Comp. Fundamental & Architecture Guess Questions
Comp. Fundamental & Architecture Guess Questions
(a) CPU. (b) Memory (c) Storage (d) File Ans. (b)
102, is the key to close a selected drop-down list: cancel a
a dialog box. command ano
(a) TAB (b) SHIFT (c) ESC Ans. (c)
103. is the key we use to run the (d) F10
(a) SHIFT selected comman(d) Ans. (c)
(b) TAB (c) ENTER (d) CTRL
104. Is the. functional key to
(a) F5 display save-as box. Ans. (d)
(b) F6 (c) F9 (d) F12
Shrey Publishing House
105. Data becomes
when it is presented in a
129
can understand and u^e format that people
(a) processed (b) graphs (C) information (d)
106. The term
designates presentation Ans. (c)
Computer systen to enhance
equipment that might be added to a
(a) digital device
its functionality.
(b) system add-on
(c) disk pack (d) peripheral device
is a Ans. (d)
107. A microprocessor-based
(a) perSonal computer computing
(b) mainframe device.
(c) workstation (d) server
Ans. (a)
108. RAM can be treated as the for the computer's processor.
(a) factory (b) operating room
(c) waiting room (d) planning room Ans. (c)
n Which of the following are the functions of a operating system
(a) MDcates resources (b) Monitors Activities
(c) Manages disks and files (d) All of the above Ans. (d)
410. To move a copy oT Tie rOm one Computer to another over a communication
channel is called?
(a) File transfer (b) File encryption
(c) File modification (d) File copying Ans. (a)
111. The primary function of the is to set up the hardware and load and
start an operating system
(a) System Programs (b) BIOS
(c) CP (d) Memory Ans. (b)
112. What kind of memory is both static and non-volatile?
(a) RAM (b) ROM (c) BIOS (d) CACHE Ans. (b)
113. is computer software designed to operate the computer hardware and to
provide platform for running application software
(a) Application softwar (b) System software
(c) Software (d) Operating system Ans. (b)
can move
114. The is the amount of data that a storage device
from the storage medium to the Computer per second
(a) data migration rate (b) data digitizing rate Ans. (c)
(c) data transfer rate data accesS rate
(d)
125. A device, which is not connected to CPU, is called as
(b) On-line device
(a) Land-line device Ans. (c)
(d) Device
(c) Off-line device
116. What is the other name for programmed
(c) LSIC
chip* (d) PROM Ans. (C)
(a) RAM (b) ROM generation
117. On-line real time systems become popular in
(b) Second Generation
(a) First Generation (d) Fourth Generation Ans. (c)
(c) Third Generation mouse, to input
118. You use a(n) such as a keytboard or
information (b) input device Ans. (b)
(a) output device (d) processing device
(C) storage device requested data
"jump" directly to the
119, is the ability of a device to (b) Random access
Ans. (b)
(a) Sequentia! access (d) All of the
above
C) Quick accesS
Computer
Fundamental & Architecture
(130 managernent services that allow t.
and memory
120. prOvides process programs to run
simultaneously
more tasks, jobs, or (b) Multithread1ng
(a) Multitasking (d) Multicomputin9 Ans. (a)
(c) Multiprocessing logical operations is
arithmetic and
operations like
121. The task of performing
called
(c) Editing (d) Sorting Ans. (a)
(a) Processing (b) Storing
known as
122. ALUand Control Unit jointly (c) CPU (d) PC Ans. (c)
(a) RAM (b) ROM
123. RAM is an example of (b) Primary memory
(a) Secondary memory Ans. (b)
(c) Main memory (d) Both (a) and (b)
124. Magnetic disk is an example of (b) Primary memory
(a) Secondary memory
(d) Both (a) and (b) Ans. (a)
(c) Main memory
Computer language
125. Which one of the following is NOT a (d) C+ + Ans. (a)
(c) COBOL
(a) MS-Excel (b) BASIC
126. RAM iS also called as
(a) Read/Write Memory (b) Long Memory
(c) Permanent Memory (d) Primary Memory Ans. (a)
as directed by the
127. Store data or information temporarily and pass it on
contro! unit
(a) Address (b) Register (c) Number (d) Memory Ans. (b)
128. Select the Odd one
(a) Operating system (b) Interpreter
(c) Compiler (d) Assembler Ans. (a)
129. A .... is an additional set of commands that the computer displays
after you make a selection from the main menu.
(a) dialog box (b) submenu
(c) menu selection (d) All of the above Ans. (a)
130. COBOL is an acronym for
(a) Common Business Oriented Language
(b) Computer Business Oriented Language
(c) Common Business Operated Language Ans. (a)
(d) Comnmon Business Organized Language
131. All of the following are examples of real security and privacy risks EXCEr
(a) Hackers (b) Spam
(c) Viruses Ans. (b)
(d) Identity theft
132. Which of the following is NOT one of the four major data processing
functions of a computer?
