0% found this document useful (0 votes)
23 views

Comp. Fundamental & Architecture Guess Questions

The document contains a series of objective-type questions related to computer fundamentals and architecture, along with their correct answers. Key topics include the history of computers, components of computer systems, programming languages, and data storage. It serves as a study guide for individuals preparing for exams in computer science or information technology.

Uploaded by

sharplearn0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Comp. Fundamental & Architecture Guess Questions

The document contains a series of objective-type questions related to computer fundamentals and architecture, along with their correct answers. Key topics include the history of computers, components of computer systems, programming languages, and data storage. It serves as a study guide for individuals preparing for exams in computer science or information technology.

Uploaded by

sharplearn0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

MOST IMPORTANT OBJECTIVETYPE QUESTIONS

1. The term 'Computer' is derived from (d) Arabic Ans. (a)


(a) Latin (b) German (c) French
2. Who is the inventor of "Difference Engine"?
(b) Charles Babbage
(a) Allen Turing Ans. (b)
(d) Augusta Adaming
(c) Simur Cray
3. Who is the father of Computer?
(a) Allen Turing (b) Charles Babbage
(d) Augusta Adaming Ans. (b)
(c) Simur Cray
4. Who is the father of Computer science?
(a) Allen Turing (b) Charles Babbage
(c) Simur Cray (d) Augusta Adaming Ans. (a)
5. Who is the father of personal computer?
(a) Edward Robert (b) Allen Turing
(c) Charles Babbage (d) None of these Ans. (a)
6. A CPUcontains
(a) acard reader and a printing device
(b) an analytical engine and acontrol unit
(c) acontrol unit and an arithmetic logic unit
(d) an arithmetic logic unit and a card reader Ans. (c)
7. Which of the following controls the process of interactËon between the
user and the operating system?
(a) User interface (b) Language translator
(c) Platform (d) Screen saver Ans. (a)
8. The first computers were programmed using
(a) assembly language (b) machine language
(C) source code (d) object code Ans. (b)
9. is a combination of hardware and software that facilitates the sharing of
information between computing devices.
(a) network (b) periphera!
(c) expansion board (d) digital device Ans. (a)
10. Coded entries which are used to gain access to a computer system are
called
(a) Entry codes (b) Passwords
(c) Security commands (d) Code words Ans. (b)
11. Which of the foBlowing statements is true?
(a) Minicomputer works faster than Microcomputer
(b) Microcomputer works faster than Minicomputer
(c) Speed of both the computers is the same
(d) The speeds of both these computers cannot be compared Ans.
with (a)
the
speed of advanced
12. You organize files by storing them in
(a) archives (b) folders (c) indexes (d) lists Ans. (b)
13. What type of resource is most likely to be a shared common resource in a
computer Network?
(a) Printers (b) Speakers
(c) Floppy disk drives Ans. (a)
(d) Keyboards
Shrey Publishing House
14.
Which device is required for the
Internet 23)
(a) Joystick (b) Modem (c) CO Driveconnection?
(d) NIC Card
pen? Ans. (b)
15. What is alight
(a) A Mechanical Input device (b) Optical
ic) Electronic input device input device
(d) Optical output device
16. UNIVAC is Ans. (b)
(a) Universal Automatic Computer
(b) Universal Array Computer
ic) Unique Automatic Computer
id) Unvalued Automatic Computer
for Ans. (a)
17. CD-ROM stands
(a) Compactable Read Only Memory
(b) Compact Data Read Only Memory
(c) Compactable Disk Read Only Memory
id) Compact Disk Read Only Memory Ans. (a)
18. ALU is
(a) Arithmetic Logic Unit (b) Array Logic Unit
(c) Application Logic Unit (d) None of above Ans. (a)
19. VGA is
(a) Video Graphics Array (b) Visual Graphics Array
(c) Volatile Graphics Array (d) Video Graphics Adapter Ans. (a)
20. IBM 1401 is
(a) First Generation Computer (b) Second Generation Computer
