computer awareness 1.pdf
TRANSCRIPT
-
8/10/2019 computer awareness 1.pdf
1/63
Visit us @ www.latestjobadda.com
OBJECTIVE COMPUTER QUESTIONS
1. All of the following are examples of real security and privacy risks EXCEPT:A. hackers.B. spam.C. viruses.D. identity theft.Answer: B2. A process known as ____________ is used by large retailers to study trends.A. data mining
B. data selectionC. POSD. data conversionAnswer: A3. ____________terminals (formerly known as cash registers) are often connected tocomplex inventory and sales computer systems.A. DataB. Point-of-sale (POS)C. SalesD. QueryAnswer: B4. A(n) ____________ system is a small, wireless handheld computer that scans anitems tag and pulls up the current price (and any special offers) as you shop.A. PSSB. POSC. inventoryD. data miningAnswer: A5. The ability to recover and read deleted or damaged files from a criminalscomputer is an example of a law enforcement specialty called:A. robotics.B. simulation.C. computer forensics.D. animation.Answer: C6. Which of the following is NOT one of the four major data processing functions of acomputer?A. gathering dataB. processing data into informationC. analyzing the data or informationD. storing the data or informationAnswer: C
-
8/10/2019 computer awareness 1.pdf
2/63
Visit us @ www.latestjobadda.com
7. ____________ tags, when placed on an animal, can be used to record and track in adatabase all of the animals movements.
-
8/10/2019 computer awareness 1.pdf
3/63
Visit us @ www.latestjobadda.com
A. POSB. RFIDC. PPSD. GPSAnswer: B
8. Surgeons can perform delicate operations by manipulating devices through computersinstead of manually. This technology is known as:A. robotics.B. computer forensics.C. simulation.D. forecasting.Answer: A9. Technology no longer protected by copyright, available to everyone, is considered tobe:A. proprietary.B. open.
C. experimental.D. in the public domain.Answer: A10. ____________ is the study ofmolecules and structures whose size ranges from 1 to100 nanometers.A. NanoscienceB. MicroelectrodesC. Computer forensicsD. Artificial intelligenceAnswer: A11. ____________ is the science that attempts to produce machines that display the sametype of intelligence that humans do.A. NanoscienceB. NanotechnologyC. SimulationD. Artificial intelligence (AI)Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.A. A processB. SoftwareC. StorageD. InformationAnswer: D13. The name for the way that computers manipulate data into information is called:A. programming.B. processing.C. storing.D. organizing.Answer: B
-
8/10/2019 computer awareness 1.pdf
4/63
Visit us @ www.latestjobadda.com
14. Computers gather data, which means that they allow users to ____________ data.A. presentB. inputC. outputD. store
Answer: B15. After a picture has been taken with a digital camera and processed appropriately, theactual print of the picture is considered:A. data.B. output.C. input.D. the process.Answer: B
16. Computers use the ____________ language to process data.A. processing
B. kilobyteC. binaryD. representationalAnswer: C17. Computers process data into information by working exclusively with:A. multimedia.B. words.C. characters.D. numbers.Answer: D18. In the binary language each letter of the alphabet, each number and each special
character is made up of a unique combination of:A. eight bytes.B. eight kilobytes.C. eight characters.D. eight bits.Answer: D19. The term bit is short for:A. megabyte.B. binary language.C. binary digit.D. binary number.Answer: C
20. A string of eight 0s and 1s is called a:A. megabyte.B. byte.C. kilobyte.D. gigabyte.Answer: B
-
8/10/2019 computer awareness 1.pdf
5/63
Visit us @ www.latestjobadda.com
21. A ____________ is approximately one billion bytes.A. kilobyteB. bitC. gigabyteD. megabyte
Answer: C22. A ____________ is approximately a million bytes.A. gigabyteB. kilobyteC. megabyteD. terabyteAnswer: C23. ____________ is any part of the computer that you can physically touch.A. HardwareB. A deviceC. A peripheral
D. An applicationAnswer: A
24. The components that process data are located in the:A. input devices.B. output devices.C. system unit.D. storage component.Answer: C25. All of the following are examples of input devices EXCEPT a:A. scanner.
B. mouse.C. keyboard.D. printer.Answer: D26. Which of the following is an example of an input device?A. scannerB. speakerC. CDD. printerAnswer: A27. All of the following are examples of storage devices EXCEPT:A. hard disk drives.B. printers.C. floppy disk drives.D. CD drives.Answer: B28. The ____________, also called the brains of the computer, is responsible for
processing data.A. motherboard
-
8/10/2019 computer awareness 1.pdf
6/63
Visit us @ www.latestjobadda.com
B. memoryC. RAMD. central processing unit (CPU)Answer: D29. The CPU and memory are located on the:
A. expansion board.B. motherboard.C. storage device.D. output device.Answer: B30. Word processing, spreadsheet, and photo-editing are examples of:A. application software.B. system software.C. operating system software.D. platform software.Answer: A
31. ____________ is a set of computer programs used on a computer to help performtasks.A. An instructionB. SoftwareC. MemoryD. A processorAnswer: B32. System software is the set of programs that enables your computers hardware
devices and ____________ software to work together.A. managementB. processingC. utilityD. applicationAnswer: D33. The PC (personal computer) and the Apple Macintosh are examples of two different:A. platforms.B. applications.C. programs.D. storage devices.Answer: A34. Apple Macintoshes (Macs) and PCs use different ____________ to process data anddifferent operating systems.A. languagesB. methodsC. CPUsD. storage devicesAnswer: C35. Servers are computers that provide resources to other computers connected to a:A. network.B. mainframe.
