Top Banner
: : 1 : : CCE Sreedhar’s 1. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as_________ 1) Robotics 2) computer forensics 3) Simulation 4) forecasting 5) None of these 2. Who built the first Mechanical Calculator? 1) Joseph Marie Jacquard 2) John Mauchly 3) Blaise Pascal 4) Howard Aiken. 5) None of these 3. _____ is the capability to continue as if nothing has happened, even after a major component failure. 1) Redundancy 2) interoperability 3) Fault tolerance 4) backup 5) None of these 4. Technology no longer protected by copyright, available to everyone, is considered to be: 1) Proprietary 2) open 3) Experimental 4) In the public domain 5) None of these 5. A…… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files. 1) Worm 2) virus 3) Trojan horse 4) phishing scam 5) None of these 6. An Internet connection require 1) A personal computer 2) a modem 3) A dial-up telephone line 4) Software to operate 5) All of these 7. Which Operating System provides GUI for user _____. 1) LINUX 2) WINDOWS 3) DOS 4) MARK 5) None of these 8. In the right setting a thief will steal your information by simply watching what you type 1) Snagging 2) Spying 3) Social engineering 4) shoulder surfing 5) None of these 9. What is the address given to a computer connected to a network called? 1) System Address 2) SYSID 3) Process ID 4) IP Address 5) None of these 10. A process known as ____________ is used by large retailers to study trends. 1) Data mining 2) data selection 3) POS 4) data conversion 5) None of these 11. All of the following are examples of real security and privacy risks except 1) Hackers 2) Spam 3) Viruses 4) identity theft 5) None of these 12. The desktop contains small graphics called 1) Windows 2) logo 3) Icons 4) pictures 5) None of these 13. The Boolean operators of the Internet are 1) And 2) OR 3) Nand 4) Nor 5) All of the above 14. Which of the Following is a Firmware Software in Computer? 1) WINDOWS 2) DOS 3) BIOS 4) PASCAL 5) None of these 15. Which generation of computers is covered by the period 1964-77? 1) First 2) Second. 3) Third 4) Forth 5) None of these COMPUTER AWARENESS
104

COMPUTER AWARENESS s CCE

Apr 06, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 1 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1. Surgeons can perform delicate operations by manipulating devices throughcomputers instead of manually. This technology is known as_________1) Robotics 2) computer forensics 3) Simulation4) forecasting 5) None of these

2. Who built the first Mechanical Calculator?1) Joseph Marie Jacquard 2) John Mauchly 3) Blaise Pascal4) Howard Aiken. 5) None of these

3. _____ is the capability to continue as if nothing has happened, even after a majorcomponent failure.1) Redundancy 2) interoperability 3) Fault tolerance4) backup 5) None of these

4. Technology no longer protected by copyright, available to everyone, is consideredto be:1) Proprietary 2) open 3) Experimental4) In the public domain 5) None of these

5. A…… is a set of program instructions that can attach itself to a file, reproduceitself, and spread to other files.1) Worm 2) virus 3) Trojan horse4) phishing scam 5) None of these

6. An Internet connection require1) A personal computer 2) a modem 3) A dial-up telephone line4) Software to operate 5) All of these

7. Which Operating System provides GUI for user _____.1) LINUX 2) WINDOWS 3) DOS 4) MARK 5) None of these

8. In the right setting a thief will steal your information by simply watching whatyou type1) Snagging 2) Spying 3) Social engineering4) shoulder surfing 5) None of these

9. What is the address given to a computer connected to a network called?1) System Address 2) SYSID 3) Process ID4) IP Address 5) None of these

10. A process known as ____________ is used by large retailers to study trends.1) Data mining 2) data selection 3) POS4) data conversion 5) None of these

11. All of the following are examples of real security and privacy risks except1) Hackers 2) Spam 3) Viruses 4) identity theft 5) None of these

12. The desktop contains small graphics called1) Windows 2) logo 3) Icons 4) pictures 5) None of these

13. The Boolean operators of the Internet are1) And 2) OR 3) Nand 4) Nor 5) All of the above

14. Which of the Following is a Firmware Software in Computer? 1) WINDOWS 2) DOS 3) BIOS 4) PASCAL 5) None of these15. Which generation of computers is covered by the period 1964-77?

1) First 2) Second. 3) Third 4) Forth 5) None of these

COMPUTER AWARENESS

Page 2: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 2 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

16. ____________ is the study of molecules and structures whose size ranges from 1to 100 nanometers.1) Nanoscience 2) Microelectrodes 3) Computer forensics4) Artificial intelligence 5) None of these

17. Java is example of ______ languages1) Low-level 2) computer 3) System programming4) high-level 5) None of these

18. ICMP stands for1) Intranet Control Message Protocol2) Internet Control Message Protocol3) Information Control Master Protocol4) internet communication message protocol 5) None of these

19. A typical modern computer uses1) LSI chips 2) Vacuum tubes 3) Valves 4) All the above 5) None of these

20. What are the instructions called that tell a system what, how, and when to dosomething?1) Object-oriented approach 2) Object-oriented database3) Program 4) Database management 5) None of these

21. A hacker contacts you by phone or email and attempts to acquire your password1) Spooling 2) Phishing 3) Spamming 4) bugging 5) None of these

22. Which of the following systems mimics human thinking?1) Artificial intelligence 2) Intelligent agent 3) Boot4) Database management system 5) None of these

23. When you purchase a product over a Mobile Phone, the transaction is called ___1) Web Commerce 2) e-Commerce 3) m-Commerce4) Mobile Purchases 5) None of these

24. __________ is data that has been organized or presented in a meaningful fashion.1) A process 2) Software 3) Storage 4) Information5) None of these

25. ____________ is the science that attempts to produce machines that display thesame type of intelligence that humans do.1) Nanoscience 2) Nanotechnology 3) Simulation4) Artificial intelligence 5) None of these

26. A (n) _______ camera is a peripheral device used to capture still images in adigital format that can be easily transferred into a computer and manipulatedusing graphics software.1) Digital 2) analog 3) classic 4) Film 5) None of these

27. A is a device that not only provides surge protection, but also furnishes yourcomputer with battery backup power during a power outage1) Surge strip 2) USB 3) UPS 4) battery strip 5) None of these

28. Programs stored in ROM are called ___1) Hardware 2) Firmware 3) Software 4) all of above 5) None of these

29. More than one of the same components is anexample of a __________ system.1) Scalable 2) Redundant 3) RAID 4) back-up 5) None of these

30. ____________terminals (formerly known as cash registers) are oftenconnected to complex inventory and sales computer systems.1) Data 2) Point-of-sale 3) Sales 4) Query 5) None of these

31. The name for the way that computers manipulate data into information is called?1) Programming 2) Processing 3) Storing 4) organizing 5) None of these

Page 3: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 3 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

32. When you save to _____ your data will remain intact even when the computer isturned off.1) RAM 2) motherboard 3) Secondary storage device4) primary storage device 5) None of these

33. What kind of programming language is Java?1) Object-oriented programming language2) Relational programming language3) Sixth-generation programming language4) Database management programming Language. 5) None of these

34. The phrase __________ describes viruses, worms, Trojan horse attack applets,and attack scripts.1) Malware 2) spam 3) phish 4) virus 5) None of these

35. The unit KIPS/MIPS is used to measure the speed of _________1)Processor 2) Disk drive. 3) Printer 4) Tape drive 5) None of these

36. _______ is a Sequential access medium device.1) All Magnetic Medium Devices 2) C4)3) Magnetic Tapes 4) Pen Drive 5) None of these

37. A (n) ____________ system is a small, wireless handheld computer that scans anitem’s tag and pulls up the current price (and any special offers) as you shop.1) PSS 2) POS 3) inventory 4) data mining. 5) None of these

38. An e-mail address typically consists of a user ID followed by the____ sign and the name of the e-mail server that manages the user’s electronicpost office box.1) @ 2) # 3) & 4) * 5) None of these

39. Which of the following statements is/are true?1) Cache Memories are bigger than RAM2) Cache Memories are smaller than RAM3) ROM is faster than RAM4) Information in ROM can be written by users. 5) None of these

40. Which device can understand difference between data & programs?1) Input device 2) Output device. 3) Memory4) Microprocessor 5) None of these

41. Dot matrix and band printers are __________ printers1) Laser 2) Impact 3) Inkjet 4) thermal 5) None of these

42. The ability to recover and read deleted or damaged files from a criminal’s computeris an example of a law enforcement specialty called:1) Robotics 2) simulation 3) Computer forensics4) animation 5) None of these

43. The Computer Data is stored in the form of:1) Windows 2) logos 3) Folders 4) pictures 5) None of these

44. The motherboard is the—1) Circuit board that houses devices 2) Same as the CPU chip3) The first dup that is accessed when the Computer is turned on4) Circuit board that contains a CPU and other Chips 5) None of these

45. A (n) __________ converts all the source code into machine code, creating anexecutable file1) Linker 2) Compiler 3) Interpreter 4) Assembler 5) None of these

Page 4: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 4 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

46. Which of the following is not one of the four major data processing functions ofa computer?1) Gathering data 2) processing data into information3) Analyzing the data or information4) storing the data or information 5) None of these

47. A file extension is separated from the main file name with a (n) ____ but nospaces.1) Question mark 2) exclamation mark 3) Underscore4) period 5) None of these

48. The transformation of a message into an encoded form is known as1) Mnemonics 2) Encoding. 3) Encryption 4) Decoding 5) None of these

49. Memory unit is one part of1) Input device 2) Control unit 3) Output device4) Central Processing Unit 5) None of these

50. In a laser printer, the __________ transfers the image to the paper1) Laser 2) roller 3) toner 4) Drum 5) None of these

51. ____________ tags, when placed on an animal, can be used to record and track ina database all of the animal’s movements1) POS 2) RFID 3) PPS 4) GPS 5) None of these

52. IC are classified on the basis of ___1) Manufacturing company 2) Type of computer. 3) Number of transistors4) 1 and 2 5) None of these

53. Algorithm and Flow chart help us to1) Know the memory capacity 2) Identify the base of a number system3) Direct the output to a printer4) Specify the problem completely and clearly 5) None of these

54. A series of steps that always results in an answer is the definition of ______.1) Heuristic 2) flowchart. 3) Algorithm 4) pseudo code 5) None of these

55. What is meant by “green computing?”1) A non-computing person using a computer2) Environmentally sensible computing3) The leading edge of computer technology4) Using a new software program 5) None of these

56. The most important or powerful computer in a typical network.1) Desktop 2) network client. 3) Network server4) network station 5) None of these

57. If you wished to limit what you would see on an Excel worksheet, what datafunction would you use?1) Sort 2) Filter. 3) Conditional format4) Data analysis 5) None of these

58. The rules of a language are called its __________.1) Structure 2) code 3) Syntax. 4) Rigidity 5) None of these

59. A __________ is anything that can cause harm.1) Vulnerability 2) phish 3) Threat 4) spoof 5) All of the above

60. MCI and AT&T are examples of which of the following?1) Social networks 2) Communications systems3) Internet service providers 4) Mobisodes 5) None of these

61. A word in a web page that, when clicked, opens another document.1) Anchor 2) URL 3) Hyperlink 4) reference 5) All of above

Page 5: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 5 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

62. Which computer virus records every movement you make on your computer?1) Malware Android 2) Key logger 3) DoS4) Trapper. 5) None of these

63. The daily processing of corrections to customer accounts best exemplifies theprocessing mode of:1) Batch processing 2) Real-time processing3) Inter processing 4) Multi processing 5) All of the above.

64. Software instruction intended to satisfy a user's specific processing needs arecalled1) System software 2) A microcomputer. 3) Documentation4) Applications software 5) All of the above

65. To access a mainframe or supercomputer, users often use a ___1) Terminal 2) node 3) desktop 4) Handheld 5) None of these

66. If you wished to highlight, not hide, some information in a worksheet because itmet some criteria, what Excel tool would you use?1) Table 2) Format 3) Conditional Format4) Filter 5) None of these

67. A language that can be written on one platform and executed on another platformis said to be ___.1) Portable 2) robust. 3) Third generation4) dynamic 5) None of these

68. The person who writes and tests computer programs is called a1) programmer 2) computer scientist 3) software engineer4) project developer 5) None of these

69. What type of telecommunications hardware allows you to access the web?1) Browser 2) Modem 3) FTP protocol 4) IRC 5) All of above

70. A network’s __________ is the central structure that connects otherportions of the network.1) Trunk 2) Backbone 3) Protocol 4) server 5) None of these

71. What program would you use to gain administrative rights to someone's computer?1) Bot 2) Executive Android. 3) Root kit4) Trojan horse 5) None of these

72. Which is related to unit of measurement in computer systems?1) Byte 2) Kilobyte. 3) Megabyte 4) Gigabyte 5) All of the above

73. Which of the following is the most powerful type of computer?1) Super micro 2) Super conductor 3) Microcomputer4) Super computer 5) Mega frame

74. What data base function allows you to define the data your database is storing?1) Definition wizard 2) Query Function. 3) Design view4) Data dictionary 5) None of these

75. What Excel tool allows you to create quickly and automatically summary datafrom a large data set?1) Conditional formatting 2) Sorting 3) Pivot tables4) Field lists 5) None of these

76. __________ is Microsoft’s latest entry into the programming arena.1) Java 2) .NET 3) Visual Basic4) Pascal 5) None of these

77. File extension separate the file name by using the __________ symbol1) & 2) . 3) % 4) * 5) None of these

78. ________ is the protocol that supports linking from one web page to another page.1) HTML 2) IP 3) HTTP 4) FTP 5) All of above

Page 6: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 6 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

79. A remote control that is used to turn on or off some machine is also called a (n)_____.1) Class 2) interface 3) message 4) instance 5) None of these

80. Million Bytes is represented by1) Kilo Byte 2) Giga Byte 3) Mega Byte 4) sixteen bits 5) None of the above

81. Which of the following people probably has the least amount of technical knowledge?1) Programmer 2) User 3) System analyst4) Computer operator 5) Computer professional

82. If you wanted to tell the database management system that a specific attributecontained numbers only, what would you need to set?1) Data category 2) Data type 3) Data dictionary4) Data definition 5) None of these

83. When creating a custom filter in Excel, which of the following would not beconsidered a Boolean operator?1) If 2) And 3) Or 4) Not 5) None of these

84. A next-generation Web content development language, __________ typically refersto a suite of technologies that allow developers to store data in a readable format.1) HTML 2) XSL 3) XML 4) PHP 5) None of these

85. The mail server as defined in the text uses the __________ protocol to ReceiveData.1) HTTP 2) FTP 3) POP 4) SMTP 5) All of above

86. You can organize your bookmarks using __________.1) Structures 2) containers. 3) Folders 4) menus 5) None of these

87. In a student grading system, Student Last Name, Student Address, and FinalCourse Grade would all be classified as what?1) Inheritance 2) Information3) Encapsulation 4) Polymorphism 5) None of these

88. Which is a secondary memory device?1) CPU 2) ALU 3) Floppy disk 4) Mouse 5) None of the above

89. The Central Processing Unit (CPU) consists of:1) Input, output and processing2) Control unit, primary storage & secondary Storage3) Control unit, arithmetic-logic unit &primary storage4) Control unit, processing, and primary storage 5) None of these

90. What key distinctly identifies a record in a database table?1) Main key 2) Primary key 3) Principal Key 4) Major key 5) None of these

91. Which of the following is a good habit to get into when creating a worksheet?1) Placing titles for columns in the first row of data

2)Using conditional formatting to spot spelling errors3) Inserting comments in each cell to define that data or type of data

4) Grouping records according to some Classification. 5) None of these92. Which of the following will not protect you from spam?

1) Spam blockers 2) e-mail rules3) Popup blocker4) filters. 5) None of these

93. When sending an e-mail, the __________ line describes the contents of themessage.1) to 2) subject 3) contents 4) CC 5) All of above

94. The browser’s __________ keeps a list of web pages you have visited during thecurrent session.1) History 2) cache1 3) favorites 4) trail 5) All of the above

Page 7: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 7 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

95. What part of object-oriented technology defines super class and subclassrelationships?1) Inheritance 2) Scalability. 3) Encapsulation 4) Polymorphism 5) All of above

96. Which is the computer memory that does notforget?1) ROM 2) RAM 3) PROM4) All of the above 5) None of the above

97. This is the part of the computer system that one can touch and feel?1) Hardware 2) data 3) software 4) input 5) None of these

98. What key links records from one database table to a record or records in anotherdatabase table?1) Primary key 2) Principal Key 3) Foreign key 4) Link key 5) None of these

99. What term is used to describe a collection of information that you can use to buildreports or discover facts about an environment?1)Database 2) Web site 3) Wiki 4) Relation 5) None of these

100. A __________’s main purpose is to prohibit unauthorized access to your computervia the Internet.1) Popup blocker 2) Firewall 3) Spyware blocker4) spam assassin 5) Restore files

101. Unsolicited commercial email is commonly known as __________.1) Junk 2) hoaxes 3) spam 4) hypertext 5) All of above

102. The most common binary code in use today is the 8 bit ASCII code. What do theletters ASCII stand for?1) American Standard Code for International Interchange2) American Standard Code for Information Interchange3) American Standard Code for Intelligence Interchange4) American Scientific Code for Information Interchange. 5) None of the above

103. Reusable optical storage will typically have the acronym ___.1) CD 2) RW 3) DVD 4) ROM 5) None of these

104. When you link one database table to another database table, what are youcreating?1) Primary link 2) Connectivity 3) Relationships4) Referential integrity. 5) None of these

105. Microsoft's Access and Corel's Paradox are both examples of which type ofsoftware?1) Network database systems 2) Relational database systems3) Flat-file database systems 4) Hierarchical database systems 5) None of these

106. The __________ is a special database that holds information aboutthe computer’s user, installed programs and hardware devices.1) Dynamic library 2) initialization file 3) Compiled help module4) Windows Registry 5) None of these

107. To read the system messages and warnings, access the __________ in Windows.1) System manager 2) control panel 3) Event viewer4) message screen. 5) None of these

108. News servers utilize __________ to distribute documents to readers.1) NNTP 2) NEWS 3) HTTP 4) FTP 5) None of these

109. A computer derives its basic strength from1) Speed 2) Accuracy 3) Memory4) all of the above 5) None of the above

110. The __________ tells the computer how to use its components.1) Utility 2) network 3) operating system4) application program. 5) None of these

Page 8: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 8 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

111. Keystrokes are Converted Into which Code?1) Binary Code 2) ASCII 3) ANSI 4) JAVA 5) None of these

112. ARPANet was introduced in?1) 1642 2) 1969 3) 1972 4) 1981 5) None of these

113. Which of the following is Telecommunication medium device?1) HUB 2) SWITCH 3) MODEM 4) GATEWAY 5) None of these

114. To create a copy of files in the event of system failure, you create a __________.1) Restore file 2) backup 3) firewall 4) redundancy 5) None of these

115. Software, such as Explorer and Firefox, are referred to as _____.1) Systems software 2) Utility software 3) Browsers4) Internet tools 5) None of these

116. A BIT represents a1) Decimal digit 2) Octal digit. 3) Binary digit4) Hexadecimal digit 5) None of these

117. Which of the following contains information about the structure of a database?1) Database management system 2) Data dictionary3) Data repository 4) Data warehouse. 5) None of these

118. The color of an object is an example of a(n) __________.1) Attribute 2) detail 3) listing 4) specification5) None of these

119. To recover files from a backup, you perform a __________.1) Restore 2) scan 3) un erase 4) copy 5) None of these

120. When internet data leaves your campus, it normally goes to a (n) ______ beforemoving toward its destination.1) Internet backbone 2) Network access point3) Base station 4) Communication system 5) None of these

121. The Internet was originally a project for this government agency.1) ARPA 2) NSF 3) NSA 4) FCC 5) None of these

122. How do accountants quickly research new government rules and regulations?1) With an internal database management Systems 2) Through the Web3) With an external database management Systems4) Through organizational network systems 5) All of above

123. A collection of eight bits is called1) Byte 2) Word 3) Record 4) File 5) None of the above

124. What database tool would you use to find answers to your questions about datastored in your database?1) Queries 2) Tables 3) Show 4) Q&A 5) None of these

125. After you develop a model for your database, you should then _____ it beforebuilding it.1) Normalize 2) design 3) plan 4) Approve 5) None of these

126. If configured correctly, the __________ will prevent interaction with computerafter a specified time period.1) Firewall 2) filter 3) screen saver 4) popup blocker 5) virus

127. Which IT area is well-established in Accounting?1) Multimedia systems 2) Web development3) Statistical analysis4) Accounting Information Systems 5) None of these

128. What common technique attempts to save time and energy by reducing redundantwork in object- oriented programming?1) Reduce lines of programming 2) Reuse of code3) Reduce size of systems being developed4) Merging different systems together 5) All of above

Page 9: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 9 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

129. Process of finding errors in software Code is called?1) Debugging 2) Testing 3) Fetching 4) Finding 5) None of these

130. Correcting/Rectification of errors in Software Code is called? 1) Debugging 2) Testing 3) Fetching 4) Finding 5) None of these131. Microsoft first introduced an operating environment named Windows in which

year?1)1977 2) 1980 3) 1985 4) 1990 5) None of these

132. Which of the following uses a handheld operating system? 1) supercomputer 2) personal computer 3) Laptop.

4) PDI 5) None of these133. To display the contents of a folder in Windows Explorer you should ______

1) click on it 2) collapse it 3) name it4) give it a password 5) None of these

134. The CPU comprises of Control, Memory and _____ units1) Microprocessor 2) Arithmetic/Logic 3) Output4) ROM 5) None of these

135. _____ is the most important/powerful computer in a typical network1) Desktop 2) Network client 3) Network server4) Network station 5) None of these

136. A(n) ______ appearing on a web page opens another document when clicked1) anchor 2) URL 3) hyperlink 4) reference 5) None of these

137. Which of the following refers to the rectangular area for displaying informationand running programs?1) Desktop 2) Dialog box 3) Menu 4) Window 5) None of these

138. ________ is a windows utility program that locates and eliminates unncessaryfragments and rearranges filed and unused disk space to optimize operations1) Backup 2) Disk cleanup 3) Disk defragmenter4) Restore 5) None of these

139. Which of the following refers to too much electricity and may cause a voltagesurge?1) Anomaly 2) Shock 3) Spike 4) Virus 5) None of these

140. The software that is used to create text-based documents are referred to as______1) DBMS 2) Suites 3) Spreadsheets4) Word processors 5) None of these

141. _________ devices convert human understandable data and programs into a formthat the computer can process.1) Printing 2) Output 3) Solid state 4) Input 5) None of these

142. Allows users to upload files to an online site so they can be viewed and editedfrom another location1) General purpose applications 2) Microsoft Outlook3) Web-hosted technology 4) Office live 5) None of these

143. What feature adjusts the top and bottom margins so that the text is centeredvertically on the printed page?1) Vertical justifying 2) Vertical adjusting 3) Dual centering4) Horizontal centering 5) None of these

144. Which of these is not a means of personal communication on the internet?1) Chat 2) Instant messaging 3) Instanotes4) Electronic mail 5) None of these

Page 10: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 10 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

145. What is the overall term for creating editing, formatting, storing, retrieving andprinting a text document ?1) Word processing 2) Spreadsheet design 3) Web design4) Database management 5) None of these

146. Fourth generation mobile technology provides enhanced capabilities allowing thetransfer of both _____ data, including full-motion video, high-speed internet access,and video conferencing.1) video data and information 2) voice and non-voice 3) music and video4) video and audio 5) None of these

147. _______ is a form of denial of service attack in which a hostile client repeatedlysends SYN packets to every port on the server using fake IP addresses.1) Cybergaming crime 2) Memory shaving 3) Syn flooding4) Software piracy 5) None of these

148. Which of these is a point and draw device?1) Mouse 2) Scanner 3) Printer 4) CD-ROM 5) None of these

149. A set of rules for telling the computer what operations to perform is called a1) procedural language 2) structures 3) natural language4) programming language 5) None of these

150. A detailed written description of the programming cycle and the program, alongwith the test results and a printout of the program is called1) documentation 2) output 3) reporting4) spec sheets 5) None of these

151. Forms that are used to organize business data into rows and coloumns are called1) transaction sheets 2) registers 3) business forms4) spread sheets 5) None of these

152. In power point, the header and footre button can be found on the insert tab inwhat group?1) Illustrations group 2) Object group3) Text group4) Tables group 5) None of these

153. A(n) ______ is a set of programs designed to manage the resources of a computer,including starting the computer, managing programs, managing memory andcoordinating tasks between input and output devices.1) application suite 2) compiler 3) input/output system4) operating system 5) None of these

154. A typical slide in a slide presentation would not include1) photo images charts, and graphs 2) graphs and clip art3) clip art and audio clips 4) full motion video 5) None of these

155. The PC productivity tool that manipulates data organized in rows and coloumn iscalled a1) spreadhsheet 2) word processing document3) presentation mechanism 4) database record manager 5) None of these

156. In the absence of parentheses, the order of operation is1) exponentiation, addition of subtraction, muliplication of division2) addition or subtraction, multiplication or division, exponentiation3) multiplication or division, exponenitation, addition or subtraction4) exponentiation, multiplication or division, addition of subtraction5) None of these

157. To find the Paste Special option, you use the clipboard group on the _______ tab ofpower point1) Design 2) Slide show 3) Page layout 4) Home 5) None of these

Page 11: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 11 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

158. A(n) _____ program is one that is ready to run and does not need to be altered inany way.1) Interpreter 2) High level 3) Compiler 4) Executable 5) None of these

159. Usually downloaded into folders that hold temporary internet files, _____ arewritten to your computer's hard disk by some of the websites you visit.1) anonymous files 2) behaviour files 3) banner ads4) cookies 5) None of these

160. What is the easiest way to change the phrase, revenues, profits, gross margin, toread revenues, profits, and gross margin?1) Use the insert mode, position the cursor before the g in the gross, then typethe word and followed by a space2) Use the insert mode, position the cursor after the g in gross, then type theword and followed by a space3) Use the overtype mode, position the cursor before the g in gross, then type theword and followed by a space4) Use the overtype mode, position the cursor after the g in gross, then type theword and followed by a space5) None of these

161. A program either talk or music, that is made available in digital format forautomatic download over the internet is called a1) Wiki 2) Broadcast 3) Vodcast 4) Blog 5) None of these

162. Which power point view displays each slide of the presentation as a thumbnailand is useful for rearranging slides?1) Slide sorter 2) Slide show 3) Slide master 4) Notes page 5) None of these

163. Different components on the motherboard of a PC unit are linked together by se tsof parallel electrical conducting lines. What are these lines called?1) Conductors 2) Buses 3) Connectors 4) Consecutives 5) None of these

164. What is the name given to those applications that combine text, sound, graphics,motion video, and/or animation?1) Motionware 2) Anigraphics 3) Videoscapes4) Multimedia 5) None of these

165. A USB communication device that supports data encryption for secure wirelesscommunication for notebook users is called a1) USB wireless network adapter 2) wireless switch3) wireless hub 4) router 5) None of these

166. A(n) ____ language reflects the way people think mathematically.1) cross-platform programming 2) 3GL business programming3) event driven programming 4) functional 5) None of these

167. When entering text within a document, the Enter key is normally pressed at theend of every1) Line 2) Sentence 3) Paragraph 4) Word 5) None of these

168. When a real time telephone call between people is made over the Internet usingcomputers, it is called1) a chat session 2) an e-mail 3) an instant message4) internet telephony 5) None of these

169. Which of the following is the first step in sizing a window?1) Point to the title bar 2) Pull down the view menu to display the toolbar3) Point to any corner or border4) Pull down the view menu and change to large icons 5) None of these

170. Which of the following software could assist someone who cannot use their handsfor computer input?

Page 12: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 12 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1) Video conferencing 2) Speech recognition 3) Audio digitizer4) Synthesizer 5) None of these

171. ______ a document means the file is transferred from web server to your computer.1) Uploading 2) Really Simple Syndication 3) Accessing4) Downloading 5) None of these

172. Which computer memory is used for storing programs and data currently beingprocessed by the CPU?1) Mass memory 2) Internal memory 3) Non-volatile memory4) PROM 5) None of these

173. Computers that control processes accept data in a continuous1) data traffic pattern 2) data highway 3) infinite loop4) feedback loop 5) None of these

174. What refers to a set of characters of a particular design?1) Keyface 2) Formation 3) Calligraph 4) Stencil 5) None of these

175. ______ is used by public and private enterprises to publish and share financialinformation with each other and industry analysis across all computer platformsand the Internet.1) Extensible Markup Language 2) Extensible Business Reporting Language3) Enterprise Application Integration4) Sales Force Automation Software 5) None of these

176. Which part of the computer is used for calculating and comparing?1) ALU 2) Control unit 3) Disk unit 4) Modem 5) None of these

177. The method of Internet access that requires a phone line, but offers faster accessspeeds than dial- up is the _____ connection.1) cable access 2) satellite access 3) fiber-optic service4) modem 5) None of these

178. ____ software creates a mirror image of the entire hard disk, including the operatingsystem, applications, files and data.1) Operating system 2) Backup software 3) Utility programs4) Driver imaging 5) None of these

179. What is a URL?1) A computer software program 2) A type of programming object3) The address of a document or page on the World Wide Web4) An acronym for Unlimited resources for Learning 5) None of these

180. What is the significance of a faded (dimmed) command in a pull-down menu?1) The command is not currently accessible2) A dialog box appears if the command is selected3) A help window appears if the command is selected4) There are no equivalent keystrokes for the particular command5) None of these

