Computer Basic

advertisement
Basic Computer Awareness
1.ENIAC was built by John Presper Eckert and John Mauchly.
2.ENIAC stands for Electronic Numeral Integrator and Computer.
3.Current generation of computers is known as Fifth generation.
4. First commercially available computers were known as UNIVAC.
5. UNIVAC was designed by IBM.
6. Large scale Integration (LSI) was introduced in which generation? -Fourth generation
7. Networking age lies in which generation? Fifth generation
8. IBM was previously known as Tabulating and recording company
9. In which year IBM changed its name? 1924
10. Who is the major market holder of computers? IBM format
11. IBM created first floppy disc in 1967.
12. Computer is a machine, which performs tasks such as Mathematical calculations, Electronics
communication, Image processing etc.
13. A computer is controlled by set of instructions called programs.
14. Important feature/fetures of a computer is/are Reliability, Accuracy, Speed.
15. What is basic flow of data in computers? Input-processing-output
16.High speed computers have lead to many scientific projects which was previously
impossible? - Weather forecasting
17 The ability to get answers fast enough so that one has time to take decisions on them, for
example fight reservation, is an example of Real-time processing
18. Computers can perform operations on: Analog data, Digital data, Both
19. Computer is electronic equipment and it works on: Electrical pulses
20.Computer can not perform the following operations: Thinking, Object distingwishing in real
environment , Imagination etc.
21. In recent times digital signal processing has obtained an important place in the field of
computing It is used for a) Audio processing b) Image processing.
22. Poorly designed systems affect the Accuracy of a computer.
23. Computer seems capable of performing any task, provided that the: Task can be reduced to
series of logical steps.
24. Which basic operation is actually performed by a computer? a. It transfers data internally
with in computer b. It performs basic arithmetic operations and it performs operations on
comparisions.
25. A computer exchanges information with outside world via Input output devices
26. Computers have: Limited ability.(no thinking ability)
27. If a company has got huge number of clients? Use computers to manage information about
clients.
28. When a computer is provided with correct database, it can perform operations on database to
get desired results, store the database and can be used for retrival and can be used for base of
other applications.
29. In order to process the image/picture, for example increasing the brightness, which will be
the efficient way to do it? Make use of a computer.
30. Nuclear data can be used for simulating nuclear explosions in super computers. This lie
under the category of data processing.
31. 20th century is often called: Computer age
32. Digital computers operates on instructions provided in the form of electrical pulses denoted
by 1 and 0.
33. Micro processors are widely used in the field of? Engineering, control systems and domestic
machines.
34. Performing arithmetical operations or logical operations on data in order to convert them in
to useful data is known as: processing
35. The process of saving data and instructions so that they are available for later use or
processing is called? storing
36. The process of producing useful information or results for the user such as printed reports or
visual display is called: outputting
37. Directing the manner and sequences in which all the operations are performed is called :
controlling
38. The basic organization of the computer: remains the same for all system models
39. Which of the following units link external environment with the computer system? Input unit
40.Inputs received from all the input devices are transformed in to______, that the primary
memory of the computer is designed to accept: Binary coded decimals.
41. Which of the following units links the computer system to the external world? output unit
42. The task of input interface is to : convert input data into machine readable form
43. The job of output interface is to: convert processed data into human readable form
44. The programs that deal with low-level machine functions that are essentially substitute for
additional hardware are called: micro programs
45. In binary system numbers are represented by sequence of : 0 and 1.
46. The basic unit of memory in a computer is called: bit
47. One byte is made of: 8 bits
48. The time taken by the CPU to read or write a bit to memory is called? accesstime
49. Virus is a network______ issue? - security
50. ICR,OMR, OCR falls in the category of : Character recognition.
51. Give the expansion of of ICR: Intelligent Character Recognitio
52. OCR: Optical Character Recognition
53.OMR: Optical Mark Reder
54. OMR technology detects absence or presence of a mark, but not the shape of the mark.
55. Data protection from natural disaster such as network is network_____issue. reliability
56. Give the expansion of IT: Information Technology
57. What do you mean by the term IT? A system in which data can be processed and
communicated between the various electronics equipments.