-
8/10/2019 computer awareness 1.pdf
7/63
Visit us @ www.latestjobadda.com
C. supercomputer.D. client.Answer: A36. Smaller and less expensive PC-based servers are replacing ____________ in manybusinesses.
A. supercomputersB. clientsC. laptopsD. mainframesAnswer: D37. ____________ are specially designed computers that perform complex calculationsextremely rapidly.A. ServersB. SupercomputersC. LaptopsD. Mainframes
Answer: B38. DSL is an example of a(n) ____________ connection.A. networkB. wirelessC. slowD. broadbandAnswer: D39. The difference between people with access to computers and the Internet and thosewithout this access is known as the:A. digital divide.B. Internet divide.C. Web divide.D. broadband divide.Answer: A40. ____________ is the science revolving around the use of nanostructures to builddevices on an extremely small scale.A. NanotechnologyB. Micro-technologyC. Computer forensicsD. Artificial intelligenceAnswer: A41. Which of the following is the correct order of the four major functions of a computer?A. Process Output Input StorageB. Input Output Process StorageC. Process Storage Input OutputD. Input Process Output StorageAnswer: D42. ____________ bits equal one byte.A. EightB. Two
-
8/10/2019 computer awareness 1.pdf
8/63
Visit us @ www.latestjobadda.com
C. One thousandD. One millionAnswer: A43. The binary language consists of ____________ digit(s).A. 8
B. 2C. 1,000D. 1Answer: B44. A byte can hold one ____________ of data.A. bitB. binary digitC. characterD. kilobyteAnswer: C45. ____________ controls the way in which the computer system functions and provides
a means by which users can interact with the computer.A. The platformB. The operating systemC. Application softwareD. The motherboardAnswer: B46. The operating system is the most common type of ____________ software.A. communicationB. applicationC. systemD. word-processing softwareAnswer: C47. ____________ are specially designed computer chips that reside inside other devices,such as your car or your electronic thermostat.A. ServersB. Embedded computersC. Robotic computersD. MainframesAnswer: B48. The steps and tasks needed to process data, such as responses to questions or clickingan icon, are called:A. instructions.B. the operating system.C. application software.D. the system unit.Answer: A49. The two broad categories of software are:A. word processing and spreadsheet.B. transaction and application.C. Windows and Mac OS.
-
8/10/2019 computer awareness 1.pdf
9/63
Visit us @ www.latestjobadda.com
D. system and application.Answer: D50. The metal or plastic case that holds all the physical parts of the computer is the:A. system unit.B. CPU.
C. mainframe.D. platform.Answer: A
Fill in the Blank:
51. Between PCs and Macs, the ____________ is the platform of choice for graphic
design and animation.
Answer: Mac52. The ____________ is the program that manages the hardware of the computersystem, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system
53. The type of operating system software you use depends on your computers
____________.Answer: platform54. ____________software helps you carry out tasks, such as typing a document or
creating a spreadsheet.
Answer: Application55. ____________are the fastest and most expensive computers.Answer: Supercomputers56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte57. Input devices are used to provide the steps and tasks the computer needs toprocess data, and these steps and tasks are called ____________.Answer: instructions58. A computer gathers data, processes it, outputs the data or information, and
____________ the data or information.
Answer: stores
59. The binary language consists of two digits: ____________ and ____________.Answer: 0 and 160. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)61. The devices you use to enter data into a computer system are known as
____________ devices.Answer: input62. The devices on a computer system that let you see the processed information are
known as ____________ devices.
Answer: output
-
8/10/2019 computer awareness 1.pdf
10/63
Visit us @ www.latestjobadda.com
63. ____________ is the set of computer instructions or programs that enables the
hardware to perform different tasks.Answer: Software64. When you connect to the ____________, your computer is communicating with a
server at your Internet service provider (ISP).
Answer: Internet65. ____________ are computers that excel at executing many different computerprograms at the same time.Answer: Mainframes66. ____________is the application of computer systems and techniques to gather
legal evidence.
Answer: Computer forensics67. ____________ is the science that attempts to create machines that will emulatethe human thought process.
Answer: Artificial intelligence (AI)68. Macintosh computers use the Macintosh operating system (Mac OS), whereas
PCs generally run ____________ as an operating system.Answer: Microsoft Windows69. A process known as ____________ tracks trends and allows retailers to respond
to consumer buying patterns.
Answer: data mining70. Hard disk drives and CD drives are examples of ____________ devices.Answer: storage71. You would use ____________ software to create spreadsheets, type documents,
and edit photos.
Answer: application72. ____________ are computers that support hundreds or thousands of users
simultaneously.Answer: Mainframes73. ____________ is the term given to the act of stealing someones identity and
ruining their credit rating.
Answer: Identity theft74. Surgeons are using ____________ to guide robots to perform delicate surgery.Answer: computers75. Patient ____________ are life-sized mannequins that have a pulse and a
heartbeat and respond to procedures just like humans.
