Computer Refresher MCQ

download Computer Refresher MCQ

of 19

Transcript of Computer Refresher MCQ

  • 7/25/2019 Computer Refresher MCQ

    1/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    COMPUTER REFRESHER MCQ FOR

    IBPS CLERK MAIN

    1. In addition to keying data directly into a database, data entry can also be done from a (an)

    1) field 2) table 3) data dictionary

    4) input form 5) None of these

    2. A word processor would most likely be used to do which of the following?

    1) Doing a computer search in the media centre

    2) Keeping an account of money spent

    3) Maintaining an inventory

    4) Typing a biography

    5) None of these

    3. What is the main folder on a storage device called?

    1) Interface 2) Root directory 3) Platform

    4) Device driver 5) None of these

    4. In database, a field is a

    1) table of information 2) label 3) group of related records

    4) category of information 5) None of these

    5. Computers BIOS is stored in

    1) ROM 2) RAM 3) Hard disk 4) Flopy drive 5) None of these

    6. Bootstrap program is a program that

    1) starts the working of a computer 2) terminates the working of a computer

    3) is the middle part of the program 4) Both 1 and 2

    5) None of these

    7. You can do transactions on Internet using your bank account. This is called

    1) Banking 2) Online banking 3) Offline banking

    4) Transactions 5) None of these

    8. Which of the following is graphics solution for Word Processor?

    1) Clipart 2) Wordart 3) Dropcap

    4) All the above 5) None of these

    9. The command that is used to format a drive through command prompt is

    1) Scandisk 2) X Format 3) Chkdisk 4) Format 5) None of these

    10. FIND option is available under which menu?

    1) Tools 2) View 3) File 4) Edit 5) None of these

    11. DSL is an example of

    1) Wireless 2) Broadband 3) Network 4) Slow 5) None of these

    12. A saved document is referred to as

    1) Folder 2) Object 3) File 4) Project 5) None of these

  • 7/25/2019 Computer Refresher MCQ

    2/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    13 A computer that deals with physical quantities is known as

    1) Digital Computer 2) Analog Computer 3) Hybrid Computer

    4) Mainframe Computer 5) None of these

    14. PDF extension is used for which of the following?

    1) MS-Excel 2) Adobe Reader 3) Photoshop

    4) Pagemaker 5) None of these

    15. Since viruses are only a form of software, they primarily infect

    1) Data 2) Hardware 3) Peripherals 4) Programs 5) None of these

    16. What is the other name of LAN card?

    1) Modem 2) NIC 3) Network connector

    4) Internet card 5) None of these

    17. Which of the following is the name given to devices that make up a computer that you can see or

    touch?

    1) Print 2) Mouse 3) Hardware 4) Software 5) None of these

    18. A(n)_____contains commands that can be selected.1) icon 2) button 3) pointer 4) menu 5) None of these

    19. Which of the following is not an image file?

    1) TMP 2) BMP 3) GIF 4) JPEG 5) None of these

    20. Which of the following is used to measure the speed of the processor?

    1) Unit 2) Processing speed 3) Clock speed

    4) Memory 5) None of these

    21. What is a flowchart?

    1) It represents process. 2) It represents algorithm.

    3) It represents process or algorithm. 4) It represents mathematical subtraction.

    5) None of these

    22. Which of the following is used to find a saved document in the computers memory and bring it up

    on the screen to view?

    1) Rerun 2) Reverse 3) Retrieve 4) Return 5) None of these

    23. A computer uses_____ system to process data.

    1) kilobyte 2) processing 3) binary

    4) representational 5) None of these

    24. Why is the Caps Lock key referred to as a toggle key?1) Because it cannot be used to delete

    2) Because it cannot be used for entering number

    3) Because it cannot be used to insert

    4) Because its function goes back and forth every time it is pressed

    5) None of these

    25. Which of the following keys launches the Start button?

    1) Windows 2) Shift 3) Shortcut 4) Esc 5) None of these

    26. Which of the following is a collection of unprocessed items?

  • 7/25/2019 Computer Refresher MCQ

    3/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    1) Memory 2) Information 3) Data 4) Reports 5) None of these

