Thursday, 10 December 2020

General Computer Test - 68

 

1. One advantage of dial-up Internet access is………….

(a)    it utilizes broadband technology

(b)    it is Indian

(c)     it uses a router for security

(d)    modem speeds are very fast

(e)    it utilizes existing telephone service

Ans : (e)

2. An error in a computer program……….

(a)    Crash

(b)    Power Failure

(c)     bug

(d)    Virus

(e)    Fatal error

Ans : (c)

3. Access control based on a person’s fingerprints is an example of………..

(a)    biometric  identification

(b)    characteristic  identification

(c)     characteristic security

(d)    fingerprint security

(e)    logistics

Ans : (a)

4. The patterns of printed lines on most products are called…………

(a)    prices

(b)    striping

(c)     scanners

(d)    OCR

(e)    barcodes

Ans : (e)

5. Most mail programs automatically complete the following two parts in an e-mail…………

(a)    From : and Body :

(b)    From : and Date :

(c)     From : and To :

(d)    From : and Subject :

(e)    None of these

Ans : (b)

6. The computer’s capability of distinguishing spoken words is called………….

(a)    voice analysis

(b)    speech acknowledgement

(c)     voice recognition

(d)    speech interpretation

(e)    vocalization

Ans : (e)

7. Which of the following is an advantage of mounting an application on the Web?

(a)    the possibility of 24-hour access for users

(b)    creating a system that can extend globally

(c)     standardizing the design of the interface

(d)    All of these

(e)    None of these

Ans : (d)

8. ERP is an acronym for…………..

(a)    Enterprise Retirement Planning

(b)    Enterprise Relationship Planning

(c)     Enterprise Resource Planning

(d)    Enterprise Reorder Planning

(e)    Enterprise Retention Planning

Ans : (c)

9. The software that allows users to surf the Internet is called a/an………..

(a)    Search engine

(b)    Internet Service Provider (ISP)

(c)     Multimedia application

(d)    Browser

(e)    Internet Surfing Provider

Ans : (d)

10. The issues that deal with the collection and use of data about individuals is………….

(a)    access

(b)    publicity

(c)     accuracy

(d)    property

(e)    privacy

Ans : (e)

11. A term relating to sending data to a satellite is……….

(a)    downlink

(b)    modulate

(c)     demodulate

(d)    uplink

(e)    interrelate

Ans : (d)

12. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current documents or to other documents with related information are called………….

(a)    hypermedia

(b)    hypertext

(c)     HTML

(d)    URL

(e)    FTP

Ans : (b)

13. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and……… security is concerned with protecting software from unauthorized tampering or damage.

(a)    data

(b)    cyber

(c)     Internet

(d)    metaphysical

(e)    publicity

Ans : (b)

14. Unauthorized copying, of software to be used for personal gain instead of for personal backups is called……….

(a)    program thievery

(b)    data snatching

(c)     software piracy

(d)    program looting

(e)    data looting

Ans : (c)

15. What is usually used for displaying information at public places?

(a)    Monitors

(b)    Overhead Projections

(c)     Monitors and Overhead Projections

(d)    Touch Screen Kiosks

(e)    Loud Speakers

Ans : (d)

 16. What is MP3?

(a)    A mouse

(b)    A Printer

(c)     A Sound format

(d)    A Scanner

(e)    A Mobile Phone

Ans : (c)

17. What is the most popular hardware for multimedia creations?

(a)    PCs

(b)    Minicomputers

(c)     Mainframe Computers

(d)    WANs

(e)    Supercomputers

Ans : (a)

18. For sound recording, what is necessary?

(a)    Speaker      

(b)    Microphone

(c)     Talker         

(d)    Mouse

(e)    Telephone

Ans : (b)

19. The…………..settings are automatic and standard.

(a)    default

(b)    CPU

(c)     peripheral

(d)    user friendly

(e)    defaulter

Ans : (a)

20. What are the two parts of an E-mail address?

(a)    User name and street address

(b)    Legal name and phone number

(c)     User name and domain name

(d)    Initials and password

(e)    User Name and Recipient Name

Ans : (c)

21. Participants can see and hear each other in a……….

(a)    electronic mail system

(b)    message system

(c)     teleconference

(d)    bulletin board

(e)    Video

Ans : (e)

22. Magnetic tape is not practical for applications where data must be quickly recalled because tape is………..

(a)    A random-access medium

(b)    Expensive

(c)     A read-only medium

(d)    Fragile and easily damaged

(e)    A sequential-access medium

Ans : (b)

23. How is it possible that both programs and data can be stored on the same floppy disk?

(a)    A floppy disk has two sides, one for data and one for programs.

(b)    A floppy disk has to be formatted for one or for the other

(c)     Programs and data are both software, and both can be stored on any memory device

(d)    Floppy disks can only store data, not programs

(e)    Floppy disks are better than CDs

Ans : (c)

24. Which of the following will you require to hear music on your computer?

(a)    Video Card

(b)    Tape Recorder

(c)     Mouse

(d)    Joystick

(e)    Sound Card

Ans : (e)

25. The signal that a computer is waiting for a command from the user………….

(a)    prompt

(b)    event

(c)     time slice

(d)    interrupt

(e)    None of these

Ans : (a)

No comments:

Post a Comment