19/02/2016

advertisement
COMPUTER KNOWLEDGE
1. The software component of an expert system that draws conclusions is the _________
1) user interface 2) database
3) inference engine 4) I/O controller
5) model base
2. An E-R diagram is a graphic method of presenting__________
1) primary keys and their relationships 2) primary keys and their relationships to instances
3) entity classes and their relationships 4) entity classes and their relationships to primary keys
5) None of these
3. Where are cookies stored?
1) On the server 2) In web.xml
4.
1)
2)
3)
4)
3) On the client machine
4) In HTML 5) None of these
In Oracle, which statement is true about segments?
Each table has its own segment.
A segment is created every time an extent is created, extended, or altered.
An index segment is created every time a table is created.
A segment is deleted whenever a table is truncated.
5) None of these
5. The term "hypertext" means_________
1) Non-sequential writing
2) Hypermedia
5) None of these
4) Text with heavy formatting
3) Blinking text
6. A __________ is an organized collection of data about a single entity.
1) file
2) library
3) database
4) dictionary
5) None of these
7. Something which has easily-understood instructions is said to be _________
1) user-friendly
2) information
3) word processing
4) icon
5) None of these
8. The standard protocol of the Internet is_______
1) TCP/IP
2) Java
3) HTML
4) Flash
5) None of these
9. When you install a new program on your computer, it is typically added to the menu.
1) All Programs
2) Select Programs
3) Start Programs
4) Desktop Programs
5) None of these
10. Which of the following is a key function of a firewall?
1) Monitoring
2) Deleting
3) Copying
4) Moving
5) None of these
11. What is full form of HTML?
1) High Transfer Machine Language
2) High Transmission Markup Language
3) Hypertext M arkup Language
4) Hypermedia Markup Language
5) None of these
12. Computers connected to a LAN can ________
1) run faster
2) share information and/or share peripheral equipment
3) e-mail
4) go online
5) None of these
13. To send another station a message, the main thing a user has to know is _______
1) how the network work
2) the other station’s address
3) whether the network is
packet-switched or circuit-switched
4)whether this is a voice or data network
5) None of these
14. In a client/server model, a client program _________
1) asks for information
2) provides information and files
3) serves software files to other computers
4) distributes data files to other computers
5) None of these
15. Storing same data in many places is called_________
1) iteration
2) concurrency
3) redundancy
4) enumeration
5) None of these
16. Computers manipulate data in many ways, and this manipulation is called________
1) utilizing
2) batching
3) upgrading
4) processing
5) None of these
17. Software applies_______ , also cal led algorithms, to process data.
1) arithmetic
2) procedures
3) objects
4) rules
5) None of these
18. The desktop contains small graphics called ________
1) windows
2) logos
3) icons
4) pictures
5) None of these
19. The human-readable version of a program is called ________
1) source code 2) program code
3) human code
4) system code
5) None of these
20. A CD-ROM disk ________
1) cannot be erased and rewritten
3) holds less data than a floppy disk
2) has more storage capacity than a CD
4) can be written to only once 5) None of the above
21. If a new device is attached to a computer, such as a printer or scanner, its must be installed
before the device can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these
22. The main folder on a storage device is called________
1) Platform
2) Interface
3) Root Directory
4) Home Page
5) None of these
23. The software that allows users to surf the Internet is called a/an ________
1) Search engine
2) Internet Service Provider (ISP)
3) Multimedia application
5) None of these
4) Browser
24. A storage device found inside the computer.
1) CD-ROM
2) Zip Disk
3) Super Disk
4) Hard Disk
25. Which of these keys is not on the number keypad?
1) Ctrl
2) Del
3) Enter
4) Num Lock
26. What is CPU is an abbreviation for _______
1) Central Programming Unit
2) Central Processing Unit
4) Computer Protocol Unit
5) Central Protocol Unit
5) None of the above
5) None of the above
3) Computer Processing Unit
27. A microprocessor is the brain of the computer and is also called a ________
1) microchip
2) macrochip
3) macroprocessor
4) calculator
5) software
28. When we run a program in HTML coding,______ is used as back-end and works as front-end.
1) Notepad- Internet Explorer
2) Notepad-MSNMessenger 3) MS
- Word-Internet Explorer
4) Both 1 and 2
5) None of these
29. In DOS, the "Label" command is used to _______
1) display the label of disk
2) change the label of disk
4) Both 1 and 2
5) None of these
3) remove the label of disk
30. Which type of switching uses the entire capacity of a dedicated link?
1) Circuit switching
2) Virtual Circuit Packet Switching
3) Datagram Packet Switching
4) Message Switching
5) None of these
31. The ________ is a device that connects inputs to outputs.
2) Crosspoint
2) Crossbar
3) Modem
4) RAM
32. The abbreviation ISP stands for _______
1) International Spy Project
2) Indian Social Planning
4) Internet Service Provider
5) None of these
5) None of these
3) Initial Service Provider
33. Which of the following components is required to process data into information and consists
of integrated circuits?
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these
34. Data structure includes
1) Arrays
2) Execution statement
3) Interaction
4) Both (2) and (3)
35. What is name of the logic circuit which can add two binary digits?
1) half adder
2) full adder
3) parallel adde
r
4) serial adder
36. Firewalls are used to protect against
1) Unauthorised Attacks
2) Virus Attacks
5) None of these
3) Data-Driven Attacks
37. The ________ directory is mandatory for every disk.
l) Root
2) Base
3) Sub
4) Case
38. Which of the following is not associated with Computers ?
l) Bit
2) Binary
3) Pencil
4) Mouse
5) List
5) None of these
4) Fire Attacks
5) None of these
5) Screen
39. 'MICR' technology used for clearance of cheques by banks refers to _______
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Insurance Cases Recognition
5) None of these
40. A ______ represents approximately one billion memory locations.
1) kilobyte
2) megabyte
4) terabyte
5) None of these
3) gigabyte
41. A saved document is referred to as a_______
1) file
2) word
3) folder
42. Choose the web browser among the following.
4) project
1) MSN- Messenger
2) Yahoo- Messenger
4) Netscape Navigator
5) None of these
5) None of these
3) Rediffbal.net
43. Which of the following is a web browser ?
1) Paint
2) Power point
3) Firefox
4) Word
5) All are web bowser
44. Which of the following is NOT hardware of a computer?
1) Monitor
2) Keyboard
3) Windows
4) Central Processing Unit
45. Which of the following is NOT a famous operating system?
1) Windows Vista
2) Mac OS X
3) Linux
4) Sun OS
46. The Internet allows you to______
1) send electronic mail
2) view Web pages
4) All of the above
5) None of these
5) Mouse
5) Virtual Box
3) connect to servers all around the world
47. The most common input devices are the and the _______
1) microphone, printer
2) scanner, monitor
5) None of these
4) Keyboard, Mouse
48. ________ servers store and manage files for network users.
1) Authentication
2) Main
3) Web
4) File
3) digital camera, speakers
5) None of these
49. Servers are computers that provide resources to other computers connected to a ______
1) network
2) mainframe
3) supercomputer
4) client
5) None of these
50. What menu is selected to cut, copy, and paste ?
1) File
2) Tools
3) Special
4) Edit
5) None of these
Download