    27. Which command is given to run or switch off the computer?

    1) Ctrl+Alt 2) Ctrl+Alt+Del3) Alt+Del

    4) Alt+Shift+Del 5) None of these

    28. What do we call the keys that change the meaning of what you type?

    1) Change keys 2) Disk space 3) Modifier keys

    4) Keyboard 5) None of these

    29. What kind of files do we care about the most? (letters, pictures, memos, etc.)

    1) Document files 2) Application files 3) System files

    4) User files 5) None of these

    30. In which of the following was artificial intelligence introduced?

    1) First generation 2) Second generation 3) Third generation

    4) Fourth generation 5) Fifth generation

    31. What is full form of VLSI?

    1) Very Large Scale Integration 2) Very Large Scale Intranet

    3) Very Large Scale Internet 4) Very Large Scale Internetwork 5) None of these

    32. Which of the following is the location to store a file in a drive?

    1) File Folder 2) Version 3) Pad 4) Folder 5) None of these

    33. Which of the following is the default setting in a cell of Excel sheet?

    1) Leftaligned 2) Rightaligned 3) Centred

    4) Justified 5) None of these

    34. Information on a computer is stored as

    1) Analog data 2) Digital data 3) Watts data

    4) Modem data 5) None of these

    35. Which of the following is used for writing the webpage code?

    1) Winzip 2) Hypertext markup language 3) Fifth generation language

    4) Part 5) None of these

    36. FLASH is a

    1) Hardware 2) Game 3) RAM 4) EEPROM 5) None of these

    37 Which of the following is a must for a computer?

    1) Chip 2) Data 3) Mouse 4) Processor 5) None of these

    38. Disk can be used to store

    1) Random files 2) Sequential files 3) Both 1 and 2

    4) Horizontal files 5) None of these

    39. How many characters can be typed in a single cell in an Excel sheet?

    1) 256 2) 1024 3) 32000 4) 65535 5) None of these

    40. Whas is the full form of XP in Windows-XP?

    1) XTRA Power 2) XTREME Programming 3) XTRA Process

    4) XTREME Power 5) None of these

  • 7/25/2019 Computer Refresher MCQ

    4/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    41. Which key is used to send a digital signature?

    1) Public key 2) Private key 3) Digital key 4) Keypad 5) None of these

    42. The group of processors combined together to create a program is referred to as

    1) Multiprogramming 2) Multitasking 3) Multiprocessing

    4) Thrashing 5) None of these

    43. Which program searches the fault of any software?

    1) Debug 2) Inverse 3) EBCDIC 4) LOG 5) None of these

    44. What is the default paper size of a word document?

    1) A4 2) Letter 3) A3

    4) Both 2 and 3 5) None of these

    45. A device that is connected to the motherboard is

    1) called an adjunct device 2) called an external device

    3) connected by using a ribbon cable 4) called a peripheral device

    5) None of these

    46. Which of the following is used to find an individual item in a file immediately?

    1) File allocation table 2) Sequential access 3) Direct access

    4) Directory 5) None of these

    47. In Excel, charts are created using which of the following options?

    1) Pivot table 2) Chart Wizard3) Pie chart

    4) Bar chart 5) None of these

    48. Which device is used to access your computer from another computer or for talk over phone?

    1) CD-Rom Drive 2) Hard Drive 3) RAM

    4) Modem 5) None of these

    49. Which of the following is the name of the software which is used for sending or receiving a message?

    1) Telnet 2) Browser 3) Messenger

    4) Operating system 5) None of these

    50. Which of the following software applications would be most appropriate for performing numerical

    and statistical calculations?

    1) Document Processor 2) Database 3) Graphics Package

    4) Spreadsheet 5) None of these

    51. Which of the following is the minimum zoom percentage supported by MS Word?

    1) 10% 2) 15% 3) 25% 4) 4% 5) None of these

    52. The default lines to drop for drop cap is

    1) three lines 2) two lines 3) four lines 4) eight lines 5) None of these

    53. The red wavyline in MS Word document indicates

    1) spelling errors 2) grammar errors 3) address block

    4) All the above5) None of these

    54. The ascending order of a data hierarchy is

    1) bitbyterecordcharacterdatabase

  • 7/25/2019 Computer Refresher MCQ

    5/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    2) bitbytefieldrecordfiledatabase

    3) bitbyterecordfieldfiledatabase

    4) All the above

    5) None of these

    55. Which of the following is a problem of file management system?

    1) Lack of data independence 2) Data redundancy 3) Programme dependence

    4) All the above 5) None of these

    56. BASIC, ACGOL and COBOL are the examples of

    1) High level language 2) Low level language 3) Middle level language

    4) All the above5) None of these

    57. COBOL was developed by

    1) Dennis Ritchie 2) Grace Hopper 3) John Burden

    4) Steve Jobs 5) None of these

    58. How many bits are there in one MB?

    1) 220 2) 221 3) 222 4) 219 5) None of these

    59. Which page orientation will you select if you want to print in wide format?1) Landscape 2) Horizontal 3) Portrait 4) Vertical 5) None of these

    60. Which type of server is responsible for storing files for users on the network?

    1) Web server 2) File server 3) Print server

    4) Both (2) and (3) 4) Both (1) and (2)

    61. Which network architecture is defined in IEEE 802.3 standard?

    1) Token ring 2) FDDI 3) Fiber 4) Ethernet 5) None of these

    62. PDA stands for

    1) Portable Digital Assistant 2) Personal Digital Assistant 3) Personal Duplex Assistant