(c) Third Generation Computer (d) Fourth Generation Computer Ans. (b)
21. MSI stands for
(a) Medium Scale Integrated Circuits
(b) Medium System Integrated Circuits
(c) Medium Scale Intelligent Circuit
(d) Medium System Intelligent Circuit Ans. (a)
22. The capacity of 3.5 inch floppy disk is
(a) 1.40 MB (b) 1.44 GB (c) 1.40 GB (d) 1.44 M8 Ans. (d)
23. WAN stands for
(a) Wap Area Network (b) Wide Area Network
(c) Wide Array Net (d) Wireless Area Network Ans. (b)
24. MICR stands for
(a) Magnetic Ink Character Reader
(b) Magnetic Ink Code Reader Ans. (a)
(c) Magnetic Ink Cases Reader (d) None
25. EBCDIC stands for
Code
(a) Extended Binary Coded Decimal Interchange
(0) Externded Bit Code Decimal Interchange Code
() Extended Bit Case Decimal Interchange Code
Interchange Code Ans. (a)
(d) Extended Binary Case Decimal
26. Which of Central Processing Unit?
the following is a part of the
(b) Key board
(a) Printer unit Ans. (d)
(C) Mouse (d) Arithmetic & Logic
27, CAD stands
for (b) Coputer algorithrm for
design
(a) Computer aided design
(C) Computer application in design Ans. (a)
(0) Computer analogue design
|124 Computer Fundamental &Architecture
28. Junk e-mail is also called
(b) spoof
(a) spam (d) spool
(c) sniffer script Ans. (a)
29. Hackers
(a) all have the same motive
(b) break into other people's computers
(c) may legally break into computers as long as they do not do anu.
damage
(d) are people whoare allergic to computers Ans. (b)
30. What type of computers are client computers (most of the time) in a
client-server system?
(a) Mainframe (b) Mini-computer
(c) Microcomputer (d) PDA Ans. (c)
31. A Computer cannot boot' if it does not have the
(a) Compilr (b) Loader
(c) Operating System (d) Assembler Ans. (c)
32. The amount of vertical space between lines of text in a document is called
(a) double-space (b) line spacing
(c) single space (d) vertical spacing Ans. (b)
33. Example of non-numeric data is
(a) Employee address (b) Examination sScore
(c) Bank balance (d) All of these Ans. (a)
34. What is enbedded system?
(a) The programme which arrives by being wrapped in box
(b) The programme which is the permanent part of the computer
(c) The computer which is the part of abig computer
(d) The computer and software system that control the machine Ans.
(d)
35. First page of Website is termed as
(a) Homepage (b) Index
(c) JAVA script (d) Bookmark Ans. (a)
36. Is the appearance of typed characters?
(a) Size (b) Format (c) Point (d) Colour Ans. (b)
37. When afile is saved for the first time
(a) a copy is automatically printed
(b) it must be given a name to identify it
(c) it does not need a name
(d) it only needs a name if it is not going to be printed Ans. (b)
38. Office LANS, which are scattered geographically on large scale, cali
connected by the use of corporate
(a) CAN (b) LAN (C) DAN (d) WAN Ans. (d)
39. Where are data and programme stored when the prOcessor uses ie
(a) Main memory (b) Secondary memory
(c) Disk memory (d) Programme mernory Ans. (a)
40. What characteristic of read-only memory (ROM) makes it usefui?
(a) ROM information can be easily updated.
(b) Data in ROM is non-volatile, that is, it remains there even without
electrical power.
(c) ROM provides very large amounts af inexpensive data storage
(d) ROM chips are easily swapped between different brands of Computers.
Ans. (b)
Shrey Publishing House
125
41.
represents raW facts, where-as
(a) Information, reporting is data made meaningful:
(b) Data, information
(c) Information, bits (d) Records, bytes
do you call the Ans. (b)
What
42. and their causes? programs that are used to find out
possible faults
(a) operating system extensions (b) cookies
(c) diagnostic software (d) boot diskettes
Which programming languages are classified Ans. (c)
(a) BASIC, COBOL, Fortran as low levei lanquages?
(b) Prolog
(c) C, C++ (d) Assembiy languages
AA Which of the following is not anti-viruses' software? Ans. (d)
(a) NAV (b) F-Prot (c) Oracle (d) MCAfee
As. Which device is required for the Internet connection2 Ans. (c)
(a) Joystick (b) Modem (C) CD Drive (d) NIC Card Ans. (b)
