Computer Knowledge 1. HTML viruses infect a) - TopicsExpress



          

Computer Knowledge 1. HTML viruses infect a) your computer b) a Web page in the HTML code c) both a Web page and the computer that is viewing it d) All the above e) None of these 2. _______ technology standards were used in the past, but Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies currently being used to build LANs. a) ARCNET, Token Ring b) CIR c) X.25 d) VoFR e) None of these 3. Microsoft Project is an example of _____ software. a) personal financial b) customer relationship management (CRM) c) project management d) personal information manager (PIM) e) None of these 4. Image made of thousands of pixels are called a) bitmap b) vector c) story boards d) graphics e) None of these 5. Machine Language a) is the language in which programs were first written. b) is the only language understood by the computer c) differs from one type of computer to another d) All of these e) None of these 6. FTP stands for a) File Translate Protocol b) File Transit Protocol c) File Typing Protocol d) File Transfer Protocol e) None of these 7. Memory, also called random access memory, or RAM, a) contains the electronic circuits that cause processing to occur. b) makes the information resulting from processing available for use. c) allows data, programs, commands, and user responses to be entered into a computer d) consists of electronic components that store data e) None of these 8. A processing complex consisting of two or more interconnected computer is called. a) computer network b) control program c) cybernetics d) All the above e) None of these 9. Let A, B and C be three binary numbers. Which of the following is not true according to Boolean algebra laws? a) A + B = B + A b) AB = BA c) A - B = B - A d) (A+B) + C = A + (B+C) e) None of these 10. If a memory chip is volatile, it will a) explode if exposed to high temperatures b) lose its contents if current is turned off c) be used for data storage only d) be used to both read and write data e) None of these 11. The name given to a document by user is called a) Filename b) Program c) Data d) Record e) None of these 12. To “maximize” a window means to a) fill it to capacity b) expand it to fit the desktop c) put it on toolbar. d) drag it to the Recycle Bin e) None of these 13. Press _______ to move the insertion point to the Address box or to highlight the URL in the Address box. a) ALT + D b) ALT + A c) SHIFT + TAB c) TAB + CTRL d) CTRL + S 14. Housing all hardware, software, storage and processing in one site location is called a) time sharing b) a distributed system c) centralized processing d) a host computer e) None of these 15. What does AMD stand for? a) Advanced Mainframe Devices b) Advanced Micro Devices c) Advanced Mini Devices d) Advanced Major Devices e) Advanced Monitor Devices 16. The cell reference for cell range of G3 to M13 is a) G3. M13 b) G3-M13 c) G3; M13 d) G3:M13 e) G3+M13 17. __________ are raw facts from which _____ is derived. a) Data, output b) Input, information c) Data, information d) Input, output e) None of these 18. Using computers and communication technology to help people better use and manage information is called a) Ergonomics b) Except System c) Decision Support System d) Office Automation e) Executive Support System 19. PDF extension is used for which of the following? a) MS-Excel b) Adobe Reader c) Photoshop d) Pagemaker e) None of these 20. The ascending order of a data hierarchy is a) bit → byte → record → character → database b) bit → byte → field → record → file → database c) bit → byte → record → field → file → database d) All the above e) None of these 21. __________ is a set of computer programs used in a computer to help perform tasks. a) An instruction b) Software c) Memory d) A processor e) None of these 22. Which of the following makes Windows popular? a) Multitasking capacity b) Desktop features c) Users-friendly GUI features d) Being inexpensive e) None of these 23. WIMAX technology is based on the IEEE _________ standard. a) 802.13 b) 802.15 c) 802.11 d) 802.16 e) 802.14 24. _________ is the first available high-level language developed by IBM in 1957. a) PROLOG b) LEO c) PASCAL d) FORTRAN e) ALGOL 25. The part of operating system that manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel and serial ports, is a) basic input/output system b) secondary input/output system c) peripheral input/output system d) marginal input/output system e) None of these 26. _________ viruses are often transmitted