Showing posts with label Computer Questions. Show all posts
Showing posts with label Computer Questions. Show all posts

Sunday 13 August 2017

Computer General Knowledge MCQ Questions and Answers


1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red (B) green (C) blue (D) black (Ans : A)

2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search (B) Cut (C) Document (D) Undo (Ans : D)

3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula (B) text (C) a name (D) a title (Ans : B)

4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing (B) Presentation graphics (C) Database Management Systems (D) Electronic Spreadsheet (Ans : C)

5. A ____________represent approximately one billion memory locations.
(A) kilobyte (B) megabyte (C) gigabyte (D) terabyte (Ans : C)

6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting (B) Merging (C) Embedding (D) Splitting (Ans : B)

7. The operating system is the most common type of____________software.
(A) communication (B) application (C) system (D) word-processing (Ans : C)

8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking (B) pointing (C) Double-clicking (D) Secondary-clicking (Ans : C)

9. The horizontal and vertical lines on a worksheet are called—
(A) cells (B) sheets (C) block lines (D) gridlines (Ans : D)

10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key (B) double-click the right mouse key
(C) press the BACKSPACE key (D) press the delete key (Ans : D)

11. The operating system does all of the following EXCEPT—
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing. (Ans : D)

12. During the boot process, the____________looks for the system files.
(A) CD B. BIOS C. CPU D. DVD (Ans : B)

13. ____________ are lists of commands that appear on the screen.
(A) GUIs (B) Icons (C) Menus (D) Windows (Ans : C)

14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking (B) Streamlining (C) Multiuser (D) Simulcasting (Ans : A)

15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an—
(A) action. (B) event. (C) interrupt. (D) activity. (Ans : C)

16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU (B) slice of time (C) stack (D) event (Ans : B)

17. The blocks of code, included in the operating system, that software applications interact with are known as—
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers. (D) bootstrap loaders. (Ans : A)

18. MS-DOS is a ____________ operating system.
(A) point-and-click (B) user-friendly (C) command-driven (D) Mac (Ans : C)

19. An interrupt handler is a(n)—
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device. (C) utility program.
(D) special numeric code that indicates the priority of a request. (Ans : D)

20. A spooler is a(n)—
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.(Ans : C)

21. Virtual memory is typically located—
(A) on a floppy disk. (B) in the CPU.
(C) in a flash card. (D) on the hard drive. (Ans : D)

22. The purpose of a swap (or page) file is to—
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously. (Ans : B)

23. The definition of thrashing is—
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry. (Ans : A)

24. All of the following are TRUE of Safe Mode EXCEPT—
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices. (Ans : B)

25. Verification of a login name and password is known as—
(A) configuration. (B) accessibility. (C) authentication. (D) logging in. (Ans : C)

26. The combination of the operating system and the processor is referred to as the computer’s—
(A) CPU. (B) platform. (C) BIOS. (D) CMOS. (Ans : B)

27. The following message generally means—
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device. (Ans : A)

28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system (Ans : B)

29. All of the following are steps involved in the boot process EXCEPT—
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs. (Ans : D)

30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS (B) API (C) device driver (D) supervisor program (Ans : A)

31. The basic input/output system (BIOS) is stored in—
(A) RAM. (B) ROM. (C) the CPU. (D) the hard drive. (Ans : B)

32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration (B) CMOS (C) POST (D) ROM (Ans : C)

33. The memory resident portion of the operating system is called the—
(A) registry. (B) API. (C) CMOS. (D) kernel. (Ans : D)

34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly. (Ans : A)

35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive. (Ans : A)

36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files. (B) folders. (D) drives. (D) systems. (Ans : D)

37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows. (Ans : A)

38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders. (Ans : C)

39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file. (Ans : B)

40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List (B) Thumbnails (C) Details (D) Icon
(Ans : C)

Sunday 6 August 2017

Computer Questions


Q1. Choose the odd one out:
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
(e) Cross-site Scripting

S1. Ans.(b)
Sol. Except Virtual Reality all other are obvious security threats to computers and data.

