comp2 Flashcards
Q501. An error in a computer program is called a ______(a) bug(b) virus(c) crash(d) power failure(e) None of these
(a)Explanation: (a) A software bug is an error, flaw, failure or fault in computer program or system that produces an incorrect or unexpect result, or causes it to behave in unintended ways. Most bugs arise from mistakes and errors made by people in either a program’s source code or its design, or in framework and operating systems used by such programs, and a few are caused by compilers producing incorrect code.
- The name of the computer’s brain(a) RAM(b) ROM(c) ALU(d) CPU(e) None of these
(d)Explanation: (d) The CPU (Central Processing Unit) is refered to as the brain of the computer as most of the processing of the computer takes place here. CPU performs arithmetic operations such as addition, multiplication, etc and logical comparisons such as greater than, less than, equal to, etc.
- Saving is the process of _____.(a) making changes to a document’s existing content(b) copying a document from memory to a storage medium(c) changing the appearance, or overall look, of a document & (d) developing a document by entering text using a keyboard(e) None of these
(b)Explanation: (b) Saving is the process of copying data from a temporary area to a more permanent storage medium. For example, when you edit a file with a word processor, the word processor copies the entire file, or portions of the file, into an area of main memory called a buffer. Any changes you make to the file are made to the copy in the buffer not to the real file on the disk. The buffer is temporary- as soon as you exit the program or turn off the computer, the buffer disappears. To record your modifications to the file on the disk, you must save the file. When you do this, the word processor copies the contents of the buffer to the file on the disk, replacing the previous version of the file.
- In a computer file system which among the following is top or first in hierarchy ?(a) parent directory(b) root directory(c) home directory(d) working directory(e) None of these
(b)Explanation: (b) In a computer file system that is organised as a hierarchy or tree, the root directory is the first or top most directory in a hierarchy. That is, it includes all other directories . for eg. the root directory (or folder) of the main partition on your computer is probably C:\
- With a CD you can _____(a) Write(b) Read(c) Read and Write(d) Either Read or Write(e) None of these
(c)Explanation: (c) A compact disc (CD) is a small, portable, round medium made of molded polymer for electronically recording, storing, and playing back audio, video, text and other information in digital form. Different types of CD include CDROM, CD-R, CD-RW, DVD, etc.
- When computer users ______ a document, they change its appearance.(a) create(b) edit(c) save(d) format(e) None of these
“(d)Explanation: (d) Formatting refers to the appearance or presentation of your document. It is also called layout. To ““format”” is to apply a look and feel to your document. It may include font, size, color, bold, italics, paragraph style, spacing, bullets and numbering, auto styles, background, highlighting, outline and special effects.”
- A flat metallic disk that contains a large amount of permanently stored information read optically is called a ______(a) ALU(b) Monitor(c) CD-ROM(d) RAM(e) None of these
(c)Explanation: (c) CD-ROM (Compact Disc-Read Only Memory) is a compact disc on which a large amount of digitized data can be stored and accessed but it can not be altered by the user-that is, it contains permanently stored data which can not be changed.
- What is a modem connected to ?(a) mother board(b) processor(c) phone line(d) printer(e) None of these
(c)Explanation: (c) A modem is a device or program that enables a computer to transmit data over telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone line is transmitted in the form of analog waves. A modem converts between these two form.
- A ________ is an icon on the desktop that provides a user with immediate access to a program or file.(a) buffer(b) kernel(c) shortcut(d) spooler(e) None of these
(c)Explanation: (c) In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the operation that saves time over the regular operation. In windows 95 and later operating systems, a short cut is a computer desktop icon that enables a user to easily see and select a particular program or data object. The operating system comes with some shortcuts already visible on the desktop. A user can remove these or add new ones.
- To select text by shading as you drag the mouse arrow over the text is referred to as _____(a) highlight(b) clip art(c) fetch(d) decode(e) None of these
(a)Explanation: (a) A highlight refers to an indication that text or other object has been selected with a mouse or keyboard. When highlighting text, the selected text colors reverse, show as blue, have dots around the selection, or have bold lines around the selected text. To highlight text using a mouse, position your cursor at the beginning of the text you want to highlight. Press and hold your primary mouse button (left button), while holding the button, move the cursor to the end of the text and let go of the button. This will highlight all text from the beginning to the end.
