.(c) specify a document markup language or tag set. Such a
Sol. Shortcut icon provides a user with immediate access to a specification is itself a document type definition (DTD). SGML
program of file. is not in itself a document language, but a description of how
to specify one.
S31. Ans.(a)
Sol. The Menu Bar is the horizontal band that contains S42. Ans.(d)
commands and options that can be chosen. Sol. Physical is the layer closest to transmission medium.

S32. Ans.(a) S43. Ans.(d)


Sol. A superclass passes its characteristics to its subclass in Sol. All of the above are true and required to create a Table
concept of inheritance in programming languages. in MS Access.

S33. Ans.(a) S44. Ans.(c)


Sol. The CMOS is a physical part of the motherboard: it is a Sol. IP addresses are converted to a hierarchy of domain
memory chip that houses setting configurations and is names.
powered by the onboard battery. The CMOS is reset and loses
all custom settings in case the battery runs out of energy, S45. Ans.(c)
additionally, the system clock resets when the CMOS loses Sol. IEEE 802.6 is a standard governed by the ANSI for
power. Metropolitan Area Networks (MAN).

17 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S46. Ans.(d) S58. Ans.(a)
Sol. A protocol identifier, www and the unique registered Sol. Mainframes are a type of computer that generally are
domain name are requisite for a URL. known for their large size, amount of storage, processing
power and high level of reliability. They are primarily used by
S47. Ans.(b) large organizations for mission-critical applications requiring
Sol. Downloading is the process of a computer receiving high volumes of data processing.
information from a server.
S59. Ans.(b)
S48. Ans.(a) Sol. Zip is a Compressed File.
Sol. A complier is used to translate a program written in a
high-level language to a machine language by compiling the S60. Ans.(a)
entire program in one go. Sol. The MICR (Magnetic Ink Character Recognition) is a
device that can recognize human readable characters printed
S49. Ans.(c) on documents such as cheques using a special magnetic ink.
Sol. Encryption is the most effective way to achieve data
security. To read an encrypted file, you must have access to a S61. Ans.(d)
secret key or password that enables you to decrypt it. Sol. A cell is the intersection between a row and a column on
Unencrypted data is called plain text; encrypted data is a spreadsheet that starts with cell A1.
referred to as cipher text.
S62. Ans.(d)
S50. Ans.(c) Sol. A protocol or communication protocol is a set of rules
Sol. Java complier called JVM – Java Virtual Machine is in which computers communicate with each other.
independent of platform.
S63. Ans.(a)
S51. Ans.(c) Sol. Star topology is a network topology where each
Sol. Computer forensics is the application of scientifically individual piece of a network is attached to a central node
proven methods to gather, process, interpret, and to use (often called a hub or switch).
digital evidence to provide a conclusive description of
cybercrime activities. S64. Ans.(b)
Sol. Key logging is a type of surveillance software that once
S52. Ans.(a) installed on a system, has the capability to record every
Sol. Application software is a term which is used for keystroke made on that system.
software created for a specific purpose. It is generally a
program or collection of programs used by end users. S65. Ans.(c)
Sol. A FOREIGN KEY is a key used to link two tables together.
S53. Ans.(a)
Sol. Digital divide is the gap between those who have S66. Ans.(a)
already access to computers and the Internet, and those who Sol. To place your image into a live video conference, a
do not. Webcam is usually used.

S54. Ans.(a) S67. Ans.(d)


Sol. Encryption is the process of converting information or Sol. General Purpose computers can perform all those tasks.
data into a code, especially to prevent unauthorized access.
S68. Ans.(d)
S55. Ans.(c) Sol. A Palmtop PC was an about pocket calculator-sized,
Sol. Editing is the process of changing an existing document. battery-powered PC in a horizontal clamshell design with
integrated keyboard and display. It could be used like a
S56. Ans.(c) subnotebook, but was light enough to be comfortably used
Sol. Speech recognition is a technology that allows spoken handheld as well. That is the reason they were also known as
input into systems. handheld devices.