181. Your business has contracted with another company to have them host and runan application for your company over the Internet. The company providing thisservice to your business is called an1) Internet service provider 2) Internet access provider3) Application service provider 4) Outsource agency 5) None of these

182. A(n) _____ allows you to access your e-mail from anywhere.1) forum 2) webmail interface 3) message board4) weblog 5) None of these

183. Which of the following would you find on Linkedin?1) Games 2) Connections 3) Chat 4) Applications 5) None of these

Page 13: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 13 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

184. ________ is a technique that is used to send more than one call over a single line.1) Digital transmission 2) Infrared transmission 3) Digitizing4) Multiplexing 5) None of these

185. The search companion can1) locate all files containing a specified phrase2) restrict its search to a specified set of folders3) locate all files containing a specified phrase and restrict its search to a specifiedset of folders4) cannot locate all files containing a specified phrase or restrict its search to aspecified set of folders5) None of these

186. Which of the following cannot be part of an e-mail address?1) Period 2) At sign 3) Space 4) Underscore 5) None of these

187. Which of the following must be contained in a URL?1) A protocol identifier 2) The letters www.3) The unique registered domain name4) www.and the unique registered domain name 5) None of these

188. In [email protected] what does .com stands for?1) Hypertext. 2) Mail address. 3) Domain4) Website. 5) None of these

189. A mistake in an algorithm that causes incorrect results is called a1) logical error 2) syntax error3) procedural error4) compiler error 5) None of these

190. A device for changing the connection on a connector to a different configurationis1) a converter 2) a competent3) an attachment 4) an adapter 5) None of these

191. To navigate to a new web page for which you know the URL, type that URL in thebrowser's ... and press Enter1) Address bar 2) Domain bar 3) Address button4) Name button 5) None of these

192. The CPU also called the ... when talking about PCs, does the vast majority of theprocessing for a computer.1) Macroprocessor 2) RAM 3) Memory system4) microprocessors 5) None of these

193. A computer's type, processor and operating system define its ...1) Brand 2) Size 3) Platform 4) Speed 5) None of these

194. A kiosk1) is data organised and presented in a manner that has additional value beyondt he value of the data itself2) combines microscopic electronic components on a single integrated circuitthat processes bits according to software instructions3) is a computer station that provides the public with specific and usefulinformation and service4) describes a computer's type, processor, and operating system5) None of these

195. The part of the CPU that accesses and decodes programme instructions, andcoordinates the flow of data among various system components is the1) ALU 2) Control unit 3) Megabertz 4) Motherboard5) None of these

196. Computer programs are written in a high level programming language, however,the human readable version of a program is called

Page 14: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 14 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1) cache 2) instruction set 3) source code4) word size 5) None of these

197. What is the difference between a CD-ROM and a CD-RW?1) They are the same just two different terms used by different manufacturers2) A CD-ROM can be written to and a CD-RW cannot3) A CD-RW can be written to, but a CD-ROM can only be read from4) A CD-ROM holds more information than a CD-RW 5) None of these

198. What is the term for how words will appear on a page?1) Text formatting 2) Character formatting 3) Point size4) Typeface 5) None of these

199. The process of a computer receiving information from a server on the Internet isknown as1) Pulling 2) Pushing 3) Downloading 4) Transfering 5) None of these

200. When sending an e-mail, the ... line describe the contents of the message1) Subject 2) To 3) Contents 4) CC 5) None of these

201. All the deleted files go to1) Recycle bin 2) Task bar 3) Tool bar4) My computer 5) None of these

202. You organise files by storing them in1) Archives 2) Folders 3) Indexes 4) Lists 5) None of these

203. A website address is a unique name that identifies a specific ___ on the web1) Web page 2) Website 3) PDA 4) Link 5) None of these

204. _________ are specially designed computer chips that reside inside o ther devices,such as your car or your electronic thermostat1) Servers 2) Embedded computers 3) Robotic computers4) Mainframes 5) None of these

205. Which of the following places the common data elements in order from smallestto largest?1) Character, file, record, field, database2) Character, record, field, file, database3) Character, field, record, file, database4) Bit, byte, character, record, field, file, database 5) None of these

206. Which of the following statements is false concerning file names?1) Files may share the same name or the same extension but not both2) Every file in the same folder must have a unique name3) File extension is another name for file type 4) None of these

207. A disk's content that is recorded at the time of manufacture and that cannot bechanged or erased by the user is1) Memory only 2) Write only 3) Read only4) Run only 5) None of these

208. Distributed processing involves1) solving computer component problems from a different computer2) solving computing problems by breaking them into smaller parts that areseparately processed by different computers3) allowing users to share files on a network4) allowing users to access network resources away from the office5) None of these

209. The operating system determines the manner in which all of the following occursexcept1) user creation of a document 2) user interaction with the processor3) printer output 4) data displayed on the monitor 5) None of these

Page 15: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 15 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

210. Connecting upto10 computers in an office to share printer is which type of Network?1) CAN 2) LAN 3) DAN 4) WAN 5) None of these

211. You can keep your personal files/folders in1) My folder 2) My documents 3) My files4) My text 5) None of these

212. The primary purpose of software is to turn data into1) Websites 2) Information 3) Programs 4) Objects 5) None of these

213. A directory within a directory is called1) Mini Directory 2) Junior Directory 3) Part Directory4) Sub Directory 5) None of these

214. A compiler translates a program written in a high-level language into1) Machine language 2) An algorithm 3) A debugged program4) Java 5) None of these

215. When your turn on the computer, the boot routine will perform this test1) RAM test 2) disk drive test 3) memory test4) power on self test 5) None of these

216. A ___________ is a unique name that you give to a file of information1) Device letter 2) Folders 3) File name4) File name extension 5) None of these

217. Hardware includes1) all devices used to input data into a computer2) sets of instructions that a computer runs or executes3) the computer and all the devices connected to it that are used to input andoutput data4) all devices involved in processing information including the central processingunit, memory and storage5) None of these

218. A ______ contains specific rules and words t hat express the logical steps of analgorithm1) Programming language 2) Syntax error3) Programming structure4) Logic chart 5) None of these

219. The simultaneous processing of two or more programs by multiple processors is1) multiprogramming 2) multitasking 3) time-sharing4) multiprocessing 5) None of these

220. The secret code that restricts entry to some programs1) Password 2) Passport 3) Entry code4) Access code 5) None of these

221. Computers use the ________ number system to store data and perform calculations.1) Binary 2) Octal 3) Decimal 4) Hexadecimal 5) None of these

222. The main function of the ALU is to1) perform arithmetic and logical operations2) store data and information for future use3) control computer output, such as printing4) monitor all computer activities 5) None of these

223. ________ is the process of carrying commands.1) Fetching 2) Storing 3) Executing 4) Decoding 5) None of these

224. Softcopy is the intangible output, so then what is hardcopy?1) The physical parts of the computer 2) The printed parts of the computer3) The printed output 4) The physical output devices5) None of these

225. A(n) _______ is a program that makes the computer easier to use1) utility 2) application 3) operating system 4) network 5) None of these

Page 16: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 16 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

226. A complete electronic circuit with transistors and other electronic components ona small silicon chip is called a(n)1) workstation 2) CPU 3) magnetic disk4) integrated circuit 5) None of these

227. Computer systems are comprised of1) hardware, programs, processors, procedures and people2) hardware, programs, information, people and procedures3) hardware, programs, information, people and networks4) hardware, software, procedures, networks and people 5) None of these

228. An error in a computer program1) Crash 2) Power Failure 3) Bug 4) Virus 5) None of these

229. What is output?1) What the processor takes from the user2) What the user gives to the processor3) What the processor gets from the user4) What the processor gives to the user 5) None of these

230. A peer-to-peer LAN is an appropriate network architecture for____1) The Internet. 2) Home network.3) Network requiring a server with shared resources.4) wide area network 5) None of these

231. Similar to a hub in an Ethernet network, a _______ helps relay data betweenwireless network nodes.1) Wireless port 2) Wireless access point 3) wireless adapter4) wireless transceiver 5) None of these

232. Cell phones use ____________ to access the Internet.1) MMS technology 2) a notation system 3) micro browser software4) HTML language 5) None of these

233. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______1) Node. 2) Packet. 3) Override. 4) Token. 5) None of these

234. The uniform resource locator (URL) is case sensitive in the ____.1) Protocol 2) Authority 3) Directory 4) Type 5) None of these

235. ASCII is a(n)________1) Numbering system for representing numbers with decimals.2) Character representation standard common in older mainframe computers.3) Encoding standard used to represent letters and characters.4) Symbolic programming language that directly represents machine instructions.5) None of these

236. A global network made up of thousands of privately owned computers and networksis called the:1) World Wide Web. 2) Internet. 3) Specialized search engine.4) Internet2. 5) None of these

237. Which of the following is NOT a basic function of the operating system?1) Manage memory 2) Provide the word processing system3) Start the computer 4) Provide the user interface 5) None of these

238. Which of the following scrambles a message by applying a secret code?1) Encryption 2) Audits 3) UPS 4) Firewalls 5) None of these

239. The Internet began with the development of1) USENET 2) ARPANET 3) Ethernet 4) Intranet 5) None of these

240. Website is a collection of ________1) HTML documents 2) Graphic files 3) Audio and Video files4) All of the above 5) None of these

Page 17: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 17 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

241. Who designed the first electronic computer- ENIAC ?1) Eckert & Mauchly 2) Joseph M Jacquard 3) J presper Eckert4) Both 1 and 2 5) None of these

242. Which of the following is not a network?1) Local Area Network 2) Wide Area Network 3) Optical Fiber4) All are networks 5) None of these

243. In MICR, C stands for?1) Code 2) Colour 3) Computer 4) Character 5) None of these

244. Which of the following is the largest unit of storage?1) GB 2) KB 3) MB 4) TB 5) None of these

245. Virtual memory is?1) memory on the hard disk that the CPU uses an extended RAM2) in RAM3) only necessary if you do not have any RAM in your computer4) a back up device for floppy disks 5) None of these

246. _______ is the process of finding errors in software code?1) Compiling 2) Testing 3) Running 4) Debugging 5) None of these

247. What is the shortcut key to “Undo” the last action in a document?1) Ctrl + X 2) Ctrl + Y 3) Ctrl + Z 4) Ctrl + U 5) None of these

248. The programs which are as permanent as hardware and stored in ROM is knownas1) Hardware 2) Software 3) Firmware 4) ROM ware 5) None of these

249. For creating a document, you use........ Command at File Menu.1) Open 2) Close 3) New 4) Save 5) None of these

250. Computer uses the_________number system to store data and perform calculations.1) Binary 2) octal 3) Decimal 4) Hexadecimal5) None of these

251. .............. is the process of carrying out commands1) Fetching 2) Storing 3) Decoding 4) Executing 5) None of these

252. In word, when you indent a paragraph, you ....1) push the text in with respect to the margin2) change the margins on the page3) move the text up by one line4) move the text down by one line 5) None of these

253. ASCII stands for .........1) American Special Computer for Information Interaction2) American Standard Computer for Information Interchange3) American Special Code for Information Interchange4) American Special Computer for Information Interchange5) American Standard Code for Information Interchange

254. Which of the following is used by the browser to connect to the location of theInternet resources ?1) Linkers 2) Protocol 3) Cable 4) URL 5) None of these

255. ……….is the process of dividing the disk into tracks and sectors.1) Tracking 2) Formatting 3) Crashing 4) Allotting 5) None of these

256. What is the permanent memory built into your computer called ?1) RAM 2) Floppy 3) CPU 4) CO-ROM 5) ROM

257. Which computer memory is used for storing programs and data currently beingprocessed by the CPU ?1) Mass memory 2) Internal memory 3) Non-volatile memory4) PROM 5) None of these

Page 18: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 18 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

258. Changing an existing document is called _____ the document.1) Creating 2) Editing 3) Modifying 4) Adjusting 5) None of these

259. What is backup?1) Adding more components to your network2) Protecting data by copying it from the original source to a different destination3) Filtering old data from the new data4) Accessing data on tape 5) None of these

260. What is a popular program for creating documents that can be read on both a PCand a Macintosh computer?1) Microsoft Word 2) Adobe In Design 3) Adobe Acrobat4) QuarkXPress 5) None of these

261. An image on a computer screen is made up of a matrix of what?

1) Byte 2) Pixels 3) Bit 4) Palette 5) None of these262. What does dots per inch (DPI) measure?

1) number of bits it takes to represent each color2) density of the pixels on a computer screen3) the density of bits on a disk4) density of graphic files stored on a hard disk 5) None of these

263. What type of software creates a smaller file that is faster to transfer over theInternet?1) MPEG 2) Unzipped 3) Fragmentation 4) Compression 5) None of these

264. A unit of computer information that contains data as well as all the procedures oroperations is called:1) A method. 2) Encapsulation. 3) An object. 4) An OOP 5) None of these

265. The world’s first truly cross-platform programming language is called:1) C++. 2) Java. 3) Visual BasiC.NET.4) Smalltalk. 5) None of these

266. The most widely used type of database management system is the:1) Flat database. 2) Network databas5) 3) Relational database.4) Hierarchical database. 5) None of these

267. What is the newest type of database, which is well suited for multimediaapplications, called?1) Object-oriented database 2) Client/server database3) Data warehouse 4) Multimedia database 5) None of these

268. What do the circles on a data flow diagram represent?1) Data sources and destinations 2) Data flows3) Transformation processes 4) Data stores 5) None of these

269. The type of printer that prints by selectively unchanging static electricity fromspots on a metal drum is a(n):1) Plotter 2) Dot-matrix printer 3) Laser printer4) Ink-jet printer 5) None of these

270. A warm boot in older versions of Windows is caused by:1) Typing the Alt+ Tab key combination2) Selecting Hibernate or Standby when shutting down3) Typing the Ctrl+ Alt+ Delete key combination4) Pressing the power switch 5) None of these

271. Setting fonts for the text in your document is an example of:1) Formatting.2) Formulas. 3) Tracking changes 4) Tools. 5) None of these

272. ____________ is the file system used by the operating system to identify thephysical locations of files on the hard drive.1) RTOS 2) GIF 3) FAT 4) POST 5) None of these

Page 19: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 19 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

273. ___________software allows the user to speak into the computer rather than typein text.1) Speech recognition 2) CHAT 3) Message4) All of the above 5) None of these

274. A server uses _________applications software to support its client computers.1) back-end 2) front end 3) programming4) java 5) none of these

275. What does the XP stand for in Windows XP?1) Exponential 2) Experience 3) Expertise 4) Exchange 5) None of these

276. Which symbol is used in Excel to denote exponential numbers?1) * 2) ^ 3) & 4) $ 5) None of these

277. Which of the following is NOT a source of viruses?1) Diskettes 2) The Internet 3) E-mail messages4) Computer networks 5) None of these

278. Which printer type is an impact printer?1) Page printers 2) Laser printers 3) Ink-jet printers4) Dot-matrix printers 5) None of these

279. What type of software must to be used to translate scanned text into a formatthat can be manipulated?1) OCR 2) CRT 3) RGB 4) MIDI 5) None of these

280. High Resolution computer monitors will have_____1) High dpi 2) Low dpi 3) 256 colors4) Resolution is not measured in dpi 5) None of these

281. A world wide web contains web pages ______1) Residing in many computers 2) Created using HTML3) With links to other web pages4) Residing in many computers linked together using HTML5) None of these

282. Word processing, spreadsheet, and photo-editing are examples of________1) application software 2) system software 3) operating system software4) platform software 5) none of these

283. Retail employees typically use ____________ terminals to process sales transactions.1) sales processing 2) transaction point 3) automatic teller4) point of sale 5) None of these

284. The primary purpose of a computer is to process _____________ and convert it intoinformation.1) electricity 2) data 3) raw material 4) a bit 5) None of these

285. The simultaneous processing of two or more programs by multiple processors is_____1) multiprogramming 2) multitasking 3) time-sharing4) multiprocessing 5) None of these

286. Help Menu is available at which button?1) End 2) Start 3) Turnoff 4) Restart 5) Reboot

287. The……….folder retains copies of messages that you have started but are not yetready to send.1) Drafts 2) Outbox 3) Address Book 4) Sent Items 5) None of these

Page 20: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 20 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

288. Which of the following statements is true?1) Microsoft Windows defines the operating environment standard for computerswith Linux processors2) Microsoft Windows defines the operating environment standard for computerswith UNIX processors3) Mac OS defines the operating environment standard for computers with Intelprocessors4) Microsoft Windows defines the operating environment standard for computerswith Intel processors5) None of these

289. The ___________ records the name and exact location of every file on a disk.1) partition master 2) file allocation table 3) disk controller4) boot sector 5) None of these

290. Inheritance is the ability of an object to pass on its characteristics to its____________.1) subclasses 2) off-spring 3) super classes 4) parents 5) none of these

291. Which of the following activities is NOT a component of e-business?1) Collaboration with business partners 2) Cash flow management3) Customer service 4) Selling 5) None of these

292. Which of the following extends data across networks rather than store it in onecentral site?.1) PIM 2) File manager 3) Distributed database4) Data mining program 5) None of these

293. What is a serial port that adds a direct connection to a network?1) FireWire 2) NIC 3) USB4) Internal modem 5) None of these

294. Which of the following is saved to noncontiguous clusters on a hard disk?1) Clustered file 2) Defragmented file 3) Sectored file4) Fragmented file 5) None of these

295. What should be used if a company wants to include its company name and logo atthe bottom of every page of a brochure?1) Header 2) Macro 3) Footer 4) Footnote 5) None of these

296. ___________ is an event-driven programming language developed in the early1990.1) C 2) VB 3) C++ 4) Pascal 5) None of these

297. Linux is a_____1) Utility program for peer-to-peer file sharing 2) Real-time operating system3) Network operating system 4) PDA platform 5) None of these

298. The_________ runs the front-end applications software in a network.1) Client 2) Database 3) Server 4) CPU 5) None of these

299. Which of the following is used for close a tab on a browser?1) Ctrl + T 2) Ctrl + W 3) Ctrl + A 4) Ctrl + Y 5) None of these

300. What is RISC?1) Storage Device 2) Computer Network 3) Microprocessor4) Operating System 5) None of these

301. ‘NORTON‘ is an ____1) Software 2) Anti-Virus Program 3) Network4) Program 5) None of these

302. A program that converts high level language to machine Language is _______1) Linker 2) Assembler 3) Compiler 4) All of the above 5) None of these

Page 21: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 21 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

303. Zip is a ——file.1) Executable File 2) Compressed File 3) System File4) Combo 5) None of these

304. At a time how many operating system can be at work on a computer ?1) Only one 2) Two 3) Three 4) Four 5) None of these

305. Answer Sheets in bank PO‘s/Clerk‘s examinations are checked by using –1) Optical Character Reader 2) Optical Mark Reader3) Magnetic ink Character Reader 4) All of the above 5) None of these

306. Image can be sent over telephone lines by using —-1) Larger bandwidth 2) Fax 3) Scanner4) Cable 5) None of these

307. Which among the following is a Scientific Computer Language?1) BASIC 2) COBOL 3) FORTRAN 4) PASCAL 5) None of these

308. What is Oracle ?1) A Co-ordination System 2) Word Software 3) Database Software4) All of the above 5) None of these

309. IC Chip is made of ——.1) Silicon 2) Nickel 3) Iron 4) Copper 5) None of these

310. At which place is India‘s Silicon Valley situated?1) Bangalore 2) Hyderabad 3) Chennai 4) Kolkata 5) None of these

311. A connection from one HTML document to another HTML document is called____________1) Hyper Link 2) Connecting Link 3) Icon 4) All of these 5) None of these

312. This device is used to connect your computer with a telephone line, so that canaccess information from other servers and ordinary users too, said device iscalled ___________1) Modem 2) Set Top Box 3) LAN Card 4) UPS 5) None of these

313. Device on one network can communicate with devices on another networkvia_______1) File Server 2) Utility Server 3) Printer Server4) Gateway 5) None of these

314. The screen background is known as the________1) Application 2) Window 3) Desktop 4) Frames 5) None of these

315. Which of the following is not an input device?1) Mouse 2) Keyboard 3) Light pen 4) VDU 5) None of these

316. What are the units used to count the speed of a printer ?1) CPM 2) DPI 3) PPM 4) BIT 5) None of these

317. A computer that combines the characteristic of analog and digitalcomputers_________1) Hybrid Computer 2) Digital Computer 3) Analog Computer4) Super Computer 5) None of these

318. WORM stands for?1) Write Once Read Memory 2) Wanted Once Read Memory3) Wanted Original Read Memory4) Write Original Read Memory 5) None of these

319. Memory unit is a part of ______1) Input Device 2) Control Unit 3) Output Device4) Central Processing Unit 5) None of these

320. Which of the following companies developed MS Office-2000?1) Novell 2) Core 3) Lotus 4) Microsoft 5) None of these

Page 22: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 22 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

321. What is the meaning of ?MICR‘?1) Magnetic Ink Character Recognition2) Magnetic Intelligence Character Recognition3) Magnetic Information Cable Recognition4) Magnetic Insurance Cases Recognition 5) None of these

322. VIRUS stands for________1) Very Important Record User Searched2) Verify Interchanged Result Until Source3) Vital Information Resource Under Seize4) Very Important Resource Under Search 5) None of these

323. The technique that extends storage capacities of main memory beyond the actualsize of the main memory is called _______1) Multitasking 2) Virtual storage 3) Multiprocessing4) Multiprogramming 5) Switching

324. ____________Command we can use to close the windows.1) Alt+ F1 2) Alt+ S 3) Alt+ End 4) Alt+F4 5) None of these

325. Algorithm is used ———-1) To bring itself into desired state by its own action

2) To perform logarithmic operations 3) To describe a set of procedure by given result is obtained 4) As a high level language 5) None of these326. FOXPRO is a ————-

1) RDMBS 2) DBMS 3) Language4) All of the above 5) None of these

327. Who is considered to the father of computers?1) John Bardeen 2) Charles Babbage 3) John Backus4) William Shockley 5) None of these

328. Which of the following will connect you to the Internet?1) An Commercial online service 2) An Internet service provider3) A network connection 4) All of the above 5) None of these

329. What software allows you to view internet sites?1) A cyber café 2) A browser 3) A modem 4) Your computer5) None of these

330. To make current page as bookmark —— is pressed.1) CTRL+B 2) CTRL+D 3) CTRL+M 4) CTRL+K 5) None of these

331. Where are data and program stored when the processor uses them ?1) Main memory 2) Secondary memory 3) Disk memory4) Program memory 5) None of these

332. _______Represents raw facts, where- as.................is a meaningful data.1) Information, reporting 2) Data, information 3) Information, bits4) Records, bytes 5) Bits, bytes

333. Saving is a process-1) To copy the document from memory to storage medium2) To bring change in present status of the document3) To change entire form 4) All of the above 5) None of these

334. PNG stands for________1) Potable Name Generator 2) Portable Network Generator3) Printed Name Graphics4) Portable Network Graphics 5) None of these

335. The maximum Zoom percentage in MS PowerPoint is________1) 100% 2) 200% 3) 400% 4) 500% 5) None of these

Page 23: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 23 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

336. The word FTP stands for________1) File Translate Protocol 2) File Transit Protocol 3) File Typing Protocol4) File Transfer Protocol 5) None of these

337. Compiler in computer system is a_________1) Software 2) System Software 3) Process4) Application Software 5) None of these

338. What is an intersection of a row and column in a spreadsheet?1) Formula 2) Worksheet 3) Address 4) Cell 5) None of these

339. What is the process of creating movement from still images?1) Transition 2) Twining 3) Bit-mapped graphic4) Animation 5) None of these

340. A set of rules for creating markup languages that enables programming to capturespecific types of data by creating their own elements is called______1) XML 2) HTML 3) Ada 4) XHTML 5) None of these

341. Small plain text files that are written to your computer’s hard disk by many of theWeb sites you visit are called_______1) RFID’s 2) Web beacons 3) GUID’s 4) Cookies 5) None of these

342. Which of the following is the proper way to denote a cell in a spreadsheet?1) 5C 2) C5 3) 2-15 3) C 4) None of these

343. Which broadband service is the most available?1) C-able 2) POTS 3) Satellite 4) DSL 5) None of these

344. _________ is a set of rules computers use to talk to each other.1) Protocol 2) Syntax 3) DOS command 4) HTML 5) None of these

345. Which backup method only backs up files that have been modified since the lastbackup?1) Incremental backup 2) Partial backup 3) Selective backup4) Full backup 5) None of these

346. Which type of transmission media is known as regular telephone wire?1) Wi-Fi 2) Twisted-pair wire 3) Fiber optic cable4) Coaxial cable 5) None of these

347. What is the purpose of a firewall on a computer?1) To protect a computer from unauthorized access2) To protect a computer in case of fire3) To protect a computer from spam 4) All of the above 5) None of these

348. A disk’s content that is recorded at the time of manufacture and that cannot bechanged or erased by the user is_______________1) Memory-only 2) Write-only 3) Once-only 4) Run-only 5) Read-only

349. In word, you can change Page Margins by ......1) Dragging the scroll box on the scroll bars2) Deleting the margin boundaries on the Ruler3) Dragging the margin boundaries on the Ruler4) Clicking the right mouse button on the Ruler 5) None of these

350. Which part of the computer helps to store information?1) Monitor 2) Keyboard 3) Disk – drive 4) Printer 5) Plotter

351. Which key is used to delete one character to the left of the current position of thecursor ?1) Backspace 2) Delete 3) Insert 4) Esc 5) Ctrl

352. If you want to connect to your own computer through the Internet from anotherlocation, you can use–1) e-mail 2) FTP 3) instant message 4) Telnet 5) None of these

Page 24: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 24 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

353. A (n) ……….is a special visual and audio effect applied in Power-point to text orcontent.1) Animation 2) Flash 3) Wipe 4) Dissolve 5) None of these

234. Where does most data go first with in a computer memory hierarchy?1) RAM 2) ROM 3) BIOS 4) CACHE 5) None of these

345. All of the following are examples of storage devices EXCEPT _______1) hard disk drives 2) printers 3) floppy disk drives4) CD drives 5) Pen drives

346. Select the Odd one_____1) Operating system 2) Interpreter 3) Compiler4) Assembler 5) None of these

347. Which of the following is not an advantage of magnetic disk storage?1) The access time of magnetic disk is much less than that of magnetic tape2) Disk storage is longer lasting than magnetic tape3) Disk storage is less expensive than tape storage4) All of the above 5) None of these

348. Perforated paper used as input or output media is known as_____1) Paper tape 2) Magnetic tape 3) Punched paper tape4) Card punch 5) None of these

349. 30 The first generation computer system used________1) Vacuum tubes 2) Transistors 3) Registers4) Magnetic cores 5) Silicon chip

350. To access properties of an object, the mouse technique to use is _______1) dragging 2) dropping 3) right-clicking 4) shift-clicking 5) None of these

351. The ALU and Control Unit jointly known as_______1) RAM 2) ROM 3) CPU 4) PC 5) none of these

352. Computers process data into information by working exclusively with ______1) multimedia 2) words 3) characters 4) numbers 5) None of these

353. COBOL stands for _______1) Common Business Oriented Language2) Computer Business Oriented Language3) Common Business Operated Language4) Common Business Organized Language 5) None of these

354. What is the other name for programmed chip?1) RAM 2) ROM 3) LSIC 4) PROM 5) None of these

355. ___________ Store data temporarily and pass it on as directed by the control unit.1) Address 2) Register 3) Number 4) Memory 5) None of these

356. RAID stands for________1) Reproduce Array of Intelligent Disks 2) Reproduce Array of Inexpensive Disks3) Redundant Array of Inexpensive Drives4) Redundant Array of Inexpensive Disks 5) None of these

357. Select the smallest memory size:-1) Terabyte 2) Gigabyte 3) Kilobyte 4) Megabyte 5) None of these

358. In most Microsoft programs, what does ‘alt+f4’ do?1) Ends the program 2) Opens the program 3) Run the program4) Modify the program 5) None of these

359. A device that is used to transmit data from one location to another is known as________1) Storage 2) Memory 3) Carrier 4) All of the above 5) None of these

Page 25: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 25 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

360. The process of moving data from secondary storage to primary memory is called____.1) Paging 2)Spooling 3) copying 4) All of the above5) None of these

361. Which of the following describe one or more characteristics of a modem computer?1) An electronic device 2) A mechanical device3) An electro-mechanical device 4) All of the above 5) None of these

362. Octal number system has a base ______.1) Two 2) Four 3) Eight 4) Ten 5) None of these

363. PL 1 (Programming Language One) Is __________.1) High level programming language 2) Low level programming language3) Machine language 4) Assembly language 5) None of these

364. Which of the following is a disadvantage of machine language?1) Machine Dependent 2) Slower Execution 3) Machine Independent4) all of the above 5) None of these

365. Android Operating system is an example of which kind of Source Model?1) Vertical Market Software 2) Open Source 3) Horizontal Market Software4) Shareware 5) None of these

366. You can use the tab key to___________.1) Move a cursor across the screen 2) Indent a paragraph3) Move the cursor down the screen 4) Only 1 and 2 5) None of these

367. Which process checks to ensure the components of the computer and operatingare connected properly?1) Booting 2) Processing 3) Saving 4) Editing 5) None of these

368. What is the correct association between a hardware component and a computerfunction?1) Monitor > input 2) Mouse > input3) CPU > storage4) Hard disk > processing 5) None of these

369. The sharing of a medium and its path by 2 or more devices is called ________.1) Modulation 2) Encoding 3) Line discipline 4) Multiplexing 5) None of these