58. IT has removed geographical limitations for communications: true
59. Technology has drastically changed the way of: communication and business and research
60. e-mail: electronic mail
61. Where will you find all programs installed on a system? Start → All programs
62. Internet banking is done over : Internet
63.Which is the cheapest means of communication for people living in different countries? email
64. People can purchase items online with the help of: debit card and credit card (both).
65. Which software is used to create presentations? Microsoft PowerPoint
66.Which technique used now a days for producing micro chips? - small scale Integration
67.keyboard- input device
68.printer- output device
69.The process of entering a data and instructions in a computer system is called: inputting
70. Which software is used for creating tables with data and doing calculations on it? Microsoft
Excel
71.All the calculations are performed and all the comparisons are made in ------- of computer.control unit.
72. Command to save a Microsoft Word document is
CTRL + S
73.Intermediate results generated in the ALU are temporarily transferred back to----------until
needed at a later time.- secondary storage unit
74. Which command is used to permanently delete a file or folder?
Shift + Delete
75. Files are stored inside folders
76.ROM- Read only memory
77. Where will you find deleted files and folders?
Recycle bin
78.Control unit, ALU and Registers are the parts of CPU.
79.______manages and coordinates entire computer system- control unit.
80.The control unit and ALU of a computer are jointly known as central processing unit.
81.In a computer all the calculations and comparisons are made inside the - central processing
unit.
82. The primary storage is usally referred to as Random Access Memory.
83. RAM can : randomly select and use any location of memory to directly store and take back
data and instructions.
84. The information from RAM can be: read and write
85.voice recognition system - input device
86. plotter is a : output device
87. Light pen VDT is an input device
88. Graphic VDT is capable of displaying? - graphics
89.Alpha numeric VDT is used to enter and retrieve only : - letters , special characters and
numbers.
90. Non-volatile memory- It is not washed away even if power supply is down.
91.VDT- video Display Terminal
92. The most commonly used line printers is? - drum printer, chain printer
93.Page printers are Non impact printers
94. Line printers - impact printers
95. Non impact printers such as inkjet printers : cannot produce multiple copies of file in a single
printing.
96. Inkjet printers use a special type of ink having high content of : Iron
97.Inkjet printers are : non impact printers
98.Daisy wheel printers are : Impact printers
99.Floppy disks is typically _____inches in diameter - 3.5
100. Chracter printer prints : one character at a time
101.The speed of letter quality printers normally range from 10-50 characters per second
102. The speed of dot matrix printers normally range from : 40-250 characters per second.
103. An example of a character printer is : Letter quality printer, Dot matrix printer and inkjet
printer
104.Letter quality printers use a print wheel front known as a - daisy wheel
105. Which program you will use to write business letter?
Microsoft Word
106. Impact printers : work like common type writer by hitting the typeface against paper and
inked ribbon.
107. Computer memory is measured in
Mega Bytes
108.Diskettes are most popular, inexpensive storage medium used in - micro computers
109. The capacity of a single -sided-single-density 5.25 inch diskette is a little over : 100 kilo
bytes
110. The plastic of floppy disk is coated with : Magnetic oxide
111. Floppy disk is made of :flexible plastic
112. GUI stands for
Graphical User Interface
113. The default extension of Microsoft Word and Microsoft Excel files are
.docx,.xlsx
114. Floppy drive is a : secondary storage device
115. Floppy disks were introduced in : 1972
116. Which of the following is not an operating system?
a) Windows
b) Java
c) Linux
d) Solaris
Answer – b
117. An operating system is said to be multi user if
More than one users can work simultaneously
118. Floppy disks was first introduced by : IBM
119. Tape cassettes have a data transfer rate of : 1000 bytes per second
120. Tape cassettes and cartridges have relatively : Low data transfer rate
121.The changeable tape cassette used in the familiar home recorder is used for recording :
digital data
122. Firewall is used forprotecting computers from virus
123. PROM (Programmable read only memory) : is non volatile
124. What is eCommerce?
buying and selling takes place over Internet
125.Magnetic tape reels are suitable for use with : both large and medium size computers.