46. What does DMA stand for?
(a) ADistinct Memory ACcess (b) Direct Memory Access
(c) Direct Module Access (d) Direct Memory Allocation Ans. (b)
47, Which of the following is a storage device?
(a) Tape (b) Hard Disk
(C) Floppy Disk (d) All of the above Ans. (d)
48. When did John Napier develop logarithm?
(a) 1416 (b) 1614 (c) 1641 (d) 1804 Ans. (b)
49. A normal CD-ROM usually can store up to data?
(a) 680 KB (b) 680 Bytes (c) 680 MB (d) 680 GB Ans. (c)
50. MIS is designed to provide information needed for effective decision making
by?
.(a) Consumers (b) Workers (c) Foremen (d) Managers Ans. (d)
51. What is a light pen?
(a) Mechanical Input devIce (b) Optical input device
(c) Electronic input device (d) Optical output device Ans. (b)
52. BCD is
(a) Binary Coded Decimal (b) Bit Coded Decimal
(c) Binary Coded Digit (d) Bit Coded Digit Ans. (a)
53. ASCII stands for
(a) American Stable Code for International Interchange
(6) American Standard Case for Institutionai Interchange
(9 American Standard Code for Information Interchange
(a) American Standard Code for Interchange Information Ans. (c)
S4. Which of the followina is first generation of computer?
(a) EDSAC (b) IBM-1401 (c) CDC-1604 (d) ICL-2900 Ans. (a)
Chief component of first generation computer was
(a) Transistors (b) Vacuum Tubes and Valves
(c) Integrated Circuits (d) None of above Ans. (b)
56. FORTRAN 0S
(a) File Translation (b) Format Transiation
(c) Formula Translation (d) Floppy Translation, :Ans. (c)
S7, Second Generation computers were developed during
(a) 1949 to 1955 (b) 1956 to 1965
(c) 1965 to 1970 (d) 1970 to 1990 Ans. (b)
|126 Computer Fundamental &Architecture
58. EEPROM stands for
(a) Electrically Erasable Programmable Read Only Memory
(b) Easily Erasable Programmable Read Only Memory
(C) Electronic Erasable Programmable Read Only Memory
(d) None of the above Ans. (c)
59. The computer size was very large in
(a) First Generation (b) Second Generation
(C) Third Generation (d) Fourth Generation Ans. (a)
60. Microprocessors as switching devices are for which generation computers
(a) First Generation (b) Second Generation
(c) Third Generation (d) Fourth Generation Ans. (d)
61. Which of the following devices can be sued to0 directly image printed text?
(a). OCR (b) OMR (c) MICR (d) All of above Ans. (a)
62. The output quality of a printer is measured by
(a) Dot per inch (b) Dot per sq. inch
(C) DotsS printed per unit time (d) All of above Ans. (b)
63. In analogue computer
(a) Input is first converted to digital form
(b) Input is never converted to digital form
(c) Output is displayed in digital form
(d) All of above Ans. (b)
64. In latest generation computers, the instructions are executed
(a) Parallel only "(b) Sequentially only
(c) Both sequentially and parallel
(d) All of above Ans. (c)
65. Who designed the first electronics computer - ENIAC?
(a) Van-Neumann (b) Josèph M. Jacquard
(c) J. Presper Eckert and John WMauchly
(d) All of above Ans. (c)
66. Who invented the high level language "C"?
(a) Dennis M. Ritchie (b) Niklaus Writh
(c) Seymour Papert (d) Donald Kunth Ans. (a)
67. Personnel who design, program, operate and maintain computer equipmen
refers to
(a) Console-operator (b) Programmer
(c) Peopleware (d) System Analyst Ans. (c)
68. When did arch rivals IBM and Apple Computers In(c) decide to join handS?
(a) 1978 (b) 1984. (c) 1990 (d) 1991 Ans. (d)
69. Human beings are referred to as Homosapiens, which device is Cale
Sillico Sapiens?
(a) Monitor (b) Hardware (c) Robot (d) Computer Ans. (d)
70. An error in software or hardware is called a bue. What is the alternative
computer jargon for it?
(a) Leech (b) Squid (c) Slug (d) Glitch Ans. (d)
71. Modern Computer are very reliable but
(a) Fast they are not
(b) Powerful (c) Infallible (d) Cheap Ans. (c)
72. What is the name of the display feature that highlights are of the SCreen
which requires operator attention?
(a) Pixel (b) Reverse video
C) Touch screen (d) Cursor Ans. (b)
Shrey PublishingHouse
