You are on page 1of 8

1. Which device can understand the difference between data and programs?

(1) Input device


(2) Output device
(3) Memory
(4) Microprocessor
(5) None of these

2. Which command is used to open (open) dialogue box?
(1) F12
(2) Shift+F12
(3) Alt+F12
(4) Ctrl+F12
(5) None of these

3. The pattern of printed lines on most products are called-
(1) prices
(2)OCR
(3) scanners
(4) barcodes
(5)None of these

4. The main advantage of magnetic disk compared to magnetic tape is
(1) low cost
(2) rigidity
(3) direct access
(4) high packet density
(5) sequential access

5. To copy cell contents using drag and drop, press the:
(1) End key
(2) Shift key
(3) Esc key
(4) All of above
(5) None of these

6. To add two cells (A1 and A2) together you use which of the formula?
(1) = A1+ A2
(2) = Add (A1 + A2)
(3) = together (A1:A2)
(4) A1 + A2
(5) None of these

7. Which one is NOT shared by the threads of the same process?
(1) Message Queue
(2) Address Space
(3) Stack
(4) Database
(5) None of these

8. The updating of master files to reflect the effects of current transactions is called?
(1) Direct processing
(2) File processing
(3) Flow chart
(4) Front-end Processor
(5) None of these

9. One or more operations performed on data to achieve a desired objective is called?
(1) Database
(2) Data processing
(3) Data collection
(4) Data communication
(5) None of these

10. The total set of interlinked hypertext documents worldwide is
(1) HTTP
(2) Browser
(3) WWW
(4) B2B
(5) None of these

ANSWERS:



1. 4
2. 4
3. 4
4. 3
5. 5
6. 1
7. 3
8. 2
9. 2
10. 3



Read more: http://www.bankersadda.com/2013/11/computer-quiz.html#ixzz3EDHA6LKB
1. First digital computer with magnetic core RAM and real-time graphics
(1) ENIAC (2) Whirlwind machine
(3) UNIVAC (4) IBM-360
(5) None of these


2. In hospital department for patient treatment which computer is used-
(1) Analog computer (2) Digital computer
(3) Super computer (4) Hybrid computer
(5) None of these

3. Process of obtaining program instruction or item from memory-
(1) Recording (2) Executing
(3) Fetching (4) Storing
(5) None of these

4. Keys when pressed change their status from one state to another
(1) Modifier keys (2) Hot keys
(3) Function keys (4) Toggle keys
(5) None of these

5. Which type of software are also known as customized software?
(1) Special purpose application software
(2) System software
(3) General Purpose application software
(4) Only 1 & 2
(5) None of these

6. Disk defragmentation is done by-
(1) Application software (2) Utility software
(3) Customized software (4) Only 2 & 3
5) None of these

7. A public switched telephone network (PSTN) uses __ switching technique.
(1) Packet (2) Message
(3) Circuit (4) Transport
(5) None of these

8. An instruction cycle refers to :
(1) fetching an instruction
(2) clock speed
(3) fetching, decoding and executing an instruction
(4) Executing an instruction
(5) None of these

9. A hardware interrupt is:
(1) also called an internal interrupt
(2) also called an external interrupt
(3) an Input Output interrupt
(4) a clock interrupt
(5) None of these

10. __ is a piece of hardware that executes a set of machine language instructions.
(1) Controller (2) Bus
(3) Processor (4) Motherboard
(5) None of these

11. Which of the following lists memory types from highest to lowest access speed?
(1) Secondary storage, main memory, cache, registers
(2) Registers, cache, secondary storage, main memory
(3) registers, cache, main memory, secondary storage
(4) cache, registers, main memory, secondary storage
(5) None of these

12. A network that requires human interventions to route signals is
(1) bus network
(2) ring network
(3) star network
(4) T-switched network
(5) None of these

13. Which of the following is true?
(1) Plotters are not available for microcomputer systems
(2) Micro-computer are not programmed like conventional computers
(3) Mini-computers are task-oriented
(4) The contents of ROM are easily changed
(5) None of these

14. ROM is composed of
(1) Magnetic cores
(2) Micro-processors
(3) Photoelectric cells
(4) Floppy disks
(5) None of these

15. Consider the following statements about Internet facility:
I. It serves as the largest one-line information system.
II. It provides the most dependable and latest mode for sending E-mail.
III. Recurring expenditure on communication E-mail is very high.
IV. It is often misused and has triggered cyber-crimes.
Which of these statements are correct?
(1) I, II and IV (2) I and IV
(3) II, III and IV (4) II and III
(5) All are correct



The type of memory that uses in circuit writing to erase the content by applying electric field is ----
(1) PROM (2) Flash memory
(3) EAROM (4) EEPROM
(5) None of these


