Computer questions with answers

Post on 07-Nov-2014

3038 Views

Category:

Education

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

get free ias pcs exam notes, get previous year papers, computer gk, general knowledge question papers,all classes question papers,cbse syllabus,cbse question papers,icse syllabus,punjab university chandigarh syllabus,all classes syllabus,computer general knowledge,computer gk

Transcript

Computer Questions With AnswersFor more question and answers go to http://yoursyllabus.blogspot.com

All of the following are examples of real security and privacy risks EXCEPT:

A. hackers. B. spam. C. viruses. D. identity theft. Answer: B

A process known as ____________ is used by large retailers to study trends.

A. data mining B. data selection C. POS D. data conversion Answer: A

. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B

A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.

A. PSS B. POS C. inventory D. data mining Answer: A

The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:

A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C

Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C

____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements.

A. POS B. RFID C. PPS D. GPS Answer: B

Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A

Technology no longer protected by copyright, available to everyone, is considered to be:

A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A

. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A

____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D

. ____________ is data that has been organized or presented in a meaningful fashion.

A. A process B. Software C. Storage D. Information Answer: D

. The name for the way that computers manipulate data into information is called:

A. programming. B. processing. C. storing. D. organizing. Answer: B

Computers gather data, which means that they allow users to ____________ data.

A. present B. input C. output D. store Answer: B

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:

A. data. B. output. C. input. D. the process. Answer: B

Computers use the ____________ language to process data

A. processing B. kilobyte C. binary D. representational Answer: C

Computers process data into information by working exclusively with:

A. multimedia. B. words. C. characters. D. numbers. Answer: D

In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D

The term bit is short for:

A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C

A string of eight 0s and 1s is called a:

A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B

A ____________ is approximately one billion bytes.

A. kilobyte B. bit C. gigabyte D. megabyte Answer: C

A ____________ is approximately a million bytes.

A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C

____________ is any part of the computer that you can physically touch.

A. Hardware B. A device C. A peripheral D. An application Answer: A

The components that process data are located in the:

A. input devices. B. output devices. C. system unit. D. storage component. Answer: C

All of the following are examples of input devices EXCEPT a:

A. scanner. B. mouse. C. keyboard. D. printer. Answer: D

Which of the following is an example of an input device?

A. scanner B. speaker C. CD D. printer Answer: A

All of the following are examples of storage devices EXCEPT:

A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B

The ____________, also called the brains of the �computer, is responsible for processing data.

A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D

The CPU and memory are located on the:

A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B

Word processing, spreadsheet, and photo-editing are examples of:

A. application software. B. system software. C. operating system software. D. platform software. Answer: A

____________ is a set of computer programs used on a computer to help perform tasks.

A. An instruction B. Software C. Memory D. A processor Answer: B

. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.

A. management B. processing C. utility D. application Answer: D

The PC (personal computer) and the Apple Macintosh are examples of two different

A. platforms. B. applications. C. programs. D. storage devices. Answer: A

Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.

A. languages B. methods C. CPUs D. storage devices Answer: C

Servers are computers that provide resources to other computers connected to a:

A. network. B. mainframe. C. supercomputer. D. client. Answer: A

Smaller and less expensive PC-based servers are replacing ____________ in many businesses.

A. supercomputers B. clients C. laptops D. mainframes Answer: D

____________ are specially designed computers that perform complex calculations extremely rapidly.

A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B

DSL is an example of a(n) ____________ connection.

A. network B. wireless C. slow D. broadband Answer: D

The difference between people with access to computers and the Internet and those without this access is known as the:

A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A

____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.

A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A

Which of the following is the correct order of the four major functions of a computer?

A. Process & Output & Input & Storage

B. Input & Output & Process & Storage

C. Process & Storage & Input & Output

D. Input & Process & Output & Storage

Answer: D

____________ bits equal one byte.

A. Eight B. Two C. One thousand D. One million Answer: A

The binary language consists of ____________ digit(s).

A. 8 B. 2 C. 1,000 D. 1 Answer: B

A byte can hold one ____________ of data.