Answer: simulatorsTrue and False
76. Currently, the performance of tasks by robots is based on preprogrammed
algorithms.
Answer: True77. Data can be a number, a word, a picture, or a sound.Answer: True
-
8/10/2019 computer awareness 1.pdf
11/63
Visit us @ www.latestjobadda.com
78. Strictly defined, a computer is a data processing device.Answer: True79. The discrepancy between the haves and have-nots with regard
to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)80. One of the benefits of becoming computer fluent is being a savvy computer userand consumer and knowing how to avoid viruses, the programs that pose threats tocomputer security.Answer: True81. Trend-spotting programs, developed for business, have been used to predict
criminal activity.Answer: True82. Employers do not have the right to monitor e-mail and network traffic on
employee systems used at work.
Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to thecomputer.Answer: True84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)85. The CPU and memory are located on a special circuit board in the system unit
called the motherboard.Answer: True86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True
87. The main difference between a supercomputer and a mainframe is thatsupercomputers are designed to execute a few programs as quickly as possible,hereas mainframes are designed to handle many programs running at the same
time (but at a slower pace).
Answer: True88. Being computer fluent means that you should be able to build a computer
yourself.Answer: False89. Embedded computers are self-contained computer devices that have their own
programming and do not receive input.
Answer: True90. A Web browser is a special device that is installed in your computer that allowsit to communicate with other devices on a network.
Answer: False (network adapter)91. With a wireless network, it is easier to relocate devices.
Answer: True92. The most common type of memory that the computer uses to process data isROM.
Answer: False (RAM)
-
8/10/2019 computer awareness 1.pdf
12/63
Visit us @ www.latestjobadda.com
Matching:
93. Match the following terms with their approximate size:I. kilobyte A. one million bytesII. byte B. eight bits
III. gigabyte C. one thousand bytesIV. megabyte D. one billion bytesV. terabyte E. one trillion bytesAnswer: C, B, D, A, E
94. Match the following terms with their meanings:
I. printer A. storage deviceII. scanner B. output deviceIII. RAM C. input deviceIV. CPU D. a type of memoryV. CD drive E. processor
Answer: B, C, D, E, A
95. Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculationsextremely rapidlyII. supercomputer B. a computer that provides resources to other computers connected toa networkIII. embedded computer C. a large, expensive computer that supports hundreds orthousands of users simultaneouslyIV. PDA D. a self-contained computer device that usually performs preprogrammedfunctions such as temperature control
V. server E. a small mobile computing deviceAnswer: C, A, D, E, B
96. Match the following terms with their meanings:I. software A. transforming data into informationII. hardware B. data that has been organized or presented in a meaningful fashionIII. operating system C. any part of the computer that you can physically touchIV. processing D. a set of computer programs that enables hardware to perform differenttasksV. information E. the most common type of system software, it controls the way in whichthe computer system functionsAnswer: D, C, E, A, B
97. Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices andapplication software to work togetherII. application software B. the kind of operating system software you will use depends onthisIII. platform C. operating system software generally used on PCs
-
8/10/2019 computer awareness 1.pdf
13/63
Visit us @ www.latestjobadda.com
IV. Microsoft Windows D. a set of programs used to accomplish a specific taskV. Mac OS E. operating system software used on the Apple MacintoshAnswer: A, D, B, C, E
98. Match the following terms with their meanings:
I. data A. the main circuit board in the system unitII. memory B. the representation of a fact or idea (unprocessed information)III. output C. processed data or informationIV. storage D. holds instructions or data that the CPU processesV. motherboard E. data or information that can be accessed againAnswer: B, D, C, E, A
99. Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on anextremely small scaleII. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1sIV. system unit D. short for binary digitV. nanotechnology E. steps and tasksnecessary to process data into usable informationAnswer: D, C, E, B, A
100. Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual toursII. business B. data miningIII. law enforcement C. robotics and simulationIV. education D. computer forensicsV. archeology E. digital recreations of ruins
Answer: C, B, D, A, E
PAPER 2
1. A file containing relatively permanent data is
a)Random file b)Master file c)Transaction file d)Sequential file e) None
2. One million bytes of information is abbreviated as
a) Bit b) KB c) MB d) GB e) None
3. Bing is also known as
a) MSN Search b) Live Search c) Windows Live Search d) All e) None
4. Microsofts latest operating system is
-
8/10/2019 computer awareness 1.pdf
14/63
Visit us @ www.latestjobadda.com
a)Vista b)Vista Advanced c)Windows XP d)Windows 7 e)None
5. AltaVista is a
a)Search engine b)Windows OS c)Browser d)Virus e)Vista Theme
6. What is other name of LAN Card
a)MODEM b)NIC c)Internet Card d)Network Connector e)None
7. Which is the latest type of printer interface?
a)Serial b)DVI c)Parallel d)USB e)none
8. In Windows XP, which shortcut is used you lock the computer?
a) Ctrl + L
b) Windows key + K
c) Ctrl + K
d) Scroll Lock key
e) Windows key + L
9. The maximum number of IDE devices that can be installed in an ATX computer
is
a) 1 b) 2 c) 3 d) 4 e) 5
10. When using characters in Windows, what code does Windows use?
a)ASCII b)UNICODE c)MORSE d)IDBC e)WESTRN
11. Which protocol provides name resolution for host and domain names for a
TCP/IP
network?