(a) gathering data (b) processing data into information
(c) analyzing the data or information
(d) storing the data or information Ans. (c)
133. All of the following are examples of storage devices EXCEPI :
(a) Hard d1sk drives (b) Printers Ans. (b)
(c) Floppy disk drives (d) CD drives
134. The CPU and memory are
(a) expansion board ocated on the :
(c) storage device (b) motherboard Ans. (b)
(d) output device
Shrey Publishing House
135.is the Science that attempts to produce machines that display the same
(131)
intelligence that humans do
type of
(a) Nanoscience
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence (AI) Ans. (d)
136. Servers are computers that provide resources to other computers
Connected to a:
(a) networked (b) mainframe
(c) supercomputer (d) client Ans. (b)
creating a computer program, the
137. When designs the structure
of the program
(a) End user (b) System Analyst
(c) Programmer (d) All of the above Ans. (b)
138, Acomputer program that Converts an entire program into machine language
at one time is called a/an
(a) Interpreter (b) Simulator (c) Characters (d) Compiler Ans. (c)
"39, Computers process datainto information by working exclusively with:
(a) multimedia (b) word (C) -numbers (d) characters Ans. (c)
The difference between people with access to computers and the Internet
and those without this access is known as the :
(a) Digital divide (b) Internet divide
(c) Web.divide (d) E-illiteracy Ans. (a)
141. Computers manipulate data in many ways and this manipulation is calie(d)
(a) upgrading (b) processing (c) batching (d) utilizing Ans. (b)
142. The ability to recover and read deleted or damaged files from a criminal's
computer is an example of a law enforcement speciality called:
(a) robotics (6) simulation
(c) computer forensics (d) animation Ans. (c)
143. Where does most data go first with in acomputer memory hierarchy?
(a) RAM (b) ROM (c) BIOS (d) CACHE Ans. (a)
144. The data mining technique derives rules from real-world
case examples.
(a) Rule discover (b) Signal processing
(C) Neural nets (d) Case-based reasoning Ans. (c)
145. are used to identify a user who returns to a Website
(a) Cookies (b) Plug-ins (c) Scripts (d) ASPs Ans. (a)
40. Codes consisting of lines of varyinq widths or lengths that are computer
readable are known as
(a) an ASCII Code (b) a magnetic tape
(C) an OCR SCanner (d) a bar code Ans. (d)
.Why is it unethical to share copyrighted files with your friends?
(a) It is not unethical, because it is legal. free.
(D) It isS unethical because the files are being given for
copyright laws.
() Sharing copyrighted files without permission breaks for free. Ans. (c)
(0) It is not unethical because the files are being given
148, Reusable optical storage will typically have the acronym:
(a) CD (c) ROM (d) RW Ans. (d)
(b) DVD
149, The most common type of storage devices are :
(a) Steel (b) Optical (c) Magnetic (d) Flash Ans. (b)
132) Computer Fundamental & Architecture
150. A device that connects to a network without the use of cables is caid
be:
(a) Distributed (b) Free
(c) Centralized (d) none of these Ans. (d)
151. A person who used his or her expertise to gain access to other people's
computers to get information legally or do damage is a :
(a) Hacker (b) Spammer
(c) Instant messenger (d) Programmer Ans. (a)
152. To access properties of an object, the mouse technique to use is :
(a) Dragging (b) Dropping
(c) Right-clicking (d) Shift-clicking Ans. (c)
153. ADVD is an example of a (n):
(a) Harddisk (b) Optical disc
(c) Output device (d) Solid-state storage device Ans. (b)
154. The procesS of transferring files from a computer on the Internet to your
computer is called
(a) Downloading (b) Uploading
(c) FTP (d) JPEG Ans. (a)
155. Help Menu is available at which button?
(a) Tracking (b) Formatting (c) Crashing (d) Allotting Ans. (b)
156. is the process of dividing the disk into tracks and sectors.
(a) End (b) Start (c) Turnoff (d) Restart Ans. (b)
157. Which is not abasic function of.a computer?
(a) CISC (b) RISC (c) CD-ROM (d) Wi-Fi Ans. (b)
158. The technology that stores only the essential instructions on a
microprocessor chip and thus enhances its speed is referred to as
(a) Store data (b) Accept input
(c) Process data (d) Copy text Ans. (d)
159. ASCII is a coding systern that provides
(a) 256 different characters (b) 512 different characters
(c) 1024 different characters (d) 128 different characters Ans. (c)
160. Which part of the computer is directly involved in executing the
of the Computer program? instructons
(a) The scanner (b) The main storage
(c) The secondary storage (d) The processor Ans. (d)
161. When a computer is switched on, the booting
(a) Integrity Test process performs
(b) Power-On Self-Test
(c) Correct Functioning Test (d) Reliatbility Test Ans. (b)
162. AComputer system that is old and perhaps not
as afn) satisfactory is rerered
(a) Ancient system (b) Historical system
(c) Age old system (d) Legacy system Ans. (d)
163. Which of the foilowing is not abinary number?
(a) 001 (b) 101 (c) 202 Ans. (c)
164, Which of the following does5 not (d) 110
(a) ROM store data permanently?