A. bit B. binary digit C. character D. kilobyte Answer: C

____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

A. The platform B. The operating system C. Application software D. The motherboard Answer: B

The operating system is the most common type of ____________ software.

A. communication B. application C. system D. word-processing software Answer: C

____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.

A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B

The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:

A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A

The two broad categories of software are:

A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D

The metal or plastic case that holds all the physical parts of the computer is the:

A. system unit. B. CPU. C. mainframe. D. platform. Answer: A

If a word is typed that is not in Word’s dictionary, a____________way underline appears below the word.

(A) red (B) green (C) blue (D) black (E) None of these Ans : (A)

The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.

(A) Search (B) Cut (C) Document (D) Undo (E) None of these Ans : (D)

In Excel, any set of characters containing a letter , hyphen, or space is considered—

(A) a formula (B) text (C) a name (D) a title (E) None of these Ans : (B)

.____________Software allows users to perform calculations on rows and columns of data.

(A) Word processing (B) Presentation graphics (C) Database Management Systems (D) Electronic Spreadsheet (E) None of these Ans : (C)

A ____________represent approximately one billion memory locations.

(A) kilobyte (B) megabyte (C) gigabyte (D) terabyte (E) None of these Ans : (C)

____________cells involves creating a single cell by combining two or more selected cells.

(A) Formatting (B) Merging (C) Embedding (D) Splitting (E) None of these Ans : (B)

The operating system is the most common type of____________software.

(A) communication (B) application (C) system (D) word-processing (E) None of these Ans : (C)

When you quickly press and releaes the left mouse button twice , you are—

(A) Primary-clicking (B) pointing (C) Double-clicking (D) Secondary-clicking (E) None of these Ans : (C)

The horizontal and vertical lines on a worksheet are called—

(A) cells (B) sheets (C) block lines (D) gridlines (E) None of these Ans : (D)

To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.

(A) press the left mouse key (B) double-click the right mouse key (C) press the BACKSPACE key (D) press the delete key (E) None of these Ans : (D)

The operating system does all of the following EXCEPT:

(A) provide a way for the user to interact with the computer.

(B) manage the central processing unit (CPU).

(C) manage memory and storage. (D) enable users to perform a

specific task such as document editing.

Ans : (D)

During the boot process, the____________looks for the system files.

A. CD B. BIOS C. CPU D. DVD Ans : (B)

____________ are lists of commands that appear on the screen.

(A) GUIs (B) Icons (C) Menus (D) Windows Ans : (C)

____________ is the ability of an operating system to control the activities of multiple programs at the same time.

(A) Multitasking (B) Streamlining (C) Multiuser (D) Simulcasting Ans : (A)

The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:

(A) action. (B) event. (C) interrupt. (D) activity. Ans : (C)

The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.

(A) CPU (B) slice of time (C) stack (D) event Ans : (B)

The blocks of code, included in the operating system, that software applications interact with are known as:

(A) application programming interfaces (APIs).

(B) complimentary metal-oxide conductors (CMOS).

(C) device drivers. (D) bootstrap loaders. Ans : (A)

MS-DOS is a ____________ operating system.

(A) point-and-click (B) user-friendly (C) command-driven (D) Mac Ans : (C)

An interrupt handler is a(n):

(A) location in memory that keeps track of recently generated interrupts.

(B) peripheral device. (C) utility program. (D) special numeric code that

indicates the priority of a request. Ans : (D)

A spooler is a(n):

(A) location in memory that maintains the contents of a document until it prints out.

(B) print job. (C) program that coordinates the print jobs that

are waiting to print. (D) message sent from the printer to the

operating system when a print job is completed. Ans : (C)

Virtual memory is typically located:

(A) on a floppy disk. (B) in the CPU. (C) in a flash card. (D) on the hard drive. Ans : (D)

The purpose of a swap (or page) file is to:

(A) maintain pages of documents that are being spooled to the printer.

(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.

(C) prevent thrashing in a multitasking environment.

(D) allow multiple print jobs to print their pages out simultaneously.

Ans : (B)

The definition of thrashing is:

(A) swapping data between virtual memory and RAM too frequently.