73. PerSonat computers use a number nf chips mounted on a main circtiit 127
board. What is the common name for such boards?
(a) Daughter board
(b) Motherboard
(c) Father board (d) Breadboard
Ans. (b)
14. In most IBM PCs, the CPU, the device drives, memory expansion slots and
ative components are moUnted on a single board. what is
this board? the name o
( a ) Motherboard
(b) Breadboard
(c) Daughter board (d) Grandmother board Ans. (a)
75. What is meant by a dedicated computer?
ia) Which is used by one person oniy
(b) Which is assigned one and onBy one task
ir) Which usesS one kind of software
i )Which is meant for application software Ans. (b)
The svstem unit of a personal computer typically contains ali of the foHowing
except
(a) MicroprocesSor (b) Disk controlier
(c) Serial interface (d) Modem Ans. (d)
17. A
computer program that converts an entire program into machine language
is called a/an
(a) Interpreter (b) Simulator (c) Compiler (d) Commander Ans. (c)
78.Acomputer program that translates one program instructions at a time
into machine language is called a/an
(a) Interpreter (b) CPU (c) Compiler (d) Simulator Ans. (a)
79. ASmall or intelligent device is so called because it contains within it a
(a) Computer (b) Microcomputer
(c) Programmable (d) Sensor Ans. (d)
working correcty is
80. A fault in acomputer program which prevents it from
known as Ans. (b)
(c) Biff (d) Strap
(a) Boot (b) Bug
virus which was taken from a 1970s
82. A self repiicating program, similar to aentitled the Shockwave Ricer is
Sience fiction novel by John Bruner (d) Worm Ans. (d)
(a) Bug (b) Vice (c) Lice
5. A state, is a bi-stable electronic circuit that has
(a) Multivibrator (b) Flip-flop Ans. (b)
(d) laten
{c) LogiC gates buik e-maii is knowh as
messages, such as unsolicited Ans. (a)
Waited repetitious (c) Calibrt
(d) Courier
(a) Span (b) Trash
B4. DOS stands for Session
(b) Disk Operating Ans. (a)
(a) Disk Operating System Digital Open
System
() Digital Operating Systern (d)
Ans. (b)
83, Who ís the chief of Microsoft (c) BlCinton (d) None
{a) Babbage (b) BillGates
86, Which of the foliowing are input devices?
(b) Mouse Ans. (d)
{a) Keyboard (d) Any of
these
{C) Card reader computer
as brain of
87. Which of the folBowing is also known Processing unit
(a) Control unit (b) Central
Ans. (b)
(C) Arithmetic and language ut
(d) Monitor
[128 Computer Fundamental &Architecture
87. Examples of output devices are
(a) Screen (b) Printer (c) Speaker (d) All of these Ans,
(dy
89. IBM stands for
(a) Internal Business Management
(b) International Business Management
(c) International Business Machines
(d) Internal Business Machines Ans. (c)
90. translates and executes program at run time line by line
(a) Compiler (b) Interpreter (c) Linker (d) Loader Ans. (b)
91. Is an 00P principle
(a) Structured programming (b) Procedural programming
(c) Inheritance (d) Linking Ans. (c)
92: COBÓL 0s widely used in applications
(a) Commercial (b) Scientific
(c) Space (d) Mathematical Ans. (a)
93. RAM stands for
(a) Random origin money (b) Random only memory
(c) Read only memory (d) Random access memory Ans. (d)
94. 1Byte = ?
(a) 8bits (b) 4bits (c) 2 bits (d) 9 bits Ans. (a)
95. SMPS stands for
(a) Switched mode Power Supply
(b) Start mode power supply
(c) Store mode power supply
(d) Single mode power supply Ans. (a)
96. The device used to carry digital data on analogue lines is called as
(a) Modem (b) Multiplexer (c) Modulator (d) Demodulator Ans. (a)
97. VDUis also called
(a) Screen (b) Monitor
(c) Both aand b (d) printer Ans. (c)
98. BIOS stands for
(a) Basic Input Output system (b) Binary Input output system
(c) Basic Input Off system (d) all the above Ans. (a)
99. Father of "C programming language
(a) Dennis Ritchie (b) Prof John Keenly
(c) Thomas Kurtz (d) Bill Gates Ans. (a)
100. The instructions that tell a computer how to carry out the processing
are referred to as computer tass
(a) programs (b) processors
(C) input devices (d) memory modules Ans. (a)
101. An area of a computer that temporarily hoids data waiting to be processed