370. The server on the internet is also known as ___________.1) Repeater 2) Host 3) Gateway 4) AND Gate 5) None of these

371. A database management system (DBMS) is a__________.1) Hardware system used to create, maintain and provide controlled access to adata- base2) hardware system used to create, maintain, and provide uncontrolled access toa database3) Software system used to create, maintain, and provide uncontrolled access toa database.4) Software system used to create, maintain and provide controlled access toa database.5) None of these

372. Which of the following is an example of connectivity?1) Internet 2) floppy disk 3) power card 4) data 5) None of these

373. What menu is selected to cut, copy and paste?1) File 2) Tools 3) Special 4) Edit 5) None of these

374. To save a document in different location use ______.1) Save 2) Save as 3) Save as web page4) All of above 5) None of these

375. Programming language built into user programs such as Word and Excel areknown as _______.1) 4GLs 2) Macro languages 3) object-oriented languages4) visual programming languages 5) None of these

Page 26: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 26 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

376. Codes consisting of lines of varying widths or lengths that are computer-readableare known as______.1) an ASCII code 2) a magnetic tape 3) an OCR scanner4) a bar code 5) None of these

377. To reload a Web page, press the __________ button.1) Redo 2) Reload 3) Restore 4) Ctrl 5) Refresh

378. Personal computers can be connected together to form a_______.1) server 2) supercomputer 3) network 4) enterprise 5) None of these

379. Which of the following is true?1) Byte is a single digit in a binary number2) Bit represents a grouping of digital numbers3) Eight-digit binary number is called a byte4) Eight-digit binary number is called a bit 5) None of these

380. Which of the following can be used to select the entire document?1) CTRL+A 2) ALT+F5 3) SHIFT+A 4) CTRL+K 5) CTRL+H

381. A concentric circle on a disk is called a________1) cylinder 2) track 3) head 4) sector 5) none of these

382. DSL is an example of a(n) ____________ connection.1) network 2) wireless 3) slow 4) broadband 5) none of these

383. Instructions and data that are processed by the CPU are located in________1) CD-ROM 2) RAM 3) the hard disk4) the motherboard 5) none of these

384. All of the following are considered to be storage devices EXCEPT_______1) floppy disk 2) CPU 3) CD 4) hard disk drive 5) none of these

385. The commonly used UNIX commands like date, ls, cat etc…. are stored in_________1) dev directory 2) bin directory 3) tmp directory4) unix directory 5) None of these

386. DOS is a _____driven Operating System.1) GUI 2) Command 3) Character 4) cd 5) None of these

387. One megabyte equals approximately ___________1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes

388. A computer checks the _____ of user names and passwords for a match beforegranting access.1) Website 2) Network 3) Backup file 4) Data base 5) None of these

389. Computers that are portable and convenient for users who travel are known as_____1) Super computers 2) Lap tops 3) Mini computers4) File servers 5) None of these

390. What is the term for unsolicited e-mail?1) News group 2) Use net 3) Backbone 4) Flaming 5) Spam

391. The _____ tells the computer how to use its components.1) Utility 2) Network 3) Operating system4) Application program 5) None of these

392. When sending an e-mail, the _____ line describes the contents of the message.1) to 2) subject 3) contents 4) CC 5) None of these

393. The _____ key will launch the start buttons.1) Esc 2) Shift 3) Windows 4) Shortcut 5) None of these

394. What is the ultimate purpose of Defragmentation?1) Make the PC faster 2) Create More Free Space3) Delete temporary files4) Reduce Power consumption5) none of these

Page 27: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 27 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

395. Which input device cannot be used to work in MS Office?1) Scanner 2) Mouse 3) Keyboard 4) Joy stick 5) Light pen

396. . ........... Is a method in which multiple communication devices are connected toone another efficiently.1) Switching 2) Redundancy3) Capacity 4) Detecting 5) None of these

397. ............. is a collection of web - pages and .......... is the very first page that wesee on opening of a website.1) Home page, Web page 2) Website, Home page 3) Web page, Home page4) Web page, Website 5) None of these

398. What’s considered the ‘backbone’ of the World Wide Web?1) URL 2) HTML 3) HTTP 4) FTP 5) None of these

399. SMTP stands for _________1) Simple Mail Transfer Protocol 2) Serve Message Text Process3) Short Messaging Text Process4) Short Messaging Transfer Protocol 5) None of these

400. Small application programs that run on a Web page and provide animation areknown as _________1) flash 2) spiders 3) cookies 4) applets 5) none of these

401. The errors that can be pointed out by the compiler known as ______.1) Syntax errors 2) Semantic errors 3) Logic errors4) System errors 5) None of these

402. A _______ contains specific rules and words that express the logical steps of analgorithm?1) syntax 2) programming structure 3) programming language4) logic chart 5) None of these

403. A Proxy server is used for which of the following?1)To provide security against unauthorized users2)To process client requests for web pages 3)To provide TCP/IP4)To process client requests for database access 5) None of these

404. Storage that retains its data after the power is turned off is referred to as?1) Volatile storage 2) non-volatile storage 3) sequential storage4) direct storage 5) None of these

405. Which term identifies main page of the entire site?1) URL 2) Web site address 3) Hyperlink4) Domain name 5) None of these

406. A hard copy of a document is_________1) stored in the hard disk 2) stored on a floppy 3) stored on a CD4) printed on the printer 5) None of these

407. Which is the part of a computer that one can touch and feel?1) Programs 2) Software 3) Hardware 4) Output 5) None of these

408. CPU stands for _________1) CD-run on memory 2) central processing unit 3) call powers up4) create programs user 5) None of these

409. Start or restart the computer known as _____________1) exit 2) kick 3) boot 4) kick-start 5) None of these

410. This is not a function category in Excel ________1) Logical 2) Data Series 3) Financial 4) Text 5) None of these

411. The operating system that is self-contained in a device and resident in the ROMis ______1) Batch Operating System 2) Real - time Operating System3) Embedded Operating System 4) Multi Operating System 5) None of these

Page 28: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 28 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

412. To be able to ‘boot’, the computer must have a(n) ..........1) Compiler 2) Loader 3) Operating System4) Assembler 5) None of these

413. On-line real time systems become popular in..........Generation.1) First Generation 2) Second Generation 3) Third Generation

4) Fourth Generation 5) None of these414. ___________is the ability of a device to “jump” directly to the requested data.

1) Sequential access 2) Random access 3) Quick access4) All of the above 5) None of these

415. . ............ is the combination of keys to switch between the last four places thatyou have edited.1) ALT + CTRL + Z 2) ALT + CTRL + Y 3) ALT + TAB + Z4) ALT + SHIFT + Z 5) None of these

416. ............ is the functional key to display save-as box.1) F5 2) F6 3) F9 4) F12 5) None of these

417. Accessing data on tapes is much ....... than that accessing data on disks.1) Slower 2) Faster 3) Same 4) All of the above 5) None of these

418. Who amongst the following is called the father of modern computing?1) Charles Babbage 2) Hollerith 3) Gottfried von Leibnitz4) Joseph M. jacquard 5) None of these

419. If you begin typing an entry into a cell and then realize that you don’t want yourentry placed into a cell, you_________1) Press the Erase key 2) Press esc 3) Press the Enter button4) Press the Edit Formula button 5) none of these

420. Superscript, subscript, outline, emboss, engrave are known as ______1) font styles 2) font effects 3) word art4) text effects 5) None of these

421. What is object of UPS?1) Using for storage 2) To increase the speed of a computer3) Provides backup power 4) All of these 5) None of these

422. Documents converted to .......... can be published to the Web.1) .doc file 2) http 3) machine language4) HTML 5) none of these

423. Holding the mouse button down while moving an object or text is known as ___1) Moving 2) Dragging 3) Dropping 4) Highlighting 5) None of these

424. When was the first Windows operating system launched?1) 1984 2) 1985 3) 1988 4) 1989 5) 1990

425. What is the difference between a CD-ROM and a CD-RW?1) They are the same; just two different terms used by different manufacturers2) A D-ROM can be written to and a CD-RW cannot3) A CD-RW can be written to, but a CD-ROM can only be read from4) A CD-ROM holds more information than a CD-RW5) None of these

426. What happens when we try to delete the files on the floppy ?1) The files get moved to the Recycle Bin2) Files on a floppy cannot be deleted3) The files get deleted and can be restored again from Recycle Bin4) The files get deleted and cannot be restored again5) The file gets copied on the Hard disk

Page 29: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 29 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

427. An educational institution would generally have the following in its domain name....1) .org 2) .edu 3) .inst 4) .com 5) .sch

428. POST stands for ...........1) Power on Self Test 2) Program on Self Test 3) Power on System Test4) Program on System Test 5) Power Off System Test

429. Which of the following can input graphical images and pictures for a computer?1) Plotter 2) Scanner 3) Mouse 4) Printer 5) Keyboard

430. Which of the following categories would include a keyboard ?1) Printing Device 2) Output Device 3) Pointing Device4) Storage Device 5) Input Device

431. In Word you can force a page break–1) By positioning your cursor at the appropriate place and pressing the F1 key2) By positioning your cursor at the appropriate place and pressing Ctrl +Enter3) By using the Insert/Section Break4) By changing the font size of your document 5) None of these

432. LSI’s (Large Integration) used in?1) First generation 2) Second generation 3) Third generation4) Fourth generation 5) None of these

433. The purpose of an application program is to?1) Meet specific user needs 2) Make equivalent run better3) Allow the operating system to control resources better4) Convert program written in high-level language to machine level language5) None of these

434. Hypertext is a _________1) Text stored in the memory of the computer2) Text displayed on the screen of the computer3) Special text used in developing Internet developing package4) A system of managing textual Information by creating associations betweendifferent documents5) None of these

435. For running WINDOW minimum disk free space required is?1) 8 MB 2) 10 MB 3) 16 MB 4) 32 MB 5) None of these

436. Which of the following printers generates character from a grid?1) Inkjet 2) Laser 3) Daisy wheel 4) Dot matrix 5) None of these

437. Accumulator is a _______1) Hardwired unit 2) Sequential circuit 3) Finite state machine4) Register 5) None of these

438. _______Function key refreshes the current window.1) F5 2) F6 3) F7 4) F8 5) None of these

439. In 1983, this person was the first to offer a definition of the term ‘computer virus’?1) MC Fee 2) Smiths 3) Frederick Cohen4) Norton 5) None of these

440. To minimize all open windows and display the desktop?1) Windows logo +D 2) Windows logo + E 3) Windows logo + F4) Windows logo + G 5) None of these

441. In MS-Word ‘alt + shift + d’ does what?1) Automatically inserts the date 2) Inserts the time3) Inserts the day 4) All of the above 5) None of these

Page 30: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 30 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

442. ________ deletes an item immediately without placing it in the recycle bin.1) Shift +enter 2) Shift +delete 3) Shift +right arrow4) Shift +left arrow 5) None of these

443. Which of the following is not a network topology?1) Star 2) Bus 3) Linear 4) Ring 5) None of these

444. A list of rules for transferring data over a network is called?1) Protocol 2) Program code 3) Rules 4) Flowchart 5) None of these

445. A table consists of_________1) Fields and columns 2) Rows and columns 3) Rows and cells4) All of the above 5) None of these

446. What does ‘ctrl +esc’ do?1) Shows the start menu 2) shows the format menu 3) Shows the tools menu4) shows the insert menu 5) None of these

447. A proxy server is used as the computer?1) With external access 2) acting as a backup 3) Performing file handling4) Access user permissions 5) None of these

448. Which of the following best defines embedded system?1) A program that comes wrapped in a box2) A program that is permanent part of a computer3) A computer that is a part of a larger computer4) A computer and software system that controls a machine 5) None of these

449. To see the document before the printout is taken, use.......1) Insert Table 2) Paste 3) Format Painter 4) Cut 5) Print Preview

450. Digital video consists of a series of_____1) Media clips 2) Captures 3) Frames 4) Pictures 5) none of these

451. The __________ is the smallest meaningful unit of data.1) cell 2) field 3) application 4) all of the above 5) none of these

452. What are the four main aspects of data handling with a computer?1) Input, processing, output, and storage2) Comparing, dividing, sorting, and organizing3) Decision making, sorting, correcting, and mapping4) Adding, subtracting, multiplying, and dividing 5) none of these

453. Most cash registers are now computers that are known as ____________ terminals.1) POS 2) DS 3) UDC 4) UPC 5) none of these

454. Which of the following is NOT an example of system maintenance?1) Replacing user interfaces 2) Making backup copies of files3) Adding, deleting, adjusting records4) Providing system security 5) none of these

455. Which of the following is the primary task of a NAS server?1) Login authentication 2) File sharing 3) Internet access4) E-mail processing 5) none of these

456. If you change Windows 98 to Windows XP, you are actually performing ...........1) Upstart 2) upgrade 3) update 4) patch 5) None of these

457. To make a copy of the current document to disk ........1) Use the ‘Save’ command 2) This cannot be done3) Use the ‘duplicate’ command4) Copy the document 5) Use the ‘save as’ command

458. The main system board of a computer is called the ..........1) integrated circuit 2) motherboard 3) processor4) microchip 5) None of these

Page 31: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 31 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

459. Your position in the text is shown by a ..........1) Blinker 2) Cursor 3) Causer 4) Pointer 5) None of these

460. How many megabytes make a gigabyte ?1) 1024 2) 128 3) 256 4) 512 5) 64

461. Using output devices one can ............1) input data 2) store data 3) scan data4) view or print data 5) None of these

462. Which contents are lost when the computer turns off ?1) Storage 2) input 3) output 4) memory 5) None of these

463. When you save to this, your data will remain intact even when the computer isturned off–1) RAM 2) Motherboard 3) Secondary storage device4) Primary storage device 5) None of these

464. A central computer that holds collections of data and programs for many PCs,workstations, and other computers is a(n) –1) supercomputer 2) minicomputer 3) laptop4) server 5) None of these

465. The piece of hardware that converts your computer’s digital signal to an analogsignal that can travel over telephone lines is called a–1) red wire 2) blue cord 3) tower 4) modem 5) None of these

466. When the pointer is positioned on a……….it is shaped like a hand Symbol.1) Grammar error 2) Formatting error 3) Screen Tip4) Spelling error 5) hyperlink

467. Mobile Commerce is best described as–1) The use of Kiosks in marketing 2) transporting products3) Buying and selling goods/services through wireless handheld devices4) Using notebook PC’s in marketing 5) None of the above

468. Which of the following is a storage device that uses rigid, permanently installedmagnetic disks to store data/information–1) floppy diskette 2) hard disk 3) permanent disk4) optical disk 5) None of these

469. Which of the following are advantages of CD-ROM as a storage media?1) CD-ROM is an inexpensive way to store large, amount of data and information2) CD-ROM disks retrieve data and information more quickly than magnetic disks do3) CD-ROMs make less errors than magnetic media4) All of the above 5) None of these

470. A device, which is not connected to CPU, is called as .......1) land-line device 2) On-line device 3) Off-line device4) Device 5) None of the above

471. A computer program that converts an entire program into machine language atone time is called a/ an ____1) interpreter 2) simulator 3) compiler 4) numbers 5) None of these

472. What is MS Word?1) A game 2) An Operating System 3)Word Processing Software4) Typing tutor software 5) None of these

473. For Scientific work the most popular language is?1) PASCAL 2) FORTRON 3) COBOL 4) PROLOG 5)None of these

474. TCP stands for _______1) Transfer control protocol 2) Transfer control process3) Transmission control protocol4) Transmission control process 5)None of these

Page 32: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 32 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

475. The first graphical web browser are?1) Gopher 2) WAIS 3) CERN 4) Mosaic 5)None of these

476. Total memory of system can be known using?1) DIR commands 2) MEM commands 3) Warm boot4) TOT MEM commands 5)None of these

477. The meaning of double-click is?1) Pushing and releasing the main mouse button twice in rapid successionwhen the on-tree mouse pointer is positioned over the desired item2) Appearance of an icon3) To take a selection from the document and move it to the clipboard4) All of the above 5) None of these

478. The term overflow means?1) An excess of Internal storage 2) An excess of external storage3) A situation where record cannot fit in to its right place4) A device, which controls the level of humidity in the computer room5) None of these

479. The access time refers to1) Time required locating and retrieving stored data2) Time required locating the lost data3) Time required deleting specific data on a certain memory location4) All of the above 5) None of these

480. Rotational delay time is also known as1) Seek time 2) Shift time 3) Latency 4) Access time 5) None of these

481. Which memory is non-volatile and may be written only once?1) RAM 2) EPROM 3) EEPROM 4) PROM 5) None of these

482. Peer-to-peer is a description–1) Of communications between two dissimilar devices2) of communications between two equal devices3) of communications between two different devices4) All of the above 5) None of these

483. Pascal is1) A high-level programming language 2) Named after Blaise Pascal3) Named after mathematician that facilitates structured programming techniques4) All of the above 5) None of these

484. Technique to implement virtual memory where memory is divided into units offixed size memory is–1) Paging 2) De-fragments 3) Segmentation4) All of the above 5) None of these

485. An adder where all the bits of the two operands are added simultaneously–1) Parallel adder 2) Half adder 3) Full adder4) All of the above 5) None of these

486. The point at which the flow of text in a document moves to the top of a new page–1) Page insert 2) Page break 3) Page format4) All of the above 5) None of these

487. Multiprocessor is a computer system–1) Where many CPU under a common control2) Consisting of more than one input devices under common control3) Where many output devices under4) All of the above5) None of these

Page 33: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 33 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

488. Non-document files are–1) Pure ASCII files that can be listed for any word processing software2) Non ASCII files that can be listed for any word processing software3) Pure ASCII files that can be listed for specific word processing software4) Non ASCII files that can be listed for specific word processing software5) All of the above

489. Which of the Following is not a non-impact printer?1) Thermal printer 2) Ink-jet printer 3) Laser printer4) Dot-matrix printer 5) All of the above

490. EDVAC stands for_______1) Electronic Discrete Variable Automatic Computer2) Electronic Discrete Value Automatic Computer3) Electronic Device Variable Automatic Computer4) Electronic Discrete Variable Advanced Computer 5) None of these

491. When a file is saved for the first time-_______1) a copy is automatically printed 2) it must be given a name to identify it3) it does not need a name4) it only needs a name if it is not going to be printed 5) None of these

492. The computers which are relatively rare because of their cost and size are:1) Mini Computers 2) Micro Computers 3) Super Computers4) Laptops 5) Mainframe Computer

493. A mistake in an algorithm that causes incorrect results is called a .......1) Logical error 2) Syntax error 3) Machine Error4) Compiler error 5) None of these

494. A(n) .... program is one that is ready to run and does not need to be altered inany way.1) Interpreter 2) High-level 3) Compiler 4) COBOL 5) Executable

495. A set of step-by-step procedures for accomplishing a task is known as a(n)—1) algorithm 2) hardware program 3) software bug4) firmware program 5) None of these

496. The main directory of a disk is called the………directory.1) root 2) sub 3) folder 4) network 5) None of these

497. A………is a collection of data that is stored electronically as a series of records ina table.1) spreadsheet 2) presentation 3) database 4) web page 5) None of these

498. As you create documents, graphs and pictures your computer holds the data in—1) Restore file 2) Backup drive 3) Clip board 4) Memory 5) None of these

499. All are included in removable media except the following—1) CD-ROMs 2) Diskette 3) DVDs 4) High disk drive5) None of these

500. ………processing is used when a large mail-order company accumulates ordersand processes them together in one large set.1) Batch 2) Online 3) Real-time 4) Group 5) None of these

501. Computer programs are written in a high-level programming language; however,the human readable version of a program is called—1) cache 2) instruction set 3) source code4) word size 5) None of these

502. What happens if you press Ctrl + Shift + F8?1) It activates extended selection 2) It activates the rectangular selection3) It selects the paragraph on which the insertion line is.4) None of above 5) All the above

Page 34: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 34 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

503. Which of the following is not valid version of MS Office?1) Office 2003 2) Office Vista3) Office 2007 4) all of above 5) None of these

504. What is the short cut key to open the Open dialog box in ms word?1) F12 2) Shift F12 3) Alt + F12 4) Ctrl + F12 5) None of these

505. How can you disable extended selection mode?1) Press F8 again to disable 2) Press Del to disable 3) Press Esc to disable4) Press Enter to disable 5) None of these

506. Auto Calculate will quickly add selected cells if you…..1) right click on the status bar and select Sum2) click the Auto Calculate button on the toolbar3) use the key combination Ctrl+$4) Double click the selection 5) None of the above

507. You can add a hyperlink to your worksheet or document by pressing1) Alt + K 2) Ctrl + H 3) Ctrl + K4) Ctrl + Shift + K 5) None of the above

508. __________are ‘attempts by individuals to obtain confidential information from youby falsifying their identity.1) Phishing 2) Computer viruses 3) Spyware scams4) Viruses 5) None of the above

509. Which of the following is the fastest type of computer?1) Laptop 2) Notebook 3) Personal computer4) Workstation 5) Supercomputer

510. Which of the following is not a term pertaining to the Internet?1) Keyboard 2) Link 3) Browser 4) Search Engine5) Hyperlink

511. The operating system that is self-contained in a device and resident in the ROMis .......1) Batch Operating System 2) Real - time Operating System3) Embedded Operating System4) Multi Operating System 5) None of these

512. The computer abbreviation KB usually means–1) Key Block 2) Kernel Boot 3) Key Byte 4) Kit Bit 5) Kilo Byte

513. .......... is the key to close a selected drop - down list; cancel a command and closea dialog box.1) TAB 2) SHIFT 3) ESC 4) F10 5) None of these

514. Which of the following is NOT one of the four major data processing functions of acomputer?1) gathering data 2) processing data into information3) analyzing the data or information4) storing the data or information 5) None of these

515. The CPU and memory are located on the :1) expansion board 2) motherboard 3) storage device4) output device 5) display board

516. A ............ is an additional set of commands that the computer displays after youmake a selection from the main menu1) dialog box 2) submenu 3) menu selection4) All of the above 5) None of these

517. A letter, memo, proposal or other file that is created using Microsoft Word iscalled as?1) Master 2) Slide 3) Document 4) Worksheet 5) None of these

Page 35: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 35 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

518. Which of the following are parts of the CPU?1) Secondary Memory 2) Control unit 3) Input device4) Printer 5) None of these

519. Which is the portable computer?1) Micro-processor 2) Calculator 3) Laptop4) Parallel Computers 5) None of these

520. The ROM chip which can be rewritten several times and requires the action ofultraviolet radiations to erase its contents is________1) Flash memory 2) PROM 3) EEPROM4) EPROM 5) None of these

521. FPI stands for____1) Faults per inch 2) Frames per inch 3) Figure per inch4) Film per inch 5) None of these

522. A terabyte comprises1) 1024 gigabyte 2) 1024 kilobyte 3) 1024 megabyte4) 1024 byte 5) None of these

523. The memory which is utmost accessible to the processor is_____1) Cache memory 2) RAM 3) Hard disk4) Flash memory 5) None of these

524. In which kind of disk does the read/write head physically touches the surface?1) Hard Disk 2) Compact Disk 3) Floppy Disk4) all of the above 5) None of these

525. What is the correct syntax for typing a function into a cell?1) Equal sign, Function Name, Matching brackets2) Function Name, Equal sign, Matching brackets3) Equal sign, Matching brackets, Function Name4) None of the above 5) None of these

526. If you see a small red triangle in the top right corner of a cell, it means there issomething attached to the call. What is it?1) A comment 2) An attachment 3) An error4) None of the above 5) None of these

527. Cache memory is–1) Smaller and faster than main storage2) Bigger and slower than main storage3) Smaller but slower than main memory4) Bigger and faster than main memory 5) None of these

528. The overall design, construction, organization and interconnecting of the variouscomponents of a computer system is referred as–1) Computer Architecture 2) Computer Flowchart 3) Computer Algorithm4) All of the above 5) None of these

529. BIOS are responsible for1) Handling the particulars of input/output operations2) Output operations 3) Input operations4) All of the above 5) None of these

530. BISYNC is an abbreviation for–1) Binary Input/Binary Output 2) Binary synchronous 3) Binary digit4) All of the above 5) None of these

531. A process of trying out a new product by independent users before it is finallymanufactured/developed–1) Alpha test 2) Beta Test 3) Gamma test 4) All of the above 5) None of these

Page 36: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 36 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

532. An E-mail protocol for storage, management and change, especially in corporateoffices–1) Message handling service 2) Postal service‘s 3) Data storage4) All of the above 5) None of these

533. Password is–1) Code by which a user gains access to a computer system2) Pass for viewing movie 3) Entrance without paying something4) All of the above 5) None of these

534. The technique where digital signals are converted to its analog form fortransmission over an analog facility is called–1) Modulation 2) Digitization 3) Multiprocessing 4) All of the above5) None of these

535. Narrowband channel is a communication channels–1) That handles low volumes of data2) Used mainly for telegraph lines and low speed terminals3) Both 1) and 2) 4) All of the above 5) None of these

536. MIME is an acronym for ....1) Multiprogramming Internet Mail Extension2) Multicasting Internet Mail Extension3) Multiple Internet Mail Extension4) Multipurpose Internet Mail Extension 5) None of these

537. The........... Settings are automatic and standard.1) Default 2) CPU 3) Peripheral 4) User-friendly 5) None of these

538. Pop-ups are a form of ________on the World Wide Web?1) Instant Messaging 2) Search Engines 3) Browsers4) Mark-up Languages 5) Online Advertising

539. Which of the following is true about Operating System?1) It is an interface between user and the computer.2) It manages all resources3) It does all Memory management and Process management tasks4) All are true 5) None of these

540. All formula in Excel start with?1) % 2) + 3) = 4) – 5) None of the above

541. Which of the following displays the contents of the active cell?1) Active cell 2) Formula bar 3) Menu bar 4) Name box 5) None of the above

542. Tab scrolling buttons1) Allow you to view a different worksheet2) Allow you to view additional worksheet row down3) Allow you to view additional worksheet columns to the right4) Allow you to view additional sheet tabs 5) None of the above

543. What is the keyboard shortcut for creating a chart from the selected cells?1) F3 2) F5 3) F7 4) F11 5) None of the above

544. You cannot close MS Word application by1) Choosing File menu then Exit submenu 2) Press Alt+F43) Click X button on title bar4) From File menu choose Close submenu 5) None of these

545. Which file starts MS Word?1) Winword.exe 2) Word.exe 3) Msword.exe 4) Word2003.exe 5) None of these

546. Where can you find the horizontal split bar on MS Word screen?1) On the left of horizontal scroll bar2) On the right of horizontal scroll bar3) On the top of vertical scroll bar4) On the bottom of vertical scroll bar 5) None of these

Page 37: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 37 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

547. One of the functions of the arithmetic logic unit is to:1) receive data from the registers2) convert negative numbers to hexadecimal code3) send logical operations, such as AND or NOT, to the alphabetic unit4) retrieve data from virtual memory 5) none of these

548. What is defined as the number of bits that the CPU processes as a unit?1) A computer sentence 2) A computer word 3) A computer phrase4) A computer term 5) None of these

549. _________ Systems use a light beam to scan input data and convert it into electricalsignals, which are sent to the computer for processing.1) Image recognition 2) Optical recognition 3) PDF4) Application 5) None of these

550. _________ Devices accept the spoken word through a microphone and convert itinto binary code that can be understood by the computer.1) Speech recognition 2) Handwriting recognition 3) Peripheral4) All of the above 5) None of these

551. Name the technique of processing transactions in random order.1) Transaction processing 2) Batch processing 3) Offline processing4) Sequential file processing 5) None of these

552. _________ Means that a transaction is processed fast enough for the result tocome back and be acted upon right away.1) Real-time processing 2) Records processing 3) Batch processing4) All of the above 5) None of these

553. _________ uses an area of memory to temporarily store data from disk that theprogram might need soon.1) Data transferring 2) DVD 3) Disk caching4) All of the above 5) None of these

554. What is a device that prevents electrical problems from affecting computer datafiles?1) An incremental backup 2) A full backup 3) A surge protector4) A differential backup 5) None of these

555. What is any text that can be keyed in, such as a memo?1) A database 2) A spreadsheet 3) A text document4) A business presentation 5) None of these

556. What type of program lets you produce professional-looking documents containingboth text and graphics?1) A page composer 2) A thesaurus 3) A desktop publisher4) A speller checker 5) None of these

557. The letter and number of the intersecting column and row is the:1) Cell coordinates 2) Cell location 3) Cell position4) Cell address 5) None of these

558. What is the standard query language supported by most DBMS?1) Object-oriented language 2) Report generator language3) Structured Query Language (SQL)4) Query-by-example (QBE) 5) None of these

559. Which of the following are three fundamental characteristics that make a computeruseful?1) Lightweight, inexpensive, and sturdy2) Speed, reliability, and storage capability3) Durable, connectible, and renewable4) all of the above 5) none of these

Page 38: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 38 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

560. Which of the following is an appropriate use of groupware?1) A top-secret project 2) A highly classified project3) An individual employee project4) A team project 5) None of these

561. Software used for database management can store data, update it, __________ it,retrieve it, report it, and print it.1) manipulate 2) download 3) see 4) all of the above 5) none of these

562. Which of the following is NOT a function of an operating system?1) Executing and providing services for applications software2) Managing the computer‘s resources 3) Establishing a user interface4) Formatting a word document 5) None of these

563. Which of the following helps describe the Windows .NET Server?1) It is designed for different levels of network complexity.2) It is a direct upgrade from Windows NT.3) It is designed to replace Novell‘s Netware.4) It has limited complexity. 5) None of these

564. The process of analyzing large data sets in search of new, previously undiscoveredrelationships is known as:1) data mining 2) data marting 3) data maintenance4) data warehousing 5) none of these