    4) All the above5) None of these

    63. Unix operating system was developed by

    1) Walter Baatain 2) John Burdeen 3) Ken Thompson

    4) All the above5) None of these

    64. Which of the following is represented by a cluster in hard disk?

    1) Group of sectors 2) Total number of sectors in a disk

    3) Total number of tracks 4) All the above

    5) None of these

    65. Comparison of two or more numbers depends on1) ALU 2) MU 3) CU 4) CPU 5) None of these

    66. In DOS, primary hard disk drive has the drive letter

    1) A 2) B 3) C 4) D 5) None of these

    67. Default page size for word document is

    1) Legal 2) A4 3) Letter

    4) All the above5) None of these

    68. We use ________ shortcut key to insert something in microsoft excel.

  • 7/25/2019 Computer Refresher MCQ

    6/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    1) ctrl + W 2) ctrl + P 3) Shift + F11 4) Shift + Alt 5) None of these

    69. GOTO statement is used in which of the following programming languages?

    1) C++ 2) Java 3) C

    4) All the above5) None of these

    70. .rar stands for

    1) Read and right 2) Roshal Archieve 3) Right Attributes

    4) All the above5) None of these

    71. First general-purpose electric digital computer ENIAC was developed by

    1) JP Eckert 2) JW Mauchley 3) John Von Neumann

    4) All the above5) None of these

    72. E-R stands for

    1) Equity-Relationship 2) Entity-Relationship 3) Equal-Relationship

    4) All the above5) None of these

    73. In any table, record of any row is called

    1) Entity 2) Tuple 3) Field 4) Attribute 5) None of these

    74. Spelling check is performed by which of the following keys?

    1) F2 2) F3 3) F5 4) F6 5) F7

    75. Linux is a

    1) software 2) operating system 3) application

    4) application software 5) None of these

    76. NIC stands for

    1) National Informatics Centre 2) Network Interface Card 3) National Interface Code

    4) Both (1) and (2) 5) None of these

    77. Shell and kernel is a feature of

    1) operating system 2) application 3) software

    4) All the above5) None of these

    78. An example(s) of universal gate is/are

    1) NAND 2) NOT 3) NOR

    4) Both (1) and (3) 5) None of these

    79. Which of the following is not an example of a search engine?

    1) Google 2) Protocol 3) Yahoo 4) Altavista 5) None of these

    80. Which of the following is ones complement of the binary number 110010?

    1) 111111 2) 001111 3) 010101 4) 001101 5) None of these

    81. Which of the following will come next in the series?

    10, 01, 100, 011, 11001, ....

    1) 0101 2) 00110 3) 01101 4) 00101 5) None of these

    82. Which of the following is not a type of error?

    1) Logical error 2) Run time error 3) Syntax error

    4) All the above 5) None of these

  • 7/25/2019 Computer Refresher MCQ

    7/19

  • 7/25/2019 Computer Refresher MCQ

    8/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    97. Which of the following represents the size of a floppy?

    1) 3.5 inches 2) 5.25 inches 3) 8.0 inches

    4) All the above 5) None of these

    98. Extension of a Word file in MS-Office 2007 is

    1) .doc 2) .docx 3) .docxs

    4) All the above5) None of these

    99. What is Outlook Express?

    1) Scheduler 2) E-mail Client 3) Address Book

    4) All the above 5) None of these

    100.Which of the following is not a correct IP address?

    1) 192.28.238.191 2) 193.224.212.225 3) 138.124.256.225

    4) 198.225.285.255 5) 224.252.252.251

    101.The common name for the crime of stealing passwords is

    1) spooling 2) identity theft 3) spoofing 4) hacking 5) None of these

    102.Malicious software is known as

    1) hardware 2) malware 3) malicious ware

    4) illegal ware 5) None of these

    103.HTML viruses infect

    1) your computer

    2) a Web page in the HTML code

    3) both a Web page and the computer that is viewing it

    4) All the above

    5) None of these

    104.____ is the measurement of things such as fingerprints and retinal scans used for security access.

    1) Biometrics 2) Bio measurement

    3) Computer security 4) Smart weapon machinery

    5) None of these

    105.The scrambling of code is known as

    1) encryption 2) firewall 3) scrambling 4) password-proofing 5) None of these

    106.Which is the part of a computer that one can touch and feel?

    1) Programs 2) Software 3) Hardware 4) Output 5) None of these

    107.Which of the following moves the cursor one space to the right to puts spaces in between words?1) Control key 2) Space bar 3) Printer 4) Mouse 5) None of these

    108.When your computer stops working suddenly, it is referred to as a

    1) crash 2) die 3) death 4) penalty 5) None of these

    109.A symbol or question on the screen that prompts you to take action and tell the computer what to

    do next is called

    1) scanner 2) questionnaire 3) prompt and dialog box

    4) information seeker 5) None of these

  • 7/25/2019 Computer Refresher MCQ

    9/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    110.A place that a user can create to store files is called

    1) cursor 2) text 3) folder 4) boot 5) None of these

    111.Name the key that will erase information from the computers memory and characters on the screen.

    1) Edit 2) Delete key 3) Dummy out 4) Trust key 5) None of these

    112.A program that works like a calculator for keeping track of money and making budgets.

    1) Calculator 2) Spreadsheet 3) Budgeter

    4) Financier 5) None of these

    113. The OSI model is divided into _______ processes called layers.

    1) five 2) six 3) seven 4) eight 5) None of these

    114._____ are specially designed computer chips that reside inside other devices such as your car or

    your electronic thermostat.

