Thursday, 10 December 2020

General Computer Test - 80


1. Computers process data into information by working exclusively with :

(a)    multimedia

(b)    words

(c)     characters

(d)    numbers

(e)    None of these

Ans : (d)

2. The difference between people with access to computers and the Internet and those without this access is known as the :

(a)    digital divide

(b)    Internet divide

(c)     Web divide

(d)    broadband divide

(e)    None of these

Ans : (a)

3. The ability to recover and read deleted or damaged files from a criminal deleted computer is an example of a law enforcement specialty called :

(a)    robotics

(b)    simulation

(c)     computer forensic

(d)    animation

(e)    None of these

Ans : (c)

4. Where does most data go first with in a computer memory hierarchy?

(a)    RAM

(b)    ROM

(c)     BIOS

(d)    CACHE

(e)    None of these

Ans : (a)

5. Which command divides the surface of the blank disk into sectors and assign a unique address to each one

(a)    Ver

(b)    Format

(c)     Fat

(d)    Chkdsk

(e)    None of these

Ans : (b)

6. If you need to duplicate the entire disk, which command will you use?

(a)    Copy

(b)    Diskcopy

(c)     Chkdsk

(d)    Format

(e)    None of these

Ans : (b)

7. A………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a)    system virus

(b)    Trojan horse virus

(c)     file virus

(d)    macro virus

(e)    None of these

Ans : (e)

8. A result of a computer virus can not lead to………

(a)    Disk Crash

(b)    Mother Board Crash

(c)     Corruption of program

(d)    Deletion of files

(e)    None of these

Ans : (b)

9. Every computer connected to an intranet or extranet must have a distinct………..

(a)    firewall

(b)    proxy server

(c)     IP address

(d)    domain name

(e)    None of these

Ans : (b)

10. Programming language built into user programs such as Word and Excel are known as……………

(a)    4GLs

(b)    macro languages

(c)     object-oriented languages

(d)    visual programming languages

(e)    None of these

Ans : (d)

11. Firewalls are used to protect against………..

(a)    Unauthorized Attacks

(b)    Virus Attacks

(c)     Data Driven Attacks

(d)    Fire Attacks

(e)    All of these

Ans : (a)

12. Which of the following extensions suggest that the file is a backup copy

(a)    Bak

(b)    Bas

(c)     Com            

(d)    Txt

(e)    one of these

Ans : (a)

13.Computer programs are written in a high- level programming language; however, the human-readable version of a program is called…………..

(a)    cache

(b)    instruction set

(c)     source code             

(d)    word size

(e)    None of these

Ans : (c)

14.The software tools that enable a user to interact with a computer for specific purposes are known as………….

(a)    Hardware

(b)    Networked Software

(c)     Shareware

(d)    Applications

(e)    None of these

Ans : (d)

15. ……….processing is used when a large mail-order company accumulates orders and processes them together in one large set.

(a)    Batch

(b)    Online

(c)     Real-time

(d)    Group

(e)    None of these

Ans : (a)

16.When a file contains instructions that can be carried out by the computer, it is often called a(n) file.

(a)    data

(b)    information

(c)     executable

(d)    application

(e)    None of these

Ans : (c)

17. A compiler translates a program written in a high-level language into…………

(a)    Machine language

(b)    An algorithm

(c)     A debugged program

(d)    Java

(e)    None of these

Ans : (a)

18. A set of step-by-step procedures for accomplishing a task is known as a(n)……….

(a) algorithm

(b) hardware program

(c) software bug

(d) firmware program

(e) None of these

Ans : (a)

19. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)…………

(a)    Workstation

(b)    CPU

(c)     Magnetic disk

(d)    Integrated circuit

(e)    None of these

Ans : (d)

20. A saved document is referred to as a ………….

(a)    file

(b)    word

(c)     folde

(d)    project

(e)    None of these

Ans : (a)

21. What is output?

(a)    What the processor takes from the user

(b)    What the user gives to the processor

(c)     What the processor gets from the user

(d)    What the processor gives to the user

(e)    None of these

Ans : (d)

22. When you turn on the computer, the boot routine will perform this test…………

(a)    RAM test

(b)    Disk drive test

(c)     Memory test

(d)    Power-on self-test

(e)    None of these

Ans : (b)

23. Which of the following storage media provides sequential access only?

(a)    Floppy disk

(b)    Magnetic disk

(c)     Magnetic tape

(d)    Optical disk

(e)    None of these

Ans : (a)

24. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is

(a)    copy and paste

(b)    copy, cut and paste

(c)     cut, copy and paste

(d)    cut and paste

(e)    None of these

Ans : (d)

25. The term ‘user interface’ refers to………..

(a)    What the user sees on the screen and how they can interact with it

(b)    How the operating system responds to user commands

(c)     the means by which the user interacts with the peripheral devices on the computer