565. The focus of the first phase of the systems development life cycle is to:1) Design what the new system should do2) Analyze and document the existing system3) Identify problems and opportunities4) Implement the new system 5) None of these

566. Which of the following is a network in which computers are located physicallyclose together, often in the same building?1) WAN 2) PAN 3) MAN 4) LAN 5) None of these

567. What is a modulator/demodulator that is connected to a circuit board ormotherboard?1) Fax modem 2) Network Interface Card (NIC)3) Internal modem 4) External mode 5) None of these

568. What kind of server converts IP addresses to domain names?1) File 2) DNS 3) Email 4) P2P 5) None of these

569. In the OSI model, the actual transmission of data is handled in the ____________layer.1) data link 2) physical 3) network 4) transport 5) None of these

570. Which of the following is NOT true about laptop computers?1) They are typically more expensive than mobiles.2) They are typically more expensive than desktops.3) They often have fewer components than PCs.4) They cannot be connected to a PC. 5) None of these

571. On a CD-RW you can1) read and write information 2) only read information3) only write information4) read, write and rewrite information 5) None of these

572. In computer terminology, information means1) Raw data 2) Data in more useful 3) Alphanumeric data4) Program 5) None of these

Page 39: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 39 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

573. After a picture has been taken with a digital camera and processed appropriately,the actual print of the picture is considered1) data 2) input 3) output 4) the process 5) None of these

574. What is output?1) What the processor takes from the user2) What the user gives to the processor3) What the processor gets from the user4) What the processor gives to the user 5) None of these

575. What is the main difference between a mainframe and a super computer ?1) Super computer is much larger than mainframe computers2) Super computers are much smaller than mainframe computers3) Supercomputers are focused to execute few programs as fast as possiblewhile mainframe uses its power to execute as many programs concurrently4) Supercomputers are focused to execute as many programs as possible whilemainframe uses its power to execute few programs as fast as possible5) None of these

576. Programs such as Mozilla Firefox that serve as navigable windows into the Webare called ..........1) Hypertextq2) Networks 3) Internet 4) Web browsers 5) None of these

577. What is the function of Recycle Bin?1) Store deleted file 2) Store temporary file 3) Store corrupted file4) Store Document file 5) None of these

578. Which device cannot be shared in network ?1) Floppy 2) Keyword 3) Computer 4) Printer 5) None of these

579. A right click on the desktop itself will........1) open the Display Properties dialog box2) show a context - sensitive menu3) open the Control Panel4) minimize all open applications 5) None of these

580. The advantage of using a spreadsheet is:1) Calculations can be done automatically.2) changing data automatically updates calculations 3) more flexibility4) all of the above 5) None of the above

581. Documentations should include1) Destination and users of the output data 2) Source of input data3) Information on the purpose of the workbook 4) All of abov 5) None of the above

582. To edit the selected cell in ms excel-1) Press F1 2) Press F2 3) Press F4 4) Press F5 5) None of these

583. You can convert existing Excel worksheet data and charts to HTML document byusing the1) FTP Wizard 2) Internet Assistant Wizard 3) Intranet Wizard4) Import Wizard 5) None of the above

584. Which of the following is graphics solution for Word Processors?1) Clipart 2) WordArt 3) Drop Cap 4) All of above5) None of the Above

585. You can detect spelling and grammar errors by-1) Press Shift + F7 2) Press Ctrl + F73) Press Alt+ F74) Press F7 5) None of the Above

586. What is the shortcut key to Indent the paragraph in ms word?1) Ctrl + M 2) Ctrl + P 3) Shift + M 4) Ctrl + I 5) None of these

Page 40: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 40 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

587. Which of the following storage media provides sequential access only ?1) Floppy disk 2) Magnetic disk 3) Magnetic tape4) Optical disk 5) None of these

588. What is the storage area for e-mail messages called?1) A folder 2) A directory 3) A mailbox 4) The hard disk 5) None of these

589. The set of parallel electrical conducting lines through which different componentson the mother board of a PC unit are linked together are called:1) Conductors 2) Buses 3) Slide Master 4) Consecutives 5) None of these

590. A PDA’s memory contents remain intact when it is turned off because:1) A battery keeps current available for RAM2) The memory contents are synchronized with a desktop3) The memory contents are copied to flash cards4) The memory contents are stored in ROM 5) None of these

591. A network of geographically distant computers and terminals is called a-1) Integrated Services Digital Network (ISDN)2) Metropolitan area network (MAN).3) Wide area network (WAN) 4) Local area network (LAN) 5) None of these

592. One byte represents:1) Eight characters 2) Eight bits3) A single digit with two possible states4) A word 5) None of these

593. Saving files in HTML format:1) Makes it possible for anyone to view the file in a Web browser2) Increases file conversion costs3) Decreases software compatibility4) All of the above 5) None of these

594. Which of the following would NOT be performed with application software?1) Financial report sent to investors 2) Hard disk cleanup3) Charts for a sales meeting presentation4) Customer list used for mailing invoices 5) None of these

595. Which of the following statements is TRUE about the public switched telephonenetwork (PSTN)?1) PSTN is a packet-switching network2) PSTN is comprised of a variety of physical media, including twisted pair andfiber optic cable3) PSTN is exclusively a digital network system4) PSTN is only used for voice transmissions, while the Internet is used for datatransmissions5) None of these

596. Which of the following best describes the difference between the Internet andthe World Wide Web?1) The Internet is the collection of computers, while the World Wide Web is thewiring and transmission protocols that connect them2) The Internet carries traffic for schools, government offices, and other public

organizations, while the World Wide Web carries commercial traffic3) The Internet consists of software programs such as e-mail and IRC, while theWorld Wide Web is a collection of Web pages4) The Internet is the physical network of global computers, while the WorldWide Web is many hypertext documents distributed globally over manycomputers5) None of these

Page 41: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 41 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

597. Which of the following runs on a user’s local computer and is used to request anddisplay Web pages?1) FTP 2) Web browser 3) Web server 4) HTML 5) None of these

598. Which of the following computer types is most powerful?1) Professional workstation 2) Internet appliance 3) Desktop computer4) Network computer 5) None of these

599. Which of the following is the most frequently used input device?1) Microphone 2) Scanner 3) Touch screen 4) Mouse 5) None of these

600. A modem is necessary if you want to-1) Add a scanner to your computer system2) Have voice mail added to your regular telephone service3) Connect to other computers or to the Internet using phone line, cable, orwireless connections.4) Display digital camera photographs on your computer screen5) None of these

601. MS Excel is a?1) Window based word processor package 2) Window based spreadsheet package3) DOS based spreadsheet package4) Window based accounting package 5) None of these

602. What is the flow of data between countries commonly called?1) International information system 2) EDI 3) Outsourcing4) Trans border data flow 5) None of these

603. Which of the following is NOT a purpose of antivirus programs?1) Remove any identified viruses2) Copy the name of the virus and send it to Microsoft for inspection3) Notify a user if a virus is found 4) Search for viruse 5) None of these

604. <H1> is an example of _____.1) HTML 2) GML 3) SGML 4) NSGML 5) None of these

605. Which type of network requires HPNA adapters for communication between networknodes?1) Phone line 2) Wireless 3) Power line 4) Ethernet 5) None of these

606. To analyze vast quantities of scientific data and display underlying patterns, youwould use a:1) Mainframe 2) Server 3) Supercomputer 4) Minicomputer5) None of these

607. The free, open-source operating system that is becoming popular is:1) Mac OS X 2) Microsoft Windows XP 3) UNIX4) Linux 5) None of these

608. What term is used to describe software that monitors your online computeractivities?1) Snooper ware 2) Spyware 3) Tracker ware4) Travel ware 5) None of these

609. Which of the following is a memory management technique that makes the randomaccess memory appear larger than it is?1) Byte mapping 2) Preemptive multitasking3) Read-only memory 4) Virtual memory 5) None of these

610. The two major components of system software are:1) The operating system and system utilities2) Application software and system utilities3) Primary memory and storage4) The operating system and applications software 5) None of these

Page 42: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 42 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

611. Which of the following may be necessary for you to do after you install newapplication software?1) Turn the computer power switch off and then back on2) Do a cold boot 3) Press Shift + Alt + Del4) Do a warm boot 5) None of these

612. The power-on self-test————————1) Checks for upgrades to the application software2) Verifies that the computer hardware is working properly3) Is able to provide easy-to-follow on-screen instructions to correct hardwareproblems4) Is conducted after the BIOS instructions are placed in memory5) None of these

613. Input, processing, output, and storage are collectively referred to as:1) The systems cycle 2) The information processing cycle3) The system unit 4) Communication 5) None of these

614. Which of the following is NOT part of the motherboard?1) System clock 2) Connector 3) CPU 4) Chipset 5) None of these

615. An example of a wireless medium that sends data through the air or space is:1) Fiber-optic cable. 2) Coaxial cable. 3) Twisted pair.4) Microwaves. 5) None of these

616. To reverse the effect of your last action in word ——————1) Use the cut command 2) Use the Undo command3) Press the delete key 4) Use the Redo command 5) None of these

617. Information that comes from an external source and fed into computer softwareis called ................1) Output 2) Input 3) Throughput 4) Reports 5) None of these

618. The basic unit of a worksheet into which you enter data in Excel is called a–1) tab 2) box 3) range 4) cell 5) None of these

619. All of the following are examples of real security and privacy risks EXCEPT1) hackers 2) viruses 3) Spam 4) identity theft 5) None of these

620. Which of the following is not an example of hardware?1) Scanner 2) Printer 3) Monitor 4) Mouse 5) Interpreter

621. In Excel, this is a prerecorded formula that provides a shortcut for complexcalculations.........1) Value 2) Data Series 3) Function 4) Field 5) None of these

622. The process of trading goods over the Internet is known as ..............1) e-selling-n-buying 2) e-trading 3) e-finance4) e-salesmanship 5) e-commerce

623. A device that connects to a network without the use of cables is said to be–1) distributed 2) free 3) centralized 4) open source 5) None of these

624. Which of the following is a circuit that issue signals at regular intervals...?1) Circuit board 2) Clock 3) Circuit card 4) Gates 5) None of these

625. A set of related programs are known as——————-1) File 2) Arrays 3) Package 4) Subscripts 5) None of these

626. The 0 and 1 in the binary numbering system are called binary digits or ....1) bytes 2) kilobytes 3) decimal bytes 4) bits 5) nibbles

627. The 7-bit ASCII code widely used1) For data communication work 2) In IBM mainframe models3) For coding external memory4) In large machines produced by non-IBM vendors 5) None of the above

Page 43: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 43 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

628. A hard copy would be prepared on a1) Line printer 2) Dot matrix printer 3) Type writer terminal4) Plotter 5) All of the above

629. Which of the following animations cannot be done in PowerPoint?1) bullet list, revealed one bullet point at a time2) clip art - Fly in from the bottom3) table, revealed row by row4) chart, revealed by series 5) None of these

630. Several views are available in MS Front Pag5) Which one of the following is NOT avalid view ?1) Design View 2) Folders View 3) Navigation View4) Web Server View 5) None of these

631. One of the components of central processing unit (CPU) of the computer thatperforms mathematical and logical operations is ...1) ALU (arithmetic logical unit) 2) Address register3) Analog 4) All of the above 5) None of these

632. ......... is the key we use to run the selected command.1) SHIFT 2) TAB 3) ENTER 4) CTRL 5) None of these

633. To name a constant, you use the ___dialog box.1) Create names 2) Define name 3) Paste name4) Format cells 5) None of the Above

634. When you insert an Excel file into a Word document, the data are1) Hyperlinked 2) Placed in a word table 3) Linked4) Embedded 5) None of the above

635. A function inside another function is called a ….. Function.1) Nested 2) Round 3) Sum 4) Text 5) None of the above

636. Selects the entire Row press———-1) Shift + Space 2) Shift + ctrl 3) Shift + alt4) Space + enter 5) None of these

637. In Assembly language....1) Mnemonics are used to code operations2) Alphanumeric symbols are used for addresses3) Language lies between high-level language and machine language4) All of the above 5) None of these

638. CPU capacity can be measured in1) BPS 2) MIPS 3) MHz 4) MPI 5) KHz

639. “Zipping” a fie means1) Encrypting the message 2) Compressing the message3) Transfer the message 4) All of these 5) None of these

640. A .......... shares hardware, software, and data among authorized users.1) network 2) protocol 3) hyperlink 4) transmitter 5) None of these

641. To produce a high - quality graphics (hardcopy) in color, you would want to use a1) Virtual Printer 2) Laser Printer 3) Ink - jet Printer4) Plotter 5) RGB Monitor

642. When was the first Windows operating system launched?1) 1984 2) 1985 3) 1988 4) 1989 5) 1990

643. Thesaurus tool in MS Word is used for-1) Spelling suggestions 2) Grammar options3) Synonyms and Antonyms words 4) All of above 5) None of the Above

Page 44: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 44 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

644. What is the smallest and largest font size available in Font Size tool on formattingtoolbar?1) 8 and 72 2) 8 and 64 3) 12 and 724) None of above 5) None of the Above

645. Aligns the selected text or line to justify the screen press———-1) Ctrl + c 2) Ctrl + I 3) Ctrl + J 4) Ctrl + k 5) None of these

646. Which of the following is different from other ?1) Internet 2) Windows 3) Unix 4) Linux 5) None of these

647. When data changes in multiple lists and all lists are not updated, this causes?1) data redundancy 2) information overload 3) duplicate data4) data inconsistency 5) None of these

648. Granting an outside organization access to internet web pages is often implementedusing a(n)?1) extranet 2) intranet 3) internet 4) hacker 5) None of these

649. Loading Operating System onto RAM is called?1) Printing 2) Saving 3) Booting 4) Staring 5) None of these

650. The purpose of the primary key in a database is to1) unlock the database 2) provide a map of the data3) uniquely identify a record4) establish constraints on database operations 5) None of these

651. Using Windows Explorer, a plus (+) sign in front of a folder indicates—1) an open folder. 2) the folder contains subfolders.3) a text file.4) a graphics file 5) none of these

652. All of the following statements concerning windows are true EXCEPT—1) windows are an example of a command-driven environment.2) windows can be resized and repositioned on the desktop.3) more than one window can be open at a time.4) toolbars and scrollbars are features of windows. 5) None of these

653. The memory resident portion of the operating system is called the—1) Registry. 2) API. 3) CMOS. 4) Kernel. 5) None of these

654. The basic input/output system (BIOS) is stored in:1) RAM. 2) ROM. 3) The CPU. 4) The hard drive 5) None of these

655. Which of the following is not a tower?1) CPU 2) Motherboard 3) Peripheral4) All of the above 5) None of these

656. The horizontal and vertical lines on a worksheet are called—1) cells 2) sheets 3) block lines 4) gridlines 5) None of these

657. What is usually used for displaying information at public places ?1) Monitors 2) Overhead Projections3) Monitors and Overhead Projections4) Touch Screen Kiosks 5) None of these

658. Which key is used in combination with another key to perform a specific task ?1) Function 2) Control 3) Arrow 4) Space bar 5) None of these

659. Fax machines and imaging systems are examples of—1) bar-code readers 2) imaging systems 3) scanning devices4) pen-based systems 5) None of these

660. What is MP3?1) A mouse 2) A Printer 3) A Sound format4) A Scanner 5) None of these

Page 45: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 45 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

661. ___________ is a process that permits multiple computers to use the same IPaddress and hide their actual IP addresses from the Internet.1) Routing 2) Network address translation (NAT)3) Signature referencing 4) Packet filtering 5) None of these

662. What characteristic of read-only memory (ROM) makes it useful ?1) ROM information can be easily update D.2) Data in ROM is nonvolatile, that is, it remains there even without electricalpower.3) ROM provides very large amounts of inexpensive data storage.4) ROM chips are easily swapped between different brands of computers.5) None of these

663. Data representation is based on the………number system, which uses two numbersto represent all data.1) binary 2) biometric 3) bicentennial 4) byte 5) None of these

664. To what temporary area can you store text and other data, and later paste themto another location?1) The clipboard 2) ROM 3) CD-ROM 4) The hard disk 5) None of these

665. Classes, instances, and methods are characteristics of:1) Testing plan construction 2) Artificial intelligence techniques3) Object-oriented design 4) Flowcharts and pseudo code 5) None of these

666. Which of the following correctly describes the CD-R and DVD-R discs?1) You may record data to the disc surface multiple times and can read thecurrent contents at any time.2) You may read data from the disc but may not alter its contents.3) You may record data to the disc surface multiple times but have no directreading capability.4) You may record data to the disc surface once and then may only read itscontents5) None of these

667. To move down a page in a document ……1) jump 2) fly 3) wriggle 4) scroll 5) None of these

668. CD-ROM stands for……1) central processing unit 2) CD-remote open mouse3) CD-resize or minimize 4) CD-read only memory 5) None of these

669. Use this when you want to make all letters capital without having to use the shiftkey for each character………1) shifter 2) upper case 3) caps lock key4) icon 5) None of these

670. —————————is a program that has been physically etched onto a chip.1) Firmware 2) Software 3) Compiler 4) Interpreter 5) None of these

671. The type of memory that must have a constant power supply is:1) SDRAM. 2) PROM. 3) ROM. 4) EEPROM. 5) None of these

672. What type of e-commerce is being used when a student buys a computer fromDell.com?1) B2B 2) C2C 3) B2E 4) B2C 5) None of these

673. __ is the basic language of web page writing.1) Generalized markup language2) Standard generalized markup language3) Nonstandard generalized markup language4) Hypertext markup language 5) None of these

Page 46: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 46 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

674. The topology where all the nodes are attached in a circular wiring arrangementis called a:1) Star topology. 2) Bus topology. 3) Network topology.4) Ring topology 5) None of these

675. Hard disk performance can be improved by using a(n):1) Optimal storage device 2) Disk cache. 3) Solid-state storage device.4) Flash memory reader 5) None of these

676. Which is NOT a characteristic of a system unit?1) Provides a sturdy frame for mounting internal components2) Provides room for system upgrades3) Represents data as binary numbers4) Houses the connectors for input and output devices 5) None of these

677. Where are the Editing group and the Replace command found?1) On the Insert tab 2) On the Review tab 3) On the View tab4) On the Home tab 5) None of these

678. What function displays row data in a column or column data in a row?1) Hyperlink 2) Index 3) Transpose 4) Rows 5) None of the above

679. This type of software contains rows and columns.1) Drawing 2) Spreadsheet 3) Database4) Word processing 5) None of the above

680. Software for organizing storage and retrieval of information is a(n)—1) operating system 2) database 3) database program4) data warehouse 5) None of these

681. To insert a word into the middle of a sentence-1) move the cursor to the desired location in the sentence and type the newword2) move the cursor to the desired location in the sentence, press Enter key, andtype the new word3) move the cursor to the beginning of the sentence and start typing4) retype the whole sentence 5) None of these

682. A high-speed transmission line that carries WAN traffic is called a:1) X.25 line 2) P2PN. 3) Backbone 4) POP 5) None of these

683. A DVD is an example of a(n) –1) hard disk 2) optical disc 3) output device4) solid-state storage device 5) None of these

684. Grouping and processing all of a firm’s transactions at one time is called–1) a database management system 2) batch processing3) a real-time system 4) an on-line system 5) None of these

685. Semi Conductor Memory is known as?1) RAM 2) ROM 3) PROM 4) EPROM 5) None of these

686. Every computer on the Internet is known as?1) Host 2) Client 3) Modem 4) Server 5) None of these

687. A spiral shape track formatting is present in1) Floppy Disk 2) Optical Disk 3) Hard Disk4) Half-inch Tape Cartridge 5) None of these

688. ——————— Types of virus that stays permanently in the RAM memory1) Resident 2) File infectors 3) Boot virus 4) Macro virus 5) None of these

689. Which of the following groups contains graphical file extensions?1) JPG, CPX, GCM 2) GIF, TCF, WMF 3) TCP, JPG, BMP4) JPG, GIF, BMP 5) None of these

Page 47: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 47 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

690. A number system with a base of two is referred as–1) Unary number system 2) Binary number system 3) Octal number system4) All of the above 5) None of these

691. Which of the following is not true for primary storage?1) It is a part of the CPU 2) It allows very fast access of data3) It is relatively more expensive than other storage devices.4) Can be removed and transported. 5) All of the above

692. Which of the following is the advantage of Assembly language over Machinelanguage?1) Easy to use 2) Easy to understand 3) Easy to modify4) All the above 5) None of these

693. VPN stands for———-1) Virtual Personal Network 2) Very Private Network3) Virtual Private Network 4) Vicious Personal Network 5) None of these

694. Which of the following is true about Dial-up internet access?1) It utilizes the existing telephone services 2) It uses a router for security3) It utilizes the broadband technology4) Modem speeds are very fast 5) All of the above

695. Which of the following memories can be read directly by the computer processor?1) Hard Disk 2) Main Memory 3) CD 4) DVD 5) None of these

696. The communication between a processor and other devices inside the computeris done through?1) Bus 2) Channel 3) Network Cable 4) Chip 5) None of these

697. Who is/are the founders of Microsoft?1) Bill Gates 2) Bill Gates and Allen Paul 3) Steve Jobs4) Bill Gates and Steve Jobs 5) None of these

698. What is the difference between a check box and Radio button?1) No difference2) In radio buttons multiple options can be selected whereas in check boxes onlysingle option can be selected3) In check boxes as well as radio buttons multiple options can be selected, butradio buttons can be used only twice4) In check boxes multiple options can be selected whereas in radio buttonsonly single option can be selected5) None of these

699. If a memory chip is volatile, it will.......1) explode if exposed to high temperatures2) lose its contents if current is turned off3) be used for data storage only4) be used to both read and write data 5) None of these

700. Which is NOT a function of a microprocessor?1) Controls the rest of the computer’s components2) Keeps the system unit cool 3) Processes data4) Interprets instructions given by software 5) None of these

701. To connect to a WAN, you must have:1) CSMA/CD 2) Wi-Fi 3) TCP/IP 4) POP 5) None of these

702. During the ____________ operation, the control unit determines what the programis telling the computer to do.1) fetch 2) execute 3) decode 4) arithmetic 5) None of these

Page 48: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 48 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

703. _________ has a large storage capacity, up to 17 GB if both layers and both sidesare used.1) DVD-ROM 2) CD-ROM 3) Floppy 4) RAM 5) None of these

704. A __________ card connects each computer to the wiring in the network.1) network interface 2) PC interface 3) Memory4) All of the above 5) None of these

705. What is the initial page of the Web site?1) The start page 2) The hyperlink page 3) The link page4) The home page 5) None of these

706. What is the term for a set of step-by-step instructions that direct a computer toperform its tasks?1) setup 2) program 3) system4) Instruction manual 5) None of these

707. To execute a given DOS program, you must type a(n) __________.1) command 2) order 3) syntax 4) all of the above 5) none of these

708. PC cards, flash memory cards, and smart cards are all examples of:1) Removable hard disks. 2) Digital video discs. 3) Volatile memory devices.4) Solid state storage devices. 5) None of these

709. A ____________ is a unique identification number generated by a computerhardware component or a program.1) Cookie 2) .NET Passport 3) GUID 4) Private Key 5) None of these

710. RAM is an example of volatile storage and serves as the computer’s—————-1) Short-term memory 2) Hard drive 3) Permanent storage unit4) Auxiliary CPU 5) None of these

711. When a computer prints a report, this output is called_____.1) Hard copy 2) soft copy 3) COM 4) All of the above 5) None of these

712. The ascending order of a data hierarchy is————-1) Bit-byte-record-field-file-database 2) Byte-bit-field-record-file-database3) Bit-byte-field-record-file-database4) Byte-bit-record-file-field-database 5) None of these

713. In computer terminology, information means———1) Raw data 2) Data 3) Data in more useful or intelligible form4) Alphanumeric data program 5) None of these

714. A floppy disk contains——————1) Circular tracks only 2) Sectors only 3) Both circular tracks and sectors4) all of the above 5) None of these

715. A plotter is————-1) An input device to produce good quality graphics2) An output device to produce drawings and graphics3) A fast output device using camera lenses4) None of these 5) None of these

716. Which of the following is a graphical package?1) CorelDraw 2) MS-Excel 3) MS-Word 4) all of the above 5) None of these

717. A mouse, trackball, and joystick are examples of _____.”1) pointing devices 2) pen input devices 3) data collection devices4) multimedia devices 5) none of these

718. The Internet uses————————-1)Circuit switching 2) Packet switching 3) Hybrid switching4) all of the above 5) none of these

Page 49: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 49 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

719. What would you use for immediate, real-time communication with a friend?1) Instant Messaging 2) E-Mail 3) Usenet4) Blog 5) None of these

720. Which of the following is used to create newspaper style columns?1) Format Tabs 2) Table Insert Table 3) Insert Textbox4) Format Columns 5) None of the Above

721. How much space in minimum must be provided between columns?1) 0" 2) 0.5" 3) 1" 4) 1.5" 5) None of the Above

722. Which operation you will perform if you need to move a block of text?1) Copy and Paste 2) Cut and Paste 3) Paste and Delete4) Paste and Cut 5) None of the Above

723. The electronic switches in the ENIAC were:1) integrated circuits 2) transistors 3) electro-mechanical switches4) vacuum tubes 5) none of these

724. Help Menu is available at which button?1) End 2) Start 3) Turnoff 4) Restart 5) Reboot

725. A……….is the term used when a search engine returns a Web page that matchesthe search criteria.1) Blog 2) Hit 3) Link 4) View 5)Success

726. In Excel……….allows users to bring together copies of work-books that other userhave worked on independently.1) Copying 2) Merging 3) Pasting 4) Compiling 5) None of these

727. What kind of memory is static and non - volatile?1) RAM 2) ROM 3) BIOS 4) CACHE 5) None of these

728. —— Is the Virus that overwrites the files or a few parts being replaced?1) Resident 2) File infectors 3) Boot virus4) Macro virus 5) None of these

729. Which of the following is an advantage of stored programs?1) Reliability 2) Reduction in operation costs3) The computers becoming general-purpose4) All of the above 5) None of these

730. Which of the following is an Object Oriented Programming Language?1) C 2) Java 3) C++ 4) Both 2 and 3 5) none of these

731. MICR is exclusively used in——————-1) Libraries 2) Super markets 3) Stock markets4) Banking Industry 5) None of these

732. Which of the following is an audio input device?1) Microphone 2) Webcam 3) MIDI keyboard 4) Only 1 & 3 5) None of these

733. Camera is an?1) Input Device 2) Output Device 3) Storage Device4) Controller Device 5) None of these

734. The internet service that provides a multimedia interface to available resourcesis called———————-1) FTP 2) World Wide Web 3) Telnet4) VPN 5) None of these

735. What is the short-cut key to display save -as dialog box in MS-Word?1) F1 2) Alt + F1 3) F12 4) F5 5) None of these

736. Which of the following is not a web browser?1) Mozilla 2) IE 3) CE 4) Opera 5) Safari

Page 50: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 50 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

737. The backspace key is most often used to?1) Delete a character to the right of the cursor2) Delete a character to the left of the cursor3) Delete a character above the cursor4) Delete a character below the cursor 5) None of these

738. Which of the following keyboard shortcuts is used to view the properties of aselected object?1) Alt + Space 2) Ctrl + Space 3) Alt + Enter4) Ctrl + Enter 5) None of these

739. What is the function of a Drop Cap in MS - Word?1) It does not allow capital letters to be used in the documents.2) It turns the first letter of each word into Upper Case3) It lets you begin a paragraph with a large dropped Initial capital letter4) It automatically starts all paragraphs and sentences with capital letters5) None of these

740. Which of the following is a data - entry device?1) Barcode Reader 2) MICR 3) OMR 4) OCR 5) All of the above

741. Which of the following is true about CPU?1) It contains electronic circuits that cause processing to occur2) It makes the information resulting from processing available for use3) It allows data, programs, commands to be entered into a computer4) It is comprised of electronic components that store data5) None of these

742. Adwords is an——————-1) Advertising Service by Microsoft 2) Advertising Service by Google3) Advanced Search Engine4) Automatic words Search Engine by Yahoo 5) Advertising Service by Yahoo

743. Which of the following is the largest storage?1) Mega Byte 2) Kilo Byte 3) Giga Byte 4) Byte 5) Terabyte

744. System Software includes which of the following?1) Linkers 2) Debuggers 3) Loaders 4) Compilers 5) All the above

745. Which of the following is / are the functions of operating system?1) Memory Management 2) Access to I/O devices3) Controlled Access to files 4) All the above 5) None of these

746. Which of the following is fastest?1) Cache Memory 2) Main Memory 3) Secondary Memory4) Compact Disk 5) Digital Versatile Disk

747. Each Web address is actually a series of numbers, which is usually called as——————1) Domain Name 2) URL 3) http 4) HTML 5) IP address

748. Which of the following is used to connect a personal computer to a network?1) Modem 2) NIC 3) PIC 4) CPU 5) None of these

749. Which of the following is the short-cut key to close an active tab of a browser?1) Alt + F4 2) Ctrl + C 3) Ctrl + F4 4) Shift + C 5) Ctrl + W

750. Which of the following is true about URL?1) It is a web browser 2) It is a messenger 3) It is a mail service4) It is a global address of documents and other resources on World Wide Web5) It is same as internet

751. Which of the following keyboard short-cut is used to center the paragraph?1) Ctrl + C 2) Ctrl + E 3) Ctrl + L 4) Ctrl + R 5) None of these

Page 51: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 51 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

752. Which of the following functions is not performed by servers?1) Processing Websites 2) Database Sharing 3) Storage4) Word Processing 5) Email Processing