126. EDI stands for- Electronic data interchange
127. The information from ROM can be - read only
128. ____ provides space for storing data and instructions, space for intermediate results and laso
space for final results? - storage unit
129. PROM are programmed to record information using a special facility known as a Prom
Programmer.
130. ___chip is used to erase information and to reprogram it to store new information using a
special pro-programmer facility. - EPROM
131.Database - a collection of records.
132. The basic unit of a worksheet into which you enter data in Excel is - cell
133. Who is the largest producer of processors in computer market: Intel
134. UNIX, Windows, Linux, OS/2 are all : Operating systems.
135. Microsoft excel sheets are known as- worksheet
136. The name of Indian super computer is : PARAM
137. Microsoft office consists of - Word, Excel, PowerPoint
138. CRAY is name of a : Supercomputer developed by America.
138. In banks and various other organization back of the computer data is taken on a periodic
basis because: computer virus may damage the data and computer might breakdown.
139. Which one is the ISP in India : VSNL
140. ISP : Internet Service Provider
141. FoxPro : is a database management software
142. Compiler is used for : Converting high level language to machine language.
143. BASIC : Beginners All Purpose symbolic Instruction Code.
144. MS power point, Ms- excel, Ms- word : are Applications softwares.
145. MS windows is a System software.
146. McAFee software is used to delete files.
147. Downloading a file from a trustworthy friend is always safe : False
148. Anti virus: is a software that detects computer virus and software that disinfect the computer
149.computer virus is a program.
150. Computer virus in one computer affects another computer by : network connectivity, floppy
disk and CD.(All)
151. Trojan horse is a virus
152. Who is a hacker : someone who enters into the computer without authorization.
153. Weather forecasting and nuclear simulations can be performed by a : super computer
154. DVD size compared to a CD is : same
155.Many computers connected to single computer falls in the category of : LAN
156. Touch screen of a computer is a : input / output device
157. MODEM : Modulator/ Demodulator
158. C/C++ : High level Languages
159. English : Low level language
160. Encryption is used in computers to : protect data from unauthorized access
161.Password : Secrets word known to authorized personal only.
162. Firewall : is used to a) stopping unauthorized access b) making network more secure to
hacking attempts c) filtering the data that is going out of the network and coming in the network.
163. The smallest element that a computer monitor can display is known as : pixel
164. Fibre optic cables which method to transfer data? : Light waves
165.The voice recognition system consists of a microphone or a telephone that converts human
speech in to: electrical signals
166. Most voice recognition systems are : speaker dependent
167. Internal memory of computer is made of____: electronic circuits
168.Read only memory is used to store basic set of instructions called : Basic Input Output
System (BIOS)
169. External memory can be : magnetic memory, optical memory, magneto optical memory
170.Magnetic storage devices uses: material and mechanism similar to that of audio tapes.
171. An optical storage device uses: : use laser to store and retrieve information from plastic
disk.
172. MACKENZIE publishing, with head quarters in London and branch offices in Asia, Europe
and the US are probably connected by a: WAN
173. IT has made which of the following easier? All the above
174.Internet uses which application: WWW (World Wide Web)