by a floppy disk left in the floppy drive. a) Trojan horse b) Boot sector c) Script d) Logic bomb e) None of these 27. The formula of storage capacity of an optical disk is a) Number of sectors x Number of bytes per sector b) Number of tracks x Number of bits per second c) Number of tracks x Number of bytes per second d) Both I and II e) None of these 28. The main circuit board of the system unit is the a) Computer program b) Control Unit c) Mother board d) RAM e) None of these 29. A _________ is a bi-stable electronic circuit that has two stable states. a) Multivibrator b) Flip-flop c) Logic gates d) latch e) None 30. Computer’s language consisting of binary numbers that directly correspond to its electrical state is called a) Natural b) BASIC c) Machine language d) Assembly language e) High level language 31. A transaction file is a type of a) data file b) master file c) access method d) Only b and c e) None of these 32. A function inside another function is termed as a) round function b) sum function c) nested function d) test function e) loop function 33. You Tube service of streaming videos online is provided by a) IBM b) Apple c) SONY d) Google e) Yahoo 34. Handheld computers come under which category of computer? a) Supercomputer b) Mainframe computer c) Mini computer d) Micro computer e) Personal computer 35. The concept of logarithm was developed by a) Blaise Pascal b) Joseph Marie c) Howard Alken d) John Napier e) Charles Babbage 36. EDSAC computer was based on the ideas of a) John Backup b) J P Eckert c) Gottfried d) John Von Neumann e) Herman Hollereith 37. Which of the following is an example of optical disk? a) Magnetic disk b) Blu-ray disk c) Memory disk d) Data bus disk e) Zip disk 38. __________ can check the physical address of source and destination contained in the frame. a) Router b) Repeater c) Hub d) Bridge e) Gateway 39. Which of the following is NOT a good Web security strategy? a) To restrict access to the Web server; and to keep a minimum number of ports open b) To limit the users who can load software, edit or add files c) To add demo programs so that users can test system without accessing production data d) To remove unnecessary compilers and interpreters e) None of these 40. The altering of data so that it is not usable unless the changes are undone is called a) Biometrics b) Compression c) Encryption d) Ergonomics e) None of these 41. Which of the following communication lines is best suited to interactive processing applications? a) Narrow band channel b) Simplex lines c) Full duplex lines d) Mixed band channels e) None of these 42. Web storefronts are virtual stores for ______ electronic commerce. a) b2c b) b2b c) b2e d) g2c e) c2c 43. The capability of a computer to perform more than one task at the same time is called a) batch processing b) realtime processing c) multitasking d) scheduled processing e) None of these 44. What kind of scheme is the HTTP protocol? a) get/put b) store/forward c) queuing d) search / return e) request/response 45. _______ is the act of copying or downloading a program from a network and making multiple copies of it. a) Network piracy b) Plagiarism c) Software piracy d) Site-license piracy e) None of these 46. A directory within a directory is called a a) Mini-Directory b) Junior Directory c) Part - Directory d) Sub-Directory e) None of these 47. Which device is used to access your computer by other computer or for talking over phone? a) RAM b) CD-ROM Drive c) Modem d) Hard Drive e) None of these 48. A proxy server is used for which of the following? a) To provide security against unauthorized users b) To process client request for Web pages c) To process client request for database access d) To provide TCP/IP e) None of these 49. Information on a computer is stored as a) analog data b) digital data c) modem data d) watts data e) None of these 50. A file that contains definitions of the paragraph and characters styles for your document and all things you customize like toolbars and menus is called a a) guide b) pattern c) base document d) template e) None of these ANSWERS 1.D 2.A 3.C 4.A 5.D 6.D 7.D 8.A 9.C 10.B 11.A 12.B 13.A 14.D 15.B 16.D 17.C 18.D 19.B 20.B 21.B 22.C 23.D 24.D 25.A 26.B 27.A 28.C 29.B 30.C 31.A 32.C 33.D 34.D 35.D 36.D 37.B 38.D 39.D 40.C 41.C 42.A 43.C 44.E 45.C 46.D 47.C 48.A 49.B 50.D - See more at: sbank.in/2013/07/computer-knowledge-july-2013clerkspo.html#sthash.97eT9B8V.dpuf
Posted on: Sun, 14 Jul 2013 18:06:27 +0000

Trending Topics



Recently Viewed Topics




© 2015