753. Which of the following is true about Secondary Storage?1) Does not require constant power 2) Does not use magnetic media3) Consists of four main types of devices4) Does not store information for later retrieval 5) None of these

754. Which of the following is the full form of LSI?1) Low Scale Information 2) Large Scale Information3) Low Scale Integration4) Large Scale Integration 5) Local Scale Integration

755. Which of the following Computer languages is used for Artificial Intelligence?1) FORTRAN 2) PROLOG 3) C 4) COBOL 5) None of these

756. Which of the following is the slowest Internet connection?1) Digital Subscriber Line 2) T1 3) Cable Modem4) Leased Line 5) Dial-Up

757. What is the full form of USB?1) Universal Security Block 2) Universal Security Bus 3) Under Security Block4) Universal Serial Block 5) Universal Serial Bus

758. ‘FIND’ option is available under which of the following menu?1) Tools 2) View 3) File 4) Edit 5) None

759. Compilers and interpreters are themselves——-1) High-level language 2) Codes 3) Programs4) Mnemonics 5) None of these

760. An input device that converts data punched into paper tape into a binary format is1) Page reader 2) Paper tape punch 3) Paper tape reader4) Card punch 5) None of the above

761. A computer will function only if it1) has a control unit 2) is given input data3) has a program in its memory4) has software package 5) None of the above

762. A memory in which the information is stored last is on top & is retrieved first isknown as1) PROM 2) Buffer 3) Stack 4) RAM 5) None of the above

763. Regarding a VDU, which statement is more correct?1) It is an output device 2) It is an input device 3) It is a peripheral device4) It is a hardware item 5) None of the above

764 Plotter accuracy is measured in terms of repeatability and1) buffer size 2) resolution 3) vertical dimension4) intelligence 5) None of the above

765. The minimum time delay required between the initiation of two successive memoryoperations is known as1) memory cycle time 2) memory access time 3) transmission time4) waiting time 5) None of the above

766. Which of the following terms describe 1024 kilobytes?1) Kilobyte 2) Megabyte 3) Gigabyte 4) Terabyte 5) None of the above

767. The flow and timing to data to and from the microprocessor is regulated by1) control pins2) address pins 3) data pins 4) power pins 5) None of the above

768. The total number of messages handled by a computerized telephone system on adaily basis is an example of:1) Frequency 2) Updating 3) Volume4) All of the above 5) None of the above

Page 52: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 52 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

769. An internal storage consisting of arrays of small rings of magnetic material calledferrite is1) Magnetic tape 2) Magnetic core3) Magnetic disk4) Optical mark reader 5) None of the above

770. In the language of the computer profession, one thousand position of main storageis represented with the letter1) K 2) L 3) M 4) C 5) None of the above

771. Which of the following processor is software that accepts user ideas, manipulatesand reorganizes them in user-specified ways and then produces a refined modelof those thoughts.1) Distribute 2) Out-line 3) Multi 4) On-line 5) None of the above

772. The word ‘Computer’ usually refers to the Central Processor Unit plus1) External memory 2) Internal memory 3) Input devices4) Output devices 5) None of the above

773. The control of the jobs running within a system is1) Job monitoring 2) Job stream 3) Job min4) Job step 5) None of the above

774. Communication using a modulated carrier to apply a data signal to a transmissionmedium in analog form is1) Local area network 2) Modem 3) Base band networking4) Broad band networking 5) None of the above

775. A device that can convert digital signal to analog signal is-1) a packet  2) Modem 3) Switch 4) Router 5) None of these

776. A network that uses TOKENS signals is –1) bus network 2) ring network 3) star network4) T-switched network 5) None of these

777. A dot-matrix printer-1) is an input-output device  2) is an output device only3) is an input device only  4) only 2 & 3 5) None of these

778. Which of the following is true?1) Plotters are not available for microcomputer systems2) Micro-computer are not programmed like conventional computers3) Mini-computers are task-oriented4) The contents of ROM are easily changed 5) None of these

779. ROM is composed of-1) Magnetic cores   2) Micro-processors  3) Photoelectric cells 4) Floppy disks 5) None of these

780. The computer code for interchange of information between terminals is-1) ASCII 2) BCD  3) BCDIC 4) Hollerith 5) None of these

781. A temporary storage area, attached to the CPU, for I/O operations, is a-1) Channel  2) Buffer  3) Register  4) Core 5) None of these

782. A characteristic of the ASCII code is1) its limitation to a maximum of 96 character configuration2) its use of the zone codes 1010, 1011 and 11003) its independence from Hollerith code4) All of these 5) None of these

783. A term used interchangeably with diskette is-1) Disk cartridge  2) Disk pack 3) Floppy disk 4) Packette disk 5) None of these

Page 53: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 53 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

784. The daily processing of corrections to customer accounts best exemplifies theprocessing mode of1) batch processing 2) real-time processing 3) time-sharing 4) off-line processing 5) None of these

785. A hybrid computer exhibits the features of ____.1) Analog computer 2) Digital computer3) Both analog and digital computer4) Mainframe computer 5) None of these

786. Consider the following statements about Internet facility:I. It serves as the largest one-line information system.II. It provides the most dependable and latest mode for sending E-mail.III. Recurring expenditure on communication E-mail is very high.IV. It is often misused and has triggered cyber- crimes.Which of these statements are correct?1) I, II and IV  2) I and IV  3) II, III and IV   4) II and III 5) All are correct

787. Compiler is the-1) name given to the computer operator2) part of the digital machine to store the information3) translator of source program to object program4) part of arithmetic logic unit5) operator of Boolean Algebra

788. Main memory is-1) Random Access Memory  2) Read only Memory  3) Serial Access Memory 4) All of The above 5) None of these

789. Which of the following is the smallest and fastest computer imitating brain working?1) Supercomputer 2) Quantum Computer 3) Param-10,000 4) IBM chips 5) None of these

790. To locate a data items for storage is-1) Field 2) Feed  3) Database 4) Fetch 5) None of the above

791. A type of line printer that uses an embossed steel band to form the letters printedon the paper is-1) Golf ball printer  2) Dot-matrix printer  3) Laser printer 4) Band printer  5) None of the above

792. A software used to convert source program instructions to object instruction isknown as1) Compiler  2) Assembler  3) Interpreter  4) Language processor  5) None of the above

793. Which of the following statement is wrong?1) Windows XP is an operating system 2) Linux is owned and sold by Microsoft3) Photoshop is a graphical design tool by Adobe4) Linux is free and open source software 5) None of these

794. Which one of the following is not an application software package?1) Red hat Linux   2) Microsoft Office  3) Adobe PageMaker  4) Open Office 5)None of these

795. A DSLAM is a device used by Internet Service Providers (ISPs) to route incomingDSL connections to the Internet. What is its correct full form?1) Digital Subscriber Line Access Multiplexer2) Digital Subscriber Line Access Multiplier3) Digital Service Line Access Multiplexer4) Dual Subscriber Line Access Multiplexer5) None of these

Page 54: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 54 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

796. Which among the following has been standardized in the IEEE 803 specifications?1) Bluetooth 2) Ethernet 3) Wi MAX 4) All of the above 5) None of the above

797. State the correct external command?1) Chkdsk.exe 2) Attrib.exe 3) Restore.exe 4) Backup.exe 5) All of the above

798. Which of the following is a Web browser?1) Word 2) Paint 3) Power Point 4) Fire fox 5) None of these

799. Which of the following shortcut key is used to move backward through the tabs?1) SHIFT+TAB 2) CTRL+SHIFT+TAB 3) CTRL+TAB4) CTRL+ALT+TAB 5) None of the above

800. Alerts are mostly appear in ___.1) Check Box 2) Combo Box 3) Dialog Box4) All of the above 5) None of the above

801. Which of the following is the impact printer?1) Laser printer 2) Ink jet printers 3) Chain Printers4) All of the above 5) None of the above

802. The use of parity bit is for:1) Error detection 2) Indexing 3) Coding4) All of the above 5) None of the above

803. Symbolic constants can be defined using ___1) extern 2) const 3) define 4) All of the above 5) None of the above

804. Stand alone programs refer to:1) Executable programs 2) Source programs 3) Object programs4) Direct programs 5) Indirect programs

805. The primary purpose of software is to turn data into ____.1) websites 2) information 3) programs 4) objects 5) None of these

806. Back up of the data files will help to prevent ____.1) loss of confidentiality 2) duplication of data 3) virus infection4) loss of data 5) None of these

807. ____ is processed by the computer into information.1) Data 2) Numbers 3) Alphabets 4) Pictures 5) All of the above

808. A ___ can make easier to play games.1) Mouse 2) Joystick 3) Keyboard 4) Pen 5) All of the above

809. Which of the following memories is an optical memory?1) Floppy Disk 2) Bubble Memories 3) CD–ROM4) Core Memories 5) None of these

810. DNS refers to1) Data Number Sequence 2) Digital Network Service3) Domain Name System 4) Disk Numbering System 5) None of these

811. Java was originally invented by1) Oracle 2) Microsoft 3) Novell 4) Sun 5) None of these

812. The unit of speed used for super computer is1) KELOPS 2) GELOPS 3) MELOPS 4) All of these 5) None of these

813. Whose trademark is the operating system UNIX?1) Motorola 2) Microsoft 3) BELL Laboratories4) AshtonTate 5) None of these

814. The first mechanical computer designed by Charles Babbage was called1) Abacus 2) Analytical Engine 3) Calculator4) Processor 5) None of these

815. Which of the following is the most powerful type of computer?1) Super–micro 2) Super conductor 3) Super computer4) Megaframe 5) None of these

Page 55: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 55 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

816. Which is called integrated circuit?1) Gate 2) Mother Board 3) Chip4) CPU 5) None of these

817. C is1) A third generation high level language 2) A machine language3) An assembly language 4) All of the above 5) None of these

818. Web pages are written using1) FTP 2) HTTP 3) HTML 4) URL 5) None of these

819. Find the odd man out.1) Coaxial cable 2) Microwaves 3) Optical fibre4) Twisted pair wire 5) None of these

820. The parity bit is added for the purpose of1) Coding 2) Error detection 3) Controlling 4) Indexing 5) None of these

821. India’s first super computer is1) Agni 2) Flow solver 3) Param 4) Trisul 5) None of these

822. Which of the following is NOT operating system?1) Dos 2) Unix 3) Window NT 4) Java 5) None of these

823. The computer that is not considered as a portable computer is1) Laptop computer 2) Mini computer 3) Notebook computer4) All of these 5) None of these

824. IC chips used in computers are usually made of:1) Lead 2) Silicon 3) Chromium 4) Gold 5) None of these

825. One kilobyte is equal to:1) 1000 bytes 2) 100 bytes 3) 1024 bytes 4) 1023 bytes 5) None of these

826. The errors that can be pointed out by the compiler are:1) Syntax error 2) Symantic error 3) Logical error4) Internal error 5) None of these

827. What do you use to create a chart?1) Pie Wizard 2) Excel Wizard 3) Data Wizard4) Chart Wizard 5) None of these

828. What is the full form of SDRM?1) Shift Dynamic random access memory2) Synchronous Dynamic random access memory3) System Dynamic random access memory4) Serial Dynamic random access memory 5) None of these

829. The performance of a hard drive or other storage device, meaning how long ittakes to locate a file is called?1) Response time 2) Access Time 3) Quick time4) Processing time 5) None of these

830. Alerts are mostly appears in ____?1) Check box 2) Combo box 3) Dialog box4) Window box 5) None of these

831. What is used in most programs that is a part of a program and guides the user’sthrough certain steps?1) Software 2) Wizard 3) Wiki 4) operating 5) None of these

832. Structured query language (SQL) is used in the following?1) Create database 2) Create & Modify Databases3) Create, Modify & Query Databases4) Modify Database 5) None of these

Page 56: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 56 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

833. A file which has not been alerted, compressed, or manipulated in any way by thecomputer is called?1) temp file 2) raw file 3) permanent file4) distort file 5) None of these

834. The word bandwidth is also used to mean ____?1) width of the data cable 2) amount of data transferred3) number of the computers on a particular network4) Both 1 & 2 5) None of these

835. Which of the following used in programming the first computers?1) Object code 2) Source code 3) Machine language4) Assembly language 5) None of these

836. BSNL Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of thefollowing groups?1) ISDN 2) IRC 3) ISP 4) ICONS 5) None of these

837. Which among the following is correct about 4GL?1) A computer brand 2) A software brand 3) A software program4) A programming language 5) None of these

838. First microprocessor was used in which of the following?1) Computer 2) Calculator 3) Telephones 4) Printers 5) None of these

839. Which of the following transforms input data into output data?1) Peripherals 2) RAM 3) ROM 4) CPU 5) None of these

840. In computer file systems which among the following is top or first in hierarchy?1) root directory 2) parent directory 3) home directory4) working directory 5) None of these

841. Which among the following is not a security/ private risk?1) Spam 2) Hacking 3) Virus 4) Phishing 5) None of these

842. When using characters in Windows, what code does a window use?1) ASCII 2) UNICODE 3) MORSE 4) IDBC 5) WESTRN

843. To avoid the wastage of memory, the instruction length should be1) Multiple of character size only 2) Of word size only3) Of file size only4) Of word size which is multiple of character size 5) None of these

844. A generic name for Intel processors released after the original 8086 processor is____?1) Pentium  2) x86  3) Pentium 286  4) None of these 

845. A network that is connected to the Internet, but uses encryption to scramble allthe data sent through the Internet is called ? 1) My network  2) Virtual private Network 3) Social Network  4) None of these 

846. V-RAM is used for access of the following ? 1) Video & Graphics  2) Text & Images 3) programs  4) None of these

847. The word bandwidth is also used to mean ________? 1) width of the data cable  2) amount of data transferred 3) number of the computers on a particular network  4) None of these 

848. NetBIOS was introduced in 1983 by which company as an improvement to thestandard BIOS used by Windows-based computers? 1) Dell  2) IBM  3) Compaq  4) None of these 

849. Which among the following is not a payment card technology? 1) Magnetic Stripe Card  2) Smart Card 3) Fleet Card  4) All of them are payment card technologies 

Page 57: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 57 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

850. Which among the following can be called an electronic check ? 1) Debit Card  2) Smart Card  3) Credit Card  4) None of these 

851. A packet switching network that was sponsored by the Commission of the EECand became operational in 1979 is1) LAN 2) Broadband network 3) Star network4) Euronet 5) None of the above

852. What is the standard code the computer industry created to represent characters?1) DASI  2) ASSH 3) ASCII  4) BASCII 5) EPROM

853. A sizeable geographical area with communication based on the telephone systemis though as1) Local area network 2) Wide area network 3) Modulator-Demodulator4) All of the above 5) None of the above

854. A Winchester disk is a1) Disk Stack 2) Removable disk 3) Flexible disk4) All of the above 5) None of the above

855. Which one of the following is the first second-generation computer?1) IBM 7090 2) IBM 801 3) IBM 7070 4) IBM 650 5) None of the above

856. Which of the following is not a factor affecting the processing capability orperformance of a PC system?1) The clock sped of the microprocessor2) The revolutions per minute of the printer disk3) The primary storage capacity of the processor4) The built-in instruction set available to the microprocessor5) None of the above

857. Condensing output data to exhibit specific information is1) Calculating 2) Recording 3) Merging4) Summarising 5) None of the above

858. Which of the following is used for manufacturing chips?1) control bus 2) control unit 3) parity unit4) semiconductor 5) None of the above

859. Which of the following terms applies to communication between separate computersystems?1) Computer literacy 2) Power supply 3) Applications software4) Connectivity 5) None of the above

860. Output hardware is often categorized according to whether it:1) is expensive 2) requires a large amount of electricity to work3) produces hardcopy or softcopy 4) can fit on a desktop 5) None of the above

861. The original ASCII code used _____ bits of each byte, reserving that last bit forerror checking.1) 5 2) 6 3) 7 4) 8 5) 4

862. Which of the following terms is the most closely related to main memory?1) nonvolatile 2) permanent 3) control unit4) temporary 5) None of the above

863. The computer industry uses prefixes of Greek origin to measure large amounts ofdata Which term describes 1024 bytes.1) Kilobyte 2) Megabyte 3) Gigabyte 4) Terabyte 5) None of the above

864. Which kind of storage device can be carried around?1) Floppy disk 2) Hard disk 3) System cabinet4) Hard disk drive 5) Floppy disk drive

Page 58: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 58 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

865. One nibble is equal to1) 4 bits 2) 8 bits 3) 6 bits 4) 16 bits 5) None of the above.The combination of the operating system and the processor is referred to as thecomputer’s :1) CPU 2) Platform 3) BIOS 4) CMOS 5) None of these

866. The function of Key F4 is1) Delete 2) Repeat last function 3) Refresh 4) Copy 5) None of these

867. Magnetic tape is not practical for applications where data must be quickly recalledbecause tape is: 1) A random-access medium 2) A sequential –access medium3) A read –only medium 4) Fragile and easily damaged5) An expensive storage medium

868. The ______ allows you to choose where to go and is located below the standardsbuttons toolbar.1) system menu 2) Address bar 3) Menu bar 4) Task bar 5) None of these

869. In windows XP, which shortcut is used you lock the computer?1) Ctrl + L 2) Windows Key + k 3) Ctrl + K4) Scroll Lock key 5) Windows Key + L

870. A dot-matrix printer1) is an input-output device    2) is an output device only3) is an input device only      4) both 2 and 3 5) None of these

871. A characteristic of card system is:1) slowness in processing data 2) using cards as records of transactions3) needing a larger data staff 4) all of these 5) None of these

872. What is a ‘TUPLE’?1) another name for a table in an RDBMS.2) Another name for the key linking different tables in a database.3) Initial seed value of field.4) A row or record in a database table. 5) An attribute attached to a record.873._______ is the ability of an operating system to control the activities of multipleprograms at the same time.1) Multitasking 2) Streamlining 3) Multi user4) Simulation 5) None of these

873. A spooler is a(n):1) location in memory that maintains the contents of a document until it printsout2) Print job3) Program that coordinates the print jobs that are waiting to print4) Message sent from the printer to the operating system when a print job iscompleted5) None of these

874. Which of the following is not a protocol in the application layer of TCP/IP suit:1) HTTP 2) TCP 3) HTTPS 4) Telnet 5) None of these

875. All of the following statements concerning files are true EXCEPT:1) A file is a collection of related pieces of information stored together for easyreference.2) Files can be generated from an application3) Files are stored in RAM4) Files should be organized in folders. 5) None of these

Page 59: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 59 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

876. The four main functions of a computer are:1) Input, processing, output and storage2) Learning, thinking, intelligence and virtuosity3) Data, information, bits and bytes4) Hardware, software, modeling and operations 5) None of these

877. A scientific institution performing intensive mathematical operations for a complexmodel that required extremely powerful computing capabilities will most likelyuse a(n):1) Supercomputer 2) PC 3) mainframe 4) ISP 5) None of these

878. The ‘brains’ of the computer which executes the instructions, is called the:1) CPU 2) RAM 3) Motherboard 4) System Unit 5) None of these

879. The process ___ involves automated study of consumer buying patterns in order tosupport marketing, inventory replenishment and pricing decisions.1) transaction processing 2) Data mining 3) Simulation     4) information processing 5) None of these

880. The Principle advantage of adding memory to a printer is to increase:1) resolution 2) Print Speed 3) Number of colors in output4) DPI 5) None of these881. An operating system versiondesigned for use with media Centre PC is Microsoft Windows XP ___.1) Home Edition 2) Media Centre Edition 3) Tablet PC Edition4) None of these 5) None of these

881. Press the ___ button to have the window fill the entire screen.1) close 2) Maximize 3) Minimize4) All of the above    5) None of these

882. What digits are representative of all binary numbers?1) 0 2) 1 3) both 0 and 1 4) 3 5) None of these

883. What can you print? 1) An entire worksheet 2) A single worksheet 3) A range of cells by range name 4) All of the above 5) None of these884. How can you link excel

worksheet data to a word document? 1) With a hyperlink 2) With a copy and paste buttons on the standard toolbar. 3) With a right drag method 4) With a copy and paste special command 5) None of these884. In what way the material that consists of text and numbers be best presented? 1) A bullet slide 2) A title slide 3) A table slide 4) None of the above885. What is the advantage of using a spreadsheet?

1) Automatic calculations2) Calculations are automatically updated if data is changed.3) More flexibility 4) All of the above 5) None of these

886. We can add two kinds of sound effects files to the presentation of MicrosoftPowerPoint and they are1) .wav and .jpg 2) .wav and .gif 3) .wav and .mid4) .jpg and .gif 5) None of these

887. In an electronic database, when the words or phrases is being searched and iffound then it is called 1) IT 2) Bug 3) Hit 4) Default 5) None of these

888. To a PowerPoint show one can add the file with extension1) .jpg 2) .gif 3) .wav 4) All of the above 5) None of these

Page 60: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 60 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

889. The vast network of computers that connects millions of people all over the worldis called _____.1) LAN  2) Web  3) Hypertext 4) Internet  5) None of these

890. The property that, when classes are arranged in a hierarchy, each class assumesthe attributes and methods of its ancestors is _______.1) generalization  2) inheritance  3) encapsulation 4) information hiding 5) None of these

891. The software component of an expert system that draws conclusions is the _____.1) user interface  2) database  3) inference engine4) I/O controller  5) model base

892. The attributes and methods for each object are stored in _______.1) an object instance  2) an object connection3) an assembly structure  4) an object repository 5) None of these

893. An E-R diagram is a graphic method of presenting ____.1) primary keys and their relationships2) primary keys and their relationships to instances3) entity classes and their relationships4) entity classes and their relationships to primary keys 5) None of these

894. ________ is an invalid type of database key.1) Structured primary key  2) Atomic primary key3) Primary key  4) Composite primary key 5) None of these895. Aprocessor that collects the transmissions from several communications mediaand sends them over a single line that operates at a higher capacity is called______.1) multiplexer  2) bridge  3) hub 4) router 5) None of these

895. Bandwidth refers to _______.1) the cost of the cable required to implement a WAN2) the cost of the cable required to implement a LAN3) the amount of information a peer-to-peer network can store4) the amount of information a communications medium can transfer in agiven amount of time 5) None of these

896. _________ is a primary key of one file that also appears in another file.1) Physical key  2) Primary key  3) Foreign key4) Logical key  5) None of these

897. The technique that extends storage capacities of main memory beyond the actualsize of the main memory is called _______.1) multitasking  2) virtual storage 3) multiprocessing4) multiprogramming 5) switching

898. Customers, facilities, knowledge workers, business information, communicationinfrastructure and computer equipment are all considerations in a good _______plan.1) Hacker  2) Disaster recovery  3) Security4) Risk management  5) None of these

899. Which of the following correctly defines the term E-Banking?A) It is the short form of Efficient Banking which means providing all bankingrelated services to the customers in minimum required time during their visit tothe branch.B) E-Banking is providing banking facilities to all the customers through ATMsonly which restricts their visits to a bank branch to a bare minimum.

Page 61: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 61 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

C) E-Banking implies provisions of banking products and services through electronicdelivery channels like ATMs, Phone, internet, mobile phones etc.1) Only A      2) Only B 3) Only C 4) Only A & B  5) Only A & C

900. SMTP, FTP and DNS are applications of the ____ layer.1) data link  2) network  3) transport  4) application  5) None of these

901. In a database, information should be organized and accessed according to whichof the following?1) Physical position  2) Logical structure 3) Data dictionary 4) Physical structure 5) None of these

902. Traffic in a VPN is not ______.1) invisible from public networks 2) logically separated from other traffic3) accessible from unauthorized public networks4) restricted to a single protocol in IP Sec 5) None of these

903. A ________ is not a form of Biometrics.1) fingerprint  2) password 3) retina scan 4) breath scan 5) None of these

904. A compiler ______.1) translates machine language into a high level language2) translates one statement at a time as the program executes3) translates two statements at a time as the program executes4) produces object code 5) is less sophisticated than an assembler

905. References to each file on a disk are stored in a ______.1) file allocation table  2) root allocation table 3) linking directory 4) root directory 5) directory allocation table

906. A sender must not be able to deny that he sent a specific message when he infact did. This is an aspect of security called ______.1) privacy  2) authentication  3) integrity4) non-repudiation  5) None of these

907. Each dot on screen is called______.1) Pixel  2) DPI 3) Dot 4) All of these  5) None of these

908. The vast network of computers that connects millions of people all over the worldis called _____.1) LAN  2) Web  3) Hypertext 4) Internet  5) None of these

909. The property that, when classes are arranged in a hierarchy, each class assumesthe attributes and methods of its ancestors is _______.1) generalization  2) inheritance  3) encapsulation 4) information hiding 5) None of these

910. The software component of an expert system that draws conclusions is the _____.1) user interface  2) database  3) inference engine4) I/O controller  5) model base

911. The attributes and methods for each object are stored in _______.1) an object instance  2) an object connection 3) an assembly structure 4) an object repository 5) None of these

912. An E-R diagram is a graphic method of presenting ____.1) primary keys and their relationships2) primary keys and their relationships to instances3) entity classes and their relationships4) entity classes and their relationships to primary keys 5) None of these

913. ________ is an invalid type of database key.1) Structured primary key  2) Atomic primary key 3) Primary key 4) Composite primary key 5) None of these

Page 62: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 62 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

914. A processor that collects the transmissions from several communications mediaand sends them over a single line that operates at a higher capacity is called______. 1) multiplexer  2) bridge  3) hub 4) router  5) None of these

915. Which of the following is the largest manufacturer of Hard Disk Drives?1) IBM               2) Seagate 3) Microsoft   4) 3M 5) None of these

916. _________ is a primary key of one file that also appears in another file.1) Physical key  2) Primary key  3) Foreign key 4) Logical key  5) None of these

917. The technique that extends storage capacities of main memory beyond the actualsize of the main memory is called _______.1) multitasking  2) virtual storage 3) multiprocessing4) multiprogramming 5) switching

918. Customers, facilities, knowledge workers, business information, communicationinfrastructure and computer equipment are all considerations in a good _______plan.1) Hacker  2) Disaster recovery  3) Security4) Risk management  5) None of these

919. A sender must not be able to deny that he sent a specific message when he infact did This is an aspect of security called ______.1) privacy  2) authentication  3) integrity 4) non-repudiation  5) None

920. _______ is an access method in which collisions are entirely avoided.1) CSMA  2) CSMA/CD 3) CSMA/CA 4) All of these  5) None of these

921. What is the responsibility of the logical unit in the CPU of a computer?1) Producing result 2) Comparing numbers3) Controlling flow of information4) Performing mathematical operations 5) Controlling flow of data

922. Abacus was the first ___1) Electronic computer 2) Mechanical computer3) Electronic calculator 4) Mechanical calculator 5) Electronic chip

923. If in a computer, 16 bits are used to specify address in a RAM, the number ofaddresses will be _1) 216 2) 65,536 3) 64K 4) 128K 5) 135K

924. Instructions and memory address are represented by ___1) Character code 2) Binary code3) Binary word4) Parity bit 5) Bite code

925. The terminal device that functions as a cash register, computer terminal andOCR reader is:1) Data collection terminal 2) OCR register terminal3) Video Display terminal 4) POS terminal 5) None of the above

926. A set of flip flops integrated together is called ____1) Counter 2) Adder 3) Register 4) Flip flop 5) All of the above

927. People often call ______ as the brain of computer system.1) Control Unit2) Arithmetic Logic Unit 3) Central Processing Unit4) Storage Unit 5) Store data

928. Which of the following is used for manufacturing chips?1) Bus 2) Control unit 3) Semiconductors4) 1 and 2 only 5) None of the above

929. What are the chief components of 1G Computers?1) Vaccum Tubes 2) Transistors 3) IC’S 4) VLSI 5) All of these

Page 63: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 63 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

930. What are the chief components of 2G Computers?1) Vaccum Tubes 2) Transistors 3) IC’S 4) VLSI 5) All of these

931. What are the chief components of 3G Computers?1) Vaccum Tubes 2) Transistors 3) IC’S 4) VLSI 5) All of these

932. The telephone is an example of a(n)____ signal.1) analog 2) digital 3) modulated 4) demodulated 5) compiler

933. Acredit card-sized expansion board that is inserted into portable computers thatconnects the modem to the telephone wall jack is:1) Internal modem 2) External modem 3) PC Card modem4) Wireless modem 5) Wired modem

934. A modem that is contained within the system unit is called:1) External 2) Internal 3) Wireless 4) Wi-Fi 5) Bluetooth

935. A modem that doesn't need to be connected to a telephone line is the ___ modem.1) external 2) internal 3) wireless 4) DSL 5) NSL

936. A special high-speed line used by large corporations to support digitalcommunications is known as:1) satellite/air connection service lines 2) cable modems3) digital subscriber lines4) T1, T2, T3 and T4 lines 5) None of the above

937. An affordable technology that uses existing telephone lines to provide high-speedconnections is called ________.1) ISDN 2) microwave 3) cable modem 4) DSL 5) ALU

938. The capacity of a communication channel is measured in ___1) Bandwidth 2) Bit capacity3) Baud rate 4) Data flow 5) Store data

939. A relatively new technology that allows wireless connectivity:1) Bluetooth 2) Black tooth 3) Blue band 4) Broadband 5) None of these

940. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify thesoftware product?1) MS 2) DOS 3) MS DOS 4) 5.0 5) 4.2.0

941. Which of the following is part of the system unit?1) Keyboard 2) Floppy disks 3) Monitor 4) Memory 5) CD

942. Specialized programs that allow particular input or output devices to communicatewith the rest of the computer system are called ____.1) operating systems 2) utilities 3) device drivers4) language translators 5) Connectors