    1) Servers 2) Embedded computers 3) Robotic computers

    4) Mainframes 5) None of these

    115.The goal of data mining is

    1) to explain some observed event or condition2) to confirm that data exists

    3) to analyse data for expected relationships

    4) to create a new data warehouse

    5) None of these

    116. A database management system (DBMS) is a

    1)hardware system used to create, maintain and provide controlled access to a database.

    2)hardware system used to create, maintain, and provide uncontrolled access to a database.

    3)software system used to create, maintain, and provide uncontrolled access to a database.

    4)software system used to create, maintain, and provide controlled access to a database.

    5)None of these

    117.Which of the following describes database fields?

    1) Structures 2) Field markers 3) Field definition

    4) Field names 5) None of these

    118.A goal of normalization is to

    1) minimize the number of relationships

    2) minimize the number of entities

    3) minimize the number of tables

    4) minimize the number of redundancy

    5) None of these

    119.The code that relational database management systems use to perform their database task is referred

    as

    1) QBE 2) SQL 3) OLAP 4) Sequel Server 5) None of these

    120.Chip is a common nickname for a (n)

    1) transistor 2) resistor 3) integrated circuit 4) semiconductor 5) None of these

    121.The most frequently used instructions of a computer program are likely to be fetched from

    1) the hard disk 2) cache memory 3) RAM

    4) registers 5) None of these

  • 7/25/2019 Computer Refresher MCQ

    10/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    122.____ are viruses that are triggered off by the passage of time or on a certain date.

    1) Boot-sector viruses 2) Macro viruses 3) Time bombs

    4) Worms 5) None of these

    123.Which of the following places the common data elements in order from smallest to largest?

    1) character, file, record, field, database

    2) character, record, field, database, file

    3) character, field, record, file, database4) bit, byte, character, record, field, file, database,

    5) None of these

    124.The Internet is

    1) a large network of networks

    2) an internal communication system for a business

    3) a communication system for the Indian government

    4) All the above

    5) None of these

    125.Verification of a login name and password is known as

    1) configuration2) accessibility 3) authentication 4) logging in 5) None of these

    126.Which of the following would most likely NOT be a symptom of a virus?

    1) Existing program files and icons disappear.

    2) The CD-ROM stops functioning.

    3) The Web browser opens to an unusual home page.

    4) Odd messages or images are displayed on the screen.

    5) None of these

    127.The PC and the Apple Macintosh are examples of two different

    1) platforms 2) applications 3) programs 4) storage devices 5) None of these

    128. The metal or plastic case that holds all the physical parts of the computer is the

    1) system unit 2) CPU 3) mainframe 4) platform 5) None of these

    129.The ability to recover and read deleted or damaged files from a criminals computer is an example

    of a law enforcement specialty called

    1) robotics 2) simulation 3) computer forensics 4) animation 5) None of these

    130.______ server stores and manages files for network users.

    1) Authentication 2) Main 3) Web 4) File 5) None of these

    131.In a ring topology, the computer in possession of the ____ can transmit data.

    1) packet 2) data 3) access method 4) token 5) None of these

    132.When data changes in multiple lists and all lists are not updated, this causes

    1) data redundancy 2) information overload

    3) duplicate data 4) data inconsistency

    5) None of these

    133.____ are words that a programming language sets aside for its own use.

    1) Control words 2) Reserved words

    3) Control structures 4) Reserved keys

    5) None of these

  • 7/25/2019 Computer Refresher MCQ

    11/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    134.You must instal a(n) ____ on a network if you want to share a broadband Internet connection.

    1) router 2) modem 3) node 4) cable 5) None of these

    135. A dedicated computer is one

    1) which is used by one person only.

    2) which is assigned one and only one task.

    3) which uses one kind of software.

    4) which is meant for application software.5) None of these

    136.The system unit of a personal computer typically contains all of the following except

    1) Microprocessor 2) Disk controller

    3) Serial interface 4) Modem

    5) None of these

    137.A small or intelligent device is so called because it contains within it a

    1) Computer 2) Microcomputer 3) Programmable data 4) Sensor 5) None of these

    138.Which technology is used in compact disks?

    1) Mechanical 2) Electrical 3) Electro Magnetic 4) Laser 5) None of these

    139.EPROM can be used for

    1) Erasing the contents of ROM

    2) Reconstructing the contents of ROM

    3) Erasing and reconstructing the contents of ROM

    4) Duplicating ROM

    5) None of these

    140.Algorithm and Flow Chart help us to

    1) Know the memory capacity

    2) Identify the base of a number system

    3) Direct the output to a printer

    4) Specify the problem completely and clearly

    5) None of these

    141.Which of the following is not a valid size of a Floppy Disk?