a)HTTP b)TELNET c)SMTP d)DNS e)SNMP
-
8/10/2019 computer awareness 1.pdf
15/63
Visit us @ www.latestjobadda.com
12. How fast is Fast Ethernet?
a)10 Mbps b)100 Mbps c) 256 Kbps d)1 Gbps e)10 Gbps
13. YouTube service of streaming videos online is provided by
a)Google b)Microsoft c)IBM d)Apple e)Sony
14. Which one is not true?
a)Google is a search engine
b)Ubuntu is a system software
c)Windows XP launched in 2001
d)Buzz is an e-Commerce company
e) None
15. A Laptop or Notebook marked 802.11n in its feature, it means device support
a)Bluetooth b)WiMAX c)USB d)Wi-Fi LAN e)3G
16. In EXCEL, the default workbook opens with
a) One worksheets
b) Two worksheets
c) Three worksheets
d) Four worksheets
e) None
17. In Excel, this surrounds an active cell.
a) Cell border
b) Cell outline
c) Cell rim
-
8/10/2019 computer awareness 1.pdf
16/63
Visit us @ www.latestjobadda.com
d) Cell selector
e) None
18. In H2O the figure 2 is appeared lowered. Which effect has been applied?
a) Superscript
b) Lowered
c) Subscript
d) Laid down
e) None
19. What is the Thesaurus used for?
a) Grammar options
b) Spelling options
c) Opposite Words
d) Synonyms and Antonyms
d)None
20. What is the shortcut of Research command in MS-Word?
a) Alt + click b) F3 c) Ctrl + F d) F7 e)None
PAPER 31. For the purposes of defining data needs, a responsibility area is
a) Marketing b) Personnel c) Administration d) Finance e) None
2. The problem statement should include all of the following except:
a) Input. b) Output. c) Processing d) Storage e) None
-
8/10/2019 computer awareness 1.pdf
17/63
Visit us @ www.latestjobadda.com
3. Hotmail, a free web-based email service operated by which company
-
8/10/2019 computer awareness 1.pdf
18/63
Visit us @ www.latestjobadda.com
a) Apple b) Rediff c) Microsoft d) Yahoo e) Google
4. A collection of 4 binary digits is known as
a) Half Bit b)1/2 KB c) Byte d)Nibble e) None
5. How many types of arithmetic operations does the ALU of all computers
perform?
a) 2 b) 4 c) 6 d) 8 e) 5
6. Which of the following is not a part of the CPU?
a) Arithmetic and Logic Unit
b) Storage Unit
c) Program Unit
d) Control Unit
e) None
7. Which of the following is not a unit of measurement in computer systems?
a)DPI b)PPI c)API d)Bd e)MB
8. In Windows XP, which shortcut is used to cycle through opened items in taskbar?
a) Ctrl + Tab
b) Alt + Tab
c) Ctrl + Esc
d) Alt + Esc
e) None
9. A digital computer compute the value of expression 2 * 5 - 2 >2 inside
-
8/10/2019 computer awareness 1.pdf
19/63
Visit us @ www.latestjobadda.com
a) RAM b) CPU Chip c) Hard Disk d) Floppy Disk e) MS-Excel
-
8/10/2019 computer awareness 1.pdf
20/63
Visit us @ www.latestjobadda.com
10. To produce a high-quality graphics (hardcopy) in color, you would want to use a
a)Virtual Printer b)Laser Printer c)Ink-jet Printer d)Plotter e)RGB Monitor
11. Which of the following is fastest memory ?
a) DDR RAM b) DDR2 RAM c) DDR3 RAM d) Swap Memory e) Buffer
Memory
12. Which protocol is used by operating system to generate error message like
Host Unreachable over a TCP/IP network?
a) HTTP/1.1 b) ICMP c) PPP d) ICGM e) TCP/IP
13. What does SNMP stands for?
a) Simple Network Mail Protocol
b) Single Network Mail Protocol
c) Single Network Message Protocol
d) Simple Network Management Protocol
e) None
14. On a school computer, Tina learned how to copy programs. A classmate asked her
to copy a program for his home use. Her most ethical response would be which of
the following?
a) I'll copy it, but you have to promise not to tell anyone.
b) I don't know how to copy disks.
c) I can't copy it because it will break copyright laws.
d) I'll copy it for you, but you can't copy it for anyone else.
-
8/10/2019 computer awareness 1.pdf
21/63
-
8/10/2019 computer awareness 1.pdf
22/63
Visit us @ www.latestjobadda.com
15. Which of the following is not true?
a)LOGO stands for Live On Googles Orkut
b)BIOS is a system software
c)GRUB is a Linux bootloader
d)Ruby is a web scripting language
e) LILO is a Linux bootloader
16. What is the function of Drop Cap?
a) It does not allow capital letters to be used in the documents.
b) It makes first letter of each word capital letter in the documents
c) It lets you begin a paragraph with a large dropped initial capital letter.
d) It automatically starts all paragraphs and sentences with capital letters.
e) None
17. What is Mail-Merge?
a) a web based e-mail service with no spam
b) a name of Yahoo! MINDSET search feature
c) a new virus-hoax which can delete data from mail-inbox
d) a feature of MS-Word used to create multiple documents like letters,
mailing labels, name tags etc.