- The restart of computer is called __, when computer is already on.(a) Warm Booting(b) Cold Booting(c) Shut Down(d) Logging off(e) None of these
(a)Explanation: (a) Warm boot refer to restarting a computer that is already turned on via the operating system. Restarting it reforms the computer to its initial state. A warm boot is sometimes necessary when a program encounters an error from which it cannot recover on PCs, you can perform a worm boot by pressing control, Alt and Delete keys simultaneously.
“512. A computer message is ““Do you really want to delete the selected files (s)?”” The user clicks ‘Yes’ key. It is called(a) User output(b) Program Response(c) User Response(d) Program output(e) None of these”
(c)Explanation: (c) User response is the user’s answer to the computer’s questions such as choosing ok, YES, or NO or typing in text, for example, the name of a file.
- To open disk, mouse pointer is placed on disk icon and then-(a) mouse is double-clicked(b) mouse is dragged pushing the button(c) mouse is rotated around(d) mouse is clicked after rotating it(e) None of these
(a)Explanation: (a) Double-clicking is most often used to open items on your desktop. For example, you can start a program or open a folder by double- clicking its icon on the desktop. To double-click an item, point to the item on the screen, and then click twice quickly.
- Files are organised after storing in_______(a) Folders(b) Archives(c) Indices(d) Lists(e) None of these
“(a)Explanation: (a) In graphical user interfaces such as windows and the Macintosh environment, a folder is an object . On computer’s hard drive to store files. These files can be documents, programs, scripts, libraries, etc. A folder can also store sub-folders. Folders allow people to organize their files in a way that makes sense to them. For eg. a college student might store all her photos in a folder name ““Pictures””, all her assignments in a folder named ““college work”” and all her financial information in a folder named ““Finance””.”
- ______ are such distinct items, which do not have wide implication in the given situation.(a) Data(b) Field(c) Query(d) Property(e) None of these
(b)Explanation: (b) A field consists of grouping of characters. A data field represents an attribute (a characteristic or quality) of some entity (object/ person/place/event). They are distinct items that do not have wide implication in the given situation. Whereas a record represents a collection of attributes that describe a real world entity. A record consists of fields, with each field describing an attribute of the entity. For example, a tax form contains a number of fieldsone for your name, one for your social security number and one for your income, etc.
- Which of the following is appropriate method to shutdown computer ?(a) Click ‘Start’, then select ‘Restart the Computer’(b) Click ‘Start’, then select ‘Shut Down’ and finally select ‘Shut Down’.(c) Switch off the Power(d) Switch off Monitor and Printer(e) None of these
“(b)Explanation: (b) Never just switch off your computer-you may loose unsaved information and damage your computer’s hard disk drive. To shut down your computer properly, follow the steps: • Click the start button • Click shutdown • Select the ““shut down the computer”” option by clicking on it. • Click the Yes button to confirm your selection.”
- The user generally applies ____ to access mainframe or super computer.(a) Node(b) Terminal(c) Desktop(d) Hand held(e) None of these
(b)Explanation: (b) Traditionally, user connect to a mainframe using a terminal which allowed them to input request to the mainframe. The mainframe would then handle all the computing before outputing a response. These terminals are called dumb terminals because they had no data-processing abilities of their own, they were simply windows through which users could access the mainframe. These days, terminal emulation software such as 3270 emulation is used in place of a terminal.
- Which of the following is called small single site network ?(a) DSL(b) LAN(c) RAM(d) USB(e) None of these
(b)Explanation: (b) A LAN (Local Area Network) is a single site network. A single site network exists when multiple pieces of computer equipment in one geographic location- such as a campus, office or home-are connected together for the purpose of sharing information. A network that connects multiple pieces of computer equipment in multiple geographic locations is a multi site area network, also known as WAN (Wide Area Network).
