Você está na página 1de 12

Q1) . is the science that attempts to produce machines that display same type of intelligence as the humans.

a) Simulation b) Artificial intelligence c) Nanoscience d) Hybridization Q2) A hybrid Computer a) Resembles digital computer b) Resembles analog cmputer c) Resembles both analog and digital computer d) None of the above Q3) What is back up? a) Adding more components to your network b) Protecting data from copying it from original source to different destination c) Filtering old data from the new data d) Accessing data on tape Q4) Anurag is a supercomputer developed in? a) China b) USA c) India d) England Q5) Which operation is not performed by computer? a) Inputting b) Processing c) Controlling d) Understanding Q6) A is approximately 1 billion bytes? a) Kilobyte b) Gigabyte c) Megabyte d) Terabyte Q7) Which number system is used as shortcut notations for groups of four binary digits? a) Binary b) Decimal c) Octal d) Hexadecimal Q8) The process of retrieving data from memory is called? a) Read out b) Read from c) Read d) All of the above Q9) A computer program which converts an entire program into machine language is called an .? a) Interpreter b) Simulator c) Compiler d) Changer Q10) What kind of software would you most likely use to keep track of billing account? a) Word Processing b) Electronic Publishing c) Spreadsheet d) Web authoring Q11) A set of instructions telling computer what to do is ?

a) Instructor b) Compiler c) Mentor d) Program Q12) Arranging of data in a logical sequence is known as? a) Classifying b) Searching c) Sorting d) Reproducing Q13) Which of the following is not a DBMS software? a) FOXPRO b) ORACLE c) Sybase d) Database 2000 Q14) If you wish to extend the length of the network without having the signal degrade, you would use a ? a) Repeater b) Router c) Gateway d) Switch Q15) One advantage of dial up internet access is? a) It utilizes broadband technology b) It utilizes existing telephone service c) It uses a router for security d) Modem speed is very fast Q16) Hard disk drives are considered as storage? a) Flash b) Non Volatile c) Temporary d) Non Permanent Q17) Microprocessors can be used to make ? a) Computer b) Digital Systems c) Calculators d) All of the Above Q18) Which of the following is generally reffered to as brain of computer? a) ALU b) CPU c) Control Unit d) Memory Q19) All of the following are storage devices except? a) Hard Disk drive c) Floppy disk drive b) Printers d) CD drive 20) Which of the following is not an example of Intel processor a) i3 b) i5 c) i7 d) i11 21) The difference between memory and storage is that memory is .. and storage is ..? a) Temporary , Permanent b) Permanent , Temporary

c) Slow , Fast d) None of the Above 22) Computer instructions written with use of english words instead of binary machine code is called as? a) Mnemonics b) Symbolic Code c) Gray Codes d) Opcode 23) An example of non numeric data is ? a) Bank Balance b) Examination marks c) Real numbers d) None of the above 24) Which of the following is the last key of the series F1, F2, F3 ..? a) F10 b) F11 c) F12 d) None of the above 25) A single application that combines the major features of several types of applications is called as .? a) integrated software b) suite c) combo package d) high end 26) Which of the following topology is least effected by addition or removal of node? a) Ring b) Star c) Bus d) Mesh Q13) Coaxial cables are good for ? a) Digital transmission b) Long distance transmission c) Both a and b d) None of the above 27) A device operating at the physical layer is ? a) Bridge b) Router c) Repeater d) All of the above 28) When a pointer is positioned on a .. it is shaped like a hand? a) Gramatical error b) Hyperlink c) Spelling error d) screen tip 29. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 30. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion 31. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS)

C. Sales D. Query 32. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining 33. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. 34. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information 35. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. A. POS B. RFID C. PPS D. GPS 36. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. 37. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. Open. C. Experimental. D. In the public domain. 38. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence 39. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) 40. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information 41. The name for the way that computers manipulate data into information is called: A. programming. B. Processing. C. Storing. D. Organizing.

42. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store 43. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. 44. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational 45. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. 46. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. 47. The term bit is short for: A. megabyte. B. binary language. 48. A string of eight 0s and 1s is called a: A. megabyte. B. byte.

C. binary digit.

D. binary number.

C. kilobyte.

D. gigabyte.

49. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 50) The metal or plastic case that houses the physical components of a computer together is called the: A.) CPU B.) Storage device. C.) Motherboard. D.) System unit. 51) The brains of the computer which executes the instructions, is called the: A.) CPU. B.) RAM. C.) Motherboard. D.) System unit.

52) Instructions and data that are about to be processed by the CPU are located in: A.) CD-ROM. B.) RAM. C.) The hard disk. D.) The motherboard.

53) The circuitry that includes the CPU and memory chips is located on the: A.) System unit. B.) Operating system. C.) Motherboard. D.) Computer platform.