943. The primary purpose of software is to turn data into:1) Websites 2) graphs 3) programs 4) objects 5) information

944. The _____________ enables you to simultaneously keep multiple web pages openin one browser window.1) Tab bar 2) pop-up helper 3) Tab row 4) Address bar 5) None

945. Information is?1) Summarization process of data 2) Data Information3) Textual form of data 4) Facts and figures 5) None of these

946. Total memory of system can be known using?1) DIR commands 2) MEM commands 3) Warm boot4) TOT MEM commands 5) None of these

947. The first graphical web browser are?1) Gopher 2) WAIS 3) CERN 4) Mosaic 5) None of these

948. Which of the following is correct?1) POWER(2^ 3) 2) POWER(2,3) 3) POWER(2# 3)4) POWER(2* 3) 5) None of these

Page 64: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 64 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

949. What is the default font in MS Word?1) Gothic Bold 2) MV Biol 3) Times new roman 4) Arial 5) None of these

950. ………………is the process of carrying out commands.1) Fetching 2) Storing 3) Executing 4) Decoding 5) None of these

951. Latest Entry Level Desktop PC have at least more than ------ of RAM.1) 100bit 2) 100Byte 3) 100KB 4) 100 MB 5) None of these

952. ---------- Bar is located at top of WordPad / Notepad /MS Word window.1) Title 2) Menu 3) Tool 4) Format 5) None of these

953. Computers uses which number system ?1) hexa decima 2) Decimal 3) octal 4) Binary 5) None of these

954. The ---------- button on the quick access toolbar allow you to cancel your recentcommands or action.1) Search 2) Cut 3) Document 4) Undo 5) None of these

955. What type of virus use computer hosts to reproduces it?1) Time bomb 2) worm 3) Melissa virus 4) Macro virus 5) None of these

956. ---------- is a signaling method that handles a relatively wide range of frequencies.1) Broadband 2) DLF 3) Dial-up 4) both 1& 3 5) None of these

957. Block on buffer caches are used:1) to handle interrupts 2) to increase capacity of main memory3) to improve disk performance4)to speed up main memory read operation 5) None of these

958. The term --- designate equipment that might be added to a computer system toenhance. Its functionality.1) Digital device 2) system add 3) Disk pack4) Peripheral device 5) None of these

959. A disk content that is recorded at the time of manufacture and that cannot bechanged or erased by the user.1) READ ONLY 2) Memory only 3) Run only4) WRITES ONLY 5) None of these

960. Pascal calculator Was invented in which year?.1) 1542 2) 1642 3) 1742 4) 1842 5) 1942

961. A device operating at the physical layer is called a1) Bridge             2) Router 3) Repeater        4) All of the above 5) None of these

962. For separating channels in FDM, it is necessary to use1) Time slots      2) Band pass filters 3) Differentiation             4) All of the above 5) None of these

963. Encryption and decryption are functions of1) Transport layer            2) Session layer 3) Presentation layer     4) All of the above 5) None of these

964. Which of the following computer language is a mathematically oriented languagesused for scientific problems?1) FORTRAN      2) COBOL             3) LISP 4) PROLOG        5) APPLE

965. ________ is when the more power-hungry components, such as the monitor andthe hard drive, are put in idle.1) Hibernation 2) Power down 3) Standby mode4) The shutdown procedure 5) None of these

966.  Hard disk drives are considered ________ storage.1) flash 2) non-volatile 3) temporary4) nonpermanent 5) None of these

Page 65: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 65 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

967. The ________ key and the ________ key can be used in combination with otherkeys to perform shortcuts and special tasks.1) Control, Alt 2) Function, toggle 3) Delete, Insert4) Caps Lock, Num Lock 5) None of these

968. The most common input devices are the ________ and the ________.1) microphone, printer 2) scanner, monitor 3) digital camera, speakers4) keyboard, mouse 5) None of these

969. To save an existing file with a new name or to a new location, you should use the________ command.1) Save 2) Save and Replace 3) Save As    4) New File 5) None of these

970.   A(n) ________ is a combination of hardware and software that facilitates thesharing of information between computing devices.1) network                         2) peripheral 3) expansion board        4) digital device 5) None of these

971. The term bit is short for ________1) megabyte         2) binary language 3) binary digit    4) binary number 5) None of these

972. Computers gather data, which means that they allow users to ________ data.1) present              2) input 3) output               4) store 5) None of these

973. Which of the following terms is just the connection of networks that can be joinedtogether ?1) virtual private network 2) internet 3) intranet 4) extranet5) None of these

974.  ________ is a form of permanent memory that holds all the instructions thecomputer needs to start up and does not get erased when the power is turned off.1) The Network Interface Card (NIC) 2) The CPU 3) RAM4) ROM 5) None of these

975. Servers are computers that provide resources to other computers connected to a________1) network             2) mainframe 3) supercomputer                4) client 5) None of these

976. IP address contains ........... bits.1) 8 bits 2)16 bits 3) 32 bits 4) 40 bits 5) None of these

977. Which key is used to indent a paragraph in MS word ?1) Shift 2) tab 3) Ctrl 4) Esc 5) None of these

978. Which is the example of spread sheet ?1) MS word  2) MS excel  3)  Power point 4) MS Access 5) None of these

979. Which disk contains permanent magnetic disk1) CD 2) DVD 3) HDD 4) BRD 5) None of these

980. _________ is the process of correcting errors in software code.1) Debugging 2) Compiling 3) Testing 4) Running 5) None of these

981. ____________ are viruses that are triggered by the passage of time or on a certaindate.1) Boot-sector viruses 2) Macro viruses 3) Time bombs4) Worms 5) None of these

982. Linux is a (n)______ ______ operating system.1) open-source 2) Microsoft 3) Windows 4) Mac 5) None of these

983. What is a backup?1) Restoring the information backup 2) An exact copy of a system’s information3) The ability to get a system up and running in the event of a system crash orfailure4) All of these 5) None of these

Page 66: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 66 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

984. Which of the following places the common data elements in order from smallestto largest1) character, file, record, field, database2) character, record, field, database, file3) character, field, record, file, database4) Bit, byte, character, record, field, file, database, 5) None of these

985. What is the file extension of Ms-Word document?1) Dot 2) Doc 3) Dom 4) Txt 5) None of these

986. The vast network of computers that connects millions of people all over the worldis called—1) LAN 2) Web 3) Hypertext 4) Internet 5) None of these

987. ________ is a primary key that also appears in another file.1) Physical key 2) Primary key 3) Foreign key4) Logical key 5) None of these

988. The OSI model is divided into_______ processes called layers.1) five 2) six 3) seven 4) eight 5) None of these

989. System software is the set of programs that enables your computer’s hardwaredevices and______ software to work together.1) management 2) processing 3) utility 4) application 5) None of these

990. ________ are specially designed computer chips which reside inside other devices,such as your car or your electronic thermostat.1) Servers 2) Embedded computers 3) Robotic computers4) Mainframes 5) None of these

991. The following are all computing devices , except………1) notebook computers 2) cellular telephones 3) digital scanners4) personal digital assistants 5) None of these

992. In a ring topology , the computer in possession of the______ can transmit data1) packet 2) data 3) access method 4) token 5) None of these

993. Full form of TCP is:1) Transmission Control Protocol 2) Total Control Protocol3) Transmission Control Program4) Totaling Control Program 5) None of these

994. __ provides a common address space and routes the packets of data across theentire internet?

1) IP 2) TCP 3) UDP 4) ALU 5) None of these995. Cyberspace is being governed by a system of law and regulation called? 1) Civil Law 2) Criminal Law 3) Electronic Law

4) Cyber Law 5) Cyber Authority996. To move to the beginning of a line of text, press __key?

1) Home 2) Ctrl 3) Space 4) Enter 5) None of these997. What menu is selected to change the font and style?

1) Tools 2) File 3) Format 4) Edit 5) None of these998. The process of starting the computer and loading of operating system programs

for execution is called1) initialization 2) retrieving 3) loading 4) searching 5) booting

999. Primary memory is used by the:1) user 2) input device 3) CPU 4) all of these 5) None of these

1000.In a disk, each block of data is written into - 1) one sector 2) three sector 3) Two sectors 4) Two or more sectors 5) either two or three sectors:

Page 67: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 67 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1001.The Pentium processor contains-1) tens of thousands of transistors 2) hundred thousands of transistors

3) thousands of transistors4) several millions of transistors 5) hundred transistors

1002.__ was the precursor to internet as we know it today?1) ARPANET 2) USENET 3) TELNET 4) DBMS 5) None of these

1003.Which of the following is not an operating system?1) DOS 2) Oracle 3) Linux 4) Windows 5) None of these

1004.In word, what combination of keys do you press to delete an entire word?1) Ctrl + del 2) Alt + del 3) Shift + Backspace4) Shift + Alt + del 5) None of these

1005.Hardware that adds two numbers is: 1) the control unit 2) an internal CPU register 3) arithmetic Logic Unit

4) Browser 5) None of these1006.A small amount of memory included in the processor for high speed access id

called-1) Register 2) Cache 3) RAM 4) ROM 5) None of these

1007.A byte represents a group of:1) 10 bits 2) 40 bits 3) 16 bits 4) 18 bits 5) 8 bits

1008.Extension name of flash file is ___. 1) .pdf 2) .swf 3) .pmd 4) .prd 5) None of these1009.Who invented world wide web?

1) Mosaic corporation 2) Opera corporation 3) Tim berner lee4) Vint cert 5) None of these

1010.URL stands for ____.1) Uniform Resource Locator 2) Universal resource locator3) Address bar 4) All 1, 2 & 3 are correct 5) None of these

1011.A thing present in real world in physical form is called____.1) DBMS 2) Entity 3) Modulation 4) Keywords 5) None of these

1012.BUG is -1) To find error in any software testing 2) To find error in any software code3) logical error of any program 4) both 1 & 2 5) None of these

1013.Which of the following is not a type of key?1) Alphabetic K eys 2) Numeric keys 3) Function keys4) Toggle keys 5) None of these

1014.If a previously saved file is edited ___?1) it cannot be saved again2) the changes will automatically be saved in the file3) the file will only have to be saved again if it is more than one page in length4) its name must be changed5) the file must be saved again to store the changes

1015. Which of the following converts all the statements in a program in a single batchand the resulting collection of instructions is placed in a new file?1) Compiler 2) Interpreter 3) Converter 4) Instruction 5) None of these

1016.A program that generally has more user-friendly interface than a DBMS is calleda ____?1) front end 2) repository 3) back end 4) form 5) None ofthese

1017.When you install new programs on your computer, it is typically added to the___?1) All programs 2) Select programs 3) Start programs4) Desktop programs 5) None of these

Page 68: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 68 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1018.Which of the following statements is FALSE concerning file names?1) Files may share the same name or the same extension but not both2) Every file in the same folder must have a unique name3) File extension is another name for file type4) The file extension comes before the dot (.) followed by the file name5) None of these

1019.Which of the following is the key function of a firewall?1) Monitoring 2) Deleting 3) Record 4) Copying 5) Moving

1020.Programming language built into user programs such as Word and Excel areknown as____?1) 4GLs 2) macro languages 3) object-oriented languages4) visual programming languages 5) None of these

1021.In MS Word Key F12 opens ____?1) Save dialog box 2) print dialog box 3) New dialog box4) Save as dialog 5) none

1022.What is gutter margin?1) Margin that is added to the left margin when printing2) Margin that is added to right margin when printing3) Margin that is added to the binding side of page when printing4) Margin that is added to the outside of the page when printing5) None of these

1023.The vast network of computers that connects millions of people all over the worldis called.1) LAN 2)web 3)hypertext 4)internet 5) None of these

1024. The property that, when classes are arranged in a hierarchy, each class assumesthe attributes and methods of its ancestors is1) generalization 2) inheritance 3) encapsulation4) information hiding 5) None of these

1025.The software component of an expert system that draws conclusions is the.1)user interface 2)database 3)inference engine4)1/0 controller 5)model base

1026.The attributes and methods for each object are stored in.1) an object instance 2) an object connection 3) an assembly structure4) an object repository 5) None of these

1027.An E-R diagram is a graphic method of presenting1) primary keys and their relationships2) primary keys and their relationships to instances3) entity classes and their relationships4) entity classes and their relationships to primary keys5) None of the above

1028.The OCR is used for the preparation of1) electricity bills 2) insurance premium 3) telephone bills4) All of these 5) None of these

1029.This part of operating system manages the essential peripherals, such as thekeyboard, screen , disk drives, and parallel and serial ports_____1) basic input/output system 2) secondary input/output system3) peripheral input/output system 4) marginal input/output system5) None of these

1030.MS-DOS is usually supplied on a1) hard disk 2) cartridge tape 3) CD ROM4) floppy disk or diskettes 5) None of these

Page 69: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 69 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1031.Which one of the following is not a DOS prompt ?1) C > 2) B > 3) A > 4) ENTER 5) None of these.

1032. Which one of the following is not an internal DOS command?1) BACKUP 2) COPY 3) CLS 4) BREAK 5) None of these

1033.In Excel, the contents of the active cell are displayed in the ................1) footer bar 2) tool bar 3) task bar 4) menu bar 5) formula bar

1034.The execution phase is referred to as ...........1) program cycle 2) machine instruction 3) execution cycle4) task cycle 5) machine cycle

1035.In Windows ME. what does M stand for?1) Millennium 2) Micro-Expert 3) Macro-Expert4) Multi-Expert 5) My-Expert

1036.Which of the following refers to the fastest, biggest and most, expensivecomputers?1) Notebooks 2) Personal Computers 3) Laptops4) Supercomputers 5) PDA’s

1037.Which is not a basic function of a computer ?1) Accept and process data 2) Accept input 3) Process data4) Store data 5) Scan text

1038.Which of the following is not a term pertaining to Email?1) power Point 2) inbox 3) sender 4) receiver 5) None of these

1039. Peripheral devices such as printers and monitors are considered to be ................1) data 2) software 3) hardware4) information 5) None of these

1040. Which of the following is required to create an HTML document ?1) browser 2) internet 3) text editor4) search engine 5) None of these

1041.Which language is directly understood by the computer without translationprogram ?1) BASIC language 2) Assembly language 3) High level language4) C language 5) Machine language

1042. Which of the following is not true about a compiler ?1) Translates instruction of a high level language into machine language2) Translates entire source program into machine language program3) It is involved in program’s execution4) Is a translating program 5) Is useful to run programs

1043.Keyboards, scanners, and microphones are examples of ................1) software programs 2) input devices 3) output devices4) utilities 5) None of these

1044. Computers manipulate data in many ways, and this manipulation is called1) upgrading 2) processing 3) batching 4) utilising 5) None of these

1045.What is an e-mail attachment?1) A receipt sent by the recipient2) A separate document from another program sent along with an e-mailmessage3) A malicious parasite that feeds off your messages and destroys the contents4) A list of CC or BCC recipients 5) None of these

1046.SMTP, FTP and DNS are applications of the ____ layer.1) data link 2) network 3) transport 4) application 5) None of these

Page 70: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 70 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1047. In a database, information should be organised and accessed according to whichof the following?1) Physical position 2) Logical structure 3) Data dictionary4) Physical structure 5) None of these

1048.A _______ is a path connected to two networks.1) link 2) server 3) gateway 4) bridge way 5) None of these

1049.A file extension is separated from the main file name with a(n) _______, but nospaces.1) question mark 2) exclamation mark 3) underscore4) period 5) None of these

1050.A telephone number, a birth date, and a customer name are all examples of1) a record 2) data 3) a file 4) a database 5) None of these

1051.The term _______ designates equipment that might be added to a computer systemto enhance its functionality.1) digital device 2) system add-on 3) disk pack4) peripheral device 5) None of these

1052.Which key is used in combination with another key to perform a specific task?1) Function 2) Control 3) Arrow 4) Space bar 5) None of these

1053.OCR stands for _____1) Optical Character Recognition 2) Optical CPU Recognition3) Optimal Character Rendering 4) Other Character Restoration5) None of these

1054.If a new device is attached to a computer, such as a printer or scanner, its ______must be installed before the device can be used.1) buffer 2) driver     3) pager 4) server 5) None of these

1055.The software that allows users to surf the Internet is called a/an1) Search engine 2) Internet Service Provider (ISP)3) Multimedia application 4) Browser 5) None of these

1056.A tuple is a1) column of a table          2) two-dimensional table3) row of a table    4) key of a table 5) None of these

1057.In Excel,_____ contains one or more worksheets.1) Template 2) Workbook   3) Active cell 4) Label   5) None of these

1058.Which of the following is a popular programming language for developingmultimedia web pages, websites, and web-based applications?1) COBOL 2) Java  3) BASIC 4) Assembler        5) None of these

1059.Compiling creates a(n) _____ .1) program specification   2) algorithm 3) executable program    4) subroutine 5) None of these

1060.A CD-RW disk1) has a faster access than an internal disk2) is a form of optical disk, so it can only be written once3) holds less data than a floppy disk4) can be erased and rewritten5) None of these

1061.The first page of a Web site is called the1) Home page 2) Index 3) Java Script  4) Book mark 5) None of these

1062.Which of the following device reproduces test & images?1) CPU 2) Reader 3) Memory  4)Trackball 5) Scanner

Page 71: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 71 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1063.Extension of excel spreadsheet is _____?1) .doc 2) .xls 3) .ppt 4) .acctf 5) .exe

1064._______electrically connects electronic components.1) Hard disk 2) Scanner 3) RAM 4) ROM 5) Circuit board

1065. Most important part of computer system is present in a box. This box is known as_____?1) software 2) hardware 3) input device4) system unit 5) None of these

1066.Track ball is _______. 1) Programming 2) Pointing device3) Output 4) Software 5) Printing device

1067.What is the meaning of page break up –1) Page of document is break into small parts.2) Next part of the document will be started on the new page.3) Page of the document is break in small – 2 sentences.4) Page of the document is break into small paragraph 5) None of these

1068.Which of the following work is not done by computer?1) Input  2) Processing 3) Controlling 4) Understanding  5) Outputting

1069.Full form of BIT ______1) Built in tasks  2) Binary digit3) Before instructed task4) Before interpreting task 5) Before initial task

1070.Which of the following word is odd one?1) Delete 2) Edit 3) Copy 4) Slide show 5) None of these

1071.What is best position of mouse for operating?1) Tail is away from user 2) Tail is front from user3) Right hand side 4) Left hand side 5) None of these

1072.________ does not require translator? 1) BASIC 2) High level language 3) Assembly4) C 5) Machine language

1073.Arranged following in descending order – 1) TB, MB, GB, KB 2) GB, TB, MB, KB3) TB, GB, KB, MB 4) TB, GB, MB, KB 5) GB, MB, TB, KB

1074. Computer RAM is ______. 1) CPU 2) Computer software 3) Operating system 4) ALU 5) Computer hardware

1075.Which of the following is not example of hardware?1) Mouse 2) Printer 3) Monitor 4) Operating system 5) Scanner

1076.Basic component used in 3rd generation computer is _____1) Integrated circuits 2) Microprocessor3) Transistor & diodes 4) Vacuum tubes 5) None of these

1077.What part of the database stores information about the data?1) Data dictionary 2) Data depository 3) Data warehouse4) Administrative data systems 5) None of these

1078.The textbook examples use _______ database files?1) Oracle 2) Access 3) SQLClient4) SQL Server Express 5) None of these

1079.By default, your documents print in ________ mode.1) Landscape 2) Portrait 3) Page Setup 4) Print View 5) None of these

1080.Something which has easily accessible and usable is said to be1) information 2) word processing 3) user friendly 4) icon 5) None of these

Page 72: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 72 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1081.Where are programs and data kept while the processor is using them?1) Main memory 2) Secondary memory3) Disk memory 4) Program memory 5) None of these

1082.If you wished to highlight, not hide, some information in a worksheet because itmet some criteria, what Excel tool would you use?1) Table  2) Format 3) Conditional Format 4) Filter 5) None of these 

1083.What Excel tool allows you to create quickly and automatically summary datafrom a large data set?1) Conditional formatting  2) Sorting 3) Pivot tables 4) Field lists 5) None of these 

1084.When creating a custom filer in Excel, which of the following would not beconsidered a Boolean operator?1) If  2) And 3) Or  4) Not 5) None of these 

1085.Which of the following is a good habit to get into when creating a worksheet?1) Placing titles for columns in the first row of data2) Using conditional formatting to spot spelling errors3) Inserting comments in each cell to define that data or type of data4) Grouping records according to some classification 5) None of these

1086.What term is used to describe a collection of information that you can use tobuild reports or discover facts about an environment?1) Database  2) Web site 3) Wiki  4) Relation 5) None of these

1087.Microsoft’s Access and Corel’s Paradox are both examples of which type of software?1) Network database systems 2) Relational database systems3) Flat-file database systems 4) Hierarchical database systems 5) None of these

1088.What type of graphical model is used to define a database?1) Flowchart  2) E-R diagram 3) Organizational model4) Programming model 5) None of these

1089.After you develop a model for your database, you should then _____ it beforebuilding it.1) normalize  2) design 3) plan  4) approve 5) None of these

1090. Which of the following contains information about the structure of a database?1) Database management system 2) Data dictionari3) Data repository  4) Data warehouse 5) None of these

1091. The rules of a language are called its __________.1) structure  2) code 3) syntax  4) rigidity 5) None of these

1092. A language that can be written on one platform and executed on another platformis said to be __________.1) portable  2) robust 3) third generation  4) dynamic 5) None of these

1093. __________ is Microsoft’s latest entry into the programming arena.1) Java  2) .NET 3) Visual Basic  4) Pascal 5) Noneof these 

1094. A next-generation Web content development language, __________ typically refersto a suite of technologies that allow developers to store data in a readable format.1) HTML  2) XSL 3) XML  4) PHP 5) None of these 

1095. JavaScript was developed by __________ to run inside of web pages.1) Microsoft  2) Sun 3) Oracle  4) Netscape 5) None of these

1096.Mostly which of the following device is used to carry user files?1) Floppy Disk 2) Hard Disk 3) RAM 4) CDROM 5) None of these

Page 73: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 73 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1097. Which device is used to backup the data?1) Floppy Disk 2) Tape 3) Network Drive4) All of the above 5) None of these

1098. In order to play and hear sound on a computer, one needs:1) a sound card and speakers        2) a microphone3) all of them required                  4) none of them required

1099. Which of the following are the cheapest memory devices in terms of Cost/Bit?1) Semiconductor memories 2) Magnetic Disks3) Compact Disks 4) Magnetic Tapes 5) None of these

1100. Which of the following are the best units of data on an external storage device?1) Bits 2) Bytes 3) Hertz 4) Clock cycles 5) None of these

1101. Which of the following have the fastest access time?1) Semiconductor Memories 2) Magnetic Disks3) Magnetic Tapes   4) Compact Disks

1102. Which of the following is a read only memory storage device?1) Floppy Disk 2) CDROM 3) Hard Disk 4) None of these

1103. Which of the following is a programming language?1) Lotus 2) Pascal 3) MS-Excel   4) Netscape

1104. What is a compiler?1) A compiler does a conversion line by line as the program is run2) A compiler converts the whole of a higher level program code into machinecode in one step3) A compiler is a general purpose language providing very efficient execution4) None of the above

1105. What is an interpreter?1) An interpreter does the conversion line by line as the program is run2) An interpreter is the representation of the system being designed3) An interpreter is a general purpose language providing very efficient execution4) None of the above

1106. When a key is pressed on the keyboard, which standard is used for convertingthe keystroke into the corresponding bits?1) ANSI               2) ASCII 3) EBCDIC              4) ISO

1107. A Pixel is ………1) A computer program that draws picture2) A picture stored in secondary memory3) The smallest resolvable part of a picture 4) None of these

1108. Which device is used as the standard pointing device in a Graphical User Environment?

1) Keyboard               2) Mouse 3) Joystick 4) Track ball1109. Which number system is usually followed in a typical 32-bit computer?

1) 2         2) 10 3) 16 4) 321110. Which number system is usually followed in a typical 32-bit computer?

1) Binary   2) Decimal 3) Hexadecimal 4) Octal1111. Which of the following is not an output device?

1) Scanner   2) Printer 3) Flat Screen 4) Touch Screen1112. Which of the following devices have a limitation that we can only store information

to it but cannot erase or modify it?1) Floppy Disk 2) Hard Disk 3) Tape Drive 4) CDROM

Page 74: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 74 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1113. Which technology is used in Compact disks?1) Mechanical 2) Electrical 3) Electro Magnetic 4) Laser

1114. Which of the following storage devices can store maximum amount of data?1) Floppy Disk 2) Hard Disk 3) Compact Disk 4) Magneto Optic Disk

1115. The programs which are as permanent as hardware and stored in ROM is knownas1) Hardware 2) Software 3) Firmware 4) ROM ware

1116. Memory unit is one part of1) Input device   2) Control unit3) Output device 4) Central Processing Unit

1117.Who built the first Mechanical Calculator1) Joseph Marie Jacquard 2) John Mauchly3) Blaise Pascal   4) Howard Aiken

1118. The earliest calculating devices are1) Abacus 2) Clock 3) Difference Engine 4) None of these

1119. Dumb terminals are the terminals that have-1)  Mouse  2)  Keyboard  3)  Printer 4)  Scanner 5)  None of these.

1120. Software’s such as virus, worm, Trojan, horse are the example of ..........1)  utility 2)  spy ware  3)  firmware  4)  Malware 5)  None of these

1121. .......... Makes it possible for shoppers to make purchases using their computers.1) e-world 2) e-commerce 3)  e-spend4)  e-business  5)  None of these

1122.Large size computers were observed in ___Generation.1) 1G 2) 2G 3) 3G 4) 4G 5)5G

1123.Data that is copied from an application is stored in the ...........1) driver 2) terminal 3) prompt 4) clipboard 5) None of these

1124. All the deleted files go to _________1) Task bar 2) Tool bar 3) Status bar 4) Recycle bin 5) None of these

1125. A/an _____ converts one statement at a time.1) Converter 2) Program 3) compiler 4) Interpreter 5) None of these

1126.The person who manages the database of an enterprise known as _________1) FBA 2) DSA 3) DMA 4) DBA 5) None of these

1127. _________ is the result produced by a computer.1) Data 2) Memory 3) Input 4) Output 5) None of these

1128. The program which is used to located & display web pages known as _________1) Hyper 2) HTML 3) HTTP 4) Web browser 5) None of these

1129.  The amount of time required by a storage device to retrieve data and programsis its _______ .1) retrieval speed 2) capacity 3) memory4) storage 5) access time

1130. A 32-bit-word computer can access _______ bytes at a time.1) 4 2) 8 3) 16 4) 32 5) 30

1131. A megabyte is actually equal to _______ kilobytes.1) 100 2) 1000 3) 1024 4) 1024 × 1024 5) None of these

1132. The main memory of a computer must be large enough to contain the activeparts of _______1) the operating system 2) the applications3) input/output storage & working storage4) All of these 5) None of these

1133. Which of the following types of memory improves processing by acting as atemporary high-speed holding area between the memory and the CPU?1) RAM 2) ROM 3) Cache memory 4) Flash memory 5) EPROM

Page 75: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 75 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1134. What do we call the HTML codes written in a text editor to make web pages?1) Source code 2) HTML tags 3) Source elements4) Roots 5) None of these

1135. C Language was introduced in ?1) 1952 2) 1962 3) 1972 4) 1982 5) None of these

1136.The process of identifying specific rows and columns so that so that certaincolumns and rows are always visible on the screen is called:1) Freezing 2) locking 3) Selecting 4) fixing 5) none

1137.Where can you find the horizontal split bar on MS Word screen?1) On the left of horizontal scroll bar2) On the right of horizontal scroll bar3) On the top of vertical scroll bar4) On the bottom of vertical scroll bar 5) None of these

1138.A microprocessor is generally made up of metal?1) Lithium 2) Iron 3) Silicon 4) Both 1and 2 5) None of these

1139.What is a portion of a document in which you set certain page formatting options?1) Page 2) Document 3) Section 4) Page Setup 5) None

1140.XML stands for-1) Xtreme Markup Language 2) Extensible Markup Language3) X-Markup Language 4) Xpensive Markup Language 5) None of these

1141.Lycos is known as-1) website 2) internet radio 3) search engine 4) messenger 5) None of these

1142. Speed of line printer is limited by the speed of1) paper movements 2) cartridge used3) length of paper 4) All of these 5) None of these

1143. In laser printers, printing is achieved by deflecting laser beam on to surface of adrum1) magnetized 2) photosensitive 3) magnetic4) Either 1 or 2 5) None of these

1144. Resolution of laser printer is specified in terms of1) DPI 2) LPM 3) CPM 4) PPM 5) None of these

1145. What are the units used to count the speed of a printer?1) CPM 2) DPI 3) PPM 4) BIT 5) None of these

1146. The binary equivalent of decimal number 98 is1) 1110001 2) 1110100 3) 1100010 4) 1111001 5) None of these

1147. The product of two binary numbers (1011) and (1001) is1) 1100011 2) 1010100 3) 1011001 4) 100110 5) None of these

1148. A byte represents a group of1) 10 bits 2) 40 bits 3) 8 bits. 4) 22 bits 5) None of these

1149. A hexa digit can be represented by1) three binary (consecutive) bits 2) four binary (consecutive) bits3) eight binary (consecutive) bits4) sixteen binary (consecutive) bits 5) None of the above

1150. When a key is pressed on the keyboard, which standard is used for convertingthe keystroke into the corresponding bits?1) ANSI 2) ASCII 3) EBCDIC 4) ISO 5) None of these

1151. Which of the following statements in regard to directories is false?1) Directories with files can be deleted2) Directories cannot be renamed3) The root directory is always at the highest level4) Directories can exist inside directories 5) None of the above