    1) 8 2) 54

    1 3) 2

    2

    1 4) 5

    2

    1 5) None of these

    142.The 16-bit microprocessor means that it has

    1) 16 address lines 2) 16 buses 3) 16 data lines 4) 16 routes 5) None of these

    143.Data going into the computer is called

    1) Output 2) Algorithm 3) Input 4) Calculations 5) Flow chart

    144.Which of the following is the fastest memory?

    1) DDR RAM 2) DDR2 RAM 3) DDR3 RAM 4) Swap Memory 5) Buffer Memory

    145.Which protocol is used by the operating system to generate error message like Host Unreachable

    over a TCP/IP network?

    1) HTTP/1.1 2) ICMP 3) PPP 4) ICGM 5) TCP/IP

    146.What does SNMP stand for?

  • 7/25/2019 Computer Refresher MCQ

    12/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    1) Simple Network Mail Protocol

    2) Single Network Mail Protocol

    3) Single Network Message Protocol

    4) Simple Network Management Protocol

    5) None of these

    147.On a school computer, Lucy learned how to copy programs. A classmate asked her to copy a program

    for his home use. Her most ethical response would be which of the following?

    1)Ill copy it, but you have to promise not to tell anyone.2)I dont know how to copy disks.

    3)I cant copy it because it will break copyright laws.

    4)Ill copy it for you, but you cant copy it for anyone else.

    5)None of these

    148.Which of the following is not true?

    1) LOGO stands for Live On Googles Orkut.

    2) BIOS is a system software.

    3) GRUB is a Linux boot loader.

    4) Ruby is a web scripting language.

    5) LILO is a Linux boot loader.

    149.What is Mail-Merge?

    1)a web based e-mail service with no spam

    2)a name of Yahoo! MINDSET search feature

    3)a new virus hoax which can delete data from mail inbox

    4)a feature of MS-Word used to create multiple documents like letters, mailing labels, name tags etc

    5)None of these

    150.In MS-Word, a menu item in dim color (gray) indicates that the menu is?

    1) toggle menu

    2) unavailable for current context

    3) not much required menu4) over-used menu

    5) None of these

    151.Which of the following cant be a proper virus detection and prevention tip?

    1)Do not open any file attached to an email unless you know what it is, even if it appears to come

    from a dear friend or someone you know. Some viruses can replicate themselves and spread through

    email. Better be safe than sorry and confirm that they really sent it.

    2)Do not open any file attached to an email if the subject line is questionable or unexpected. If the

    need to do so is there, always save the file to your hard drive before doing so.

    3)Open chain emails or junk mail and forward it to others.

    4)Do not download any file from strangers.

    5)None of these

    152._____ temporarily holds program instructions, data and output until they are no longer needed by

    the computer.

    1) Hard disk 2) Motherboard 3) CD 4) RAM 5) Floppy disk

    153.Which of the following statements is true about a storage media?

    1)Storage media are non-volatile.

    2)Hard disk has a very high access time as compared to RAM (10-20 million ns).

    3)Hard disk is very cheap as compared to RAM and large in capacity.

    1) Only 1 2) Only 2 3) Both 1 and 3

  • 7/25/2019 Computer Refresher MCQ

    13/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    4) Both 1 and 2 5) All 1, 2 and 3

    154.Basic Input Output System (BIOS) is necessary for

    1) boot-up 2) mouse and keyboard only

    3) resolution 4) audio and video system

    5) None of these

    155.255.255.0.0 is default mark of

    1) Class A networks 2) Class B networks3) Class C networks 4) Class D networks

    5) None of these

    156.SQL stands for

    1) Structured Query Language

    2) Solution to Query language

    3) Sub Query Language

    4) Structural Query Language

    5) None of these

    157.In which type of channel messages may flow in two directions but never at the same time?

    1) Full duplex 2) Half duplex 3) Simplex4) In data com, it is not possible. 5) None of these

    158.The first line of the C program contains a/an _____, indicated by # include.

    1) preprocessing directive 2) processing directive 3) main directive

    4) new line character 5) None of these

    159._____ technology standards have been used in the past, but Ethernet over twisted pair cabling and

    Wi-Fi are the two most common technologies currently used to build LANs.

    1) ARCNET, Token Ring 2) CIR 3) X.25 4) VoFR 5) None of these

    160.POST stands for

    1) Positive Operating System Test

    2) Particle Of Static Transfer

    3) Power-On Self-Test

    4) Printer Online Static Test

    5) None of these

    161.Which of the following statements is true about Bluetooth?

    A.Bluetooth is a proprietary open-wireless-technology standard for exchanging data over short

    distances

    B.Bluetooth uses a radio technology called frequency-hopping spread spectrum.

    C.A PC that does not have embedded Bluetooth can be used with a Bluetooth adapter that will

    enable the PC to communicate with other Bluetooth devices.1) Only A 2) Only B 3) Both A and C 4) Both B and D 5) All A, B and C

    162.Short keys for FIND in MS Office Word 2003 are

    1) Ctrl + B 2) Alt + Ctrl + A 3) Alt + Y 4) Ctrl + F 5) None of these

    163._____ is an electronic spreadsheet. You can use it to organise your data into rows and columns. You

    can also use it to perform mathematical calculations quickly.