175. Information is transmitted in internet in small units of data called : packets
176. Information on a network can be protected by : Firewall
177. I(n India the current satellite system used for Internet/ phones is : INSAT series
178. Text is collection of : Alphabets, numerals, special characters
179. Images are data in form of : pictures, photographs, hand drawing etc.
180.IP : Internet Protocol
181. Short cut to make a window the active window on the desktop : Alt+tab
182. A copy of important data is called : Back up
183. Which term is used to specify the series of steps by which a computer locates and loads the
operating system once the power is turned on? : Booting
184. Large files are compressed using a program called ? WinZip.
185. In India Internet back bone provided by : VSNL
186. In an isolated office where there is no internet connection is required which connection is
suitable : LAN
187. Network in a simplest term is a : a communication part between two or more computers
188. LCD : Liquid Crystal Display
189. GUI : Graphical User Interface
190. Computer Bus is used for : Transmission of data from one part to another
191.Scanner : input device
192. A group of 8 bits in a computer : byte
193. In computers 1 KB (kilo bytes) is equivalent to : 1024 bytes
194. A floppy disc can store up to maximum of : 1.44 MB
195. MAN : Metropolitan Area Network
196. WAP : Wireless Application Protocol
197.The computer size was very large in : first generation
198. All processing of computers is done in : CPU
199. The word “Computer” has been derived from : Latin language.
200. Charles Babbage : The father of computer
201. Data are raw facts from which information is derived.
202.IC chips are developed using : Silicon
203.Integrated chips are developed by : JS kilbi
204. The digital computer is worked on the theory of : calculation
205. Micro is television size computer.
206. Abacus was developed in : china
207. In which generation was microprocessor introduced : Fourth
208. Process to verify user name and password is known as
Authentication
209. In which generation did multiprogramming start? - third generation
210. Which type of computer could be found in a digital watch? : embedded
211. First computer was programmed using : machine language
212. Digital computer use a binary system to encode data and programs.
213. The number system used by modern computers is
Binary
214.A mainframe is a large and expensive computer capable of simultaneously processing data
for hundreds or thousands of users.
215.Input/ Output devices are also called peripheral devices.
216. The base of Hexadecimal and Octal number system is
16,8
217. Shift key is used in combination with other keys, so this is also called combination key.
218. Enter key is also called return key.
219.RAM- temporary memory
220. Turning the num Lock key off will enable the keys other functions such as using the keypad
as an arrow pad.
221. Alt, Ctrl and Shift keys are called as Modifier keys.An input/output device at which data
enters or leaves a computer system is : Terminal
222. Windows operating system is - multi tasking , multi user
223. COM : Computer Output Microfilm)
224. Dumb terminal : is used only for data entry and storage and never for processing.
225. PDA : Personal Digital Assistants
226. Which one of the below is used to browse internet?
Firefox
227. Spacebar is used to enter blank spaces in text.
228. HTTP stands for
Hyper Text Transfer Protocol
229. FTP stands for
File Transfer Protocol
230. 23 will be written in binary as- 10111
231. You can use the Tab key to indent a paragraph
232. A scanner scans : both pictures and text.
233. The input device to be used to get a printed diagram into a computer is the : scanner
234. These terminals (also called as cash registers) are often connected to complex inventory and
sales computer systems. : POS (point-of-sale)
235. USB : Universal Serial Bus
236. Which command is used to print a document
Ctrl + P
237. Dot matrix printer is bi-directional
238.A pixel is a picture element or dot on a screen
239. Plotter: is used to draw maps from stored data having high quality color graphics.
240. Resolution determines the clarity of computer.
241. How many bits make a nibble?- 4
242. How many bytes make a half word ? - 4
243. How many bytes make a full word? - 8
244. VGA : Visual Graphics Adapter
245. Laser printer belong to page printer
246.The display size of a monitor is measured : diagonally
247. How many bits make a byte? - 8
248. Using output device one can : view or print data.
249. Any data or instruction entered into the memory of a computer is considered as storage.
250. Which is valid Internet address protocol?
IPV6
251. The process to copy the software in hard disk from secondary storage media is called :
escalation
252. Main memory of computer is : Internal Hard disks drives are considered ______storage:
non-volatile.
