Which of these application packages is mostly used by computer users?
Answer
(D)
Ms Word
3
The function of an assembler is to _________
Answer
(C)
convert assembly language to machine language
4
A computer can't boot if it does not have ____________
Answer
(C)
OS
5
Fire fox is an example of __________
Answer
(C)
Application software
6
The Caps key on a keyboard is used to___________
Answer
(C)
Switch between upper and lower case letters
7
Which key deletes text?
Answer
(C)
backspace key
8
From where can the name of a user account be changed?
Answer
(D)
Control panel
9
For what does WAN stand?
Answer
(B)
Wide area network
10
The acronym IP address has its full meaning to be _________
Answer
(A)
Internet protocol
11
Which doesn't belong to the group?
Answer
(C)
External memory
12
Storage which retains data after power cut off is called.
Answer
(B)
Non-volatile storage
13
An inventory management program can assist with ________
Answer
(D)
all of the above
14
In any software package, which of the following versions represents a major improvement on the previous version?
Answer
(C)
2.0
15
Encryption helps with what?
Answer
(C)
Safe delivery of messages to destination without being accessed by a third party
16
CRACKING comes under ___________
Answer
(C)
computer crime
17
In the files, if order of operation on two or more files are similar, then operation will be
Answer
(C)
sequential
18
What is a computer file.
Answer
(C)
A place on a computer where information is stored in a package
19
When does the output of a NAND gate =1?
Answer
(A)
whenever a 0 is present at an input
20
A 2-input gate that can be used to pass a digital waveform unchanged at certain times and inverted at other times is ___________
Answer
(D)
XOR gate
21
The end users are able to operate at the _______ tier.
Answer
(D)
presentation
22
A tier in which the database resides along with the query processing language is called
Answer
(B)
data tier
23
Java is a ______ language
Answer
(A)
High level
24
How many different values can a bit have?
Answer
(A)
2
25
The binary system has the radix of ________
Answer
(C)
2
26
Which of the following is termed as the minimum error code?
Answer
(B)
gray code
27
The set of rules that defines the combination of symbols that are considered to be correctly structured statements or expressions in that language is called _________
Answer
(A)
Syntax
28
What controls the way in which the computer system function and provides a means by which users can interact with the computer.
Answer
(C)
Operating system
29
A light sensitive device that converts drawing, printed text or other images into digital form is
Answer
(C)
Scanner
30
The device primarily used to provide hardcopy is the?
Answer
(A)
printer
31
The joystick typically have a button on _________ used to select the option pointed by the cursor.
Answer
(D)
top
32
Which of the following is a computer not used for?
Answer
(D)
none of the above
33
The combination of the arithmetic and logic units, as well as the ______________ unit makes up the central processing unit.
Answer
(C)
control
34
How are the stages of SDLC implemented?
Answer
(B)
sequentially, without overlapping
35
__________________ is the conversion of computer data from one format to another.
Answer
(A)
data conversion
36
The delete permission allows one to ____________
Answer
(B)
delete or remove files and directories
37
Which of the following is not a model used in problem solving?
Answer
(C)
waterfall
38
The explorer bar is divided into _________ categories.
Answer
(B)
3
39
System software has which major function?
Answer
(C)
controlling the computer system
40
Which among the following generation computers had expensive operation cost?
Answer
(A)
First
41
What tells the computer how to use its components?
Answer
(C)
operating system
42
What does CO stand for in COBOL?
Answer
(B)
common
43
What does a linker program do?
Answer
(C)
Links the program with other programs needed for its execution
44
In which situation does running application remain active?
Answer
(B)
when user is switched
45
Internet explorer is used for
Answer
(D)
viewing Web pages
46
What does LAN stand for?
Answer
(D)
Local area network
47
The Internet is an example of which computer network?
Answer
(D)
WAN
48
A permanent memory, which has data and instruction to start up the computer and does not erase data after power off.
Answer
(D)
ROM
49
A display listing of program options which users can select is called?
Answer
(D)
menu
50
The illegal access to a network or computer system is___________
Answer
(B)
cracking
51
Which term describes accessing files from a computer other than the one where the files are stored.
Answer
(C)
cloud access
52
The windows explorer is divided into _________ categories.