    1) Microsoft Excel 2) Microsoft Word

    3) Microsoft PowerPoint 4) Microsoft Calculator

    5) None of these

  • 7/25/2019 Computer Refresher MCQ

    14/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    164.A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic

    media.

    1) plates 2) disks 3) relays 4) memories 5) platters

    165.The power supply supplies power to every single part in the PC. The power supply is to convert the

    230 VAC into 3.3 V, 5 V and 12 VDC power that the system requires for the operations. It is

    commonly known as

    1) Simple mode power supply 2) Switch mode power supply3) Uninterrupted power supply 4) Invertor 5) Convertor

    166.Which of the following statements is NOT true about a computer?

    1)8085 is an example of 8-bit microprocessor.

    2)Software is used to make computer usable.

    3)Based on the microprocessor, systems are classified as PC-XT and PC-AT.

    4)SMPS converts AC (Alternate Current) into DC (Direct Current).

    5)None of these

    167.The Intel 8085 is a/an _____ microprocessor introduced by Intel in the year _____.

    1) 16-bit, 1976 2) 16-bit, 1977 3) 8-bit, 1978 4) 8-bit, 1977 5) 8-bit, 1967

    168.Which of the following is NOT a goal of transaction processing system?

    1)Capture, process and store transactions

    2)Produce a variety of documents related to routine business activities

    3)Reduce manual effort associated with processing business transactions

    4)Produce standard reports used for management decision making

    5)None of these

    169.Which of the following is not an example of a virus?

    1) Polymorphic 2) Logic Bombs 3) Worms 4) Tartan 5) Trojan

    170.Timing and Control unit is a part of a(an)1) ALU 2) Processor 3) Memory 4) CMOS 5) BIOS

    171._____ is a software that is available for use at no cost or for an optional fee, but usually with one or

    more restricted usage rights.

    1) Firmware 2) Teachware 3) Testware 4) Freeware 5) Groupware

    172.____ involves checking or logging the data in; checking the data for accuracy; entering the data into

    the computer; transforming the data and developing and documenting a database structure that

    integrates the various measures.

    1) Data mining 2) Database 3) Data preparation 4) Data structuring 5) Data validation

    173.Which of the following is true for OCR?

    A)OCR is an improvement over OMR.

    B)It is the mechanical or electronic translation of scanned images of handwritten, typewritten or

    printed text into machine-encoded text.

    C)It is widely used to convert books and documents into electronic files, to computerise a record-

    keeping system in an office or to publish the text on a website.

    D)OCR systems require calibration to read a specific font; early versions needed to be programmed

    with images of each character, and worked on one font at a time.

    1) Only A) 2) Only B) 3) Only A), C) and D)

    4) Only B), C) and D) 5) All the above

  • 7/25/2019 Computer Refresher MCQ

    15/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    174.ISP stands for

    1) Internet Surfing Provider 2) International Service Provider

    3) Indian Service Provider 4) Internet Service Provider

    5) Indian Surfing Provider

    175.Every Web page is stored as a (an)

    1) Hypertext markup language document 2) Web document

    3) Hypertext message language document 4) Hyperlink document

    5) Internet explorer document

    176._____ is the amount of time a computer will repeat a single character when its key is held down.

    1) Typematic rate 2) Recycle rate 3) Holding rate

    4) Baud rate 5) Typewriter rate

    177.Database that spreads information across different tables while maintaining links between them is

    referred as

    1) Relational database 2) Rotational database

    3) Database connection 4) Tabular database

    5) None of these.

    178.Which is the first electronic spreadsheet on a microcomputer that helped turn the Apple II computer

    into a success and greatly assisted in their widespread application?

    1) Visi Calc 2) Lotus 1-2-3 3) Excel 4) TRS-80 5) None of these

    179.____ is a process where an external device can get the attention of the microprocessor. The process

    starts from the I/O device and is asynchronous.

    1) Request 2) Control 3) Interrupt 4) Interaction 5) None of these

    180.In relation to computer which of the following is arranged in proper sequence?

    1)HardwareAssembly languageMachine language- Highlevel language

    2)HardwareMachine languageHigh-level language-Assembly Language

    3)Machine languageAssembly languageHigh-level languageHardware4)HardwareMachine languageAssembly languageHigh-level language

    5)None of these

    181.Which of the following statements is true about a computer language?

    1)Machine languages are the only languages understood by computers. While easily understood by

    computers, machine languages are almost impossible for humans to use because they consist entirely

    of numbers.

    2)An assembly language contains the same instructions as a machine language, but the instructions

    and variables have names instead of being just numbers.

    3)Every CPU has its own unique machine language.

    4)1) and 2) are true 5) 1), 2) and 3) are true

    182.Which of the following is NOT a current spreadsheet software?

    1) IBM Lotus Symphony (2007) 2) KSpread 3) ZCubes-Calci

    4) GNU Oleo 5) None of these

    183.Databases overall structure is maintained in a file called

    1) Redolog file 2) Data file 3) Control file 4) Reload file 5) None of these

    184.Which of the following is not an advantage of a client/server model?