Q2. The type of threats on the security of a computer system or network are ……………………..
i) Interruption   ii) Interception     iii) Modification
iv) Creation       v) Fabrication 
(a) i, ii, iii and iv only
(b) ii, iii, iv and v only
(c) i, ii, iii and v only
(d) iii, iv and v only
(e) All i, ii, iii, iv and v

S2. Ans.(c)
Sol. Except Creation all other actions performed by unauthorised and suspicious person.

Q3. State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
(a) True, False, True
(b) False, True, True
(c) True, True, False
(d) False, False, False
(e) True, True, True

S3. Ans.(c)
Sol. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.

Q4. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these

S4. Ans.(b)
Sol. Except option (b) all others are the symptoms of a computer virus.

Q5. VIRUS stands for___________.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these

S5. Ans.(a)
Sol. VIRUS stands for Vital Information Resources Under Siege

Q6. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these

S6. Ans.(c)
Sol. A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)

Q7. The first Computer Virus is:
(a) Creeper
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these

S7. Ans.(a)
Sol. Creeper virus is a computer virus that is most commonly recognized as the first computer virus.

Q8. Which of the following statements is incorrect about the UNIQUE KEY constraint?
(a) Unique key columns do not accept duplicate values.
(b) One table can have only one unique key.
(c) By default, unique key columns accept null values unless the NOT NULL constraint is specified.
(d) The same combinations of columns should not make both unique and primary keys.
(e) None of these

S8. Ans.(b)
Sol. Since one table can have at the most one primary key to avoid duplicates in other columns of the table, unique key can be defined. We can make one or more unique keys in a single table.

Q9. Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
(a) <H1>
(b) <H2>
(c) <H3>
(d) <H4>
(e) <H5>

S9. Ans.(d)
Sol. The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text. Text written within the H5 and H6 elements has smaller size than the normal text.

Q10. Which of the following HTML tags is a logical style tag?
(a) <B>
(b) <I>
(c) <SMALL>
(d) <ABBR>
(e) None of these

S10. Ans.(d)
Sol. In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The <ABBR> is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.

Q11. What does DDoS stand for?
(a) Data Denial-of-Service
(b) Distributed Denial-of-Service
(c) Distributed Data of Server
(d) Distribution of Data Service
(e) None of these

S11. Ans.(b)
Sol. Distributed Denial-of-Service (DDoS) attack is a type of attack that is carried out by using multiple computers. These DDoS attacks aim at targeting computer networks of an organisation, such as Digital Subscriber Line (DSL) and cable.

Q12. Which of the following statements is incorrect about a message-switched network?
(a) It reduces traffic congestion.
(b) It allows prioritizing of messages.
(c) It allows broadcasting of messages.
(d) It is an inexpensive network.
(e) It is not compatible with videoconferencing.

S12. Ans.(d)
Sol. In a message-switched network, a packet containing the entire message is transmitted over the network. It is a more expensive network.

Q13. Which of the following statements is false in the context of client/server network?
(a) It is expensive to set up.
(b) It requires a specialized server.
(c) It is a slow network.
(d) It is highly secure.
(e) It is a congested network.

S13. Ans.(c)
Sol. The client/server network contains a centralised server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system. It is highly secure and processes good speed. However, it becomes congested when more clients simultaneously request for a service to the server.

Q14. A pathway inside a computer that carries data between hardware components is called _____________.
(a) carrier signal
(b) data bus
(c) digital signal
(d) analog signal
(e) switching

S14. Ans.(b)
Sol. A data bus connects internal components to the motherboard and acts as a carrier for the data.

Q15. Which of the following is related to simplex communication?
(a) Single wire and two-sided communication
(b) Television
(c) Two-wire communication
(d) Walkie-talkie
(e) None of these

S15. Ans.(b)
Sol. Television is an example of simplex communication.