- Tape drive provides_____access to data.(a) Sporadic(b) Timely(c) Random(d) Sequential(e) None of these
(d)Explanation: (d) A tape drive is a data storage device that reads and writes data on a magnetic tape. A tape drive is a sequential access device because to get to point ‘q’ on the tape, the drive needs to pass through points ‘a’ through ‘p’. A disk drive, on the other hand, is a random-access device because the drive can access any point on the disk without passing through all intervening points.
- The person who writes computer program and test, is known as-(a) Computer scientist(b) Programmer(c) Software engineer(d) Project developer(e) None of these
(b)Explanation: (b) A computer programmer write code or instructions to make the computer do specific tasks. These instructions are called programs. Before writing the code, the programmer gets the algorithm from a software engineer. To write those instructions, programmers use programming languages such as C, C++, Java, COBOL, etc.
- What is the storage area for email messages called?(a) A mailbox(b) A folder(c) A directory(d) The hard disk(e) None of these
(a)Explanation: (a) A mailbox refers to an area in memory or a storage device where email is placed. In email system, each user has a private mailbox. when the user receives email, the email system automatically puts it in the mailbox.Q522. The Internet is ——(a) an internal communication system for a business(b) a large network of networks(c) a communication system for the Indian government(d) a communication system for some states of India(e) a communication system for some cities of India (b)Explanation: (b) The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks.
- When data changes in multiple lists and all lists are not updated, this causes ——(a) information overload(b) data redundancy(c) duplicate data(d) data inconsistency(e) data repetition
(d)Explanation: (d) Data inconsistency exists when different and conflicting versions of the same data appear in different places. Data inconsistency creates unreliable information, because it will be different to determine which version of the information is correct. Data inconsistency is likely to occurs when there is data redundancy. Data redundancy occur when the data file/database file contains redundant-unnecessar i ly duplicated-data.
- URL stands for ——(a) Universal Resource List(b) Universal Research List(c) Uniform Research List(d) Uniform Research Locator(e) Uniform Resource Locator
(e)Explanation: (e) URL stands for uniforms resources locator. It is the address of a world wide web page.
- If you wish to extend the length of the network without having the signal degrade, you would use a——(a) router(b) resonance(c) gateway(d) switch(e) repeater
(e)Explanation: (e) Network repeaters regenerate incoming signals. With physical medium like Ethernet, data transmissions can only span a l imited distance before the quality of the signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which data can safely travel.
- An error in a computer program(a) Power Failure(b) Crash(c) Bug(d) Virus(e) Fatal error
(c)Explanation: (c) A software bug is an error, flaw, failure or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways.
- A means of capturing an image (drawing or photo) so that it can be stored on a computer is —–(a) Software(b) Modem(c) Scanner(d) Keyboard(e) Mouse
(c)Explanation: 9.(c) A scanner is a device that reads or scans an image and converts it to a digital format. It captures images from photographic prints, posters, magazine pages, letters, forms, and other similar sources forcomputer editing and display.
- Which process checks to ensure the components of the computer are operating and connected properly?(a) Processing(b) Booting(c) Saving(d) Editing(e) Starting
(b)Explanation: (b) Booting is the process that starts operating systems when the user turns on a computer system. A boot sequence is the initial set of operations that the computer performs when power is switched on. The boot loader typically loads the main operating system for the computer.
- What is the process of copying software programs from secondary storage media to the hard disk called?(a) download(b) configuration(c) storage(d) upload(e) installation
(e)Explanation: (e) Installation of system software onto your hard disk will provide you with direct access to hardware
- One advantage of dial-up Internet access is ——(a) it is Indian(b) it utilizes broadband technology(c) it uses a router for security(d) modem speeds are very fast(e) it utilizes existing telephone service
(e)Explanation: (e) Dial up internet access is a connection type that operates, through a standard telephone line. By running the telephone line to a modem device in the computer and configuring it to dial a specific phone number, the computer can connect to the internet. This connection type is usually inexpensive, but slow and may not be adequate for users who use the web for multimedia and other high bandwidth applications.