253. Flash is : hardware
254. Ram types: S-RAM, D-RAM, P-RAM etc.
255. Internal storage is primary storage.
256. A connection from one HTML document to another HTML document is called : Hyperlink
257.It is approximately a million bytes : Gigabyte
258. Print Queue is the list of print jobs waiting to be sent to a particular printer.
259. Which command can be used to recreate the disks tracks and sectors? : FORMAT
260. which of the following memories below is often used in a typical computer operation? :
HDD
261. which of the following is a standard code used to exchange information among data
processing and communication system? ASCII
262. Print Spooling is a process of sending documents to a storage where they are temporarily
stored and remain there until printer prints them.
263. Grammatical errors are shown in Green.
264. Spell check is under which menu : Tool
265. Fiber optic is most resistant to electrical and noise interference.
266. You can delete one character using this key : backspace.
267. DEL command is used to delete files.
268. A goal of data mining includes which of the following : To explain some observed event or
condition.
269. Servers are computers that provide resources to other computers connected to a : Network
270. These type of viruses are often transmitted by a floppy disk left in the floppy drive? : Boot
sector
271. It controls the way in which the computer system functions and provides a way by which
users can interact with the computer? : Operating system.
272. Ethernet is a family of computer networking technologies for local area network.
273. Anything that is typed in a worksheet appears : in both active cell and formula bar
274. To detect, locate and remove errors in programmes and/or malfunctions in equipment is :
Debug.
275. The conducting material that was coated inside the screenof CRT is : aquadag.
276. IC are classified on the basis of: number of transistors.
277. A repair for a known software bug, usually available at no charge on the Internet, is called :
patch
278. MTBF : Mean Time Before Failure
279. Save as dialog can be used : to save file by some alternative name.
280. Control unit of a digital computer is often called the : ICs
281. which file is the batch file that is read while booting a computer? : Autoexec.bat
282. Various applications and documents are represented on the Windows desktop by : icons
283. A unit of measures equal to approximately 1 billion bytes is called a : 1 GB
284. Instructions to computer are given through : input unit
285. To select several cells or ranges that are not touching each other, what would you do while
selecting? : Hold down the Ctrl key
286. Compiler : converts all the statements in a program in a single batch and the resulting
collection of instructions is placed in a new file.
287. The term ‘briefcase’ is used for a : window that is currently open
288. Macro media is the name of a company related with : software
289. In its default setting, an Excel workbook is made up of sheets and the default number is : 3
290. A storage device used to compensate for the difference in rates of flow of data from one
device to another is : buffer
291. Powerful key that lets you exit a program when pushed : escape key
292.what is the media standard for most local network installations? CAT 5
293. The intersection of a row and column is called : a cell
294. You can add picture in your document from which menu? : Insert menu
295. which one of the following types of coax cabling has two outer conductors or shields, and
offers greater resistance and decreased attention? : Dual-shielded coax
296. E-commerce refers to commercial activities carried out in an electronic network.
297.Wi max is related to which one of the following? Communication technology
298. Which one of the following bands is used in the transmission of signals in the Direct-toHome (DTH) television broadcasting? :Ku-band
299. which one of the following invented the television video games? : Ralph H Baer
300. Encryption in cyber world means : algorithmic alteration of passwords into scrabbled data
to present access
301. Modems are devices used to transmit data over telecommunications lines.
302. References to each file of a disk are stored in a - root allocation table
303. Nanoscience is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
304. Device drivers are that : short, special purpose programs
305. Which option will we use to give heading in the form? : Label
306. The process of preparing a floppy diskette for use is called : formatting
307. CPU gets the address of next instruction to be processed from the : index register
308. A directory within a directory is called : sub directory
309. Network components are connected to the same computer in the bus topology.
310. Viruses are attempts by individuals to obtain confidential information from you by
falsifying their identity.
311. The physical components of a computer system : Hardware
312. The pop-up helper enables you to simultaneously keep multiple web pages open in one
browser window.