S57. Ans.(b) S69. Ans.(b)


Sol. An embedded system is some combination of computer Sol. An instruction cycle is the basic operational process of a
hardware and software, either fixed in capability or computer. It is the process by which a computer retrieves a
programmable, that is designed for a specific function or for program instruction from its memory, determines what
specific functions within a larger system. actions the instruction dictates, and carries out those actions.

18 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S70. Ans.(b) S82. Ans.(c)
Sol. C++, Java and PHP are object-oriented programming Sol. Disk defragmenter is a Windows utility program that
languages. located and eliminates unnecessary fragments and
rearranges filed and unused to disk space to optimize
S71. Ans.(c) operations.
Sol. URL (Uniform Resource Locator) is the address of a
resource on the Internet. The resource can be any type of file S83. Ans.(b)
stored on a server, such as a Web page, a text file, a graphics Sol. This indicates either a possible spelling error or that
file, or an application program. Word doesn't recognize a word, such as a proper name or
place. Green underline- Word thinks that grammar should be
S72. Ans.(d) revised. Blue underline- A word is spelled correctly but does
Sol. The control unit is responsible for managing data not seem to be the correct word for the sentence.
transfer, coordinating all computer units, and
interpreting and executing instructions from memory, S84. Ans.(c)
making it a central component of computer operation. Sol. WordArt is decorative text that you can add to a
document. You can make changes to WordArt, such as the font
S73. Ans.(a) size and the text colour, by using the drawing tools options
Sol. In Word, you can automate frequently used tasks by available automatically after you insert or select the WordArt
creating and running macros. First, you record the macro. in a document.

S74. Ans.(a) S85. Ans.(b)


Sol. A compiler is a computer program (or set of programs) Sol. A folder is a virtual location where programs, files, and
that transforms source code written in a programming other folders can be located.
language (the source language) into another computer
language (the target language, often having a binary form S86. Ans.(d)
known as object code). Sol. Except thoughtful all other operations are performed by
general computers.
S75. Ans.(c)
Sol. Alt+F key are used to open file menu of current program. S87. Ans.(b)
Sol. A bridge is a network device used at the data link layer to
S76. Ans.(a) connect two dissimilar networks as well as similar networks.
Sol. Ctrl+K are used to Insert a hyperlink.
S88. Ans.(b)
S77. Ans.(d) Sol. Digital plotter used in CAD systems.
Sol. A proxy server is a server that acts as an intermediary for
requests from clients seeking resources from other S89. Ans.(d)
servers. Sol. The CPU, also called the Microprocessor, when talking
about PCs does the vast majority of the processing for a
S78. Ans.(c) computer.
Sol. In second generation magnetic core are used.

S79. Ans.(d)
Sol. Spam is unsolicited e-mail that is mostly sent by an
electronic messaging system used by various commercial
organizations to send bulk messages to a large number of
addresses.

S80. Ans.(b)
Sol. Hypertext Markup Language (HTML) is a markup
language and it is used to create websites or Web pages.

S81. Ans.(d)
Sol. Network connectivity is also a kind of metric to discuss
how well parts of the network connect to one another.

19 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S90. Ans.(c) S102. Ans.(d)
Sol. The original ASCII code used 7 bits of each byte, reserving Sol. Updating is periodically adding, changing and deleting file
that last bit for error checking. records

S91. Ans.(d) S103. Ans.(d)