(B) insufficient hard disk space. (C) too many processors being managed by the

operating system. (D) inaccurate information stored in the registry. Ans : (A)

All of the following are TRUE of Safe Mode EXCEPT:

(A) Safe Mode is a special diagnostic mode.

(B) Safe Mode loads all nonessential icons. (C) Safe Mode allows users to troubleshoot

errors. (D) Safe Mode loads only the most

essential devices. Ans : (B)

Verification of a login name and password is known as:

(A) configuration. (B) accessibility. (C) authentication. (D) logging in. Ans : (C)

The combination of the operating system and the processor is referred to as the computer’s:

(A) CPU. (B) platform. (C) BIOS. (D) CMOS. Ans : (B)

The following message generally means:

(A) a nonsystem floppy has been left in the floppy disk drive.

(B) the CD drive is not functioning. (C) the BIOS is corrupted. (D) there is a problem loading a

device. Ans : (A)

Which of the following is the correct sequence of actions that takes place during the boot-up process?

(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings

(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings

(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings

(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system

Ans : (B)

All of the following are steps involved in the boot process EXCEPT:

(A) load the operating system into RAM.

(B) the power-on self-test. (C) activate the basic input/output

system (BIOS). (D) load application programs. Ans : (D)

The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.

(A) BIOS (B) API (C) device driver (D) supervisor program Ans : (A)

The basic input/output system (BIOS) is stored in:

(A) RAM. (B) ROM. (C) the CPU. (D) the hard drive. Ans : (B)

Ensuring that the essential peripheral devices are attached and operational is the ____________ process.

(A) configuration (B) CMOS (C) POST (D) ROM Ans : (C)

The memory resident portion of the operating system is called the—

(A) registry. (B) API. (C) CMOS. (D) kernel. Ans : (D)

Which of the following does NOT occur during the power-on self-test (POST)?

(A) The ScanDisk utility begins to run. (B) The video card and video memory are

tested. (C) The BIOS identification process occurs. (D) Memory chips are checked to ensure

they are working properly. Ans : (A)

. All of the following are TRUE regarding virtual memory EXCEPT—

(A) any amount of RAM can be allocated to virtual memory.

(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.

(C) this temporary storage is called the swap file (or page file).

(D) virtual memory is physical space on the hard drive.

Ans : (A)

The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:

(A) files. (B) folders. (C) drives. (D) systems. Ans : (D)

All of the following statements concerning windows are true EXCEPT—

(A) windows are an example of a command-driven environment.

(B) windows can be resized and repositioned on the desktop.

(C) more than one window can be open at a time.

(D) toolbars and scrollbars are features of windows.

Ans : (A)

All of the following statements concerning files are true EXCEPT—

(A) A file is a collection of related pieces of information stored together for easy reference.

(B) Files can be generated from an application.

(C) Files are stored in RAM. (D) Files should be organized in folders. Ans : (C)

Using Windows Explorer, a plus (+) sign in front of a folder indicates—

(A) an open folder. (B) the folder contains subfolders. (C) a text file. (D) a graphics file. Ans : (B)

In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.

(A) List (B) Thumbnails (C) Details (D) Icon Ans : (C)

All of the following are examples of real security and privacy risks Except.

(A) hackers (B) spam (C) viruses (D) identify theft

The OSI model is divided into_______ processes called layers.

(A) five (B) six (C) seven (D) eight

Servers are computers that provide resources to other computers connected to a

(A) mainframe (B)Network (C) supercomputer (D) client

URL stands for.....

(A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator (D) Uniform Research Locator

You must install a __________ on a network if you want to share a broadband Internet.

(A) Router (B) modem (C) node (D) cable

Chip is a common nickname for a

(A) transistor (B) resistor (C)Integrated circuit (D) semiconductor

The design of the network is called the network:

(A) Architecture (B) server (C) transmission (D) type

Personal logs or journal entries posted on the Web are known as

(A) Podcast (B) Webcasts (C) Blogs (D) subject directories

What is a backup?

(A) Restoring the information backup (B) An exact copy of a system's

information (C) The ability to get a system up

and running in the event of a system crash or failure

(D) All of these

top related