313. The Menu bar of software contains lists of commands and option.
314. EDI : Electronic Data Interchange
315. A temporary storage area for information got by cutting and pasting is : clip board
316. A small arrow of blinking symbol on desktop is called a : cursor
317. To erase any part of a program we use delete command.
318. Windows 98 was developed in : 1998
319. Menus are lists of commands that appear on the screen.
320. Files are organized by storing them in folders.
321. To move down a page in a document : scroll option is used.
322. Easy to use : user friendly
323. To ‘maximise’ a window means to : expand it to fir the desktop
324. Date and time are available on the desktop at : taskbar
325. A shortcut is an icon on the desktop that provides a user with immediate access to a
program or file.
326. Text and graphics that have been cut or copied are stored in an area called the : clip board
327. You can keep your personal files/folders in : my documents
328. Background of screen is known as : desktop
329. At which button is help menu available : Start
330. Windows explorer : A file manager
331. The taskbar is located : at the bottom of the screen.
332. Which extension is given to Word document by default : .doc
333. It is a group of worksheets : workbook
334. A chart placed in a worksheet is called : embedded chart
335. A database that contains tables linked by common fields is called a : relational database
336. The letter and number of the intersecting column and row is the : cell address
337. which is the short key to invoke the spell checker in MS Access? : F7
338. Algorithms are necessary : to find out a definite solution to computational problem
339. Logical errors : is the set of rules that give meaning to a statement.
340. Testing is done to : find out whether the program fulfills all the conditions correctly
341. GIGO : Garbage In Garbage Out
342. A computer programmer : does all the thinking for a computer
343. The person who writes instructions that tell that computer how to handle input information
is called? : computer programmer
344. The flowchart is usually difficult to understand.
345. Portability : Ability of a program to see across different platforms without much changes.
346.It is a graphics method for describing the logic of decisions : Decision tables.
347. An algorithm that calls itself directly or indirectly is known as : recursion
348. Transmission of computerized data from one location to another is called : data
communication
349. What is the commonly used unit for measuring the speed of modem? : bits per second
350. Networks are useful because : each user of the network can access files more easily.
351. URL : Uniform Resorce Locator : The address of a document or ‘page’ on the World Wide
Web.
352. An webmail interface allows you to access your email from anywhere.
353. In a ring topology the computer in possession of the token can transmit data.
354. Downloading a document means the files is transferred from another computer to your
computer.
355. Video conferencing is used for : Live conversation
356. An electronic meeting is known as : tele-conferencing
357. File server allows LAN users to share computer programs and data.
358. A package which can be downloaded via the Internet for testing purpose before buying is
called : beta software
359. Servers are those computers, which provide resources to other computers connected by :
network
360. A chat is : a type of conversation that takes place on a computer
361.A link is the term used when a search engine returns a web page that matches the search
criteria.
362. Large collection of files are called : database
363. A form defined where data is placed on the screen.
364. An audit trail : is the recorded history of operations performed on a file.
365. In the DBMS approach, application programs perform the : processing functions
366. A transparent DBMS keeps its physical structure hidden from users
367. DDL : Data Definition Language
368.DML : Data Manipulation Language
369. The function of a database is : to collect and orgnise input data.
370. A file produced by a spreadsheet : is generally stored on disk in an ASCII text format
371. It refers to the technology that supports the transport of data between the mobile computing
device and the main computer system : Wireless
372. It is a flexible data and communication using radio frequency : wireless LAN
373. The information is translated into a WML so it is viewable on the cell phone screen.
374. The Website responds to the request and forwards the information back through the link
server.
375. One of the leading protocols is called : WAP
376. Data mining has become a cornerstone of CRMs.
377. Voice and positional commerce are becoming value-added features to m-commerce.
378. Mobile telephone was introduced in the year : 1946
379. AM : Amplitude Modulation
380. The first wireline telephone systm was introduced in the year : 1877
381. A walkie-talkie is an example of a Half Duplex System which uses ‘push to talk’ and
‘releae to listen’ type of switches.