(a) CPU. (b) Memory (c) Storage (d) File Ans. (b)
102, is the key to close a selected drop-down list: cancel a
a dialog box. command ano
(a) TAB (b) SHIFT (c) ESC Ans. (c)
103. is the key we use to run the (d) F10
(a) SHIFT selected comman(d) Ans. (c)
(b) TAB (c) ENTER (d) CTRL
104. Is the. functional key to
(a) F5 display save-as box. Ans. (d)
(b) F6 (c) F9 (d) F12
Shrey Publishing House
105. Data becomes
when it is presented in a
129
can understand and u^e format that people
(a) processed (b) graphs (C) information (d)
106. The term
designates presentation Ans. (c)
Computer systen to enhance
equipment that might be added to a
(a) digital device
its functionality.
(b) system add-on
(c) disk pack (d) peripheral device
is a Ans. (d)
107. A microprocessor-based
(a) perSonal computer computing
(b) mainframe device.
(c) workstation (d) server
Ans. (a)
108. RAM can be treated as the for the computer's processor.
(a) factory (b) operating room
(c) waiting room (d) planning room Ans. (c)
n Which of the following are the functions of a operating system
(a) MDcates resources (b) Monitors Activities
(c) Manages disks and files (d) All of the above Ans. (d)
410. To move a copy oT Tie rOm one Computer to another over a communication
channel is called?
(a) File transfer (b) File encryption
(c) File modification (d) File copying Ans. (a)
111. The primary function of the is to set up the hardware and load and
start an operating system
(a) System Programs (b) BIOS
(c) CP (d) Memory Ans. (b)
112. What kind of memory is both static and non-volatile?
(a) RAM (b) ROM (c) BIOS (d) CACHE Ans. (b)
113. is computer software designed to operate the computer hardware and to
provide platform for running application software
(a) Application softwar (b) System software
(c) Software (d) Operating system Ans. (b)
can move
114. The is the amount of data that a storage device
from the storage medium to the Computer per second
(a) data migration rate (b) data digitizing rate Ans. (c)
(c) data transfer rate data accesS rate
(d)
125. A device, which is not connected to CPU, is called as
(b) On-line device
(a) Land-line device Ans. (c)
(d) Device
(c) Off-line device
116. What is the other name for programmed
(c) LSIC
chip* (d) PROM Ans. (C)
(a) RAM (b) ROM generation
117. On-line real time systems become popular in
(b) Second Generation
(a) First Generation (d) Fourth Generation Ans. (c)
(c) Third Generation mouse, to input
118. You use a(n) such as a keytboard or
information (b) input device Ans. (b)
(a) output device (d) processing device
(C) storage device requested data
"jump" directly to the
119, is the ability of a device to (b) Random access
Ans. (b)
(a) Sequentia! access (d) All of the
above
C) Quick accesS
Computer
Fundamental & Architecture
(130 managernent services that allow t.
and memory
120. prOvides process programs to run
simultaneously
more tasks, jobs, or (b) Multithread1ng
(a) Multitasking (d) Multicomputin9 Ans. (a)
(c) Multiprocessing logical operations is
arithmetic and
operations like
121. The task of performing
called
(c) Editing (d) Sorting Ans. (a)
(a) Processing (b) Storing
known as
122. ALUand Control Unit jointly (c) CPU (d) PC Ans. (c)
(a) RAM (b) ROM
123. RAM is an example of (b) Primary memory
(a) Secondary memory Ans. (b)
(c) Main memory (d) Both (a) and (b)
124. Magnetic disk is an example of (b) Primary memory
(a) Secondary memory
(d) Both (a) and (b) Ans. (a)
(c) Main memory
Computer language
125. Which one of the following is NOT a (d) C+ + Ans. (a)
(c) COBOL
(a) MS-Excel (b) BASIC
126. RAM iS also called as
(a) Read/Write Memory (b) Long Memory
(c) Permanent Memory (d) Primary Memory Ans. (a)
as directed by the
127. Store data or information temporarily and pass it on
contro! unit
(a) Address (b) Register (c) Number (d) Memory Ans. (b)
128. Select the Odd one
(a) Operating system (b) Interpreter
(c) Compiler (d) Assembler Ans. (a)
129. A .... is an additional set of commands that the computer displays
after you make a selection from the main menu.
(a) dialog box (b) submenu
(c) menu selection (d) All of the above Ans. (a)
130. COBOL is an acronym for
(a) Common Business Oriented Language
(b) Computer Business Oriented Language
(c) Common Business Operated Language Ans. (a)
(d) Comnmon Business Organized Language
131. All of the following are examples of real security and privacy risks EXCEr
(a) Hackers (b) Spam
(c) Viruses Ans. (b)
(d) Identity theft
132. Which of the following is NOT one of the four major data processing