2. The secondary storage device that following the sequentional mode of access is
(1) Optical Disk (2) Hard Disk
(3) Magnetic Disk (4) Floppy disk
(5) None of these

3. FPI stand for -------
(1) Faults Per inch (2) Frames per inch
(3) Figure per inch (4) Film per inch
(5) Flash per inch

4. A sprit shape track formatting is present in -----
(1) Floppy Disk (2) Optical Disk
(3) Hard disk (4) Half inch Tape Cartridge
(5) Magnetic Disk

5. Hard Disk is a kind of -----
(1) Floppy Disk (2) Optical Disk
(3) Magnetic Disk (4) Temproary Memory
(5) None of these

6. The ---- data base can be a choice for the SFMS use ---
(1) Oracle (2) My SQL
(3) Both (1) & (2) (4) D Base
(5) None of these

7. In SFMS message are ------ with receiving node public key to protect confidentially of massage while in
transit.
(1) Shown (2) hided
(3) Encrypted (4) Decrypted
(5) None of these

8. Various kinds of user in SFMS are namely :
(1) Creator and verifier (2) Authorizer
(3) Super user (4) All of above
(5) None of these

9. In dial up remote access a client uses the ---- to create a physical connection to a part on a remote
access server of the private network.
(1) Public local network
(2) Public telephone network
(3) Banks branch network
(4) Private telephone network
(5) Private network

10. The expansion of CCA under the IT Act is -----
(1) Computer communication Authority
(2) Computer controlling Adjudication
(3) Controller of certifying Authority
(4) Controller of Certifying Act.
(5) None of these

Answers:
1 4 6 3
2 3 7 3
3 2 8 4
4 2 9 2
5 3 10 3


Read more: http://www.bankersadda.com/2013/07/computer-quiz_5.html#ixzz3EDKBxnLt
Database redesign is not terribly difficult if the database .
(1 ) Is structured (2 ) is well-designed
(3 ) has not data (4 ) is relatively small
(5 ) It relatively large
2. Which of following is not normally used to initialise a computer system s hardware?
(1 ) Bootstrap memory (2 ) volatile memory
(3 ) external mass memory (4 ) Static memory
(5 ) Random access memory
3. The use of spooler programs and .or --- hardware allows personal computer operator to do the
processing work at the same time when a printing operation is in progress.
(1 ) Registered mail (2 ) memory
(3 ) CPU (4 ) Buffer
(5 ) None of these
4. Which most popular input device is used for interactive processing and for one line entry of data for
batch processing ?
(1 ) Mouse (2 ) Magnetic disk
(3 ) Visual display (4 ) Card Punch
(5 ) None of these
5. User programmable that combine VDT hardware with built in microprocessor is /are called .
(1 ) Kips (2 ) PC
(3 ) Mainframe (4 ) Intelligent terminals
(5 ) None of these
6. The number of character that can be stored in a given physical space is called .
(1 ) Word length (2 ) Byte
(3 ) Data density (4 ) Field
(5 ) None of these
7. The storage of a disk system depends on the bits per of track per inch of .
(1 ) Cylinder (2 ) Hum
(3 ) Cluster (4 ) Surface
(5 ) None of these
8. Which of following is not a unit of measurement in a computer system?
(1 ) DPI (2 ) PPI
(3 ) API (4 ) BD
(5 ) Both 3 & 4
9. In window XP, which shortcut is used to cycle through
Opened item in taskbar ?
(1 ) Ctrl + Tab (2 ) Alt + Tab
(3 ) Ctrl + Esc (4 ) Alt + Esc
(5 ) None of these
10. A digital Computer computes the value of expression 2 * 5-2>2. Inside which of the following ?
(1 ) RAM (2 ) CPU chip
(3) Hard disk (4 ) Floppy disk
(5 ) MS-Excel


