Você está na página 1de 8

OBJECTIVE QUESTIONS ON COMPUTER KNOWLEDGE & LITERACY

1.
For optical fibre used in point to point trans mission, the repeater spacing is
(2) 2 - 10

(3)T DM (4)QA M Frame Relay technique uses (1) circuit Switching (2) connecti on oriented (3) message switching (4) hybrid Switching (5) N one of these 10. Which enc oding type always has a non-zero av erage amp litude? (1) unipolar (2) multi-polar (3) bipolar (4) All o f the above

(1) 10 - 100 km
km
(3) 1 :" 10 km (4) 100 - 1000 km

9.

(5) None of these

(5) No ne of these 11. I n a S ONET system, __ can I' remove signa ls from a path. (1) An STS multiplier (5) None of these (2) a regenerator 4~ Which of the following in an ob(3) an add/dr op multipllers jective of multi programm es operating system? (4) a repeater (1) To maximise CPU ultilization (5) None of these (2) To minimize .turna round time 12. IBM stands for (3) To minimize respon se time (1) International Business Ma(4) Both (1) and (2) chine . (5) None of these (2) Interconnected Business Machi ne 5. The environment provided to ASP is based on(3) Internal Business machine (1) Client/server (4) Interacting Business Ma(2) Network chine (3) Centralized system (5) None o f these (4) Operator 13. The server on the internet is also (5) None of' .these known as 6. HUB is (l~ Repeate r (2) H ost (1) layer 1 device (3) Gateway (4) A ND Gate (2) central device (5) N one of these (3) dumb device 14. For multiple bra nching in "C" we (4) All of the above

(5) None of these 2. Favourites are accessible from the __ menu (1) start (2) title (3) stop (4) menu (5) None of these 3. Which one is not nee ded by server programme fr om an operating system? (1) Task pre-empti on (2) Task priority (3) Semaphores (4) All of the above

(3)Vnet (4) Inet (5) None of these 17. In MODEMS (1) Several digital signals a re multiplied (2) A digital signal changes some characteristic of a carrier wave (3) Digital signal is amplified (4) Both (1) and (2) (5) None of these 18. The binary values are represented by two different frequencies
in
(1) Amplitude shift keying

I:

(2) Frequency shift keying (3) Phase-shift keying (4) Time period (5) None of these 19. Messenger mailbox is present in (1) Internet Explorer (2) Netscape communicator (3) Both (1) and (2) (4) Neither (1) nor (2) (5) None of these 20. __ is a method in which multiple communication devices are connected to one another efficiently . (1) Switching (2) Redundancy (3) Capacity (4) Detecting (5) None of these 21. The first generation computers had? (1) Vacuum tubes and magnetic drum (2) Magnetic tape and transistors (3) ICs (4) All of the above (5) None of these

7. The UNIX, which comman

(5) None of. these

8.

d is used to display the mes sage or value of any variable on the screen? (1) cat (2) echo (3) display (4) char (5) None of these Which of the following tech nique is used in high speed modem? (1) PCM (2) F DM

use __ s tatement. (1) Swi tch (2) Go to (3) Cout (4) Case (5) Ci n 15. Web site is a collection of(1) HTML d ocuments (2) Graphic files ' (3) Audio and video files (4) All of the above (5) N one of these 16. The 1 st network that i nitiated the Internet was (1) ARPANET (2) NSF net

ANSWERS
1. (1) 5. (1) 2. (1) 6.(4) 3. (4) 7. (2) 11. (3) 15. (4) 19. (2) 4. (1) 8. (4) 12. (1) 16. (1) 20. (1)

9.(2) 10. (3) 13. 14. (1) (2) 17. 18. (2) (2) 21. (1)

OBJECTIVE QUESTIONS ON COMPUTER KNOWLEDGE & LITERACY


22. Which of the following is false about change in computer from one generation to the next ? (1) Computer size is decreased (2) Speed of processing increases (3) Memory/Storage capacities decreases (4) All of the above (5) None of these 23. is an animated character that gives help in MSOffice? (1) Office Worker (2) Comic Assistant (3) Office Assistant (4) All of the above (5) None of these 24. Which of the following has been created by research facility of Digital Electronic Corporation of USA? (1) Yahoo ! . (2) Alta Vista (3) Web Crawler (4) All of the above .
(5) None of these 25. We are shifting towards computerisation because (1) Current technologies are available (2) Technologies help in meeting the business objectives. (3) Hire the employees that are expert in the latest technol ogies are available (4) All of the above (5) None of these 26. Which of the following search engines continuously sends out that starts on a homepage of a server and pursue all links stepwise? (1) Spiders (2) Packets (3) Cookies (4) Paddle (5) None of these 27. Which of the following makes a network insecure? (1) Encryption (2) Network Interface Card (NIC)