382. The first cellular systems were :Analog.
383. A gateway is a node used to interconnect two networks.
384.Modulation is the process of sending a signal by changing the characteristics of a carrier
frequency.
385.It was the first fully digital system utilizing the 900 MHz frequency band.
386. Information : is the knowledge derived from study, experience or instruction.
387. E-commerce refers to commercial activities carried out in an electronic network.
388. The most important or powerful computer in a typical network - Network server
389.Two broad categories of software are : System software and Application software
390. 3G Technologies - UMTS, CDMA, HSPA, EVDO, GPRS is not a 3G technology.
391.computers manipulate data in many ways and this manipulation is called : processing
392. To make the number pad act as directional arrows you press the num lock key.
393. Utility : handles most system functions that aren’t handled directly by the operating system.
394.Computer forensics is the science revolving around the use of nanostructures to build
devices on an extremely small scale.
395.A person can open a bank account sitting in his home and can easily maintain the account as
well via - net banking
396. The part of CPU which coordinates the activities of all other components of the computer is
: motherboard
397.The contents of storage are lost when the computer turns off.
398. HP launches IT executive score card software.
399.Technology no longer protected by copyright, available to everyone is considered to be :
proprietary
400. Ubiquitous computing paradigm use in which network - 5G
401. Assembly language is a low-level programming language.
402. Secondary memory is characterized by low cost per bit stored.
403. Acknowledgement from a computer that a packet of data has been received and verified is
known as - ACK
404. A sequence of precise and unambiguous instructions for solving a problem in a finite
number of operations is referred as - Algorithm
405. ALGOL is the High-level language
406.To identification particular location in storage area one have a - Address
407. A local storage register in the CPU which contains the address of the next instruction to be
executed is referred as - Address register
408. A character set that contains letters, digits, and other special characters is refered as Alphanumeric
409. A standard intended to connect relatively low-speed devices such as keyboards , mice,
modems and printers is - Access bus
410. The concept that one can disconnect peripherals and plug them in without letting computer
shut down or reconfigure the system is referred as - Hot plugging
411. The time interval between the instant at which data is called from a storage device and the
instant delivery begins in - Access time
412. A form of access to a computer or network with specified user name and password is
referred as - Account
413. A local storage area also called a register, in which the result of an arithmetic or logic
operation is formed is - Accumulator
414. A computer that operates on data which is in the form of continuously variable physical
quantities - Analog computer
415. Anonymous FTP is the - Internet file transfer protocol
416. EFF sites allows anonymous FTP that - Do not require a password or access
417. ANSI : American National Standards Institute
418. The overall design, construction, organization and interconnecting of the various
components of a computer system is referred as - computer Architecture
419. Asynchronous communication is - communication between independently operating units
420. Auxiliary storage is - secondary storage
421. Archive is - backup storage
422. A branch of computer science that deals with computers that possess reasoning, learning
and thinking capabilities that resemble those of human beings is recognized as - Artificial
Intelligence
423. ASCII is - A standard coding system for computers
424. ASCII-8 is - An extended version of ASCII -7
425. ASCII file is document file in the universally recognized format
426.A program that translates mnemonic statements into executable instructions is referred as Assembler
427. An Assembler is a - translator
428. An algebra that deals with logical propositions which are either true or false is referred as Boolean algebra
429. Bandwidth is - The range of frequencies available for data transmission
430. A coding structure in which characters are represented by means of a series of parallel bars
is - Bar code
431. In Broadband system a network system - Share the several analog signals with same
physical network channel
432.Bit : Binary digit / one binary piece of information
433. Broadband channel is the - The fastest carriers where data transfer rates is of 1 million
baud(bits/second) or more.