Page 76: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 76 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1152. _____ is when the more power – hungry components such as the monitor and thehard drive are put to idle.1) Hibernation 2) Power down 3) Standby mode4) The Shut down procedure 5) None of these

1153. A human being who writes programs, operate and maintain computer is knownas-1) live ware 2) freeware 3) spyware 4) shareware 5) None of these

1154. WWW uses ____ protocol.1) FTP 2) HTTP 3) SMTP 4) Telnet 5) None of these

1155. .com is related to-1) Personal Site 2) Art 3) Organization4) Commercial Organization 5) None of these

1156.Time – sharing systems require:1) a number of terminals connected to a system2) memory protection mechanism to prevent a job’s instructions3) job status preservation mechanism to preserve a job’s status s4) an alarm clock mechanism to send an interrupt5) All of the above

1157.Computers use the ____language to process data.1) processing 2) kilobyte 3) binary 4) representational 5) None

1158.By default, your document will print in __ mode1) landscape 2) portrait 3) page setup 4) print view 5) None of these

1159.Track ball is _______.1) Programming devices 2) Pointing device3) Output device 4) Software device 5) Printing device

1160.What is the meaning of page break up –1) Page of document is break into small parts.2) Next part of the document will be started on the new page.3) Page of the document is break in small – 2 sentences.4) Page of the document is break into small paragraph 5) None of these

1161._____ is a procedure that requires users to enter an identification code and amatching password1) paging 2) logging on 3) time sharing4) Multitasking 5) None of these

1162.Antivirus software is an example of.....................1) business software 2) an operating system3) a security utility 4) an office suite 5) None of these

1163. Computer programs ‘ are written in a high-level programming language; however,the human-readable version of a program is called..............1) cache 2) instruction set 3) source code4) word size 5) None of these

1164. Which of the following refers to the memory in your computer?1) RAM 2) DSL 3) USB 4) LAN 5) CPU

1165. Information travels between components on the motherboard through1) Flash memory 2) CMOS 3) Bays4) Buses 5) Peripherals

1166. UNIVAC is an example of:1) 1st generation computer 2) 2nd generation computer3) 3rd generation computer 4) 4th generation computer5) None of these

Page 77: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 77 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1167. The __ is the ‘Administrative’ section of the computer system :1) input unit 2) control unit 3) Memory unit4) central processing unit 5) Arithmetic logic unit

1168. A series of instructions that tells a computer what to do and how to do it is calleda-1) Program 2) command 3) user response 4) processor5) None of these

1169. The..........is the amount of data that a storage device can move from the storagemedium to the Computer per second.1) data migration rate 2) data digitizing rate3) data transfer rate 4) data access rate 5) None of these

1170. Computers manipulate data in many ways, and this manipulation is called.............1) upgrading 2) processing 3) batching 4) utilizing 5) None of these

1171. RAM can be thought of as the............for the computer’s processor.1) factory 2) operating room 3) waiting room4) planning room 5) None of these

1172. A name or number used to identify a storage location devices ?1) A byte 2) A record 3) An address 4) All of these 5) None of these

1173. The difference between memory and storage is that memory is..........and storageis............1) Temporary, permanent 2) Slow, fast3) Permanent, temporary 4) All of these 5) None of these

1174. The term.........designates equipment that might be added to a computer systemto enhance its functionality.1) digital device 2) system add-on 3) disk pack4) peripheral device 5) None of these

1175. Firewalls are used to protect against..........1) Unauthorized Access 2) Virus Attacks3) Data Driven Attacks 4) Fire Attacks5) None of these

1176. When using characters in Windows, what code does Windows use ?1) ASCII 2) UNICODE 3) MORSE 4) IDBC 5) WESTERN

1177. The.............directory is mandatory for every disk.1) Root 2) Base 3) Sub 4) Case 5) None of these

1178. ..........converts digital signals to analog signals for the purpose of transmittingdata over telephone lines.1) Modem 2) Router 3) Gateway 4) Bridge 5) All of these

1179.The term, ‘Hypertext’ means1) Non-sequential writing 2) Hypermedia3) Text with heavy formatting4) Blinking text 5) None of these

1180. After a picture has been taken with a digital camera processed appropriately,actual print of the picture considered :1) data 2) output 3) input 4) the process 5) None of these

1181. Making illegal copies copyrighted software called............1) software piracy 2) browsing 3) collaboration4) electronic distribution 5) None of these

1182. The action of moving a page up or down on the screen is called..........1) scrolling 2) linking 3) lurking 4) framing 5) None of these

1183. Which of the following is the example of Toggle Keys?1) Scroll lock 2) Del Key 3) Page Up Key4) A to Z 5) None of these

Page 78: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 78 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1184. The screen which is used for digital Signature?1) Lighter 2) Digitizer 3) Magnetizer 4) Plotter 5) None of these

1185. BCR is used for-1) Reading vertical lines have different width2) Converts dots of Pencil / Pen to electronic data3) Read Bank cheques 4) All 1, 2 & 3 are correct 5) None of these

1186. CRT stands for -1) Cathode relay tube 2) Cathode reflex tube3) Cathode ray tube 4) Cathode ray tile 5) None of these

1187. ROM is -1) Read only memory 2) non volatile 3) permanent4) BIOS 5) All 1, 2, 3 & 4 are correct

1188. Which memory is known for fastest Processing memory?1) RAM 2) ROM 3) Cache 4) Virtual 5) None of these

1189.Website is a ___1) Collection of two or more web pages2) Collection of applications 3) Set of Instruction / rules4) Collection of programme 5) None of these

1190.href is used for__1) reference name 2) portable network3) transfer image file 4) all 1, 2 & 3 are correct5) None of these

1191.____ to add some new features from internet to already installed application.1) Plug-ins 2) Adobe flash player 3) Adobe reader4) Add-ons 5) None of these

1192. Extension name of bitmap image is ___.1) ..bit 2) .bmp 3) .big 4) .bimg 5) None of these

1193.Who invented world wide web?1) Mosaic corporation 2) Opera corporation3) Tim berner lee 4) Vint cerf 5) None of these

1194. URL stands for ____.1) Uniform Resource Locator 2) Universal resource locator3) Address bar 4) All 1, 2 & 3 are correct5) None of these

1195. A thing present in real world in physical form is called____.1) DBMS 2) Entity 3) Modulation 4) Keywords 5) None of these

1196. BUG is -1) To find error in any software testing2) To find error in any software code3) Error of any program 4) both 1 & 2 5) None of these

1197. Which of the following is not a type of key?1) Alphabetic Keys 2) Numeric keys 3) Function keys4) Toggle keys 5) None of these

1198. Which of the following is true about Operating System?1) It is an interface between user and the computer.2) It manages all resources3) It does all Memory management and Process management tasks4) All are true 5) None of these

Page 79: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 79 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1199. BIOS is responsible for1) Handling the particulars of input/output operations2) Output operations 3) Input operations4) All of the above 5) None of these

1200. The overall design, construction, organization and interconnection of the variouscomponents of a computer system is referred as–1) Computer Architecture 2) Computer Flowchart3) Computer Algorithm 4) All of the above 5) None of these

1201. Cache memory is–1) Bigger and slower than main storage2) Smaller and faster than main storage3) Smaller but slower than main memory4) Bigger and faster than main memory 5) None of these

1202. In MS Excel, If you see a small red triangle in the top right corner of a cell, itmeans there is something attached to the cell. What is it?1) A comment 2) An attachment 3) An error4) None of the above 5) None of these

1203. What does the XP stand for in Windows XP?1) Exponential 2) Experience 3) Expertise4) Exchange 5) None of these

1204. Which printer type is an impact printer?1) Page printers 2) Laser printers 3) Ink-jet printers4) Dot-matrix printers 5) None of these

1205. Help Menu is available at which button?1) End 2) Start 3) Turnoff 4) Restart 5) Reboot

1206. Linux is a _______1) Utility program for peer-to-peer file sharing2) Real-time operating system 3) Network operating system4) PDA platform 5) None of these

1207. Zip is a _______ file.1) Executable File 2) Compressed File 3) System File4) Combo 5) None of these

1208. Human beings are referred to as Homosapinens, which device is called SillicoSapiens?1) Monitor 2) Hardware 3) Robot 4) Computer 5) None of these

1209. To protect a worksheet, you can choose Protection and the Protect Sheet fromthe ….. menu1) Edit 2) Format 3) Tools 4) Data 5) None Of These

1210. The pattern of printed lines on most products are called-1) prices 2) OCR 3) scanners 4) barcodes 5)None of these

1211. The main advantage of magnetic disk compared to magnetic tape is1) low cost 2) rigidity 3) direct access4) high packet density 5) sequential access

1212. TCP stands for-1) Transmit Control Protocol 2) Time Control Protocol3) Travel Control Protocol 4) Transmission Control Protocol5) None Of These

1213. MICR stands for?1) Magnetic Ink Character Recognition2) Magnetic Intelligence Character Recognition3) Magnetic Information Cable Recognition4) Magnetic Insurance Cases Recognition

Page 80: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 80 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1214.VIRUS stands for________1) Very Important Record User Searched2) Verify Interchanged Result Until Source3) Vital Information Resource Under Seize4) Very Important Resource Under Search 5) None of these

1215. FOXPRO is a ————-1) RDMBS 2) DBMS 3) Language 4) All of the above 5) None

1216. What software allows you to view internet sites?1) A cyber café 2) A browser 3) A modem4) Your computer 5) None of these

1217. A compiler means –1) A person who compiles source program2) The same thing as a programmer 3) Keypunch operator4) A program which translates source program into object program5) None of the above

1218. A modern digital computer has-1) Extremely high speed 2) Large memory3) Almost unlimited array 4) all of these 5) None of these

1219. A hard disk is divided into tracks which are further subdivided into-1) Cluster 2) Sectors 3) Vectors 4) Heads 5) None of these

1220. The mouse pointer moves erratically, what is the possible cause? The mouse1) ball is dirty2) is not connected3) driver is not installed properly4) has an incorrect IRQ setting 5) None of these

1221. The personnel who deals with the computer and its management put togetherare called-1) Software 2) Human ware 3) Firmware4) H/W 5) None of these

1222. Which of the following is storing large amounts of data outside the main memory?1) Secondary Storage 2) Auxiliary Storage3) Memory 4) All of these 5) None of these

1223. Computer memory consists of-1) RAM 2) ROM 3) HDD 4) All of the above 5) None of these

1224. A modern electronic computer is a machine that is meant for

1) Doing quick mathematical calculations2) Input storage, manipulation of outputting of data3) Electronic data processing4) Performing repetitive tasks accurately 5) None of the above

1225. Which is a device that changes information into digital form?1) Modem 2) Digitizer 3) Mouse 4) Light pen 5) None of the above

1226. The organization and interconnection of the various components of a computersystem is1) Architecture 2) Networks 3) Graphics 4) Designing

1227. ‘MPG’ extension refers usually to what kind of file?1) Word Perfect Document File 2) MS Office Document3) Animation/movie file 4) Image File 5) None of above

1228.Who is considered to the father of computers?1) John Bardeen 2) Charles Babbage3) John Backus 4) William Shockley 5) None of these

Page 81: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 81 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1229. Which of the following will connect you to the Internet?1) An Commercial online service2) An Internet service provider3) A network connection 4) All of the above

1230.  Algorithm is used ———-1) To bring itself into desired state by its own action2) To perform logarithmic operations3) To describe a set of procedure by given result is obtained4) As a high level language 5) None of these

1231. Saving is a process-1) To copy the document from memory to storage medium2) To bring change in present status of the document3) To change entire form 4) All of the above 5) None of these

1232. PNG stands for________1) Potable Name Generator 2) Portable Network Generator3) Printed Name Graphics 4) Portable Network Graphics 5) None of these

1233.The ____ shows all the web sites and pages that you have visited over a period oftime.1) status bar             2) taskbar          3) history list4) toolbar                  5) None of these.

1234. A proxy server is used for which of the following?1) To provide security against unauthorized users2) To process client requests for web pages3) To process client requests for database access4) To provide TCP/IP 5) None of these

1235.A repair for a known software bug, usually available at no charge on the Internet,is called a(n)_____.1) version 2) patch 3) tutorial 4) FAQ           5) None of these.

1236. In the URL http:/www.ravindrareddy.com, the portion labeled http is the______.1) host 2) domain name 3) protocol 4) toolbar 5) None of these.

1237. The ability to easily add additional users means that a network is:1) scalable 2) dedicated 3) decent 4) secure 5) None of these.

1238.In database , a field is a____.1) label 2) table of information3) group of related records 4) category of information 5) None of these.

1239. The number of pixels displayed on a screen is known as the screen_________.1) resolution 2) colour depth 3) refresh rate4) viewing size                  5) None of these

1240. Word processing, spreadsheet, and photo-editing are example of ________.1) application software 2) system software3) operating system software 4) platform software 5) None of these.

1241.If you wish to extend the length of the network without having the signal degrade,you would use a1) repeater 2) router 3) gateway 4) switch 5) None of these.

1242.The time it takes a device to locate data and instructions and make them availableto the CPU is known as ________1) clock speed 2) a processing cycle3) CPU speed 4) access time 5) None of these.

1243. Which of the following is NOT a Microsoft Internet tool or technology?1) Dream weaver        2) Silver light                 3) Internet Explorer          4) Expression Web        5) None of these

Page 82: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 82 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1244.Determining whether an Internet site is a commercial (.com) or governmental(govt.) site helps determine its-1) purpose 2) objective 3) accurate  4) timely 5) None of these

1245. Electronic junk mail is known as-1) site 2) spam 3) worm 4) virus 5) None of these

1246.  ATM is an example of1) Ring topology   2) Star topology  3) bus topology    4) all of these  5) None

1247. Bar is located at top of Word-pad / Notepad /MS Word window.1) Title 2) Menu 3) Tool 4) Format 5) None of these

1248. CPU does not have —————1) arithmetic and logic units          2) control unite3) Register 4) Display 5) None of these

1249.   Datagram switching is also known as  ________ .1) connection oriented packet switching2) connection less packet switching3) virtual circuit switching 4) Both 1) and 2) 5) None of these 

1250. For creating a document, you use ___ command at File Menu.1) Open 2) Close 3) New   4) Save 5) None of these

1251.The contents of ___ are lost when the computer is turn off.1) storage  2) input 3) output       4) memory 5) None of these

1252.  Shortcut Key to open old workbook is:1) Ctrl + F 2) Ctrl + O 3) Ctrl + N  4) Ctrl + Y   5) None of these

1253. a FLAW in Program Code is called?1) Bug 2) barden 3) Mistake 4) Compiler

1254. Which of the following is a part of the Central Processing Unit1) Printer 2) Keyboard 3) Mouse    4) Arithmetic Logic Unit 5) None

1255. Control Unit of a digital computer is often called the1) Clock    2) Nerve center 3) ICs  4) All of the above 5) None

1256. C, BASIC, COBOL, and Java are examples of ______ languages1) low-level    2) high-level 3) system programming  4) computer 5) None of these

1257.A(n) _______ camera is a peripheral device used to capture still images in adigital format1) digital    2) analog 3) classic    4) film 5) None of these

1258. Which of the following systems mimics human thinking?1) Artificial intelligence 2) Intelligent agent 3) Bot 4) Database management system 5) None of these

1259. A hacker contacts you my phone or email and attempts to acquire your password1) spoofing    2) phishing 3) spamming  4) bugging 5) None of these 

1260. This power protection device includes a battery that provides a few minutes ofpower.1) surge suppressor   2) line conditioner 3) generator   4) UPS 5) None of these

1261. Punched cards were invented by1) Jaquard    2) Eckert 3) Mauchly    4) Neumann 5) None of these

1262. A series of steps that always results in an answer is the definition of __________.1) heuristic   2) flowchart 3) algorithm   4) pseudo code 5) None of these

1263. Which device can understand difference between data & programs?1) Input device    2) Output device 3) Memory    4) Microprocessor 5) None

Page 83: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 83 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1264. Programs stored in ROM are called ___1) Hardware   2) Firmware 3) Software    4) all of above 5) None of these

1265. The unit KIPS is used to measure the speed of ___1) Processor   2) Disk drive 3) Printer 4) Tape drive 5) None of these

1266. Before data can be transmitted, they must be transformed to ________1) periodic signals  2) electromagnetic signals3) aperiodic signals  4) low-frequency sine waves 5) None of these

1267. What is the term used to describe the amount of space you have to transmit toand from the Internet?1) Internet speed  2) Network speed 3)Router  4) Bandwidth 5 )None of these 

1268. Which of the following device is used only in LAN (Local Area Network)?1) Gateway  2) Modem 3) NIC    4) Router 5) None of these

1269.Programs from the same developer , sold bundled together , that provide betterintegration and share common features , toolbars and menus are known as ....1) software suites 2) integrated software packages3) software processing packages4) personal information managers 5) none of these

1270. A data warehouse is which of the following ?1) Can be updated by the end users2) Contains numerous naming conventions and formats3) Organized around important subject areas4) Contains only current data5) None of these

1271. ______________ servers store and manages files for network users.1) Authentication 2) Main 3) Web4) File 5) None of these

1272. All of the following are examples of real security and privacy risks Except _____1) hackers 2) spam 3) viruses 4) identify theft 5) None of these

1273.___________ terminals (formerly known as cash registers) are often connected tocomplex inventory and sales computer systems .1) Data 2) Sales 3) Query4) Point-of-sale (POS) 5) None of these

1274.The OSI model is divided into _______ processes called layers.1) five 2) six 3) seven 4) eight 5) None of these

1275.System software is the set of programs that enables your computer’s hardwaredevices and ______ software to work together.1) management 2) processing 3) utility4) application 5) None of these

1276.________ are specially designed computer chips reside inside other devices, suchas your car or your electronic thermostat.1) Servers 2) Embedded computers3) Robotic computers 4) Mainframes 5) None of these

1277.The following are all computing devices , except.........1) notebook computers 2) cellular telephones3) digital scanners 4) personal digital assistants 5) None of these

1278.in a ring topology , the the computer in possession of the ______ can transmitdata1) packet 2) data 3) access method4) token 5) None of these

Page 84: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 84 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1279. This part of operating system manages the essential peripherals, such as thekeyboard, screen , disk drives, and parallel and serial ports ____1) basic input/output system 2) secondary input/output system3) peripheral input/output system 4) marginal input/output system5) None of these

1280. ________ Viruses are often transmitted by a floppy disk left in the floppy drive1) Trojan horse 2) Boot sector 3) Script4) Logic bomb 5) None of these

1281. ________ controls the way in which the computer system functions and providesa means by which users can interact with the computer1) The platform 2) Application software 3) Operating system4) The motherboard 5) None of these

1282. Servers are computers that provide resources to other computers connected toa ___________1) mainframe 2) network 3) supercomputer4) client 5) None of these

1283. A goal of data mining includes which of the following?1) To explain some observed event or condition2) To confirm that data exists3) To analyze data for expected relationships4) To create a new data warehouse 5) None of these

1284. URL stands for ........1) Universal Research List 2) Universal Resource List3) Uniform Resource Locator4) Uniform Research Locator 5) None of these

1285. A database management system (DBMS) is a ............1) hardware system used to create , maintain and provide controlled access to adatabase2) hardware system used to create, maintain, and provide uncontrolled accessto a database3) software system used to create, maintain, and provide uncontrolled access toa database4) software system used to create, maintain, and provide controlled accessto a database5) None of these

1286.Which of the following is NOT a goal of transaction processing system ?1) Capture , process and store transactions2) Produce a variety of documents related to routine business activities3) Reduce manual effort associated with processing business transactions4) Produce standard reports used for management decision making5) None of these

1287.Frequently visited web pages are to be saved As_________?1) Home Page 2) Book Mark 3) Blog 4) Hit

1288.When data changes in multiple lists and all lists are not updated, this causes:1) data redundancy 2) information overload3) duplicate data 4) data inconsistency

1289. _________ are words that a programming language has set aside for its own use1) Control worlds 2) Reserved words3) Control structure 4) Reserved keys

Page 85: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 85 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1290. What is the primary difference between a virus and a worm?1) A worm has the ability to self-propagate from an infected user computer toother computers2) A worm is usually written by a cracker: Script bunnies do not have the skills todevelop a worm program3) A virus is very harmful to the computers it infects A worm is not a serious aproblem4) Anti-virus software is effective in fighting viruses but not worms5) None of these

1291. ______ describe what is database fields.1) Structures 2) Field markers 3) Field definition4) Field names 5) None of these

1292.You must install a (n) ____________ on a network if you want to share a broadbandInternet connection.1) router 2) modem 3) node 4) cable 5) None of these

1293. A goal of normalization is to __________1) minimize the number of relationships2) minimize the number of entities3) minimize the number of tables4) minimize the number of redundancy 5) None of these

1294. Granting an outside organization access to internet web pages is often implemented using a (n) ____

1) extranet 2) intranet 3) internet 4) hacker 5) None of these1295. Which term identifies a specific computer on the web and the main page of the

entire site1) URL 2) Web site address 3) Hyperlink4) Domain name 5) None of these

1296. The code that relational database management systems use to perform theirdatabase task is referred to as .....1) QBE 2) SQL 3) OLAP 4) Sequel Server 5) None of these

1297.Chip is a common nickname for a (n):1) transistor 2) resistor 3) integrated circuit4) semiconductor 5) None of these

1298.The purpose of the primary key in a database is to:1) unlock the database 2) provide a map of the data3) uniquely identify a record4) establish constraints on database operations. 5) None of these

1299.A _________ contains specific rules and words that express the logical steps of analgorithm.1) programming language 2) syntax3) programming structure 4) logic chart 5) None of these

1300.The design of the network is called the network:1) architecture 2) server 3) transmission4) type 5) None of these

1301. The most frequently used instructions of a computer program are likely to befetched from:1) the hard disk 2) cache memory 3) RAM4) registers 5) None of these

Page 86: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 86 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1302. The ____________ contains data descriptions and defines the name, data type,and length of each field in the database1) data dictionary 2) data table 3) data record4) data field 5) None of these

1303.Personal logs or journal entries posted on the Web are known as:1) listservs 2) Webcasts 3) blogs 4) subject directories 5) None

1304.A(n) _______ uses pictures (called icons) and menus displayed on the screen tosend commands to the computer system.1) command - based user interface 2) GUI3) system utility 4) API 5) None of these

1305. The _____ manual tells you how to use a software program.1) documentation 2) programming 3) technical4) user 5) None of these

1306.Which of the following is NOT a type of broadband Internet connection?1) Cable 2) DSL 3) Dial-up 4) Satellite 5) None of these

1307. Software, such as viruses, worms and Trojan horses, that has a malicious intent,is known as:1) spyware 2) adware 3) spam 4) malware5) None of these

1308. Making a field ______ means : that it cannot be left blank.1) numeric 2) required 3) calculated 4) validated 5) None of these

1309. _________ is the process of finding errors in software code1) Debugging 2) Compiling 3) Testing 4) Running 5) None pf these

1310. _______ are viruses that are triggered by the passage of time or on a certain date1) Boot-sector viruses 2) Macro viruses3) Time bombs 4) Worms 5) None of these

1311. Linux is a (n) ____________ operating system.1) open-source 2) Microsoft 3) Windows4) Mac 5) None of these

1312. What is a backup?1) Restoring the information backup2) An exact copy of a system’s information3) The ability to get a system up and running in the event of a system crash orfailure4) All of these 5) None of these

1313. Which of the following places the common data elements in order from smallestto largest1) character, file, record, field, database2) character, record, field, database, file3) character, field, record, file, database4) Bit, byte, character, record, field, file, database, 5) None of these

1314.The internet is ......1) a large network of networks2) an internal communication system for a business3) a communication system for the Indian government4) All of these 5) None of these

1315.____________ are lists of commands that appear on the screen.1) GUIs 2) Icons 3) Menus 4) Windows 5) None of these

1316. Which of the following statements is FALSE concerning file names?1) Files may share the same name or the same extension but not both2) Every file in the same folder must have a unique name3) File extension is another name for file type4) The file extension comes before the dot (.) followed by the file name5) None of these

Page 87: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 87 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1317. Verification of a login name and password is known as:1) configuration 2) accessibility3) authentication4) logging in 5) None of these

1318.Which of the following would most likely NOT be a symptom of a virus?1) Existing program files and icons disappear.2) The CD-ROM stops functioning.3) The Web browser opens to an unusual home page4) Odd messages or images are displayed on the screen.5) None of these

1319. All of the following are examples of real security and privacy risks EXCEPT:1) hackers. 2) spam. 3) viruses. 4) identity theft.

1320.A process known as ____________ is used by large retailers to study trends.1) data mining 2) data selection3) POS 4) data conversion

1321. ____________terminals (formerly known as cash registers) are often connectedto complex inventory and sales computer systems.1) Data 2) Point-of-sale (POS) 3) Sales 4) Query

1322. A(n) ____________ system is a small, wireless handheld computer that scans anitem’s tag and pulls up the current price (and any special offers) as you shop.1) PSS 2) POS 3) inventory 4) data mining

1323.The ability to recover and read deleted or damaged files from a criminal’s computeris an example of a law enforcement specialty called:1) robotics. 2) simulation. 3) computer forensics. 4) animation.

1324. Which of the following is NOT one of the four major data processing functions ofa computer?1) gathering data 2) processing data into information3) analyzing the data or information4) storing the data or information

1325. ___________ tags, when placed on an animal, can be used to record and track ina database all of the animal’s movements.1) POS 2) RFID 3) PPS 4) GPS

1326. Surgeons can perform delicate operations by manipulating devices throughcomputers instead of manually. This technology is known as:1) robotics. 2) computer forensics. 3) simulation. 4) forecasting.

1327. Technology no longer protected by copyright, available to everyone, is consideredto be:1) proprietary. 2) open.3) experimental. 4) in the public domain.

1328. ____________ is the study of molecules and structures whose size ranges from 1to 100 nanometers.1) Nanoscience 2) Microelectrodes3) Computer forensics 4) Artificial intelligence

1329. ____________ is the science that attempts to produce machines that display thesame type of intelligence that humans do.1) Nanoscience 2) Nanotechnology3) Simulation 4) Artificial intelligence (AI)

1330. ____________ is data that has been organized or presented in a meaningfulfashion.1) A process 2) Software 3) Storage 4) Information

Page 88: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 88 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1331. The name for the way that computers manipulate data into information is called:1) programming. 2) processing. 3) storing. 4) organizing.

1332. Computers gather data, which means that they allow users to ____________data1) present 2) input 3) output 4) store

1333. After a picture has been taken with a digital camera and processed appropriately,the actual print of the picture is considered:1) data 2) output. 3) input. 4) the process.

1334. Computers use the ____________ language to process data1) processing 2) kilobyte 3) binary 4) representational

1335. Computers process data into information by working exclusively with:1) multimedia 2) words. 3) characters. 4) numbers.

1336. In the binary language each letter of the alphabet, each number and eachspecial character is made up of a unique combination of:1) eight bytes. 2) eight kilobytes.3) eight characters. 4) eight bits.

1337. The term bit is short for:1) megabyte 2) binary language 3) binary digit. 4) binary number.

1338. A string of eight 0s and 1s is called a:1) megabyte 2) byte 3) kilobyte 4) gigabyte

1339. A ____________ is approximately one billion bytes.1) kilobyte 2) bit 3) gigabyte 4) megabyte

1340. A ____________ is approximately a million bytes.1) gigabyte 2) kilobyte 3) megabyte 4) terabyte

1341. ____________ is any part of the computer that you can physically touch.1) Hardware 2) A device 3) A peripheral 4) An application

1342. The components that process data are located in the:1) input devices. 2) output devices.3) system unit. 4) storage component.

1343. All of the following are examples of input devices EXCEPT a:1) scanner. 2) mouse 3) keyboard 4) printer.

1344. Which of the following is an example of an input device?1) scanner 2) speaker 3) CD 4) printer

1345. All of the following are examples of storage devices EXCEPT:1) hard disk drives. 2) printers.3) floppy disk drives. 4) CD drives.

1346. The ____________, also called the “brains” of the computer, is responsible forprocessing data1) motherboard 2) memory 3) RAM4) central processing unit (CPU)

1347. The CPU and memory are located on the:1) expansion board 2) motherboard3) storage device 4) output device

1348. Word processing, spreadsheet, and photo-editing are examples of:1) application software 2) system software3) operating system software 4) platform software

1349. ______ is a set of computer programs used on a computer to help perform tasks.1) An instruction 2) Software 3) Memory 4) A processor

1350. System software is the set of programs that enables your computer’s hardwaredevices and ____________ software to work together.1) management 2) processing 3) utility 4) application

Page 89: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 89 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1351. The PC (personal computer) and the Apple Macintosh are examples of two different:1) platforms. 2) applications.3) programs. 4) storage devices.

1352. Apple Macintoshes (Macs) and PCs use different ____________ to process dataand different operating systems.1) languages 2) methods 3) CPUs 4) storage devices

1353. Servers are computers that provide resources to other computers connected toa:1) network. 2) mainframe 3) supercomputer. 4) client.