54) All of the following are considered to be storage devices EXCEPT a: A.) Floppy disk. B.) CPU. C.) CD. D.) Hard disk drive.

55) What is the correct association between a hardware component and a computer function? A.) Monitor > input B.) Mouse > input C.) CPU > storage D.) Hard disk > processing

56) The main difference between application and system software is that: A.) Application software is composed of program instructions but system software is not. B.) Application software is stored in memory whereas system software is only in the CPU. C.) System software is unnecessary whereas application software must be present on the computer. D.) System software manages hardware whereas application software performs user tasks.

57) A document created in a word processing program or a budget created in a spreadsheet are both examples of documents created in:

A.) Application software. B.) System software. C.) An operating system. D.) A Windows platform. 58) Which of the following is an example of system software? A.) Word processor B.) Operating system C.) Management information system D.) Spreadsheet

59) The term that refers to computers that provide resources to other computers in a network is: A.) Server. B.) Mainframe C.) Platform. D.) Resource provider.

60) If a large business is going to use a single computer to execute many programs for hundreds (possibly thousands) of users at the same time, performing relatively simple operations and transactions, the type of computer will probably be a(n): A.) Supercomputer. B.) PC. C.) Mainframe. D.) ISP.

61) A scientific institution performing intensive mathematical operations for a complex model that requires extremely powerful computing capabilities will most likely use a(n): A.) Supercomputer. B.) PC. C.) Mainframe. D.) ISP.

62) The standard computer keyboard is configured using the ____________ layout. A.) Dvorak B.) QWERTY C.) Control D.) Dot-matrix

63) The most commonly used keys in the Dvorak keyboard layout are located in the: A.) Far right area of the keyboard. C.) Middle row. B.) Top row. D.) Function key area.

64) On computers using Microsoft Windows XP, holding the Windows key down and pressing the letter E will: A.) Start Windows Explorer. B.) Display the Start menu. C.) Execute Microsoft Windows. D.) Run Windows Help. 65. The insert, caps lock, and num lock keys are all examples of ____________ keys. A. control B. function C. toggle D. shortcut 66. The copy, cut, and paste features use keyboard shortcuts with the ____________ key and a keyboard letter. A. Shift B. Windows C. Alt D. Ctrl 67. RF keyboards differ from infrared keyboards in that they: A. must be closer to the computer. B. are connected to the computer via the USB port. C. do not need to be pointed at the computer. D. are used primarily on laptops or PDAs. 68. The traditional mouse requires a mouse pad to provide friction for its: A. touchpad. B. tracker. C. optical sensor. 69. The standard input device for a PDA is a: A. stylus. B. touch pad.

D. roller ball.

C. keyboard.

D. trackball mouse.

70. The flicker effect of a cathode ray tube is controlled by its: A. resolution. B. refresh rate. C. dot pitch. 71. A monitor with high dot pitch will have: A. a relatively large number of pixels. C. wide gaps between pixels.

D. data transfer rate.

B. a high number of possible colors in its display. D. relatively fast recharging of the pixels illumination.

72. The larger the number of pixels of a computer monitor, the higher its: A. resolution. B. refresh rate. C. dot pitch. D. data transfer rate. 73. The maximum complete electron scans of current CRT monitors is ____________ times per second. A. 25 B. 50 C. 75 D. 100 74. Electron beam scanning is a characteristic of: A. laser printers. B. flat panel monitors. C. cathode ray tubes. D. liquid crystal display. 75. The type of output device that utilizes a fluorescent panel for generating light waves is a(n): A. CRT monitor. B. inkjet printer. C. laser printer. D. LCD monitor. 76. The main advantage of active matrix over passive matrix technology is that active matrix panels: A. have higher screen resolution. C. cost less than passive matrix panels. B. can selectively recharge individual pixels. D. require less power consumption than passive matrix panels.

77. The following are all advantages of LCD over CRT monitors EXCEPT: A. Wider viewing area relative to size of the monitor. C. More friendly to the environment. 78. The fastest and quietest type of printer is a(n): A. Dot-matrix printer. C. Laser printer. B. Inkjet printer. D. Plotter. B. Less likely to cause eyestrain. D. Wider viewing angle.

79. The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n): A. Plotter. B. Inkjet printer. C. Laser printer. D. Dot-matrix printer.