(d)    The monitor that is available for the computer

(e)    None of these

Ans : (a)

General Computer Test - 79

 

1. Which one of the following is NOT a computer language?

(a) MS-Excel

(b) BASIC

(c) COBOL

(d) C + +

(e) None of these

Ans : (a)

2. Each memory cell has a unique number, assigned to it is called as the             of the cell

(a)    Address      

(b)    Register

(c)     Number

(d)    Path

(e)    None of these

Ans : (a)

3. The server on the internet is also known as :

(a)    Repeater

(b)    Host

(c)     Gateway

(d)    AND Gate

(e)    None of these

Ans : (b)

4. Website is a collection of :

(a)    HTML documents

(b)    Graphic files

(c)     Audio and video files

(d)    All of these

(e)    None of these

Ans : (d)

5. ……….is a method in which multiple communication devices are connected to one another efficiently.

(a)    Switching

(b)    Redundancy

(c)     Capacity

(d)    Detecting

(e)    None of these

Ans : (a)

6. One computer that is not considered a portable computer is………..

(a)    Mini computer

(b)    A Laptop

(c)     Micro computer

(d)    All of these

(e)    None of these

Ans : (a)

7. The sharing of a medium and its path by 2 or more devices is called……….

(a)    Modulation

(b)    Encoding

(c)     Line discipline

(d)    Multiplexing

(e)    None of these

Ans : (d)

8. Device drivers are :

(a)    tine power cords for external storage devices

(b)    experts who know to maximise the performance of device

(c)     small, special purpose programs

(d)    the innermost part of the operating system

(e)    substitutes for operating systems

Ans : (c)

9. Array is………….

(a)    linear data structure

(b)    non-linear data structure

(c)     complex data structure

(d)    simple data structure

(e)    None of these

Ans : (c)

10. A stored link to a webpage, in order to have a quick and easy access to it later, is called :

(a)    Bookmark

(b)    WP-link

(c)     Favourites

(d)    Both (a) and (c)

(e)    None of these

Ans : (d)

11. Which input device cannot be used to work in MS Office?

(a)    Scanner

(b)    Mouse

(c)     Keyboard

(d)    Joy stick

(e)    Lightpen

Ans : (d)

12. ………….is an animated character that gives help in MS Office?

(a)    Office worker

(b)    Comic assistant

(c)     Office assistant

(d)    All of these

(e)    None of these

Ans : (c)

13. RAM is also called as

(a)    Read/Write Memory

(b)    Long Memory

(c)     Permanent Memory

(d)    Primary Memory

(e)    None of these

Ans : (a)

14. ……….Store data or information temporarily and pass it on as directed by the control unit

(a)    Address

(b)    Register

(c)     Number

(d)    Memory

(e)    None of these

Ans : (b)

15. Select the Odd one

(a)    Operating System

(b)    Interpreter

(c)     Compiler

(d)    Assembler

(e)    None of these

Ans : (a)

16. A is an additional set of commands that the computer displays after you make a selection from the main menu.

(a)    dialog box

(b)    submenu

(c)     menu selection

(d)    All of these

(e)    None of these

Ans : (a)

17. COBOL is an acronym for…………

(a)    Common Business Oriented Language

(b)    Computer Business Oriented Language

(c)     Common Business Operated Language

(d)    Common Business Organized Language

(e)    None of these          

Ans : (a)

18. All of the following are examples of real security and privacy risks EXCEPT :

(a)    hackers

(b)    spam

(c)     viruses

(d)    identify theft

(e)    None of these

Ans : (b)

19.  Which of the following is NOT one of the four major data processing functions of a computer?

(a)    gathering data

(b)    processing data into information

(c)     analyzing the data or information

(d)    storing the data or information

(e)    None of these

Ans : (c)

20. All of the following are examples of storage devices EXCEPT :

(a)    hard disk drives

(b)    printers

(c)     floppy disk drives

(d)    CD drives

(e)    Pen drives

Ans : (b)

21. The CPU and memory are located on the :

(a)    expansion board

(b)    motherboard

(c)     storage device

(d)    output device

(e)    display board

Ans : (b)

22. ……….is the science that attempts to produce machines that display the same type of intelligence that humans do.

(a)    Nanoscience

(b)    Nanotechnology

(c)     Simulation

(d)    Artificial intelligence (AI)

(e)    None of these

Ans : (d)

23. Servers are computers that provide resources to other computers connected to a :

(a)    network

(b)    mainframe

(c)     supercomputer

(d)    client

(e)    internet

Ans : (a)

24. When creating a computer program, the …………designs the structure of the program

(a)    End user

(b)    System Analyst

(c)     Programmer

(d)    All of these

(e)    None of these

Ans : (b)

25. A computer program that converts an entire program into machine language at one time is called a/an

(a)    interpreter

(b)    simulator

(c)     compiler

(d)    commander

(e)    None of these

Ans : (c)