1354. Smaller and less expensive PC-based servers are replacing ____________ in manybusinesses.1) supercomputers 2) clients 3) laptops 4) mainframes

1355. ____________ are specially designed computers that perform complex calculationsextremely rapidly.1) Servers 2) Supercomputers 3) Laptops 4) Mainframes

1356. DSL is an example of a(n) ______connection.1) network 2) wireless 3) slow 4) broadband

1357. The difference between people with access to computers and the Internet andthose without this access is known as the:1) digital divide 2) Internet divide3) Web divide 4) broadband divide

1358.____________ is the science revolving around the use of nanostructures to builddevices on an extremely small scale1) Nanotechnology 2) Micro-technology3) Computer forensics 4) Artificial intelligence

1359. Which of the following is the correct order of the four major functions of acomputer?1) Process - Output - Input - Storage2) Input – Output -Process - Storage3) Process - Storage - Input - Output4) Input - Process - Output - Storage

1360.____________ bits equal one byte1) Eight 2) Two 3) One thousand 4) One million

1361. The binary language consists of ______digit(s).1) 8 2) 2 3) 1,000 4) 1

1362.A byte can hold one ____________ of data1) bit 2) binary digit 3) character 4) kilobyte

1363. ____________ controls the way in which the computer system functions andprovides a means by which users can interact with the computer.1) The platform 2) The operating system3) Application software 4) The motherboard

1364. The operating system is the most common type of ____________ software1) communication 2) application3) system 4) word-processing software

1365. ____________ are specially designed computer chips that reside inside otherdevices, such as your car or your electronic thermostat.1) Servers 2) Embedded computers3) Robotic computers 4) Mainframes

1366.The steps and tasks needed to process data, such as responses to questions orclicking an icon, are called:1) instructions. 2) the operating system.3) application software 4) the system unit.

Page 90: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 90 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1367. The two broad categories of software are:1) word processing and spreadsheet. 2) transaction and application.3) Windows and Mac OS. 4) system and application.

1368. The metal or plastic case that holds all the physical parts of the computer is the:1) system unit. 2) CPU.3) mainframe 4) platform.

1369.Between PCs and Macs, the _________ is the platform of choice for graphic designand animation.Answer: Mac

1370.The ____________ is the program that manages the hardware of the computersystem, including the CPU, memory, storage devices, and input/output devices.Answer: operating system

1371. The type of operating system software you use depends on your computers ______.Answer: platform

1372. ____________software helps you carry out tasks, such as typing a document orcreating a spreadsheet.Answer: Application

1373. ____________are the fastest and most expensive computers.Answer: Supercomputers

1374. A ____________ is approximately 1,000 bytes.Answer: kilobyte

1375. Input devices are used to provide the steps and tasks the computer needs toprocess data, and these steps and tasks are called ____________.Answer: instructions

1376. A computer gathers data, processes it, outputs the data or information, and____________ the data or information.Answer: stores

1377. The binary language consists of two digits: ____________ and ____________.Answer: 0 and 1

1378. A string of _0s and 1s is called a byte.Answer: eight (8)

1379. The devices you use to enter data into a computer system are known as____________ devices.Answer: input

1380. The devices on a computer system that let you see the processed informationare known as ____________ devices.Answer: output

1381. ____________ is the set of computer instructions or programs that enables thehardware to perform different tasks.Answer: Software

1382. When you connect to the _________, your computer is communicating with aserver at your Internet service provider (ISP).Answer: Internet

1383. ____________ are computers that excel at executing many different computerprograms at the same time.Answer: Mainframes

1384. ____________is the application of computer systems and techniques to gatherlegal evidence.Answer: Computer forensics

Page 91: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 91 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1385.____________ is the science that attempts to create machines that will emulatethe human thought process.Answer: Artificial intelligence (AI)

1386. Macintosh computers use the Macintosh operating system (Mac OS), whereasPCs generally run ____________ as an operating system.Answer: Microsoft Windows

1387. A process known as ____________ tracks trends and allows retailers to respondto consumer buying patterns.Answer: data mining

1388. Hard disk drives and CD drives are examples of ____________ devices.Answer: storage

1389. You would use ____________ software to create spreadsheets, type documents,and edit photos.Answer: application

1390. ____________ are computers that support hundreds or thousands of userssimultaneously.Answer: Mainframes

1391. ____________ is the term given to the act of stealing some ones identity andruining their credit rating.Answer: Identity theft

1392. Surgeons are using ____________ to guide robots to perform delicate surgery.Answer: computers

1393. Patient ____________ are life-sized mannequins that have a pulse and a heartbeatand respond to procedures just like humans.Answer: simulators

1394. Computers Store the data in ______Format. Ans : Binary1395. First Generation System Language is?

Ans: Machine Language1396. Web pages are saved in ____Format.

Ans: HTML1397. Connecting devices with BLUETOOTH is which type of network?

Ans: PAN1398. Small and single site network is ?

Ans :LAN1399. Full form of DOS :

Ans.Disk Operating System1400: Bar code Readers Used at____ Systems.

Ans: Point of Sale1401.What is an Operating system?

1) It is an interface between User and the Computer2) It manages all resources3) It does all process management tasks4) All of the above 5) None of these

1402.Which process check to ensure the components of the computer are operatingand connected properly?1) Booting 2) Processing 3) Saving 4) Editing 5) None of these

1403.The ability of an operating system to run more than one application at a time iscalled _________.1) Multi-tasking  2) Object-oriented programming3) Multi-user computing 4) Real-Time 5) None of the above

Page 92: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 92 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1404.Which of the following is used to switch between open programs?1) Alt+tab 2) Ctrl+tab 3) Shift+tab 4) Ctrl+Alt 5) Alt+Shift

1405.To move to the beginning of a line of text, press the __________ key.1) Alt 2) pageup 3) enter 4) home 5) None

1406.Which among the following is a language used in a computer that is very similarto, the language of humans and is easy to understand?1) Source Code 2) Machine Language3) High Level Language 4) Object Code5) Assembly language

1407.The first electronic digital computer contained _________?1) Electronic valves 2) Neural Networks 3) Fuzzy Logic4) Semiconductor memory 5) None of these

1408.What is the sequence of events that occurs in the computer when it is interpretingand executing an instruction known as?1) Execution cycle 2) Instruction cycle3) Working cycle 4) Machine cycle 5) None

1409._____ is a Windows utility program that located and eliminates unnecessaryfragments and rearranges filed and unused to disk space to optimise operations.1) Backup 2) Disk cleanup 3) Disk defragmenter4) Restore 5) Disk restorer

1410.Which command is used to set a name to a disk in DOS?  1) VOLUME 2) VOL 3) LABEL 4) DISKLABEL 5) None of these

1411.A __________ is an electronic device that process data, converting it intoinformation.1) processor 2) computer 3) case 4) stylus 5)None of these

1412.__________ computers represent data as variable points along a continuousspectrum of values.1) Analog 2) Digital 3) Precise 4) Mainframe 5) None of these

1413.Which of the following is used by the tablet PC to write on the screen.1) finger 2) mouse 3) digitalizer 4) stylus 5) None of these

1414.A word in a web page that, when clicked, opens another document.1) anchor 2) URL 3) hyperlink 4) reference 5) None of these

1415.A network’s __________ is the central structure that connects other portions ofthe network.1) trunk 2) backbone 3) protocol 4) server 5) None of these

1416.Which key will launch the Start button.1) esc 2) shift 3) Windows 4) Shortcut 5) None of these

1417.Computers use the __________ number system to store data and performcalculations.1) decimal 2) hexadecimal 3) binary 4) octal 5) None of these

1418.Floppy drives, hard drives and tape drives all use a __________ to read data.1) laser 2) sensor 3) magnet 4) pen 5) None of these

1419.The number of pixels displayed on a screen is known as the screen ………… .1) resolution 2) colour depth 3) refresh rate 4) viewing size 5) None

1420.Word is a word processor developed by Microsoft. In MS Word spelling check is afeature available in which tab?1) Page Layout 2) Home 3) Insert 4) Review 5) References

1421.The blank white area near the edges of every page in a word document is knownas a ________.1) cut mark 2) margin 3) new area 4) gutter 5) indent

Page 93: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 93 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1422.Which of the following software posts unwanted advertisements on client’scomputer?   1) Virus 2) Malware 3) Worm 4) Adware 5) Logic bombs

1423.In which group can you find or replace text and select text or objects in adocument?  1) Proofing 2) Paragraph 3) Editing 4) Font 5) None of these

1424.Walkie-talkie is an example of which of the following?1) simplex communication 2) half-duplex communication3) full-duplex communication 4) semi-duplex communication5)None of these

1425.What happens when you boot up a PC?  1) Portions of the operating system are copied from disk into memory2) Portions of the operating system are copied from memory onto disk3) Portions of the Operating system are complied4) Portions of the operating system are emulated5) The PC gets switched off

1426.Which of the following is not a computer language?1) High-level language 2) Machine language3) Low-level language 4) Medium-level language5) All of the above

1427.The ______________ folder retains copies of messages that you have started butare not yet ready to send.1) Drafts 2) Outbox 3) Address Book 4) Sent Items 5) Inbox

1428.Linux is an OS based on_____1) DBMS 2) UNIX 3) Network node 4) J2EEE 5) Python

1429.Which of the following is used to close a tab on a browser?1) Ctrl + T 2) Ctrl + W 3) Ctrl + A 4) Ctrl + Y ` 5) None

1430.URL Contains1) . Website data 2) .server name3) .web address 4) .Mail id 5) .None of these

1431.Before use of DBMS information was stored using:1) Cloud Storage 2) Data System3) File Management System 4) Cloud Computing 5) None of these

1432.OSI model has how many layers?1) Two layers 2) Five Layers 3) Seven Layers4) Six Layers 5) Eight Layers

1433.Which one of the following is a set of one or more attributes taken collectively touniquely identify a record?1) Candidate key 2) Sub key 3) Super key 4) Foreign key 5) None of these

1434.Which one of the following is internet Standard Protocol?  1) TML 2) COBOL 3) JAVA 4) C++ 5) TCP/IP

1435.The feature in database language that allows us to access certain records indatabase is called __________.1) Query 2) Forms 3) Reports 4) Tables 5) Node

1436.UDP and TCP are categorized under the ___layer of the OSI model.1) Data link 2) Application 3) Network 4) Transport 5) Session

1437.SMTP, FTP and DNS are applications/protocols of the _____ layer. 1) Data link 2) Network 3) Transport 4) Application5) None

1438.In the ER diagram, what does an ellipse represent?1) Entity sets 2) Relation between the entity set3) Attributes 4) Link between the attributes and entity set5) None of these

Page 94: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 94 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1439.The IP address 198.10.10.0 is how many bits address ________1) 8 2) 16 3) 32 4) 64 5) 256

1440.Which of the following technique is used to send more than one calls over asingle line? 1) Digital transmission 2) Infrared transmission3) Digitizing 4) Multiplexing 5) None of these

1441.The process of checking all the peripheral units by the OS during the time ofbooting is known as_____1) BIOS 2) POST 3) BUS 4) Chkdsk 5) None of these

1442.A handheld device that allows you to control your computer without typinginstructions from a keyboard is known as_______.  1) Tablet 2) PDA 3) Mouse 4) Mike 5) None of these

1443.Which of the following file system used by the operating system to identify thephysical locations of a file on the hard drive?1) RTOS 2) GIF 3) FAT 4) FTP 5) SMTP

1444.What is SMPS?1) Settled Mode Power Supply 2) Switch Mode Power Supply3) Switch Mode Packet Switch 4) Supply Mode Packet Switch5) Settled Mode Packet Switch

1445.When a computer is turned on, which of the following is run by BIOS in order tocheck whether all the hardware components are working properly?1) Booting 2) Warm Booting 3) Cold Booting4) Power on Self-Test 5) Register

1446.Which of the following hardware or software designed to guard againstunauthorized access to a computer network?1) Hacker-proof program. 2) Firewall.3) Hacker-resistant server. 4) Encryption safe wall. 5) None of these

1447.Which among the following is the first general-purpose electronic computer? 1) EDVAC 2) ADVAC 3) Mac 4) IBM-PC 5) UNIVAC

1448.A device that not only provides surge protection but also furnishes the computerwith battery backup power during a power outage is ______  1) Battery strip 2) UPS 3) Surge strip 4) USB 5) Memory

1449.What is a bootstrap?1) A memory device 2) A device to support the computer3) An error correction technique4) A small initialization program to start up a computer5) None of the above

1450.Which part of the CPU coordinates all the activities of a computer system? 1) Motherboard 2) Coordination board3) Control unit 4) Arithmetic and logic unit 5) None of these

1451.In MS Excel, if we want to select an entire column, which of the following isused?1) Shift + Ctrl2) Ctrl +Alt 3) Alt + Shift4) Ctrl + Space 5) Ctrl + Alt + Del

1452.Which of the following is the correct option that allows users to bring togethercopies of workbooks that other users have worked on independently in MS Excel?1) Copying 2) Merging 3) Pasting 4) Compiling 5) None of these

1453.Which is the command used to remove text or graphics from a document and theinformation is then stored on a clipboard, so you can pasteitlateron?1) Cut 2) Clip 3) Chop 4) Chew 5) Chunk

Page 95: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 95 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1454.The point at which the flow of text in a document moves to the top of a new page–

1) Page insert2) Page break3) Page format4) All of the above 5) None

1455.Which of the following features is used to count the number of pages, words,characters, paragraphs and lines in a Word document? 

1) Orientation 2) Page Count 3) Word Count 4) Margin 5) None of these

1456.Which key should you use to indent the first paragraph of your report?

1) tab key 2) return key 3) space bar 4) shift key 5) None of these

1457.What is periodically adding, changing and deleting file records called?

1) renewing 2) upgrading 3) restructuring 4) updating 5) None of these

1458.What is the overall term for creating, editing, formatting, storing, retrieving andprinting a text document?

1) Word processing 2) Spreadsheet design

3) Web design 4) Database management5) None of these

1459.To justify the selected text, the shortcut key is __________.

1) Ctrl + 1 2) Ctrl + J 3) Ctrl + U 4) Ctrl + Alt + K 5) None

1460.Which of the following key combination can be used to print a document?  

1) Ctrl + P 2) Tab + P 3) Alt + P

4) Windows logo key + P 5) None of these

1461.Which of the following refers to the forging of the return address on an e-mail sothat the e-mail message appears to come from someone other than the actualsender?

1) Spoofing 2) Redacting 3) Spamming 4) Pharming 5) Ransomware

1462.Which of the following refers to blacking out portions of the document, usually toprotect confidential information, so that it cannot be recovered later?

1) Redacting 2) Encrypting 3) Spoofing 4) Defacing 5) Botnet

1463.A _________ typically connects personal computers within a very limitedgeographical area, usually within a single building.

1) LAN  2) FAN 3) TAN  4) WAN 5) VPN

1464.In which type of malicious act, hacker contacts you by phone or email and attemptsto acquire your password?

1) spoofing  2) phishing 3) spamming  4) bugging 5) None of these

1465.While browsing the internet, which of the following key is used for full screenview?

1) F3 2) F5 3) F11 4) F9 5) F1

1466.Which of the following type of software secretly collects information about youand your internet habits?

1) Detectware2) Spam 3) Spyware 4) Spooling 5) None of these

Page 96: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 96 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1467.Which of the following is a common name for the crime of stealing password?

1) Spooling 2) Ransomware3) Hacking 4) Spoofing 5) None of these

1468.Which of the following device enabling data transfer between two differentnetworks?

1) Plotter  2) Joystick 3) Gateway  4) Path 5) None of these

1469.Which of the following is related to simplex communication?

1) Single wire and two-sided communication 2) Television3) Two-wire communication 4) Walkie-talkie 5) None of these

1470.Which of the following is not a web browser?

1) Firefox 2) Safari  3) FTP 4) Edge 5) Both 3) and 4)

1471.Which type of system has its own programming and does not receive input?

1) Embedded computer 2) Supercomputer

3) Microcomputer 4) Both 2) and 3) 5) None of these

1472.Which of the following is/are file extension(s) in DOS?  

1) EXE 2) BAT 3) COM 4) All of these 5) None

1473.Multi-user systems provide cost savings for small businesses as they use a singleprocessing unit to link several ______.  

1) Personal computers 2) Workstations

3) Dumb terminals 4) Mainframe 5) Laptop

1474.Which among the following options is the application that combines text, sound,graphics, motion video, and/ or animation? 

1) Multimedia 2) Minimedias 3) Video scopes 4) Motionware 5) Macromedia

1475.Which among the following is the reboot where the power to the system isphysically turned off and back on again, causing an initial boot of the machine?

1) Toggle 2) Cold booting 3) Warm booting

4) Logging off 5) None of these

1476.Which among the following carries signals that control the actions of thecomputer?  

1) Control Bus 2) Data Bus 3) Memory Unit 4) NIC 5) Address Bus

1477.Which among the following is an important circuitry in a computer system thatdoes the arithmetic and logical processing?

1) Memory 2) ALU 3) Flag Register 4) CU 5) Calculator

1478.The two ways to arrange multiple windows on the desktop are:

1) cascade and tile 2) drag and drop

3) point and click 4) minimize and maximize 5) copy and paste

Page 97: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 97 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1479.To delete the selected item permanently, press __________.1) Alt + Delete 2) Shift + D 3) Shift + Delete4) Alt + D 5) None of these

1480.Which of the following is a requisite to ‘boot’, the system?1) Complier 2) Mouse 3) Operating system4) Assembler 5) MS Office

1481.If you wish to extend the length of the network without having the signal degrade,youwould use a _____.1) Repeater 2) Router 3) Gateway 4) Switch 5) None of these

1482.Which of the following is the fastest media of data transfer?1) Co-axial Cable 2) Untwisted Wire3) Telephone Lines 4) Fiber Optic5) None of these

1483.LANs can be connected by which of the following devices which operate on thedata link layer?1) Hub 2) Bridges 3) HDLC 4) Tunnel 5) None of these

1484.In which process, each program is split into fixed-size program components calledpages?1) Multitasking 2) Logging on 3) Paging 4) Scheduling 5) Time-Sharing

1485.Different icons of application software can be found in which bar in the latestversion of Microsoft Windows?1) Start Menu 2) Browser 3) Status 4) Control Panel 5) None

1486.If a word is typed that is not in MS Word’s dictionary, a wavy underline appearsbelow the word. What is the color of the underline that appears in this situation?1) Blue 2) Red 3) Green 4) Black 5) Pink

1487.A type of instruction that can produce several lines of machine language code iscalled a ______.1) Mnemonic 2) Address 3) Macro 4) Assemble 5) None of these

1488.Word processing, spreadsheet, and photo-editing are examples of which type ofsoftware?1) Application software 2) System software3) Operating system software 4) Platform software 5) None of these

1489.The difference between people with access to computers and the Internet andthose without this access is known as the:1) digital divide 2) Internet divide 3) Web divide4) broadband divide 5) None of these

1490.Which of the following kind of devices allows the user to add components andcapabilities to a computer system?1) System boards 2) Storage devices 3) Input devices4) Output devices 5) Expansion slots

1491.To protect your system from computer hackers you must turn on a(n) _______.

1) USP 2) VLC 3) Another system

4) Script 5) Firewall

Page 98: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 98 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1492.Which of the following groups contains graphical file extensions?

1) JPG, GIF, BMP 2) GIF, TCF, WMF

3) TCP, JPG, BMP 4) ADP, GIF, PPT

5) JPG, CPX, GCM

1493.Which of the following number systems is considered as a base-10 number system?

1) Decimal number system 2) Binary number system

3) Octal number system 4) Hexadecimal number system

5) None of these

1494.Which of the following does not exist in taskbar?

1) Quick Launch 2) Start Menu 3) My Documents4) Address bar 5) None of these

1495.Which of the following is a process of translates the IP addresses of computers ina local network to a single IP address?

1) Gateway 2) NAT(Network Address Translation)3) Packet filtering 4) Spooling 5) Translator

1496.In which of the topology all the nodes are attached in a circular wiring arrangementand uses tokens?

1) Star topology 2) Bus topology 3) Network topology4) Ring topology 5) Mesh topology

1497.Which IEEE standard used to define the specification for a wireless LAN?

1) IEEE 802.5 2) IEEE 802.3 3) IEEE 802.11 4) IEEE 802.4 5) IEEE 802.6

1498.A _________ typically connects personal computers within a very limitedgeographical area, usually within a single building.

1) LAN 2) FAN 3) TAN 4) WAN 5) VPN

1499.Which of the following menu types is also called a drop-down menu?

1) fly-list 2) cascading 3) pop-down 4) pull-down 5) go-up

1500.What is the term used for measurement of how fast data moves from one place toanother?

1) data per unit 2) bits per second 3) bits per hour

4) ratio per bit 5) None of the above

1501. Which of the following provides New slide in MS-Power point?

1) Ctrl+N 2) Ctrl+M 3) Ctrl+O 4) Ctrl+S 5) None

1502.Which of the Following Spreadsheet software provided by Google?

1) MS-Excel 2) Google Sheets 3) MS-Paint

4) Pages 5) None of the above

Page 99: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 99 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1503.Which of the following closes current Window?

1) Ctrl+F4 2) Alt+F4 3) Ctrl+End 4) Alt+End 5) None

1504.In which Topology all the hosts are connected to Central Server?

1) Mesh 2) Star 3) Tree 4) Ring 5) None

1505.The Professional Social Networking Site which provides help for seeking JobOpportunities?

1) Facebook 2) Linkedin 3) Watsaap 4) Instagram 5) None

1506.TCP Transmits data in which Layer of the network?

1) Network 2) Transport 3) Physical 4) Application 5) None

1507. The first function performed by Computer after connection USB Storage Devices?

1) Open the Files Immediately 2) It scan for the Viruses

3) Deletes the files from USB Device

4) System gets turned off 5) None of the above

1508.Which of the following is the Digital Currency getting transmitted online?

1) RBI CUrrency 2) Crypto Currency3) Fake Currency 4) Digital Currency 5) None of the above

1509.Which of the following protocol Assigns Unique IP Address in the Network ?

1) HTTP 2) DHCP 3) SMTP 4) POP 5) None

1510.Arogya Setu App is using which technology for COVID Identification in Public?

1) Wi Fi 2) Bluetooth 3) GPS

4) Bluetooth and GPS 5) None of the above

1511.Collection of Documents on web is called?

1) Web Host 2) Website 3) Webpage 4) Webmail 5) None

1512.Which of the following is Microsoft Default Search Engine?

1) Google 2) Bing 3) Yahoo 4) Gmail 5) None

1513.Sharing services within the organization by excluding outer sources is called?

1) Internet 2) Intranet 3) Extranet 4) Ethernet 5) None

1514.Which of the following Word processor Software Provided by Macintosh/Apple?

1) MS-Word 2) Pages 3) Notepad 4) Wordpad 5) None

1515.The Command used for Addition in MS-Excel Sheet?

1) ADD 2) SUM 3) MUL 4) SUB 5) None

1516.Which of the following contains Start Button in windows?

1) Status Bar 2) Task Bar 3) Title bar 4) Tool Bar 5) None

Page 100: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 100 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

1517.In EBCDIC Code how many possible characters are defined?

1) 32 2) 256 3) 8 4) 2 5) None

1518.The Main page of website is called?

1) Mother page 2) Homepage 3) Web page

4) First page 5) None of the above

1519.episodic series of spoken-word digital audio files that a user can download to apersonal device for easy listening.

1) Digital Signature 2) Podcast 3) Webseries

4) Netflix 5) None of the above

1520.Which of the following is providing OTT Data to watch on devices?

1) Netflix 2) Amazon Prime 3) Hotstar

4) SonyLiv 5) All of the above

1521.A _____ is a graphical user interface display area, usually a small window, thatsuddenly appears in the foreground of the visual interface.

1) Digital Signature 2) Podcast 3) Webseries

4) Popup 5) None of the above

1522.A ------- is a computer virus written in the same macro language as the softwareit infects

1) Boot Sector Virus 2) Worm 3) Macro Virus

4) Malware 5) None of the above

1523.EDI Full form?

1) Electric Data Information 2) Electronic Data Information

3) Electronic Data Interchange 4) Electric Data Interchange

5) None of the above

1524.Which of the following Operator represents UNION in Excel Sheet?

1) Underscore 2) Semicolon 3) Comma 4) Dot 5) None

1525. Norton is a?

1) VIRUS 2) Security Threat 3) Antivirus

4) Spam 5) None of the above

Page 101: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 101 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

IMPORTANT FULL FORMS (3-5M)BASICS:

· Full form of C.O.M.P.U.T.E.R. = Commonly Operated Machine Particularly Usedin Technical and Educational Research

· ADSL - Asymmetric Digital Subscriber Line· ALU - Arithmetic Logic Unit· ANSI - American National Standards Institute· API - Application Program Interface· ARP - Address Resolution Protocol· ASCII - American Standard Code for Information Interchange· ASP - Active Server Page or Application Service Provider· ATA - Advanced Technology Attachment· ATM - Asynchronous Transfer Mode· ATX - Advanced Technology eXtended· BASIC - Beginner’s All-purpose Symbolic Instruction Code· Bcc - Blind Carbon Copy· BIOS - Basic Input/Output System· BMP - Bitmap· CGI - Common Gateway Interface· CD - Compact Disc· CD-R - Compact Disc Recordable· CDMA - Code Division Multiple Access· CISC - Complex Instruction Set Computing· CPU = Central Processing Unit· RAM = Random Access Memory· ROM = Read Only Memory· PROM = Programmable Read Only Memory· EPROM = Erasable PROM· EEPROM = Electrically EPROM· HDD = Hard Disk Drive· CD-ROM - Compact Disc Read-Only Memory· CD-RW - Compact Disc Re-Writable· FDD = Floppy Disk Drive· I/O = Input & Output.· CAD - Computer-Aided Design· Cc - Carbon Copy· DVD = Digital Video/Versatile Disk· SMPS = Switch Mode Power Supply· POST = Power ON Self Test

Page 102: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 102 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

· CMOS - Complementary Metal Oxide Semiconductor· CMS - Content Management System· VDU = Visible Display Unit· LED = Light Embedded Diode· LCD = Liquid Crystal Display· USB = Universal Serial Bus· VGA = Video/Visual Graphic Adapter· USB= Universal Serial Bus· FAT= File Allocation Table· NTFS=New Technology File System· ASCII=American Standard Code For Information Interchange· DTP=Desk-Top Publishing· CCTV=Closed Circuit Television· OOPS=Object Oriented Programming System· SIM=Subscriber Identity Module· FAX=Facsimile· CRT=Cathode Ray Tube· TFT=Thin Film Transistor· ITES=Information Technology Enabled Services· OMR=Optical Mark Recognition· OCR=Optical Character Recognition· MICR=Magnetic Ink Character Recognition· BCR=Bar Code Reader· CRM=Customer Relationship Management· ERP=Enterprise Resource Planning· PIN=Personal Identification Number· IMEI=International Mobile Equipment Identity· PDA=Personal Digital Assistant· PC=Personal Computer=Desktop· FORTRAN=Formula Translation· COBOL= Common Business Oriented Language· DOS=Disk Operating System· XP=eXperience· ENIAC= Electronic Numeric Integrator & Calculator· VLSI=Very Large Scale Integrator· POS=Point Of Sale· PCI=Peripheral Component Interface· DDR=Double Data Rate· SDMC=Secure Digital Memory Card· XML=eXtended Markup Language

Page 103: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 103 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

· SQL=Structure Query Language· DDL=Data Definition Language

· DML=Data Manipulation Language

FILE EXTENSIONS· PNG=Plug and Play

· PDF=Portable Document Format

· Doc=Document File

· PPT=Power Point Presentation

· DLL=Dynamic Link Library

· JPEG/JPG= Joint Photographic Experts Group

· MPEG=Moving Pictures Emotions Group

· GIF=Graphics Interchange Format

· TXT=Text File (For NOTE PAD)

· DAT=Digital Audio Tape

· Wav=Waveform Audio

· SWF=Shockwave Flash

· PNG=Portable Network Graphics

NETWORKING· LAN = Local Area Network

· WAN = Wide Area Network

· MAN = Metropolitan Area Network

· HLL = High Level Language

· LLL = Low Level Language

· MIPS = Million of Instruction Per Second

· Mbps = Mega Bytes Per second

· Kbps = Kilo Bytes per second

· WWW = World Wide Web

· ISP = Internet Service Provider

· WLAN=Wireless LAN

· SMTP=Simple mail Transfer Protocol

· HTTP=Hypertext Transmission Protocol

· TCP= Transmission control Protocol

· IP= Internet Protocol

· DHCP: Dynamic Host Configuration Protocol

· DNS= Domain Name System

· POP= Post Office Protocol

Page 104: COMPUTER AWARENESS s CCE

Sreedhar’s CCE

: : 104 : :

COMPUTER AWARENESS

CCE

Sreed

har’s

· PPP= Point to Point Protocol· URL=Uniform Resource Locator· FTP=File Transmission/Transfer Protocol· ICMP= Internet Control Message Protocol· ISDN= Integrated Services Digital Network· GPRS=General Packet Radio Service· GSM= Global System for Mobile Communications· GPS= Global Positioning System· PAN=Personal Area Network· ARPANET=Advanced Research Projects Agency Network· NIC=Network Interface Card· VIRUS=Vital Information Resources Under Seize· GUI=Graphical User Interface· 3G= 3rd Generation· EDGE=Enhanced Data rates for GSM Evolution· WAP= Wireless Application Protocol· UDP=User Datagram Protocol· UPS=Uninterrupted Power Supply· WIMAX=Worldwide Interoperability For Microwave Access· Wi-Fi= Wireless Fidelity· IBM=International Business Machine

SHORTCUTS (Regular Q):· Spell Check- F7· Refresh-F5· Slideshow-F5· Save As Window-F12· Rename Folder-F2· Help Window-F1· Edit Current Cell In Work sheet- F2· Date Format in Excel- Ctrl+Shift+#· Time Format in Excel- Ctrl+Shift+@· To mute sound in Slide- ALT+U· Center Alignment- Ctrl+E· Find Dialogue Box- F5· Cursor to start of line- Home Command· Page Break- Ctrl+Enter· Undo Command: CTRL+Z

***