functions of a computer?
(a) gathering data (b) processing data into information
(c) analyzing the data or information
(d) storing the data or information Ans. (c)
133. All of the following are examples of storage devices EXCEPI :
(a) Hard d1sk drives (b) Printers Ans. (b)
(c) Floppy disk drives (d) CD drives
134. The CPU and memory are
(a) expansion board ocated on the :
(c) storage device (b) motherboard Ans. (b)
(d) output device
Shrey Publishing House
135.is the Science that attempts to produce machines that display the same
(131)
intelligence that humans do
type of
(a) Nanoscience
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence (AI) Ans. (d)
136. Servers are computers that provide resources to other computers
Connected to a:
(a) networked (b) mainframe
(c) supercomputer (d) client Ans. (b)
creating a computer program, the
137. When designs the structure
of the program
(a) End user (b) System Analyst
(c) Programmer (d) All of the above Ans. (b)
138, Acomputer program that Converts an entire program into machine language
at one time is called a/an
(a) Interpreter (b) Simulator (c) Characters (d) Compiler Ans. (c)
"39, Computers process datainto information by working exclusively with:
(a) multimedia (b) word (C) -numbers (d) characters Ans. (c)
The difference between people with access to computers and the Internet
and those without this access is known as the :
(a) Digital divide (b) Internet divide
(c) Web.divide (d) E-illiteracy Ans. (a)
141. Computers manipulate data in many ways and this manipulation is calie(d)
(a) upgrading (b) processing (c) batching (d) utilizing Ans. (b)
142. The ability to recover and read deleted or damaged files from a criminal's
computer is an example of a law enforcement speciality called:
(a) robotics (6) simulation
(c) computer forensics (d) animation Ans. (c)
143. Where does most data go first with in acomputer memory hierarchy?
(a) RAM (b) ROM (c) BIOS (d) CACHE Ans. (a)
144. The data mining technique derives rules from real-world
case examples.
(a) Rule discover (b) Signal processing
(C) Neural nets (d) Case-based reasoning Ans. (c)
145. are used to identify a user who returns to a Website
(a) Cookies (b) Plug-ins (c) Scripts (d) ASPs Ans. (a)
40. Codes consisting of lines of varyinq widths or lengths that are computer
readable are known as
(a) an ASCII Code (b) a magnetic tape
(C) an OCR SCanner (d) a bar code Ans. (d)
.Why is it unethical to share copyrighted files with your friends?
(a) It is not unethical, because it is legal. free.
(D) It isS unethical because the files are being given for
copyright laws.
() Sharing copyrighted files without permission breaks for free. Ans. (c)
(0) It is not unethical because the files are being given
148, Reusable optical storage will typically have the acronym:
(a) CD (c) ROM (d) RW Ans. (d)
(b) DVD
149, The most common type of storage devices are :
(a) Steel (b) Optical (c) Magnetic (d) Flash Ans. (b)
132) Computer Fundamental & Architecture
150. A device that connects to a network without the use of cables is caid
be:
(a) Distributed (b) Free
(c) Centralized (d) none of these Ans. (d)
151. A person who used his or her expertise to gain access to other people's
computers to get information legally or do damage is a :
(a) Hacker (b) Spammer
(c) Instant messenger (d) Programmer Ans. (a)
152. To access properties of an object, the mouse technique to use is :
(a) Dragging (b) Dropping
(c) Right-clicking (d) Shift-clicking Ans. (c)
153. ADVD is an example of a (n):
(a) Harddisk (b) Optical disc
(c) Output device (d) Solid-state storage device Ans. (b)
154. The procesS of transferring files from a computer on the Internet to your
computer is called
(a) Downloading (b) Uploading
(c) FTP (d) JPEG Ans. (a)
155. Help Menu is available at which button?
(a) Tracking (b) Formatting (c) Crashing (d) Allotting Ans. (b)
156. is the process of dividing the disk into tracks and sectors.
(a) End (b) Start (c) Turnoff (d) Restart Ans. (b)
157. Which is not abasic function of.a computer?
(a) CISC (b) RISC (c) CD-ROM (d) Wi-Fi Ans. (b)
158. The technology that stores only the essential instructions on a
microprocessor chip and thus enhances its speed is referred to as
(a) Store data (b) Accept input
(c) Process data (d) Copy text Ans. (d)
159. ASCII is a coding systern that provides
(a) 256 different characters (b) 512 different characters
(c) 1024 different characters (d) 128 different characters Ans. (c)
160. Which part of the computer is directly involved in executing the
of the Computer program? instructons
(a) The scanner (b) The main storage