Sol. MHz is short for megahertz and means a million cycles Sol. Supercomputers are fastest in their generations.
per second, or one million hertz (10 6 Hz). This unit of
frequency measurement comes from the International System S104. Ans.(d)
of Units, and in computing is used to denote the speed at Sol. All these formats can be added to a PPT.
which data moves within and between components.
S105. Ans.(d)
S92. Ans.(b) Sol. A motherboard (sometimes alternatively known as the
Sol. Machine language used binary digits. mainboard, system board, baseboard, planar board or logic
board, or colloquially, a mobo) is the main printed circuit
S93. Ans.(c) board (PCB) found in general purpose microcomputers and
Sol. stored data in secondary storage is not deleted when other expandable systems.
power turns off.
S106. Ans.(a)
S94. Ans.(c) Sol. A computer mouse is a pointing device (hand control)
Sol. To move to the bottom of a document, press Ctrl key + that detects two-dimensional motion relative to a surface.
End key. This motion is typically translated into the motion of a pointer
on a display, which allows a smooth control of the graphical
S95. Ans.(d) user interface
Sol. A computer checks the database of usernames and
passwords for a match before granting access. S107. Ans.(c)
Sol. Time bomb is a type of computer virus that lies dormant
S96. Ans.(a) for an amount of time until it finally comes out and causes a
Sol. An arithmetic logic unit (ALU) is a digital circuit used to computer program to be deleted or freeze.
perform arithmetic and logic operations. It represents the
fundamental building block of the central processing unit S108. Ans.(b)
(CPU) of a computer. Sol. A computer worm is a standalone malware computer
program that replicates itself in order to spread to other
S97. Ans.(d) computers.
Sol. Telnet is a user command and an underlying TCP/IP
protocol for accessing remote computers. Through Telnet, an S109. Ans.(b)
administrator or another user can access someone else's Sol. When power is turned on, POST (Power-On Self-Test) is
computer remotely. the diagnostic testing sequence that a computer's basic
input/output system (or "starting program") runs to
S98. Ans.(b) determine if the computer keyboard, random access memory,
Sol. CD-RW (Compact Disc-Rewritable) is a digital optical disc disk drives, and other hardware are working correctly.
storage format. A CD-RW disc is a compact disc that can be
written, read arbitrarily many times, erased, and written S110. Ans.(b)
again. Sol. Compact disc (CD) is a digital optical disc data storage
format.
S99. Ans.(d)
Sol. A draft is simply an email message you haven't yet sent. S111. Ans.(d)
Sol. COBOL is a programming language.
S100. Ans.(a)
Sol. In First Generation mainly batch processing operating S112. Ans.(b)
system were used. Sol. Datalink layer is the second layer of OSI Model.

S101. Ans.(c) S113. Ans.(c)


Sol. In computing, Trojan horse, or Trojan, is any malicious Sol. Backup Utility software is an application used to create a
computer program which is used to hack into a computer by duplicate copy of data to safeguard it and enable recovery in
misleading users of its true intent. the event it is lost, corrupted or infected by malware.

20 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S114. Ans.(c) S125. Ans.(c)
Sol. Home shortcut key is used to move the beginning of a line. Sol. In bus topology all computers are connected in a single
cable.
S115. Ans.(c)
Sol. Ctrl+Alt+Del shortcut keys are used to restart the S126. Ans.(a)
computer. Sol. Robotics is an interdisciplinary branch of engineering and
science that includes mechanical engineering, electrical
S116. Ans.(c) engineering, computer science, and others.
Sol. Through Telnet, an administrator or another user can
establish a connection to someone else's computer remotely. S127. Ans.(a)
On the Web, HTTP and FTP protocols allow you to request Sol. When we run a program in HTML coding Notepad is used
specific files from remote computers, but not to actually be as backend and Internet-Explorer works as front-end.
logged on as a user of that computer.
S128. Ans.(d)
S117. Ans.(c) Sol. In relational database data are organized in the form of
Sol. Formatting any kind of data storage disk means erasing table.
the data that it has.
S129. Ans.(d)
S118. Ans.(a) Sol. Since static and dynamic images, high graphics, voice
Sol. A control bus is a computer bus that is used by the CPU to notes and songs are rich in properties, they occupy a lot of
communicate with devices that are contained within the memory in the storage system of the computer.
computer. This occurs through physical connections such as
cables or printed circuits. S130. Ans.(c)
Sol. A flash drive is plugged into a USB port.
S119. Ans.(a)
Sol. The point of sale or point of purchase is the time and place S131. Ans.(b)
where a retail transaction is completed. Sol. Virtual teams are a great way to enable teamwork in
situations where people are not sitting in the same physical
S120. Ans.(c) office at the same time. Such teams are used more and more
Sol. Third generation of computer developed using integrated by companies and other organizations to cut travel,
circuits. relocation, real estate, and other business costs.