    1)A client/server model allows centralised control of data and centralised implementation of business

    rules.

  • 7/25/2019 Computer Refresher MCQ

    16/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    2)A client/server model increases developers productivity.

    3)A client/server model is suitable for all applications.

    4)A client/server model decreases developers productivity.

    5)None of these

    185.____ is a method of storing data on two or more hard drives that work in combination to do the job

    of a larger drive.

    1) DAID 2) RAID 3) Shadowing 4) Casting 5) MiniSD

    186.Which of the following is FALSE regarding SQL?

    1) It can execute queries against a database.

    2) It can retrieve data from a database.

    3) It can insert records in a database.

    4) It can update records in a database.

    5) It cant delete records from a database.

    187.Which of the following is not a design principle of BASIC?

    1)It is easy for beginners to use.

    2)It is a general-purpose programming language.

    3)Allow advanced features to be added for experts (while keeping the language simple for beginners).

    4)It is not interactive

    5)It provides clear and friendly error messages.

    188.C is a programming language originally developed for developing

    1) LINUX operating system 2) Windows NT

    3) Unix Operating system 4) Mac OS X

    5) Windows ME

    189.Which of the following is/are examples of upper layer technologies in the OSI model?

    1) TCP 2) HTTP, SSL and NFS 3) IP

    4) Ethernet 5) None of these

    190.In a Batch Processing Operating System, interaction between the user and the processor is

    1) limited 2) not possible 3) unlimited

    4) depends upon user only 5) depends upon amount of work

    191.In case of computer, JUMPER is

    1) used to configure the hard disk

    2) used to configure the primary memory

    3) used to play computer game

    4) a software language

    5) machine language

    192.Which of the following statements is true about FAT?

    1)The initial version of FAT designed for 16-bit microprocessors is now referred to as FAT16.

    2)FAT file systems are not found on floppy disks, flash memory cards and digital cameras.

    3)FAT was not commonly used on hard disks throughout the DOS and Windows 9x eras.

    4)FAT is a computer file system architecture now widely used on many computer systems.

    5)None of these

    193.First RAM chip was introduced by which of the following?

    1) Microsoft 2) Intel 3) Dell 4) HP 5)Apple

  • 7/25/2019 Computer Refresher MCQ

    17/19

    bsc

    4success

    .com

    Downloaded From: http://bsc4success.com

    194.____ is a system that pre-dates the World Wide Web for organising and displaying files on internet

    servers.

    1) HTML 2) SGML 3) Telnet 4) Gopher 5) None of these

    195.A specialised network device that determines the next network point to which it can forward a data

    packet towards the destination of the packet is commonly known as

    1) bridge 2) router 3) switch 4) hub 5) repeater

    196.Which of the following is a computer network service which allows clients to make indirect networkconnections to other network services?

    1) Firewall 2) Proxy 3) Network address translator 4) Hub 5) Bridge

    197.In a computer, a hardware and/or software that duplicates the functions of a first computer system

    in a different second computer system, so that the behaviour of the second system closely resembles

    the behaviour of the first system is known as

    1) Stimulator 2) Emulator 3) Scanner 4) Copier 5) None of these

    198.A _____ is the basic unit of data storage on a hard disk.

    1) track 2) sector 3) zone 4) gap 5) None of these

    199.A method of transferring information directly from a mass storage device such as hard disk or from

    adapter card into memory (or vice versa) without information passing through processor is commonly

    known as

    1) Direct memory access 2) Casting

    3) Standard memory access 4) Directional memory access

    5) None of these

    200.____ is the portion of the data block (oracle block) that contains information about the table having

    rows in this block.

    1) Table directory 2) Table row 3) Table column

    4) Header 5) Footer

    ANSWERS:

    1. 4 2. 4 3. 2 4. 3

    5.1; BIOS is Basic Input Output System. It is stored in computers permanent memory ROM.

    6.1; Boot strap is a program which is loaded in BIOS and it is responsible to start a computer.

    7.2; Transactions can be performed on Internet through online banking

    8.1

    9.4; Format drive name is used to format a drive through command prompt.

    10.4; FIND option is used to find a particular word or group of words. It is available under

    EDIT menu.

    11.2 12. 3 13. 2

    14.2; PDF files can be opened through only PDF readers such as Adobe Reader.

    15.4; Because programs are software

    16.2; NIC, ie Netowork Interface Card, is another name of LAN card which provides interface

    between a computer and a network.

    17.3 18. 4

    19.1; TMPIt is an extension of temporary file.

    20. 3

    21.3;Flowchart is a man-made diagram on paper, to represent algorithm and process both.

  • 7/25/2019 Computer Refresher MCQ

    18/19

    bsc4suc

    cess.com

    Downloaded From: http://bsc4success.com

    22.4

    23.3; Computer understands only binary system, so it uses binary system to process data

    24.4 25. 1 26. 3 27. 2

    28.3; Modifier key is a key which is used to change the meaning what we write.