(c) The secondary storage (d) The processor Ans. (d)
161. When a computer is switched on, the booting
(a) Integrity Test process performs
(b) Power-On Self-Test
(c) Correct Functioning Test (d) Reliatbility Test Ans. (b)
162. AComputer system that is old and perhaps not
as afn) satisfactory is rerered
(a) Ancient system (b) Historical system
(c) Age old system (d) Legacy system Ans. (d)
163. Which of the foilowing is not abinary number?
(a) 001 (b) 101 (c) 202 Ans. (c)
164, Which of the following does5 not (d) 110
(a) ROM store data permanently?
(C) Floppy Disk, (b) RAM
(d) Hard Disk Ans. (b)
Shrey Publishing House
Which the following is the smallest
of 133
165.
(a) Megabyte storage?
(b) Gigabyte
(c) Terabyte (d) None of these
Which of the following contains Ans. (d)
166.
the processing of transactions?
permanent data and gets updated during
(a) Operating System File (b) Transaction file
(c) Software File
(d) Master file
Which of the following helps to protect floppy disks Ans. (d)
167.
accidentally erased? from data getting
(a) Access notch
(b) Write-protect notch
(c) Entry notch (d) Input notch Ans. (b)
168. Amodem is connected to
(a) a telephone line (b) a keyboard
(c) aprinter (d) amonitor
60. Large transaction processing systems in automated
Ans. (a)
organisations use
(a) Online processing (b) Batch Processing
(c) Once-a-day Processing (d) End-of-day processing Ans. (b)
170. In a computer, most processing takes place in
(a) Memory (b) RAM
(c) Motherboard (d) CPU Ans. (d)
171. Which of the following is not storage medium?
(a) Hard disk (b) Flash drive
(c) DVD (d) scanner Ans. (d)
172. The computer. abbreviation KB usually means
(a) Key Block (b) Kernel Boot(c) Kilo Byte (d) Kit Bit Ans. (c)
173. The typical computer criminal is a(n) :
(a) Young hacker
(b) Trusted employee with no criminal record
(C) Trusted employee with a long, but unknown criminal record
(d) Overseas young cracker Ans. (b)
L74. The common name for the crime of stealing passwords is :
(a) Jacking (b) Identity theft
(c) Spoofing (d) Hacking Ans. (c)
ra Collecting personal information and effectively posing as another individual
IS known as the crime of:
(a) Spooling (b) Identity theft
(c) Spoofing (d).Hacking Ans. (b)
176. Malicious software is known as :
(a) Badware (b) Malware
(C) Maliciousware (d) Ilegalware Ans. (b)
177. A program that performs a useful task while simultaneously allowing
destructive acts is a: (b) Trojan horse
(a) Worm (d) Macro virus Ans. (b)
(c) Virus
178. An intentionally from program to program
disruptive program that spreads
or from disk to disk is known as a :
(a) Trojan horse (b) Virus
Ans. (b)
(C) Time bomb (d) Time-related bomb sequence
134 Computer Fundamental & Architecture
179. In 1999, the Melissa virus was a widely publicised :
(a) E-mail virus (b) Macro virus.
(c) Trojan horse (d) Time bomb Ans. (a)
180. What type of virus uses computer hosts to reproduUce itself?
(a) Time bomb (b) Worm
(c) Melissa virus (d) Macro virus ns. (b)
181. The thing that eventually terminates a worm virus is a lack of::
(a) Memory or disk space (b) Time
(c) CD drives space (d) CD-RW Ans. (a)
182. When a logic bomb is activated by a time-related event, it is known às
(a) Time-related bomb sequence
(b) Virus
(c) Time bomb (d) Trojan horse Ans. (c)
183. Aogic bomb that was created to erupt on Michelangelo's birthday is an
example of a :
(a) Time-related bomb sequence
(b) Virus
(c) Time bomb (d) Trojan horse Ans. (c)
184. What is the name of an application program that gathers user's nformation
and sends it to someone through the Internet?
(a) Avirus (b) Spybot
(c) Logic bomb (d) Security patch Ans. (b)
185. is the measurement of things such as fingerprints and retinal scans used
for security access.
(a) Biometrics b) Bio measurement
(c) Computer security (d) Smart weapon machinery Ans. (a)
186. What is the most common tool used to restrict access
to a omputer
system?
(a) User logins (b) Passwords
(b) Computer keys (d) Access-control software Ans. (b)
187. Hardware or software designed to quard against
Computer network is known as an): unauthorized access tO a
(a) Hacker-proof program (b) Firewall
(c) Hacker-resistant server
(d) Encryption safe wal! Ans. (b)
188. The scrambling of code is known as:
(a) Encryption (b) a firewal
(c) Scrambling (d) Password proofing Ans. (a)
189, To prevent the loss of data during
(a) Encryption program power failures, use a(n):
(c) Firewall (b) Surge protector
(d) UPS Ans. (d)
190. is defined as any crime completed
(a) Computer forensics through the use of computer tei
(c) Hacking (b) Computer crime
191. refers to electronic (d) Cracking Ans. (b)