e) None
18. In MS-Excel 2003, the default workbook sheet contain maximum
a) 65535 Rows b) 65536 Rows e) 1048576 Rows e) 65537 Rows c) None
-
8/10/2019 computer awareness 1.pdf
23/63
-
8/10/2019 computer awareness 1.pdf
24/63
Visit us @ www.latestjobadda.com
a) Toggle Menu
b) Unavailable for current context
c) Not much required menu
d) Over Used Menu
e) None
20. Hot-Key is a
a) FireWire port
b) Alternate Key
c) Keyboard Shortcut
d) Primary Key
e) None
PAPER 4
1. After a program has shown that it runs and produces results, the next step is
to...?
a) Save b) Load c) Exit d) Test e) List
2. A computer that works with discrete quantities is
a) Hybrid . b) Optical. c) Digital d) Analog e) None
3. A 32 bit computer word consists of?
a) 4 bytesb) 8 bytes c) 16 bytes d) 32 bytes e) None
4. The process of checking the validity of information held in a transaction file is
a) Verification b) Test data c) Validation d) Updating e) None
-
8/10/2019 computer awareness 1.pdf
25/63
-
8/10/2019 computer awareness 1.pdf
26/63
Visit us @ www.latestjobadda.com
a) Another name for a table in an RDBMS.
b) Another name for the key linking different tables in a database.
c) Initial seed value of a field
d) A row or record in a database table.
e) An attribute attached to a record.
6. Which of the following is not a web scripting language?
a) ASP b) DSP c) JSP d) PHP e) HTML
7. Which one of the following work as both an input and output device?
a) Keyboard b) QWERTY Keyboard c) Mouse d) Scanner e) Modem
8. Which of the following companies is also known as Big Blue
a) Intel b) IBM c) Microsoft d) Adobe System e) Google
9. Which of the following is not an operating system for personal computers?
a) Windows XP b)Windows 7 c) Red Hat Linux d) Googles Nexus One
e)Unix
10. A network where all systems have equal status is called:
a) Peer-to-Peer.
b) A Star Network.
c) The Internet.
d) Client-Server.
e) None
11. What is the communications protocol that allows you to connect your computer
-
8/10/2019 computer awareness 1.pdf
27/63
Visit us @ www.latestjobadda.com
to the Internet using a standard telephone line ?
-
8/10/2019 computer awareness 1.pdf
28/63
Visit us @ www.latestjobadda.com
a) HTTP b) ISDN c) SLIP d) TCP/IP e) None
12. What is the name given to the standard or set of rules that two computers use
to communicate with each other ?
a) Access Control b) Domain c) Link d) Protocol e) TCP/IP
13. What does SMPS stands for?
a) Switched Mode Power Supply
b) Single Mode Power Supply
c) Simple Mode Power Supply
d) Synchronous Mode Power Supply
e) None
14. When a user turns on a Windows XP system, which program will activate first?
a) Exhaust fan of SMPS will start rotating
b) Windows XP logo screen appear with progress bar
c) Operating System start to load its file in RAM.
d) Desktop screen appear with mouse pointer
e) BIOS the in-charge of system start executing
15. In Windows Explorer, when a user press Alt key and Double-click a file/folder
simultaneously, what will happen?
a) Selected file/folder will open in new window
b) Selected file/folder will open in same window
c) Selected file/folder will move to recycle bin
-
8/10/2019 computer awareness 1.pdf
29/63
Visit us @ www.latestjobadda.com
d) Properties dialog box of Selected file/folder will open
-
8/10/2019 computer awareness 1.pdf
30/63
Visit us @ www.latestjobadda.com
e) None
16. Which of the following is not true?
a) TCP is a connection-oriented protocol
b) 48 is an Octal Number
c) FTP stands for File Transfer Protocol
d) A file having extension PNG is a graphic file
e) C++ is a computer programming language
17. In MS-Excel, what is the keyboard shortcut to complete a cell entry and move up
in the selection?
a) Ctrl + TAB
b) Shift + TAB
c) Alt + ENTER
d) Shift + ENTER
e) None
18. What is the file extension used for Microsoft Word document templates?
a) .dot b) .wdt c) .txt d) .exe e) .doc
19. Which Access component is best for data presentation?
a) Table b) Form c) Report d) Query e) None
20. What would you see while spell checking the phrase My father was write?
a) The word write is misspelled.
b) A red line appears under write
-
8/10/2019 computer awareness 1.pdf
31/63
Visit us @ www.latestjobadda.com
c) A green line appears under write
-
8/10/2019 computer awareness 1.pdf
32/63
Visit us @ www.latestjobadda.com
d) The word father ismisspelled.
e)No errors.
PAPER 4
1. A set of related records in a database is known as a______?
a) Fileb) Tuples c) Field d) Record-group e) None
2. One piece or item of information in a database is known as a/an ____?
a) Record b) Entry c) File d) Field e) None
3. Locking was introduced into databases so that _____?
a) Consistency can be enforced
b) Keys can be provided to maintain security
c) All simultaneous transactions are prevented
d) Passwords can be provided to maintain security
e) None
4. The four parts of a database listed in ascending order are?
a) File, record, field, entry
b) Entry, field, record, file
c) Field, entry, record, file
d) Record, field, entry, file
e) None
5. Which input device is used to read characters directly from an ordinary piece of
paper?