(3) Help Menu (4) All of the above


(5) None of these

36. A stored link to a web page

29. Which

Input device cannot be used to work in MS Office? (1) Scanner (2) Light Pen (3) Mouse (4) Joy Stick (5) None of these 30. Artificial Intelligence can be used in every sphere of life because of its (1) Ability of work in hazardous places (2) Ability of think like human beings (3) Ability of work in artificial environments (4) All of the above (5) None of these 31. To avoid the wastage of memory, the instruction length should be (1) Multiple of character size only (2) Of word size only (3) Of file size only (4) Of word size which is multiple of character size (5) None of these 32. Electronic fund transfer is the exchange of money (1) From one place to another (2) From one account to another (3) From one bank to another (4) All of the above (5) None of these 33. All of the following are examples of real security and privacy risks EXCEPT: (1) Hackers (2) Viruses (3) Spam (4) Identity theft (5) None of these 34. Assembly language programs are written using (1) Hex code (2) Mnemonics (3) ASCII code (4) CI'ZALT (5) None of these 35. DMA module can communicate with CPU through(1) Interrupt V (2) Cycle stealing (3) Branch instruction (4) Signal sensor (5) None of these

37.

38.

, in order to have a quick and easy access to it later , is called (l)WP-!ink (2) Bookmark (3) Field (4) All of the above (5) None of these Which type of commerce is characterised by low volume and high value transactions in Bank ing? (1) C2G (2) B2B (3)B2C (4) None of these (5) None of these Which of the following is not a standard MSOffice Edition?
(1)CE

(2) Advanced (3) Standard (4) Professional (5) None of these 39. Which of the following is single user computer with many features and good processing pow er? (1) Workstation (2) Minicomputer (3) Microcomputer (4) All of the above (5) None of these 40. A process known as __ is used by large retailers to study trends. (1) data selection (2)POS (3) data mining (4) data conversion (5) None of these 41. Which of the following does not form a part of CPU ? (1) Control unit (2) Hard disk (3) Memory (4) All of the above (5) None of these

28.

(3) Static keys (4) All of the -above (5) None of these MS Office pro vides help in many ways . Which of these are more closer to the answer? (1) What 's This (2) Office Assistant

ANSWERS
22. (3) 26. (1) 30.(2) 34. (2) 38. (2) 23. (3) 27. (3) 31. (4) 35. (2) 39. (1) 24. (2) 28. (4) 32. (2) 36. (2) 40. (3) 25. (2) 29. (4) 33. (3) 37. (2) 41. (5)

OBJECTIVE QUESTIONS ON COMPUTER KNOWLEDGE & LITERACY


42. __ connects .millions of peopIe all over the world . (1) LAN (2) Web (3) Internet (4) All of the above (5) None of these 43. A computer-based information system is (1) A system in which a computer is used to process data to get information (2) Developing data (3) Performing complex rnathematical calculations (4) Data is put into the computer for processing (5) None of these 44. The time between program input & output is called (1) Execution time (2) Turn around time (3) Waiting time (4) All of the above (5) None of these 45. Third generation of computers have (1) High-level procedural Ianguages for the first time (2) An operating system for first time (3) Distributee! data processing (4) On-line real time systems (5) None of these 46. Which oneof the following statements is true with respect of VSAT? (1) Usage is restricted to geographical boundaries (2) Very high cost due to the usage of fibre optic cables (3) Though quality of data is high, it does not support high bandwidth (4) It operates in two frequency bands namely Ku and C (5) None of these 47. MIME is (1) A transport agent for E-mail (2) An interface between the mail client and the web server (3) A compressor that packages different formats into SMTP compatible type (4) All of the above (5) None of these 48. The earliest software was devel.oped using (1) The Waterfall model (2) Prototyping model (3) Spiral model (4) Incremental model (5) None of these 49. Which of the following is wrong? (1) Clients can store information (2) Wan is faster than LAN (3) Servers only provide net work resources (4) Peer-to-peer networks have poor securing (5) None of these 50. The ability to recover and read deleted or damaged flles from a criminal's computer is an exampIe of a law enforcement spe cialty called: (1) robotics. (2) simulation. (3) computer forensics . (4) animation . (5) None of these 51. Which of the memory is fastest? (1) Auxiliary (2) Buffer (3) Hard disk (4) Optical drive (5) None of these 52. Collection to tracks on a disk forms (1) Sector (2) Cylinder (3) Spindle (4) Directory (5) None of these 53. A disk where number of sectors are fixed Is called (1) Floppy (2) CD (3) Hard sectored (4) Soft sectored (5) None of these 54. The CPU and memory are locat(1) Remote concentrator (2) Message switcher (3) Front end processor (4) Demux (5) None of these 57. The key F12 opens a (1) Open dialog box (2) Save As dialog box (3) Save dialog box (4) Close dialog box (5) None of these 58. Which of these biometric tools use thermal sensors along with infrared rays for identifi cation? (1) Key stroke dynamics (2) Iris/Retinal scan (3) Speech recognition (4) Fingerprint scanning (5) None of these 59. __ are self replicating mallcious code independent of the action of the user , but slow down the processor on entering a network . (1) Viruses (2) Worms (3) Trojan Horse (4) All of the above (5) None of these 60. Generation of PIN in Bank ATM would require: (1) Acqulrer validates information (2) Acquirer sends response to the acceptor (3) Authorisation request is sent to the acquire (4) PIN entered is encrypted (5) None of these ~1. A Bridge recogntses addresses of (1) Layer 1 (2) Layer 2 (3) Layer 3 (4) All of the above (5) None of these