(a) Cracking (b) trespassing


Jacking
or criminal. hacking.
Ans. (a)
192. The first electronic (c) Spoofing (d) Smarming
(a) J.V. Attansoff computer was developed by
(c) Simur Cray (b) Bill Gates
Ans. (a)
(d) Winton Serf
Shrey Publishing House
is an/a
135
193. Snowbolbperating system (b) HLL
( Software (d) Search engine Ans. (b)
194. S tching device of fifth generation computer is
Vacuum tubes (b) Transistors
(d) VLSI Ans. (d)
195. computers operates essentially by counting
(a) Portable computer (b) Hybrid computer
(Analog computer (d) Digital computer Ans. (d)
O6 caouter is Small general purpose micro computer, but
larger than portabie
computer
(a) Hybrid (b) Digital (c) Desktop (d) Laptop Ans. (c)
197.Cathode Ray Tube is a form of
(a) Keyboard (b) Mouse
(c) Monitor (d) Mother board Ans. (c)
198. Trackball is a.
(a) Input device (b) Output device
(c) Programming language .(d) Software Ans. (a)
199. Computer is a medium sized computer
(a) Micro (b) Mainframe (c) Super (d) Mini Ans. (d)
200. Computer are of large size
(a) Micro (b) Mainframe (c) Super (d) Mini Ans. (b)
201. Note book, laptop, palm,hand-held computers are comingunder the category
computer.
(aDigital computer (b) Mainframe computer
(c) Portable computer (d) Hybrid computer Ans. (c)
202. Light pen and joystick are
(a) Algorithm (b) Input devices
(c) Output devices (d) Portals Ans. (b)
203. ouch Screen is
(a)° Input device (b) Output device
(C) Both a & b above (d) None of these Ans. (c)
204. Printer is the cheapest in terms of price and operating cost
(a) Inkjet (b) Laser (C) Thermal (d) Dot matrix Ans. (d)
205. Printer is a non-impact printer and is quite in working
(a) Inkjet (b) Laser (c) Thermal (d) Dot matrix Ans. (a)
206. are high-end printers
(a) Inkjet (b) Laser (c) Thermal (d) Dot matrix Ans. (b)
207. afe used for plotting graphs and design on papers
(a) Trackbal! (b) Joystick (c) Light pen (d) Plotters Ans. (d)
208. Daisy wheei, Drum, chain etc. are the
() Flow chart (b) Mouse (c) Key board (d) Printers Ans. (d)
209. specific to users' needs
(a) System software (b) Application software
(C) Assemblers (d) Compilers Ans. (b)
210. Joshy, Perfumes are examples of
(a) Operating system (b) Computer languages
(C) Computer viruses (d) Web portals Ans. (c)
|136 Computer Fundamental & Architecture
systems
211. Which of the following is/are operating
(a) Windows (b) Unix
(c) OS/2 (d) All of these Ans. (d)
212."MAN" stands for
(a) Maximum Area Network (b) Minimum Area Network
(c) Main Area Network (d) Metropolitan Area Network Ans. (d)

213. Which of the following is a network topology (d) BUS


(a) LAN (b) WAN (c) MAN Ans. (d)
214. Which of the following is a type of network?
(b) Bus (c) Star (d) PAN Ans. (d)
(a) Ring
215. VOIP stands for.......
(a) Voice over IP (b) Video over IP
(c) Viruses over IP (d) Virtual over IP Ans. (a)
216. The first web browser is :
(a) Mosaic (b) Netscape
(c) Internet explorer (d) Collabra Ans. (a)
217. LAN stands for.
(a) Limitéd Area Network (b) Logical Area Network
(C) Local Area Network (d) Large Area Network Ans. (c)
218. are set of rules and procedures to control the data transmission over the
internet :
(a) IP address (b) Domains (c) Protocol (d) Gateway Ans. (c)
219. NOS stands for :
(a) Node operating system (b) Non-open software
(c) Network Operating system (d) Non-operating software Ans. (c)
220. are system software to facilitate editing of text and data :
(a) MS Word (b) Editors
(c) Power Point (d) MS publisher Ans. (b)
221. Computers, combine both measuring and counting, are called :
(a) Analbg (b) Digital
(c) Hybrid (d) All of these Ans. (c)
222. In world today, most of the computers are :
(a) Digitat (b) Hybrid (c) Analog (d) Complex Ans. (a)
223. Physical structure of computer is called :
(a) Software (b) Hardware
{c) Human ware (d) All of these Ans. (b)
224. In which type of computer, data are represented as discrete
(a) Analog computer signats
(b) Digital computer
(c) Both (d) Hybrid Computer Ans. (b)
225. Which of the following is available in the form of a
(a) Mainframe PC now?
(b) Microcomputer
(c) Minicomputer (d) Botth (a) and (c) Ans. (b)
226. PARAM is an example of :
(a) Super computer (b) PC
(c) Laptop (d) PDA Ans. (a)

You might also like