- The software that allows users to surf the Internet is called a/an —(a) Internet Service Provider (ISP)(b) Search engine(c) Multimedia application(d) Browser(e) Internet Surfing Provider
(d)Explanation: (d) Browser (or web browser) is a software application used to enable computer users to locate and access web pages. Browsers translate the basic HTML code that allows us to see images, text videos and listen to audios on website, along with hyperlinks that let us travel to different web pages. The browser gets in touch with a web server and request for information.
- ERP is an acronym for ——(a) Enterprise Relationship Planning(b) Enterprise Retirement Planning(c) Enterprise Resource Planning(d) Enterprise Reorder Planning(e) Enterprise Retention Planning
(c)Explanation: (c) Enterprise Resource Planning
- The first page of a Web site is called the ——(a) Index(b) Homepage(c) Java Script(d) Book mark(e) Intro Page
(b)Explanation: (b) Home page is most often refers to the initial or main web page of a web site, sometimescalled the front page.
- The computer’s capability of distinguishing spoken words is called ——(a) speech acknowledgement(b) voice analysis(c) voice recognition(d) speech interpretation(e) vocalisation
“(c)Explanation: (c) Speech recognition (also known as automatic speech recognition or computer speech recognition) converts spoken words to text. The term ““voice recognition”” is sometimes used to refer to recognition systems that must be trained to a particular speaker— as is the case for most desktop recognition software. Recognizing the speaker can simplify the task of translating speech.”
- The patterns of printed lines on most products are called ——(a) striping(b) prices(c) scanners(d) OCR(e) barcodes
(e)Explanation: (e) A barcode is an optical machine- readable representation of data, which shows data about the object to which it attaches. Originally, barcodes represented data by varying the widths and spacings of parallel lines. Its uses on products.
- Unauthorized copying of software to be used for personal gain instead of for personal backups is called——(a) data snatching(b) program thievery(c) software piracy(d) program looting(e) data looting &
(c)Explanation: (c) The software piracy refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common.
- Hackers ——(a) are people who maintain computers(b) all have the same motive(c) may legally break into computers as long as they do not do any damage(d) are people who are allergic to computers(e) break into other people’s computers
(e)Explanation: (e) Hackers are very knowledgeable computer users who use their knowledge to invade other people’s computers.
- Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called ——(a) hypertext(b) hypermedia(c) HTML(d) URL(e) FTP
(a)Explanation: (a) Hypertext is text displayed on a computer or other electronic device with references (hyperlinks) to other text that the reader can immediately access, usually by a mouse click or keypress sequence. Apart from running text, hypertext may contain tables, images and other presentational devices. Hypertext is the underlying concept defining the structure of the World Wide Web.
- A term relating to sending data to a satellite is ——(a) modulate(b) downlink(c) demodulate(d) uplink(e) interrelate
(d)Explanation: (d) Uplink is a term relating to sending data to a satel l ite. An uplink is the portion of a communications link used for the transmission of signals from an Earth terminal to a satellite or to an airborne platform.
- The issues that deal with the collection and use of data about individuals is ——(a) publicity(b) access(c) accuracy(d) property(e) privacy
(e)Explanation: (e) Privacy is the right to be left alone when you want to be, to have control over your own personal information, and not to be observed without your consent.
- The _____ settings are automatic and standard.(a) CPU(b) default(c) peripheral(d) user friendly(e) defaulter
(b)Explanation: (b) Default setting refers to the controls of a computer hardware or software (or of a device, equipment or machine) as preset by its manufacturer. A default is a predesigned value or setting that is used by a computer program or system when a value or setting is not specified by the user. Default settings are also called presets, especially for electronic devices.
- The life-span of a CD-ROM is —(a) approximately two years(b) approximately one year(c) approximately five years(d) approximately twenty-five years(e) almost unlimited
(c)Explanation: (c) The life span of a CD-ROM is approximately five years. Unlike pressed original CDs, burned CDs (such as CD-RW) have a relatively short life span of between two to five years, depend- ing on the quality of CD. Burned CDs have a recording surface consisting of a layer of dye that can be modified by heat to store data. The degradation process can result in data shifting on the surface and thus becoming unreadable to the laser beam.