Answers
1 1 6 3
2 5 7 4
3 4 8 5

4 1 9 2
5 4 10 2


Read more: http://www.bankersadda.com/2013/01/computer-quiz_30.html#ixzz3EDKNriFi
1. Which one of the following allows user to continue to operate computer while printing in progress?
(1) Spooler (2) job control program
(3) Device manager (4) trackball
(5) None of these
2. A microprocessor is generally?
(1) Single Chip SSI (2) Single chip MSI
(3) Single chip LSI (4) Both 1 &2
(5) None of these
3. What is other name of Daisy wheel printer?
(1) Petal printer (2) Golf ball printer
(3) Laser printer (4) Line printer
(5) None of these
4. Optical memory is...............?
(1) Magnetic disk (2) floppy disk
(4) Pendrive (4) DVD
(5) None
5. Which command is used to open (open) dialogue box?
(1) F12 (2) Shift+F12
(3) Alt+F12 (4) Ctrl+F12
(5) none
6. A program that converts a HLL language program to a set of instructions that can run on a computer is
called a?
(1) Assembler (2) Compiler
(3) debugger (4) Editor
(5) none
7. The type of large printer that can most accurately produce images requiring precise, continuous lines is
a(n):
(1) plotter. (2) inkjet printer.
(3) laser printer. (4) dot-matrix printer.
8. The insert, caps lock, and num lock keys are all examples of ____________ keys.
(1) Control (2) Function
(3) Toggle (4) shortcut
(5) Modifier
9. Which of the following component displays the contents of active cell?
(1) Name box (2) Formula bar
(3) Menu bar (4) Status bar
(5) none
10. The process of identifying specific rows and columns so that so that certain columns
and rows are always visible on the screen is called:
(1) freezing (2) locking
(3) Selecting (4) fixing
(5) none

Answers:
1 1 6 2
2 3 7 1
3 1 8 3
4 4 9 2
5 4 10 1


Read more: http://www.bankersadda.com/2013/04/computer-quiz_9.html#ixzz3EDKWv9xZ
COMPUTER QUIZ
1. A network that is connected to the Internet, but uses encryption to scramble all the data
sent through the Internet is called?
(1) Hardware network (2) Social network
(3) LAN (4) Virtual private network
(5) None of these


2. The main advantage of magnetic disk compared to magnetic tape is
(1) low cost (2) rigidity
(3) direct access (4) high packet density
(5) sequential access

3. The memory card which is conceptually related to the smart card but is similar to the video
disk, is
(1) Master card (2) Visa card
(3) Optical card (4) Laser card
(5) Data card

4. process rearranges file fragments into contiguous files.
(1) folder folding (2)Defragmentation
(3) Unflagging (4) Disk scanning
(5) File filling

5. Recycle Bin enables you to restore a file which was deleted from:
(1) Drive B (2) Drive C
(3) Drive K (4) Drive L
(5) None of these

6. The collection of commands is called:
(1) file (2) Program
(3) information (4) data
(5) instruction

7. The processing capability of a microcomputer can be enhanced with the help of :
(1) secondary memory (2) additional processor
(3) expansion card (4) buffer memory
(5) None of these

8. .determines the appearance of your desktop and controls the performance of your
hardware.
(1) Windows Explore (2) Internet Explorer
(3) Program file (4) Control Panel
(5) System file

9. A stand 3.5 floppy disk can hold ----- of data .
(1) 1.44 GB (2) 1.44MB
(3) 1.44 KB (4) 1.44B
(5) All the above

10. Latest Entry Level Desktop PC have at least more than ------ of RAM.
(1) 100bit (2) 100Byte
(3) 100KB (4) 100 MB
(5) None of these


Answers:
1 4 6 2
2 3 7 3
3 4 8 4
4 2 9 2
5 2 10 4


Read more: http://www.bankersadda.com/2013/07/computer-quiz_16.html#ixzz3EDKpu7Jv

Computer Awareness
1. Software instruction intended to satisfy a user's specific processing needs are called:
1) System software
2) A microcomputer
3) Documentation
4) Applications software
5) All of the above


2. The __________ tells the computer how to use its components.
(1) utility 2) network
3) operating system 4) application program
5) None of these

3. The most important or powerful computer in a typical network.
1) desktop 2) network client
3) network server 4) network station
5) None of these

4. To access a mainframe or supercomputer, users often use a ___
1) terminal 2) node
3) desktop 4) handheld
5) None of these

5. Which of the following contains information about the structure of a database?
1) Database management system
2) Data dictionary
3) Data repository
4) Data warehouse
5) None of these

6. The rules of a language are called its __________.
1) structure 2) code
3) syntax 4) rigidity
5) None of these

7. JavaScript was developed by __________ to run inside of web pages.
1) Microsoft 2) Sun
3) Oracle 4) Netscape
5) None of these

8. A series of steps that always results in an answer is the definition of __________.
1) heuristic 2) flowchart
3) algorithm 4) pseudo code
5) None of these

9. To create a copy of files in the event of system failure, you create a __________.
1) restore file 2) backup
3) firewall 4) redundancy
5) None of these

10. If configured correctly, the __________ will prevent interaction with your computer after a
specified time period.
1) firewall 2) filter
3) screen saver 4) popup blocker
5) virus


Answers:
1 4 6 3
2 3 7 4
3 3 8 3
4 1 9 2
5 2 10 3


Read more: http://www.bankersadda.com/2013/09/computer-awareness.html#ixzz3EDL3ctOb

You might also like