Answer
(A)
2
53
What is the primary purpose of Microsoft Excel?
Answer
(C)
To solve problems involving numbers
54
In Microsoft Excel, sheet tabs can be renamed by ______
Answer
(C)
Double-clicking on the sheet tab; entering the new name
55
What is the shortcut key to "undo" last action on a Microsoft word page?
Answer
(D)
Ctrl + Z
56
________ is the process of dividing the disk into tracks and sectors
Answer
(B)
Formatting
57
The process of feeding instructions into the computer system is called
Answer
(C)
Inputting
58
To determine if a computer has the ability to think, a test was conducted named as
Answer
(A)
Turing test
59
Which is not a network for distribution of information?
Answer
(C)
Microsoft Word
60
What is the full form of TCP?
Answer
(A)
Transmission Control Protocol
61
What is the full form of UDP?
Answer
(C)
User Datagram Protocol
62
What does RAM and ROM have in common?
Answer
(A)
They both deal with memory
63
What is the permanent memory built into your computer called?
Answer
(B)
ROM
64
What does an Operating System do?
Answer
(D)
All of the above
65
An Operating System is a type of?
Answer
(B)
System software
66
What is the etiquette one should follow while working online?
Answer
(C)
Netiquette
67
___________ is when someone steals another persons identity.
Answer
(B)
Identity Theft
68
Destruction of files for malicious reasons such as access by fraudulent people is classified as being
Answer
(D)
unauthorized access
69
When an input signal 1 is applied to a NOT gate, the output is ..................
Answer
(A)
0
70
In Boolean algebra, the bar sign (-) indicates ....................
Answer
(C)
NOT operation
71
In SQL, which command is used to remove a stored function from the database?
Answer
(C)
DROP function
72
.......... provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data
Answer
(B)
DBMS
73
Programming language COBOL works best for use in
Answer
(D)
commercial application
74
Hexadecimal numbers are a mixture of
Answer
(C)
Letters and decimal digits
75
What is considered the brain of the computer?
Answer
(A)
Central Processing Unit
76
The actual physical network of wires, cables and satellite that connects computers and resources throughout the world is the _______________
Answer
(B)
Internet
77
CPU stands for ________________.
Answer
(D)
Central Processing Unit
78
Which can be the input and output devices both?
Answer
(B)
Touch screen monitor
79
Computer Monitor is also known as
Answer
(C)
VDU
80
Types of software programs are
Answer
(D)
both A and B
81
Typically, an ATM is used for
Answer
(D)
withdrawing cash
82
What is the full form of CU?
Answer
(D)
Control unit
83
The rules that govern the structure of a command or programming language is called
Answer
(A)
Syntax
84
In general, a file is basically a collection of all related______.
Answer
(D)
Records
85
Files that maintain the hierarchical structure of the file system.
Answer
(B)
Directories
86
Another word for booting is
Answer
(A)
starting
87
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
Answer
(A)
protection
88
Total types of data that can be read by document reader are
Answer
(D)
all of the above
89
The super computers are mainly used for
Answer
(D)
Mathematical intensive scientific applications
90
Which of the listed is not a type of computer application?
Answer
(C)
Joy stick
91
Firefox is an example of __________
Answer
(C)
Application software
92
Microsoft word serves the purpose of ________
Answer
(B)
Creating documents
93
Computer applications are example of ___________
Answer
(D)
Software
94
Computer softwares like ios, Ubuntu, Chrome OS, are classified as ___________
Answer
(B)
System software
95
Which part of a laptop serves the same function as a mouse?
Answer
(C)
Touchpad
96
The arrow displayed on the screen of a computer is called
Answer
(C)
Cursor
97
The most basic network is _________
Answer
(C)
PAN
98
The Domain name of a website is also its__________
Answer
(A)
IP address
99
The memory unit receives data and information from which unit?
Answer
(D)
arithmetic and logic unit
100
Computer software can be classified into how many parts?
Answer
(C)
2
101
Which of the following is an example of software
Answer
(C)
Operating systems
102
What is the function of firewall?