(C) Floppy Disk, (b) RAM
(d) Hard Disk Ans. (b)
Shrey Publishing House
Which the following is the smallest
of 133
165.
(a) Megabyte storage?
(b) Gigabyte
(c) Terabyte (d) None of these
Which of the following contains Ans. (d)
166.
the processing of transactions?
permanent data and gets updated during
(a) Operating System File (b) Transaction file
(c) Software File
(d) Master file
Which of the following helps to protect floppy disks Ans. (d)
167.
accidentally erased? from data getting
(a) Access notch
(b) Write-protect notch
(c) Entry notch (d) Input notch Ans. (b)
168. Amodem is connected to
(a) a telephone line (b) a keyboard
(c) aprinter (d) amonitor
60. Large transaction processing systems in automated
Ans. (a)
organisations use
(a) Online processing (b) Batch Processing
(c) Once-a-day Processing (d) End-of-day processing Ans. (b)
170. In a computer, most processing takes place in
(a) Memory (b) RAM
(c) Motherboard (d) CPU Ans. (d)
171. Which of the following is not storage medium?
(a) Hard disk (b) Flash drive
(c) DVD (d) scanner Ans. (d)
172. The computer. abbreviation KB usually means
(a) Key Block (b) Kernel Boot(c) Kilo Byte (d) Kit Bit Ans. (c)
173. The typical computer criminal is a(n) :
(a) Young hacker
(b) Trusted employee with no criminal record
(C) Trusted employee with a long, but unknown criminal record
(d) Overseas young cracker Ans. (b)
L74. The common name for the crime of stealing passwords is :
(a) Jacking (b) Identity theft
(c) Spoofing (d) Hacking Ans. (c)
ra Collecting personal information and effectively posing as another individual
IS known as the crime of:
(a) Spooling (b) Identity theft
(c) Spoofing (d).Hacking Ans. (b)
176. Malicious software is known as :
(a) Badware (b) Malware
(C) Maliciousware (d) Ilegalware Ans. (b)
177. A program that performs a useful task while simultaneously allowing
destructive acts is a: (b) Trojan horse
(a) Worm (d) Macro virus Ans. (b)
(c) Virus
178. An intentionally from program to program
disruptive program that spreads
or from disk to disk is known as a :
(a) Trojan horse (b) Virus
Ans. (b)
(C) Time bomb (d) Time-related bomb sequence
134 Computer Fundamental & Architecture
179. In 1999, the Melissa virus was a widely publicised :
(a) E-mail virus (b) Macro virus.
(c) Trojan horse (d) Time bomb Ans. (a)
180. What type of virus uses computer hosts to reproduUce itself?
(a) Time bomb (b) Worm
(c) Melissa virus (d) Macro virus ns. (b)
181. The thing that eventually terminates a worm virus is a lack of::
(a) Memory or disk space (b) Time
(c) CD drives space (d) CD-RW Ans. (a)
182. When a logic bomb is activated by a time-related event, it is known às
(a) Time-related bomb sequence
(b) Virus
(c) Time bomb (d) Trojan horse Ans. (c)
183. Aogic bomb that was created to erupt on Michelangelo's birthday is an
example of a :
(a) Time-related bomb sequence
(b) Virus
(c) Time bomb (d) Trojan horse Ans. (c)
184. What is the name of an application program that gathers user's nformation
and sends it to someone through the Internet?
(a) Avirus (b) Spybot
(c) Logic bomb (d) Security patch Ans. (b)
185. is the measurement of things such as fingerprints and retinal scans used
for security access.
(a) Biometrics b) Bio measurement
(c) Computer security (d) Smart weapon machinery Ans. (a)
186. What is the most common tool used to restrict access
to a omputer
system?
(a) User logins (b) Passwords
(b) Computer keys (d) Access-control software Ans. (b)
187. Hardware or software designed to quard against
Computer network is known as an): unauthorized access tO a
(a) Hacker-proof program (b) Firewall
(c) Hacker-resistant server
(d) Encryption safe wal! Ans. (b)
188. The scrambling of code is known as:
(a) Encryption (b) a firewal
(c) Scrambling (d) Password proofing Ans. (a)
189, To prevent the loss of data during
(a) Encryption program power failures, use a(n):
(c) Firewall (b) Surge protector
(d) UPS Ans. (d)
190. is defined as any crime completed
(a) Computer forensics through the use of computer tei
(c) Hacking (b) Computer crime
191. refers to electronic (d) Cracking Ans. (b)