-
8/10/2019 computer awareness 1.pdf
33/63
Visit us @ www.latestjobadda.com
a) OMR b) OCR c) TSR d) PCR e) None
-
8/10/2019 computer awareness 1.pdf
34/63
Visit us @ www.latestjobadda.com
6. Which of the following operating system is launched by IBM for personal
computers?
a) IBM-DOS b) MS-DOS c) OS/2 d) PC-DOS e) None
7. Which generation of computer use Artificial Intelligence?
a) Third b) Fourth c) Fifth d) Sixth e) None
8. Which of the following is not a name of network topology?
a) Bus b)NetWare c) Tree d) Ring e) Mesh
9. A _______ server store and manages files for network user?
a) Main b) Web c) File d) Authentication e) None
10. A medium for transferring data between two locations is called ____?
a) Network b) Modem c) Sharing d) Communication Channel e) Data Bus
11. Personal logs or journal entries posted on the Web are known as_______?
a) Twitter b) Blogs c) Web casts d) User-Forum e) None
12. Before a hard disk can be used to store data, it must be _________ firstly?
a) Partitioned b) Labeled c) Formatted d) Addressed e) None
13. What is Rover in Windows XP?
a) An animated character
b) A mouse hover event
c) Busy hourglass mouse cursor
d) A routing and remote access service
e) None
14. A computer-hoax is?
-
8/10/2019 computer awareness 1.pdf
35/63
Visit us @ www.latestjobadda.com
a) A Trojan threat
b) A computer hacker
c) A program that blows up every time you use it
d) A program intended to scare users into thinking they have a virus
e) None
15. Which of the following is not a Microsoft operating system?
a) Windows XP
b) Windows ME
c) Windows CE
d) Windows MX
e) All the above
16. What does SATA stands for?
a) Super Advanced Technology Attachment
b) Serial Advanced Technology Attachment
c) Serial Access Technology Attachment
d) Small Access Technology Attachment
e) None
17. Which one of the following is not true?
a) Front panel of computer case is also called Bezel
b) Python is a computer programming language
c) XP stands for eXPerience in Windows XP
d) DPI (dots per inch) is a measurement of printer resolution
-
8/10/2019 computer awareness 1.pdf
36/63
Visit us @ www.latestjobadda.com
e) All are true
18. The type of line spacing that leaves a blank line between each line keyed is
known as?
a) Single spacing
b) Double spacing
c) Triple spacing
d) Quadruple spacing
e) None
19. The page margins of a document refer to the?
a) Header on each page
b) Page orientation
c) White space left for binding
d) White space surrounding the page
e) None
20. In order to delete the word RAM using the backspace key, the cursor must
be
Positioned?
a) Before the letter M.
b) After the letter A
c) Before the letter R
d) After the letter M
e) Can not delete
-
8/10/2019 computer awareness 1.pdf
37/63
Visit us @ www.latestjobadda.com
PAPER 5
1. A group of attribute/field in a database is known as a______.
a) Record b) File c) Database d) Entry e) None
2. A ______ describe a category of information in a table of database.
a) Record b) File c) Entry d) Field e) None
3. A goal of data mining includes which of the following?
a) To confirm that data exists
b) To create a new data warehouse
c) To analyze data for expected relationships
d) To explain some observed event or condition
e) None of the above
4. The correct hierarchical order, smallest to largest, for the following database
terms is:
a) File, Field, Record, Database
b) File, Record, Field, Database
c) Record, Field, File, Database
d) Field, Record, File, Database
e) None of the above
5. In RDBMS , DBA is responsible for:
a) Physical database design
b) Defining conceptual models and schema
-
8/10/2019 computer awareness 1.pdf
38/63
Visit us @ www.latestjobadda.com
c) Defining security and integrity rules
-
8/10/2019 computer awareness 1.pdf
39/63
Visit us @ www.latestjobadda.com
d) Defining backup and recovery mechanisms
e) All the above
6. When data changes in multiple lists and all lists are not updated, this causes
_______.
a) Duplicate data
b) Data redundancy
c) Data inconsistency
d) Information overload
e) None
7. Which of the following programming method is used to minimize data errors
when data
is transferred over a network?
a) Checksumb) Checkbit c) Cryptography d) Encryption e) None
8. Which device act as a traffic cop over a network?
a) Modem b) Hub c) Switch d) Router e) None
9. How many layers are present in Open System Interconnection (OSI) model of
network
architecture?
a) Five b) Six c) Seven d) Eight e) None of these
10. Which layer of OSI model, firstly make use of unit of data called Packet?
a) Datalink Layer
-
8/10/2019 computer awareness 1.pdf
40/63
Visit us @ www.latestjobadda.com
b) Transport Layer
-
8/10/2019 computer awareness 1.pdf
41/63
Visit us @ www.latestjobadda.com
c)Network Layer
d) Presentation Layer
e) None
11. Communication between computers is established, maintained and terminated by
_____ .
a) Network Layer
b) Session Layer
c) Application Layer
d) Presentation Layer
e) None
12. Which term identifies a specific computer on the web and the main page of the
entire
site?
a) URL b) Hyperlink c) Web site address d) Domain name e) None of these
13. The place where data or information is stored for a short time is
a) Memory b) Control Unit c) Buffer d) ALU e) None
14. The section of CPU which selects, interprets and sees to the execution of program
instructions?