- What is MP3 ?(a) A Printer(b) A mouse(c) A Sound format(d) AScanner(e) A Mobile Phone
(c)Explanation: (c) MP3 is a patented digital audio encoding format using a form of lossy data compression. It is a common audio format for consumer audio storage, as well as a de facto standard of digital audio compression for the transfer and playback of music on digital audio players.
- What is usually used for displaying information at public places?(a) Overhead Projections(b) Monitors(c) Monitors and Overhead Projections(d) Touch Screen Kiosks(e) Loud Speakers
(a)Explanation: (a) An overhead projector is a variant of slide projector that is used to display images to an audience.
- Junk e-mail is also called ——(a) Spoof(b) Spam(c) Cookie crumbs(d) Sniffer script (e) Spill
“(b)Explanation: (b) Junk email is unsolicited email that wants to sell you something. Junk email is often sent as a ““spam”” - a single email message broadcast to hundreds or thousands of unknowing recipients - and is also usually ““anonymous”” in that you can not write back to the address that is listed as the sender of the message.”
- What is an embedded system?(a) A program that is permanent part of a computer(b) A program that comes wrapped in a box(c) A computer that is part of a larger computer(d) A computer and software system that controls a machine or appliance(e) None of these
(d)Explanation: (d) An embedded system is a computer system designed to perform one or few dedicated functions often with real - time computing constaints. It is embedded as a part of a complete device often including hardware and mechanical parts. Embedded system range from portable devices such as digital watches, MP3 players, etc. to large stationary installations like traffic lights, factory controller or the systems controlling nuclear power plants.
- How is it possible that both programs and data can be stored on the same floppy disk?(a) A floppy disk has to be formatted for one or for the other(b) A floppy disk has two sides, one for data and one for programs(c) Programs and data are both software, and both can be stored on any memory device(d) Floppy disks can only store data, not programs(e) Floppy disks are better than CDs
(c)Explanation: (c) Both data files and computer programs can be stored on any memory device like hard disk, floppy disk, optical disks such as CD, DVD, etc. It preserves data or programs for retrieval.
- Why should you delete unknown e-mail attachments?(a) the person could track you down and hurt you(b) You could go to jail(c) it is bad manners(d) it might contain a virus that could hurt your computer(e) None of these
(d)Explanation: (d) Most of the viruses that spread on your computer are delivered through attachments. These attachments are sent via email most often from people you know who are unaware of the virus or through spam mail that wants to advertise a messsage to you. Emails injected with a virus usually appears like a normal email in your inbox. When the unsuspected user open the email and the attachment the virus executes itself and begin to infect your computer system. So, you should delete unknown email attachments without opening them.
- Participants can see and hear each other in a/an ——(a) message system(b) electronic mail system(c) teleconference(d) bulletin board(e) None of these
(c)Explanation: (c) A teleconference or teleseminar is the live exchange and mass articulation of information among several persons and machines remote from one another but linked by a telecommunications system. The telecommunications system may support the teleconference by providing one or more of the following: audio, video, and or data services by one or more means, such as telephone, computer, telegraph, teletype, radio, and television.
- What are the two parts of an Email address ?(a) Legal name and phone number(b) User name and street address(c) User name and domain name(d) Initials and password(e) User Name and Recipient Name
(c)Explanation: (c) A email address such as abc @ example.com is made up of a local part, @ sign and then a domain part. The part before the @ sign is the local part of the address, often the user name of the recipient (abc) and the part after the @ sign is a domain name to which the email message will be sent (example.com).Q551. Executing more than one program concurrently by one user on one computer is known as —(a) multiprocessing(b) multiprogramming(c) time-sharing(d) multitasking(e) multiaction (d)Explanation: (d) Multitasking refers to running two or more programs at the same time on the same singleprocessor computer. This seemingly simultaneous processing is deceptive because the CPU is actually attending to only one program at any given moment. The currently running program is said to be in the ‘foreground’, all other programs are said to be running in the background.