Answer
(B)
Cyber security
103
Numerous files are referred to as _____________
Answer
(B)
Folder
104
Computer files can be characterised by all but,
Answer
(D)
Where it is stored
105
A logic circuit performs ________ functions
Answer
(B)
Processing and Controlling
106
Which of the following is not a type of logic gate
Answer
(D)
DOR
107
The acronym from DATABASE MANAGEMENT SYSTEM is ________________
Answer
(B)
DBMS
108
The major function of a Database management system is _______________
Answer
(C)
Manipulation of data in a data base
109
What is debugging?
Answer
(D)
finding and removing errors from a program
110
What type of errors occurs when the program is asked to implement an impossible task such as dividing a number by zero?
Answer
(B)
Runtime error
111
Which number base system is used by low level languages
Answer
(B)
Binary
112
Why is the base 10 system unique?
Answer
(A)
There are only 10 fingers to every human
113
Which program translates programs to a simpler language that the computer can execute.
Answer
(A)
Compiler
114
What is a website main page called?
Answer
(A)
Home page
115
The first commuters were programed using _________
Answer
(B)
Machine language
116
Which computer accessory is both an input and output device?
Answer
(C)
Network cards
117
Which doesn't belong to the group?
Answer
(D)
Memory unit
118
Computers are used majorly at offices for ____________
Answer
(C)
Storage purpose
119
Which part of a processor contains the hard ware necessary to perform all the operations required by a computer?
Answer
(A)
Data path
120
Which of the following is not a stage of system development cycle?
Answer
(D)
Observation
121
Which process is used by large retailers to study trends?
Answer
(A)
Data mining
122
Which of the following is not a method of filing
Answer
(D)
Geographical
123
Which of the following isn't used to navigate in a computer?
Answer
(D)
Scanner
124
How many types of booting are there?
Answer
(C)
2
125
System software can further be classified into two. Operating software and ______________ software
Answer
(A)
Utility
126
Which of the following system software resides in the main memory always?
Answer
(D)
Loader
127
Applications on a screen are displayed by __________
Answer
(B)
icon
128
Word processor, spreadsheets, database, graphics and presentation software are all examples of?
Answer
(A)
application packages
129
Microsoft PowerPoint is a ________________ application
Answer
(A)
presentation software
130
Which of the following is an example of output device
Answer
(C)
speaker
131
At least how many keys is a keyboard made up of?
Answer
(C)
101
132
Which type of network is usually contained inside one office building?
Answer
(B)
LAN
133
Which type of network can span several building, but is usually less than 30 square miles big?
Answer
(C)
MAN
134
Which of the following is not a type of computer network?
Answer
(D)
DAN
135
Which of the memories must be refreshed many times per second?
Answer
(D)
Dynamic RAM
136
A half byte is known as ________.
Answer
(D)
nibble
137
Which of the following software can't be categorized as an application software?
Answer
(B)
MS-DOS
138
Running other software on idle computer without the knowledge of the organisation is called theft of ___________
Answer
(C)
computer time
139
Sensitive data can be protected from prying eyes using _________
Answer
(A)
File permissions
140
The number of input combination for a 4 input gate is ______
Answer
(D)
16
141
When does the output of a NOR gate =0?
Answer
(C)
whenever 1 is present at input
142
A collection of facts and figures is known to be _________
Answer
(A)
Data
143
The logical structure of the database can be depicted through its ______
Answer
(B)
Data model
144
The java interpreter translates a java program from ____________ to machine language.
Answer
(C)
byte code
145
___________________ is a program meant to be sent from one computer to another across the world wide Web.
Answer
(A)
Applet
146
The hexadecimal digits are 0-9 and A-_____
Answer
(B)
F
147
Binary coded decimals (BCD) numbers express each digit as a ___________
Answer
(B)
nibble
148
Which of these is not a programming language
Answer
(D)
ios
149
___________ booting is done by turning on the computer at first instance.
Answer
(C)
cold
150
What differs a system software from application software?
Answer
(D)
unique programs installed by the creators to help run the computer
151
___________ is the combination of already processed _____________
Answer
(A)
information /data
152
What is the major purpose of application software?
Answer
(B)
utilities
153
What kind of data is processed by an analog computer?
Answer
(D)
Continuously varying data
154
Computers that are portable and convenient for users who travel are known as _________________