a) ALU b) Control Unit c) Register Unit d) Processing Unit e) None
15. Which program is used to convert assembly language to machine language?
a) Compiler b) Interpreter c) Linker d) Assembler e) None
-
8/10/2019 computer awareness 1.pdf
42/63
Visit us @ www.latestjobadda.com
16. The process of finding errors in softwares source code
-
8/10/2019 computer awareness 1.pdf
43/63
Visit us @ www.latestjobadda.com
a) Debugging b) Compiling c) Testing d) Running e) None
17. A computer programmer
a) can draw only flowchart
b) can enter data quickly
c) does all the thinking for a computer
d) can operate all type of computer equipment
e) None
18. Primary Memory of a personal computer consists of
a) RAM only
b) ROM only
c) Hard Disk only
d) Both (a) and (b)
e) All (a), (b), and (c)
19. A Trojan horse is
a) An ad ware program
b) A virus disguised as a useful program.
c) A program that blows up every time you use it
d) A spy ware which steal information over internet
e) None
20. Which one of the following is not true?
a) HTTP Protocol is used to view a web page in a browser
-
8/10/2019 computer awareness 1.pdf
44/63
Visit us @ www.latestjobadda.com
b) Android is Google's operating system for mobile devices
-
8/10/2019 computer awareness 1.pdf
45/63
-
8/10/2019 computer awareness 1.pdf
46/63
Visit us @ www.latestjobadda.com
c. Both sequentially and parallel
d. All of above
5. Who designed the first electronics computerENIAC?
a. Van-Neumann
b. Joseph M. Jacquard
c. J. Presper Eckert and John W Mauchly
d. All of above
6. Who invented the high level language c?
a. Dennis M. Ritchie
b. Niklaus Writh
c. Seymour Papert
d. Donald Kunth
7. Personnel who design, program, operate and maintain computer equipment refers to
a. Console-operator
b. Programmer
c. Peopleware
d. System Analyst
8. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a. 1978
b. 1984
c. 1990
d. 1991
9. Human beings are referred to as Homosapinens, which device is called SillicoSapiens?
-
8/10/2019 computer awareness 1.pdf
47/63
Visit us @ www.latestjobadda.com
a. Monitor
b. Hardware
c. Robot
d. Computer
10. An error in software or hardware is called a bug. What is the alternative computerargon for it?
a. Leech
b. Squid
c. Slug
d. Glitch
11. Modern Computer are very reliable but they are not
a. Fast
b. Powerful
c. Infallible
d. Cheap
12. What is the name of the display feature that highlights are of the screen whichrequires operator attention?
a. Pixel
b. Reverse video
c. Touch screen
d. Cursor
13. IMB launched its first personal computer called IBM-PC in 1981. It had chips fromIntel, disk drives from Tandon, operating system from Microsoft, the printer from Epsonand the application software from everywhere. Can you name the country whichcontributed the video display?
a. India
-
8/10/2019 computer awareness 1.pdf
48/63
Visit us @ www.latestjobadda.com
b. China
c. Germany
d. Taiwan
14. Personal computers use a number of chips mounted on a main circuit board. What isthe common name for such boards?
a. Daughter board
b. Motherboard
c. Father board
d. Breadboard
15. In most IBM PCs, the CPU, the device drives, memory expansion slots and activecomponents are mounted on a single board. What is the name of this board?
a. Motherboard
b. Breadboard
c. Daughter board
d. Grandmother board
16. What is meant by a dedicated computer?
a. Which is used by one person only
b. Which is assigned one and only one task
c. Which uses one kind of software
d. Which is meant for application software
17. The system unit of a personal computer typically contains all of the following except:
a. Microprocessor
b. Disk controller
c. Serial interface
-
8/10/2019 computer awareness 1.pdf
49/63
-
8/10/2019 computer awareness 1.pdf
50/63
Visit us @ www.latestjobadda.com
3. In analog computer
b. Input is never converted to digital form
4. In latest generation computers, the instructions are executed
c. Both sequentially and parallel
5. Who designed the first electronics computerENIAC?
c. J. Presper Eckert and John W Mauchly
6. Who invented the high level language c?
a. Dennis M. Ritchie
7. Personnel who design, program, operate and maintain computer equipment refers to
c. Peopleware
8. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
d. 1991
9. Human beings are referred to as Homosapinens, which device is called SillicoSapiens?
d. Computer
-
8/10/2019 computer awareness 1.pdf
51/63
Visit us @ www.latestjobadda.com
10. An error in software or hardware is called a bug. What is the alternative computerargon for it?
d. Glitch
11. Modern Computer are very reliable but they are not
c. Infallible
12. What is the name of the display feature that highlights are of the screen whichrequires operator attention?
b. Reverse video
13. IMB launched its first personal computer called IBM-PC in 1981. It had chips fromIntel, disk drives from Tandon, operating system from Microsoft, the printer from Epsonand the application software from everywhere. Can you name the country whichcontributed the video display?
d. Taiwan
14. Personal computers use a number of chips mounted on a main circuit board. What isthe common name for such boards?
b. Motherboard
15. In most IBM PCs, the CPU, the device drives, memory expansion slots and activecomponents are mounted on a single board. What is the name of this board?