S121. Ans.(a) S132. Ans.(b)


Sol. A super computer is a computer with a high level of Sol. When data are processed, interpreted, organized,
computing performance compared to a general-purpose structured or presented so as to make them meaningful or
computer. Supercomputers play an important role in the field useful, they are called information.
of computational science, and are used for a wide range of
computationally intensive tasks in various fields, including S133. Ans.(a)
quantum mechanics, weather forecasting, climate research, Sol. Supercomputer PARAM 8000 (made by C-DAC) was
oil and gas exploration etc. launched on July 01, 1991 is considered India's first
supercomputer.
S122. Ans.(a)
Sol. A network interface card (NIC) is a circuit board or card S134. Ans.(c)
that is installed in a computer so that it can be connected to a Sol. An embedded system is a computer system with a
network. A network interface card provides the computer dedicated function within a larger mechanical or electrical
with a dedicated, full-time connection to a network. system, often with real-time computing constraints.

S123. Ans.(d) S135. Ans.(a)


Sol. Artificial intelligence (AI, also machine intelligence) is Sol. A password is an un-spaced sequence of characters used
intelligent behavior by machines, rather than the natural to determine that a computer user requesting access to a
intelligence of humans and other animals computer system is really that particular user.

S124. Ans.(a) S136. Ans.(d)


Sol. Primary key is used to uniquely identify a record within a Sol. A clipboard is a temporary storage area for data that the
table. user wants to copy from one place to another.

21 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S137. Ans.(a) S147. Ans.(b)
Sol. A spreadsheet is primarily designed to provide a digital Sol. A barcode is a machine-readable representation of data
form of the paper-based worksheet. There are numerous relating to the object to which it is attached.
rows and columns for storage and available support for
mathematical formulas and calculations, data sorting and S148. Ans.(d)
analysis Integration and visualization of data in the form of Sol. A cache server is a dedicated network server or service
graphs and charts. Example: Microsoft Excel and Lotus. acting as a server that saves Web pages or other Internet
content locally.
S138. Ans.(d)
Sol. Pop up ads are advertisements that show up in a new S149. Ans.(c)
browser window. Sol. Spoofing is a type of scam where an intruder attempts to
gain unauthorized access to a user's system or information by
S139. Ans.(d) pretending to be the user. The main purpose is to trick the
Sol. Biometric authentication systems compare a biometric user into releasing sensitive information in order to gain
data capture to stored, confirmed authentic data in a access to one's bank account, computer system or to steal
database. personal information, such as passwords.

S140. Ans.(a) S150. Ans.(c)