c r p the: on
(1)' expansion board. (2) motherboard. (3) storage device. (4) output device. (5) None of these 55. Which of the following combines signals from different sources into one and sends ' on a faster channel? (1) Simplex (2) Half duplex (3) Full duplex (4) Multiplexing (5) None of these 56. Which of the following choses correct data path for an incoming message and forwards it to relevant line?

ANSWERS
42.(3) 46. (4) 50.(3) 54. (2) 43. (1) 47.(3) 51. (2) 55. (4) 59.(3) 44.(1) 48.(1) 52. (2) 56. (2) 60. (4) 45. (4) 49. (2) 53. (3) 57. (2) 61. (3)

., -

:158. (2)

OBJECTIVE QUESTIONS ON COMPUTER KNOWLEDGE & LITERACY


62. EPROM is (1) Permanent storage device (2) Temporary storage device (3) Not a storage de vice (4) Volatile (5) None of these 63. ".TIF" extension name stands for (1) Tagged Image Format (2) Tag Improve Format (3) Tied Image Format (4) Time Image Frame (5) None of these 64.__________In an network , the Host computer is connected to local computers. (1) Star network (2) Hybrid network (3) Ring network (4) Complete network (5) Multipoint network 65. In programming languages the keyboard "Void " means it (1) Does not return any value when fmished (2) Does returns values when finished (3) automatically restarts (4) Both (1) and (2) (5) None of these 66. The keyboard shortcut to restart your computer is (1) Alt + F4 (2) Ctrl + F4 (3) Ctrl + Alt + Del (4) Alt + Del (5) None of these 67. Internet is (1) a complex system (2) decentrailised system (3) dynamic system (4) All of the above (5) None of these 68. What do you need to put your web pages on the WWW ? (1) a connection to internet (2) a Web Browser (3) a Web server (4) All of the above (5) None of these 69. Which out of the followi ng is not a programming language? (2) Java (3) C (4) FORTRAN If )) N rrm of these
(1) Foxpro

70. The instruction LOAD A is a (1) zero address instruction (2) one address instruction (3) two addresses instruction (4) three addresses instruction (5) None of these 71. MS-Excel is also known as (1) Calculator (2) Worksheet (3) Spread sheet (4) Either (2) or (3) (5) None of these 72. Which type of encoding is used in Ethernet technology? (1) Manchester (2) Differential Manchester (3) Retu rn to zero (4) AMI (5) None of these 73. The instruction of a program which is currently being executed are stored in (1) Secondary memory (2) Main memory (3) Read only memory (4) WORM (5) None of these 74. All high level language uses (1) compiler (2) interpreter (3) Both (1) and (2) (4) Either (1) or (2) (5) None of these 75. Find the odd term out (1) Stageful inspection (2) Alta vista (3) Proxy firewalls (4) Packet filtering firewalls (5) None of these 76. In HTML coding, which out of the following attributes used in font tag (1) colour (2) size (3) face '(4) All of the above
(5) None of these

78. Fibre optics cable supports data rate upto (1) 100 mbps to 2 gbps (2) 2 gbps to 4 gbps (3) 100mbps to 10 gbps (4) 10 gbps to 100 gbps (5) None of these 79. In Photos hop software we can __ the image (1) modify (2) delete (3) edit (4) All of the above (5) None of these 80. Most common channel used by networks today is (1) Internet (2) Telephone lines (3) Satellite (4) Mail (5) None of these 81. In a computer network , a com puter that can control a group of other computers for sharing . information as well as hardware utilities is known as (1) Client (2) Hub (3) Switch (4) Server (5) Control Panel 82; Which of the following should be defined as a numeric field? , (1) Telephone number (2) Zip code (3) Both (1) and (2) (4) Personal data (5) None of these 83. In shell programming , which of the following command is used for character translation? (1) tr
(3) grep
(5)