Q1) MICR stands for? a) Magnetic Ink Character Recognition b) Magnetic Ink Code Reader c) Magnetic Ink Cases Reader d) None of the above Q2) Who designed the first Electronics computer ENIAC?JOHN MAUCHLY AND JOHN PRESPER ECKERT Q3) What is meant by a dedicated computer? a) used by one person only b) assigned one and only one task c) uses one kind of software d) meant for application software Q4) A . is an electronic device that process data, converting it into information? a) Processer b) Computer c) Case d) Stylus (CHALLENGE QUESTION, TO BE ANSWERED BY YOU) Q5) The CPU and memory are located on the? a) Expansion Board b) Mother Board c) Storage device d) Output device

Q6) The number of characters that can be stored in a given physical space is? a) Word length b) Byte c) Data Density d) Field Q7) In computer term, an error in software and coding is called as? a) Bug b) Error c) Blunder d) Debug Q8) The process of removing bug is called as? a) Debugging b) Error Handling c) No-Bugging d) None of the above Q9) A blinking symbol on the computer screen is called? a) Mouse b) Hand c) Light d) Cursor Q10) A typical Personal Computer used for business purposes would have RAM? a) 4 KB b) 16 K c) 64 K d) 256 K Q11) Two kind of main memory are? a) Primary & Secondary b) Random & Sequential c) RAM & ROM d) None of the Above Q12) Which of the following is the way to access secondary memory? a) Random Access Memory b) Action Method c) Transfer Method d) Density Method Q13) Computers use the . language to process data? a) Processing b) Kilobyte c) Representational d) Binary Q14) . is data that has been organised or presente in a meaningful fashion? a) A Process b) Software c) Storage d) Information Q15) Each model of a computer has a unique? a) Assembly of a computer b) Machine Language c) High Level Language d) All of the Above

Q1) Which of the following is the secondary memory device? a) Keyboard b) Disk c) ALU d) All of the above Q2) DVD stands for? a) Digital Versatile Disk b) Digital Video Disk c) Both of the Above d) None of these Q3)Computer uses the number system to store data and perform calculations? a) Decimal b) Hexadecimal c) Octal d) Binary Q4) Test the validity of the statements? a) 1 KB = 1024 BYTES b) 1 MB = 2048 BYTES c) 1 MB = 1000 KILOBYTES d) 1 KB = 1000 BYTES

Q5) Instruction in computer language consist of? a) OPCODE b) OPERAND c) Both (a) and (b) d) None of the Above

Q6) Machine language is? a) Machine dependent b) Difficuilt to program c) Error Prone d) All of the Above

Q7) Which of the following is not a computer language? a) C b) C++ c) Java d) Microsoft

Q8) In DOS, which of the following command is used to delete all the files as well as all sub-directories of a directory? a) Delete b) Del c) Deltree d) Move

Q9) To move to the beginning of a line of text, we use key? a) Home b) a c) Page up d) Enter Q10) The tells the computer how to use its components? a) Utility b) Network c) Operating System d) Application Program Q11) DSL is an example of a connection? a) Network b) Wireless c) Slow d) Broadband

Q12) What is the full form of USB in terms of computer? a) Universal Security Block b) Ultra Serial Bus c) Universal Serial Bus d) United Service Block

Q13) What is the combination used to PASTE text or other things in computer? a) Ctrl + Enter b) Shift + Enter c) Ctrl + Ins d) Shift + Ins Q14) Sending an E-mail is similar to? a) Writing a letter b) Drawing a picture c) Talking on phone d) Sending a package Q15) A commonly used graphic format used for web is? a) .gif b) .bmp c) .tif d) .imp Q1) . are specially designed computers that perform complex calculations extremely rapidly? a) Servers b) Supercomputers c) Laptops d) Mainframes Q2) In analog Computer a) Input is first converted to digital form b) Input is never converted to digital form c) Output is displayed in digital form d) All of the above

Q3) What is the responsibility of the logical unit in the CPU of a computer? a) To produce result b) To compare numbers c) To control flow of infomation d) To do maths work ? Q4) What is other name of Daisy wheel printer? a) Petal printer b) Golf ball printer c) Laser printer d) Line printer Q5) Before a disk can be used to store data. It must be? a) Formatted b) Reformatted c) Adressed d) Washed Q6) What will happen when data is entered into a memory location? a) It will add to the content of location b) It will change address of the memory location c) It will erase the previous content d) It will not be useful if there is any data stored already Q7) Time in which a job is processed by computer is called as? a) Delay time b) Execution time c) Real time d) In time Q8) The binary language consist of digit? a) 1 b) 2 c) 1024 d) 2048 Q9) Two categories of software are? a) Word Processing & Spreadsheet b) Transaction & Application c) System & Application d) None of these Q10) Which of the following is the an example of an operating system? a) Ubuntu b) Giduntu c) Chabuntu d) Buntu Q11) Which of the following languages is a mathemetically oriented language used for scientific problems? a) COBOL b) FORTRAN c) LISP d) PROLOG

Q12) Device that connects to the network without the use of cables is said to be? a) Distributed b) Wireless c) Centralised d) Open Source Q13) . key is used to take the cursor to the end of line? a) End b) Delete c) Page Down d) Home Q14) Any method for controlling access to memory is known as? a) Memory Maping b) Memory Protection c) Memory Spam d) None of the Above Q15) Which of the following is called low level language? a) Machine Language b) Assembly Language c) High Level Language d) Medium Level Language

Você também pode gostar