a. Motherboard
16. What is meant by a dedicated computer?
b. Which is assigned one and only one task
-
8/10/2019 computer awareness 1.pdf
52/63
Visit us @ www.latestjobadda.com
17. The system unit of a personal computer typically contains all of the following except:
d. Modem
18. A computer program that converts an entire program into machine language is calleda/an
c. Compiler
19. A computer program that translates one program instructions at a time into machinelanguage is called a/an
a. Interpreter
20. A small or intelligent device is so called because it contains within it a
d. Sensor
PAPER 7
1. A program which helps to create written document and lets you go back and makecorrections as necessarya. Home row keysb. Tool barc. Folderd. Word processor
Correct Answer: Word ProcessorExplanations: Obvious. Home row keys is a row of a, s, d, f, g, h, j, k, l, ;, keys in
keyboard. Tool bar is a set of tools to perform a task with one click and folder is locationwhere files are stored.
-
8/10/2019 computer awareness 1.pdf
53/63
Visit us @ www.latestjobadda.com
2. Graphics for word processora. Peripheralb. Clip artc. Highlightd. Execute
Correct Answer: b. Clip artExplanation: Obvious. Peripheral is surrounding. In computer, peripherals mean the I/Odevices surrounding CPU box. Highlight is focusing and execute is to run.
3. What type of software is used for creating letters papers and other documents?a. Databaseb. Word Processor
c. Spreadsheetd. Operating Program
Correct Answer: b. Word ProcessorExplanation: Obvious
4. What does the Ctrl + I shortcut key accomplish in Ms-Word?a. It converts selected text into the next larger size of the same font
b. It adds a line break to the documentc. It makes the selected text boldd. It applies Italic formatting t the selected text.
Correct Answer: d. It applies Italic formatting t the selected text.Explanation: For option a shortcut key is Ctrl + dot; for option b, Shift + Return; for
option c, Ctrl + b.
5. What is the file extension of Ms-Word document?a. Dotb. Docc. Domd. Txt
Correct Answer: b. DocExplanation: dot is document template, dom extension does not exist and txt is for plain
-
8/10/2019 computer awareness 1.pdf
54/63
-
8/10/2019 computer awareness 1.pdf
55/63
-
8/10/2019 computer awareness 1.pdf
56/63
Visit us @ www.latestjobadda.com
c. From Insert ->File menu optiond. By right clicking the document and choosing 'Add Sound' option
-
8/10/2019 computer awareness 1.pdf
57/63
Visit us @ www.latestjobadda.com
4. A bookmark is an item or location in document that you identify an name for futurereference. Which of the following task is accomplished by using bookmarks?
a. To quickly jump to a specific location in the documentb. To add hyper links in a web pagec. To add anchors in a web paged. To mark the ending of a page of document
5. What are sections used for in a word document?
a. To divide the document into parts so that each part may be independently printedwhen the print command is given.
b. To divide the document into parts so as to allow certain parts of the document to
display data from a table.c. To divide the document into parts so as to allow certain parts of the document to
display data from the Internet.d. To vary the layout of a document within a page or between pages by dividing the
document into parts, and then allow formating of each part the way you want.
6. What process should be used to recall a document saved previously?
a. Copyb. Savec. Open
d. Enter
7. Desktop publishing is a more sophisticated form of which of the following types ofsoftware?
a. Spreadsheetb. Graphingc. Word processingd. Database
8. What print command should be selected to print first 5 pages of document?
a. Print previewb. Page setupc. Print alld. From___To___
9. Which word processing utility could you use to find the synonym of a word?
a. Spell checker
-
8/10/2019 computer awareness 1.pdf
58/63
Visit us @ www.latestjobadda.com
b. Thesaurusc. Out-liner
-
8/10/2019 computer awareness 1.pdf
59/63
Visit us @ www.latestjobadda.com
d. Grammar checker
10. A word processor would most likely be used to do which of the following?
a. Keep an account of money spentb. Do a computer search in media centerc. Maintain an inventoryd. Type a biography
Answers
1. What is the Thesaurus used for?
c. Synonyms and Antonyms
Thesaurus is a tool application in MS-Word that lets you look for antonym orsynonym words of selected word.
2. What is the function of Drop Cap?
c. It lets you begin a paragraph with a large dropped initial capital letter.
Drop cap is the first character or word of a paragraph that is large, dropped belowthe current line. This is used for designing a paragraph.
3. How can you insert a sound file in your word document?
a. From Insert -> Object menu option
We choose Object from Insert menu to insert whether sound or video that are notcreated from MS-Word application.
4. A bookmark is an item or location in document that you identify an name for futurereference. Which of the following task is accomplished by using bookmarks?
a. To quickly jump to a specific location in the document
You can mark a location in document and save it with a name so that you can makea quick jumps to that location later on. Bookmarks are used in creating hyperlinksin document.
-
8/10/2019 computer awareness 1.pdf
60/63
Visit us @ www.latestjobadda.com
5. What are sections used for in a word document?
-
8/10/2019 computer awareness 1.pdf
61/63
-
8/10/2019 computer awareness 1.pdf
62/63
Visit us @ www.latestjobadda.com
Among the given options, typing a biography needs a word processor.
-
8/10/2019 computer awareness 1.pdf
63/63