(2) dd

(4) sed

None of these

ANSWERS
62. (2) 66. (3) 70. (2) 74. (3) 78. (1) 82. (3) 63. (1) 67. (4) 71. (4) 75. (2) 79. (4) 83. (1) 64. (1) 68. (4) 72. (1) 76. (4) 80. (2) 65. (1) 69. (5) 73.(2) 77. (1) 81. (4)

77. DHTML stands for (IJ Dynamic hyper text markup language (2) Dynamic hypertext main language (3) Digital hyper text main language (4) Digital hyper text markup language (5) None of these

OBJECTIVE QUESTIONS ON COMPUTER KNOWLEDGE & LITERACY

84.

Which UN IX command would (4) wrap word (5) None of these 93. Left justify is the same as (1) Align left (2) Align centre (3) Align righ t 85. In a netw ork with 25 comput (4) All of th e abov e ers, which topo logy would re(5) None of these quire t he mor e extensive ca94. To put text on the right of the bling? page use the (1) Mesh (2) Star (1) Align left button (3) B us (4) Ring (2) Align center button (5) None of th ese (3) Just ify button 86. Dialogue control is a function of (4) Align right button the __ layer. (5) None of these (1) Transport (2) Session 95. Which of the following is a pop(3) Pres ent ation (4) Application ular DOS based spre adsheet (5) None of these package? 87. The program wh ich takes user (1) Word (2) Smart Cell input . interprets it and takes (3) Excel (4) Lotus 1-2-3 necessary ac tion is (5) None of these (1) Kernel 96. How many characters can be (2) S ystem calls typed in a single c ell in E xce l? (3) Shell (1) 256 (2) 1024 (4) Scheduler (3) 32767 (4) 65 .535 (5) None o f these (5) None of these 88. Most appropriate data structure 97. Comments pu t in cells are called in C to represen t linked list is (1) Smart Tip ( 2) Cell Tip (1) Arra y _ (2)Struct (3) Web T ip (4) Soft Tip (3) Union (4) Switch (5) None of these (5) Non e of these 98. Getting data from a cell located 89. Which bar is usually located be in a different sheet is called low that Title Bar that provides (1) Accessing ( 2) Referenc ing categ oriz ed options? (3) Updating (4) Functioning (1) M enu bar (2) Status Bar (5) None of these (3) Tool bar (4) Scroll bar 99. A numericvalue can be t reated (5) None of these as a label value if it preced es 90. Whi ch of the following is the fat_with est version of W indows? - (1) Apostrophe ( ') (1) Windows 98 (2) Exclamation (I) (2) Windows XP (3) Hash (#) (3) Windows 2000 (4) All of the above (4) Windows Vista ' (5) None of these (5) None of these 100. Data c an be arranged in a work91. Where should you save your sheet in an easy to understand computer files? manner using (1) on disc and in folders (1) Auto Forma~ting (2) in a dRAM (2) Applying Styles (3) in a fil ing cabinet (3) Changing fonts append a file called test to the end of a fi le called output ? (1) Cat output test (2) A ppend o utput test (3) W rite output text (4) C at text ou tput (5) None of these

(3) word wrap (4) E ither ( 1) or (2) (5) Non e of th ese 102. In HTML cod ing which ' out of the follo wing attribute ofH R tag suppresses t he shading effect and fields a solid line (l)Noshade (2) Nocolor (3)Nohr (4) E ither (1) or (2) (5) None ofthese

lassified by their functio ns. In that regard ~.com" represents (1) Government (2) Comm ercial (3) N on-profit organisation (4) Internet service provider (5) None o f these 104. HTTP in URL s tands for (1) Hyper T ext to Po int (2) H ype rlink f or Tiny Text Prot ocol (3) Hyper Text Tra nsfer Protocol (4) Hig hlighted Text Throu gh Pi ctures (5) None of these 105. The "Nyquist theorem " spec ifies the minimum sampling rate t o be (1) equal to l owest frequency of signa l (2) equal to highe st frequency of sign al (3) t wice the bandwidth of a s ig nal (4) twice t he highest freque ncy ofa sign al (5) N one of these 106. Memor y allocatio n at the r un time is known as (1) St atic memor y allocation (2) Dyn amic memory= = ANSWERS = (3) Paging allocatio n (4) Dem andin g (5) None of these

103. Interne t domains are c

= =

92.

(4) in the bin (4) All of these (5) Non e of thes e (5) Tilde H When th e text au tomatically goes 101. M icro instructions are kept in onto th e next line this is called (1) main memory (1) t ext wrap (2) page wrap (2) control store (3) cache

Você também pode gostar