COMPUTER

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Ans : B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Ans : C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Ans : A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Ans : D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Ans : D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Ans : A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Ans : A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Ans : D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Ans : A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Ans : C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Ans : D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Ans : A
........................................................................................................................
1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
Ans (a) 
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
Ans (b) 
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
Ans (a) 
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL 
Ans (a) 
6. What are the two basic types of memory that your computer uses?
a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM 
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes 
Ans (c) 
8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer 
Ans (a) 
9. What digits are representative of all binary numbers?
(a) 0
(b) 1
(c) Both (a ) and (b)
(d) 3
Ans (c) 
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch 
Ans (d) 
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit 
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer 
Ans (d) 
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor 
14. The 'IC' chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
Ans (d) 
15. Name the first general purpose electronic computer
Ans : UNIVAC 
16. The size of commonly used Floppy disk is
(a) 4.5”
(b) 3.5”
(c) 3.25”
(d) 5.5”
Ans (b) 
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c) 
19. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a) 
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c) 
21.Which one of the following is not a broadband communication medium
(a) Microwave
(b) Fibre optic cable
(c) Twisted pair
(d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable
(b) Satellite
(c) Modem
(d) Optical fibre
Ans (c) 
23. Which one of the following is not an application software package
(a) Redhat Linux
(b) Microsoft Office
(c) Adobe PageMaker
(d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage 
25.The function of key F4 is
Ans : To repeat the last action 
26.The function of key F4 is
Ans : To repeat the last action 
27. The 0 and 1 in the binary numbering system are called binary digits or .......
(a) bytes
(b) kilobytes
(c) decimal bytes
(d) bits 
Ans (D) 
28. A monitor's ...... is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate
(b) dot pitch
(c) resolution
(d) colour depth 
Ans (B) 
29. A directly accessible appointment calendar is a feature of a ....... resident package.
(a) CPU
(b) memory
(c) Buffer
(d) ALU 
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape
(b) Magnetic tape
(c) Punched paper tape
(d) Card punch 
Ans (A) 
31. The invention of the slide rule is attributed to
(a) Babbage
(b) Oughtred
(c) Pascal
(d) Napier 
Ans (B) 
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
Ans (e) 
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes
(b) Kilo-bytes
(c) Bits
(d) Megabytes 
Ans (d)
34. A prefix for billion which is equal to .... is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10 
Ans (d) 
35. Each model of a computer has a unique
(a) Assembly language
(b) Machine language
(c) High level language
(d) All of the above
Ans (b) 
36. One kilobyte = ____ byte.
(a) 1250
(b) 2088
(c) 1024
(d) 1000
Ans (c) 
37. Which of the following circuit is used as a 'Memory device' in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
Ans (b) 
38. To move the cursor to the end of the document press
Ans : Ctrl + End 
39. In Word Processing the red underline indicates
Ans : Spelling mistakes 
40. The shortcut key to print documents is
Ans : Ctrl + P 
41. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
Ans (c) 
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a) 
43. Program threats are
(a) Trap doors
(b) Trojan horse
(c) Both (a) & (b)
(d) All of the above
Ans (b) 
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both (a) & (b)
(d) All of the above
Ans (c) 
45. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
Ans (b) 
46. The bar which displays information about the current page number is
Ans : Status bar 
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth
(b) J.R Whinfield
(c) J.H. Van Tassell
(d) Charles Ginsberg
Ans (c) 
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
(e) None of the above
Ans (c) 
50. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
(d) Down time 
Ans (c)
........................................................................................................................
1 Collecting personal information and effectively posing as another individual is known as the crime of:
 spooling.  identity theft.  spoofing.  hacking. 

2 Malicious software is known as:
 badware.  malware.  maliciousware.  illegalware.

3. The typical computer criminal is a(n):
 young hacker.  trusted employee with no criminal record. trusted employee with a long, but unknown criminal record. overseas young crack

4. The majority of computer crimes are committed by:
 hackers.  insiders.  overseas criminals.  young teenage computer geniuses. 

5. The common name for the crime of stealing passwords is:
 spooling.  identity theft.  spoofing.  hacking. 

6. Collecting personal information and effectively posing as another individual is known as the crime of:
 spooling.  identity theft.  spoofing. 
 hacking. 

7. Malicious software is known as:
 badware.  malware.  maliciousware.  illegalware. 

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
 worm.  Trojan horse.  virus.  macro virus. 

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
 Trojan horse.  virus.  time bomb.  time-related bomb sequence. 

10. In 1999, the Melissa virus was a widely publicized:
 e-mail virus.  macro virus.  Trojan horse.  Time bomb. 

11. What type of virus uses computer hosts to reproduce itself?
 Time bomb  Worm  Melissa virus  Macro virus 

12. The thing that eventually terminates a worm virus is a lack of:
 memory or disk space.  time.  CD drive space.  CD-RW. 

13. When a logic bomb is activated by a time-related event, it is known as a:
 time-related bomb sequence.  virus.  time bomb.  Trojan horse. 

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
 time-related bomb sequence.  virus.  time bomb.  Trojan horse. 

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
 A virus  Spybot  Logic bomb  Security patch 

ą
nitin todkar,
Sep 16, 2011, 10:10 PM
ą
nitin todkar,
Sep 16, 2011, 10:06 PM
ą
nitin todkar,
Sep 16, 2011, 10:04 PM
Comments