Sol. Multiplexing (or mux-ing) is a way of sending multiple Sol. A microphone is a device that translates sound vibrations
signals or streams of information over a communications link in the air into electronic signals.
at the same time in the form of a single, complex signal; the
receiver recovers the separate signals, a process called
S151. Ans.(b)
demultiplexing.
Sol. A web browser (commonly referred to as a browser) is a
software application for retrieving, presenting and traversing
S141. Ans.(d)
information resources on the World Wide Web. An
Sol. SMTP, FTP and DNS are protocols of the Application layer.
information resource is identified by a Uniform Resource
SMTP-Simple Mail Transfer Protocol, DNS-Domain Name
Identifier (URI/URL) that may be a web page, image, video or
System, FTP-File Transfer Protocol.
other piece of content.
S142. Ans.(c)
S152. Ans.(c)
Sol. A network is interconnection of two or more computers.
Sol. Sorting is any process of arranging items systematically.
S143. Ans.(b)
S153. Ans.(a)
Sol. An instruction cycle is the basic operational process of a
Sol. The Menu Bar is the horizontal band that contains
computer. It is the process by which a computer retrieves a
program instruction from its memory, determines what commands and options that can be chosen.
actions the instruction dictates, and carries out those actions.
S154. Ans.(a)
S144. Ans.(d) Sol. A telecommunication device is an electronic device used
Sol. Base of hexadecimal number system is 16. for communication via a telecommunication network.

S145. Ans.(d) S155. Ans.(c)


Sol. Electronic commerce, commonly written as e-commerce Sol. 400% is the max. zoom percentage in PowerPoint.
or e-commerce, is the trading or facilitation of trading in
products or services using computer networks, such as the S156. Ans.(d)
Internet or online social networks. Sol. All of these are file extension(s) in DOS.

S146. Ans.(a) S157. Ans.(b)


Sol. In computer programming, a logic error is a bug in a Sol. A programming language is a formal computer language
program that causes it to operate incorrectly, but not to or constructed language designed to communicate
terminate abnormally (or crash). A logic error produces instructions to a machine, particularly a computer.
unintended or undesired output or other behavior, although Programming languages can be used to create programs to
it may not immediately be recognized as such. control the behavior of a machine or to express algorithms.

22 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S158. Ans.(a) S171. Ans.(b)
Sol. The first electronic digital computer contained electronic Sol. A system bus is a single computer bus that connects the
valves. major components of a computer system, combining the
functions of a data bus to carry information, an address bus to
S159. Ans.(d) determine where it should be sent, and a control bus to
Sol. Word processors are used to create text-based
determine its operation.
documents.

S160. Ans.(d) S172. Ans.(b)


Sol. All of the above are web browser. Sol. Linux is can be used for various purposes i.e., Web
Serving (Nearly 60% of all websites on the Internet are run
S161. Ans.(c) using an Open-Source program named "Apache.”)
Sol. FORTRAN is the best and only major programming Networking, Databases, Scientific computing
language for scientific applications. It is designed for
performing large and complex scientific numerical S173. Ans.(b)
computing. Sol. Voice over Internet Protocol (VoIP), is a technology
that allows you to make voice calls using a broadband Internet
S162. Ans.(b)
connection instead of a regular (or analog) phone line. VoIP is
Sol. Input devices are hardware components that allow you to
enter data and instructions into a computer system. enabled by a group of technologies and methodologies used
to deliver voice communications over the internet, enterprise
S163. Ans.(d) local area networks or wide area networks.
Sol. CDs and DVDs are used to write data on them. Even
though compact, these devices can easily carry large volumes S174. Ans.(a)
of data. They are Optical storage devices. Sol. Phishing is the attempt to obtain sensitive information
such as usernames, passwords, and credit card details, often
S164. Ans.(a) for malicious reasons, by disguising as a trustworthy entity in
Sol. Hertz is a unit in which the speed of clock frequency of a an electronic communication.
microprocessor is measured.
S175. Ans.(b)
S165. Ans.(b)
Sol. Flash drives are external storage media, not necessarily Sol. Digitalization is different from digitization. It is the
required to start a system, unless you are trying to reboot the process of converting information into a digital format. In this
system through a bootable flash drive. format, information is organized into discrete units of data
(called bits) that can be separately addressed (usually in
S166. Ans.(d) multiple-bit groups called byte).
Sol. A motherboard is a part of the computer hardware that
compensates the difference between the speeds of CPU and S176. Ans.(b)
peripherals. Sol. Every presentation has at least one slide master
although you can have more than one. If you want to use a
S167. Ans.(d)
theme and background throughout the slide, using the slide
Sol. Bcc stands for ‘Blind Carbon Copy’. The recipients whose
e-mail addresses are added in the Bcc field would receive a master is a simpler and more graceful way of approaching it.
copy of the email; however, the identity of these recipients
would not be disclosed. S177. Ans.(c)
Sol. The first SIM card was developed in 1991 by Munich
S168. Ans.(a) smart-card maker Giesecke & Devrient, who sold the first 300
Sol. The Graphics Interchange Format (GIF) is used to save SIM cards to the Finnish wireless network operator
simple Web graphics having limited colours. Radiolinja. A subscriber identity module is a removable
smart card for mobile phones. SIM cards store the required
S169. Ans.(b) information to identify the mobile device.
Sol. In a computer network, the devices are called nodes.
S178. Ans.(a)
S170. Ans.(b)
Sol. Except Antivirus, all others are parts and options Sol. Downloading is the transmission of a file from one
available in MS Word. system to another.