434. An operation in which data is moved to a different location is referred as - Block move
435. Boolean variable assumes - values that are either true or false
436. Bubble memory is - Nonvolatile
437. Buffer is device/ storage area - where data are temporarily stored
438. A network geometric arrangement in which a single connecting line is shared by a number
of nodes is called - Bus topology
439. An error in a computer program is referred as - Bug
440. Circuits that provide a communication path between two or more devices of a digital
computer system is - Bus
450. A fixed number of adjustment bits that represent a particular character or symbol are
referred as - Byte
451. Cache memory is a - small buffer storage
452. A unit for measuring data transmission speed that describes the capacity of a carrier is
referred as - Baud
453. A process of trying out a new product by independent users before it is finally
manufactured/ developed - Beta test
454. A selection, choice or condition involving two possibilities is referred as - Binary
455. In Batch processing - Several computer programs runs one after another without human
interaction to run each program individually
456. BISYNC: Binary Synchronous
457. BIOS is responsible for - Handling the particulars of input/output operations
458. BIOS : Binary Input- Output System
459. A device that is used to transmit data from one location to another is referred as - carrier
460.programs developed by an outside supplier and provided to the user in a machine readable
form is known as - canned programs
461. Call statement - A program statement which transfers program control to a subroutine.
462. Communications protocol is - A set of rules and procedures established to interconnect
different computers and communicate between them.
463. To combine items from two or more sequenced files into a single one is referred as Collating
464. The process of writing computer instructions in a programming language is known as coding
465. A configuration of computers on a network such that computing tasks are done on server
computer and used by client customers is referred as - Client/server architecture
466. COBOL is : Common Business Oriented Language
467. A collection of facts in raw form that become information after proper processing is known
as - Data
468. In circuit switching : A dedicated physical path is established between sender and the
receiver through nodes of a network for the complete duration of information exchange
469. Compiler : convert or translate a program written in a high-level language to an absolute or
machine language form.
470. DASD : Direct Access Storage Device
471.Cyber crime is - offence done on/by using computer
472. The time interval between the instant at which a read/write command is given to a memory
and the instant when the next such instruction can be issued to the memory is referred as - Cycle
time
473. Console : is a device that enables human operators to communicate with the computer
474. The computer is - a data processor
475. A removable direct-access storage medium containing multiple magnetic disks mounted
vertically on a single-shaft is referred as - Disk pack
476. Diskette is a - A low-cost, thin flexible magnetic disk storage device.
477. Internet banking is an example of - Electronic funds transfer (EFT)
478. EBCDIC is - 8-bit coding system
479. Digital computer is a computer - That works with discrete quantities
480. Electronic Mail/Message System (EMMS) best suits to - Postal service
481. A collection of related records is referred as - File
482. First generation computers uses - Vacuum tubes
483. First generation computers are programmed in - Assembly language
484. A technique for processing jobs on a first-come, first-served basis is - First-in, first-out
FIFO
485. An adder which adds two binary digits and outputs a result bit and a carry bit (if any) is
called - Half adder
486. Printed or filmed output from a computer device in human readable form is called - Soft
copy
487. Electronic circuit used to interconnect I/O devices to a computer’s CPU/r memory is known
as - Interface
488. LISP (LIST processing) is a - High-level programming language
489. Integrated software package is - A software product that combines several applications
490. keys labeled F1 to F12 on computer keyboard are - Function keys
491. Gateway is the device used to - To interface two otherwise incompatible network facilities.
492. A language processor that translates a statement of a high-level language and immediately
executes it before translating the next source language statement is called - Interpreter
493. Combining records from two or more ordered files into a single ordered file is called Merging
494. One- thousandth of a second is called - Millisecond
495. One- millionth of a second is referred as - Microsecond
496. A LSI chip which contains the entire CPU of computer except main memory is called Microprocessor
497. Alternate facilities of programs, data files, hardware equipments, etc. used in case the
original one is destroyed, lost, or fail to operate is - Backup
498. A facility available in an operating system that allows multiple functions from the same
application package is referred as - Multi-threading
499. Technique to implement virtual memory where memory is divided into units of fixed size
memory is - Paging
500. Password is - code by which a user gains access to a computer system.
Download