    29.1; Document files are the special type of files where we can store letters, photos and memories.

    30.5; Artifical intelligence is the feature in which computers behave like human beings.

    31.1 32. 4 33. 1 34. 2 35. 2

    36.3; FLASH memory is based on time memory that means all data will be lost whenever current is

    discontinued. So it is RAM.

    37.4

    38.3; Both Sequential and Random files can be stored on a disk.

    39.4 40. 2

    41.2; Private key is used, because it is known to user only .

    42.3 43. 1 44. 2 45. 4

    46.3 47. 2 48. 4

    49.3; We can interchange the messages through Messenger, for example Yahoo Messenger, gtalk

    etc.

    50.4

    51.1 52.1 53.1 54.2 55.4

    56.2 57.2 58.5 59.1 60.4

    61.5 62.2 63.3 64.2 65.1

    66.3 67.2 68.3 69.3 70.2

    71.1 72.2 73.2 74.5 75.2

    76.4 77.1 78.4 79.2 80.4

    81.2 82.5 83.3 84.1 85.2

    86.1 87.4 88.4 89.5 90.2

    91.2 92.4 93.3 94.3 95.1

    96.2 97.4 98.2 99.2 100.3

    101. 3 102.2 103.4 104.1 105.1

    106.3 107.2 108. 5 109.3 110.3

    111. 2 112.2 113.3 114. 2 115.1

    116.4 117.4 118.4 119.2 120.3

    121. 2 122.3 123.3 124. 1 125.3

    126.2 127.1 128.1 129.3 130.4

    131. 4 132.4 133.2 134. 1 135.2

    136.4 137.4 138.4 139.3 140.4

    141. 2 142.3 143.3 144. 5 145.2

    146.4 147.3 148.1 149.4 150. 2

    151.3152.4; RAM is called primary memory of a computer.

    153.5

    154.1

    155.2;Class As default mask is 255.0.0.0

    Class Bs default mask is 255.255.0.0

    Class Cs default mask is 255.255.255.0

    156.1

    157.2; Half duplex is bidirectional connection, with the restriction that data can travel in one

    direction at a time.

    158.1 159.1

  • 7/25/2019 Computer Refresher MCQ

    19/19

    bsc

    4success

    .com

    160.3; POST: Power-On Self-Test refers to routines run immediately after power is applied, by

    nearly all electronic devices.

    161.5 162.4 163.1 164.5 165.2

    166.5 167.4 168.2 169.4 170.2

    171.4; Freeware (from free and software) is a computer software that is available for use at no

    cost or for an optional fee, but usually with one or more restricted usage rights.

    172.3 173.5 174.4 175.1 176.1

    177.1; A relational database stores information across different tables and connects them with links

    in the computer.178.1; VisiCalc: It was the first spreadsheet that combined all essential features of modern spreadsheet

    applications.

    179.3 180. 4 181.5 182.5 183.3 184.3

    185.2; RAID (redundant Arrays of Independent Disks) is a method of storing data on two or more

    hard drives that work in combination to do the job of a larger drive. Although RAID can be

    used to increase performance, it is most often used to protect critical data on a storage server.

    186.5 187.4

    188. 3; C is a computer programming language developed for general purpose between 1969 and

    1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating

    system.

    189.2; OSI designates the application, presentation and session stages of the stack as the upper

    layers. Generally speaking, software in these layers performs application-specific functions like

    data formatting encryption, and connection management. Examples of upperlayer technologies

    in the OSI model are HTTP, SSL and NFS.

    190.1; In a batch processing operating system, interaction between the user and the processor is

    limited or there is no interaction at all during the execution of work. Data and programs that

    need to be processed are bundled and collected as a batch and executed together.

    191.1; Several different connectors and jumpers are used to configure the hard disk and connect it

    to the rest of the system. The number and types of connectors on the hard disk depend on the

    data interface it uses to connect to the system, the manufacturer of the drive and any special

    features that the drive may possess.

    192.5; File Allocation Table (FAT) is a computer file system architecture now widely used on many

    computer systems and most memory cards, such as those used with digital cameras. FAT file systems are commonly found on floppy disks, flash memory cards, digital cameras and many

    other portable devices because of their relative simplicity. FAT was also commonly used on hard

    disks throughout the DOS and Windows 9x eras, but its use on hard drives has declined since the

    introduction of Windows XP, which primarily uses the newer NTFS.The initial version of FAT

    designed for 16-bit microprocessors is now referred to as FAT12.

    193.2

    194.4; Gopher is a system that pre-dates the World Wide Web for organising and displaying files on

    Internet servers. A Gopher server presents its contents as a hierarchically structured list of files.

    With the ascendance of the Web, many gopher databases were converted to Web sites which can

    be more easily accessed via Web search engines

    195.2

    196.2; Proxy is the computer network service which allows clients to make indirect network connections to other network services.

    197.2

    198.2; A sector is the basic unit of data storage on a hard disk. The term sector emanates from a

    mathematical term referring to that pie-shaped angular section of a circle.199.1 200.1