23 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com


S179. Ans.(b) S193. Ans.(a)
Sol. Web browser is a software application used to establish Sol. Binary Numbers use only '0' and '1'.
a connection with the server, locate, retrieve and display
content from the World Wide Web, including Web pages, S194. Ans.(c)
images, video, and other files. Examples of web browsers are Sol. A cursor is a movable indicator on a computer screen
Internet Explorer, Safari, Firefox etc. identifying the point that will be affected by input from the
user.
S180. Ans.(c)
Sol. An icon is the graphical representation of an application.
S195. Ans.(d)
Sol. Hangout Virus is not a legitimate type of computer virus.
S181. Ans.(d)
Sol. A protocol-identifier, www, and the unique registered
domain name are requisite for a URL S196. Ans.(a)
Sol. Modem stands for Modulator-Demodulator.
S182. Ans.(a)
Sol. Computers generally use a binary number system. S197. Ans.(b)
Sol. First computers were programmed using machine
S183. Ans.(d) language.
Sol. Expansion slots allow a user to add devices.
S198. Ans.(d)
S184. Ans.(d) Sol. Media Players are not considered utility software. Utility
Sol. Ctrl+Shift+N is also the shortcut key to open new software typically refers to programs that assist in managing
incognito mode in chrome web browser. and maintaining the computer system or performing specific
tasks related to system operations.
S185. Ans.(a)
Sol. A nibble is equal to 4 bits.
S199. Ans.(a)
S186. Ans.(b) Sol. Swapping refers to the process of temporarily moving a
Sol. A page break is a marker in an electronic document that process from memory (RAM) to disk (usually the hard disk)
tells the document interpreter that the content which follows to free up space for other processes that need to be loaded
is part of a new page. into memory. When a system is low on available memory,
swapping allows the operating system to prioritize active
S187. Ans.(a) processes and transfer less frequently used processes to disk.
Sol. Here except ILB, all are valid units of memory, KB- Kilo This helps ensure efficient memory utilization and allows for
Byte, YB- Yotta Byte, PB-Peta Byte. a larger number of processes to be executed concurrently.

S188. Ans.(a) S200. Ans.(d)


Sol. 3D printing, also known as additive manufacturing (AM), Sol. Drop Down menu is also called drop-down list or pull-
are processes used to synthesize a three-dimensional object down list.
in which successive layers of material are formed under
computer control to create the object.

S189. Ans.(b)
Sol. Trend Micro is an antivirus.

S190. Ans.(c)
Sol. Main memory, also known as primary memory or
random-access memory (RAM), works in conjunction with the
central processing unit (CPU) in a computer system.

S191. Ans.(d)
Sol. Bit is the smallest unit of digital information

S192. Ans.(c)
Sol. An operating system is required to boot a system.

24 adda247.com/defence | www.sscadda.com | www.bankersadda.com | www.adda247.com

You might also like