- For viewing video CDs, you would use —(a) Windows Media Player(b) CD Player(c) Windows Video Player(d) Windows Movie Player(e) None of these
(a)Explanation: (a) Windows media player (WMP) is a software application from Microsoft used to play, store and organize digital audio, images and video.
- This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page(a) Web search engine(b) Web browser(c) Web home page(d) Web service(e) None of these
(b)Explanation: (b) A browser is a software that is used to access the internet. A browser lets you visit websites and do activities within them like login, view multimedia, link from one site to another, visit one page from another, print, send and receive email, and many other activities, eg. Microsoft Internet explorer, Mozilla firefox, Google’s chrome, etc. are commonly used browsers.
- The signal that a computer is waiting for a command from the user ——(a) event(b) prompt(c) time slice(d) interrupt(e) None of these
“(b)Explanation: (b) A prompt is a sign to indicate that the computer is waiting for a command from the user. Type your command, then press ““Enter”” key to execute the command”
- Which of the following will you require to hear music on your computer?(a) Tape Recorder(b) Video Card(c) Mouse(d) Joy Stick(e) Sound Card
(e)Explanation: (e) A sound card (also known as an audio card) is an internal computer expansion card that facilitates the input and output of audio signals to and from a computer under control of computer programs.
- Collecting personal information and effectively posing as another individual is known as the crime of ——(a) spoofing(b) spooling(c) hacking(d) identity theft(e) None of these
(d)Explanation: (d) Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resourcesor obtain credit and other benefits in that person’s name.
- Three types of compact disks include CD-ROM, CD-R, and___(a) CD-RAM(b) CD-W(c) CD-DVD(d) CD-RW(e) None of these
(d)Explanation: (d) The Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CDRW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD.
- You can keep your personal files/ folders in ——(a) My Documents(b) My folder(c) My Files(d) My Text(e) My Collection
(a)Explanation: (a) On Microsoft windows operating system, My Documents is the name of a special folder on the computer’s hard drive that the system commonly uses to store a user’s documents, music, pictures, downloads and other files. My Documents folder is a user’s personal folder in which he can store his personal files. When there is more than one person using the computer, windows creates a My Document folder for each user on the computer.
- Which of the following controls the manner of interaction between the user and the operating system?(a) platform(b) language translator(c) user interface(d) icon(e) None of these
(c)Explanation: (c) A User interface refers to a visual part of computer application or operating system through which a user interacts with a computer or a software. It determines how commands are given to the computer or the program and how information is displayed on the screen. Three main types of user interfaces are- command language, Menus and Graphical user interface.
“561. A computer cannot ““boot”” if it does not have the(a) Loader(b) Compiler(c) Operating System(d) Assembler(e) None of these”
(c)Explanation: (c) Booting refers to loading the first piece of software that starts a computer. Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the boot process.
- To make the number pad act as directional arrows, you press the _____ key.(a) caps lock(b) num lock(c) arrow lock(d) shift(e) None of these
(b)Explanation: (b) Num lock (or Number lock ) key is a toggle key which toggles the input of certain keys (Numeric keypad) depending whether Num lock is on or off. When it is on , the keypad only enters numbers. When it is off, the keys may provide different input like directional arrows (up, down, left, right), Delete, Insert, End, Home and clear.
- _____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.(a) Multithreading(b) Multitasking(c) Multiprocessing(d) Multicomputing(e) None of these
(b)Explanation: (b) Multitasking refers to running two or more programs at the same time on the same single - processor computer. This seemingly simultaneous processing is deceptive because the CPU is actually attending to only one program at any given moment. The currently running program is said to be in the ‘foreground’, all other programs are said to be running in the background.
- If you open a menu and then decide you don’t want to select an option after all, click the menu title again or press the _____ key to close the menu.(a) Tab(b) Shift(c) F1(d) Esc(e) None of these
(d)Explanation: (d) To close the menu, without making any selection, press ESC (Escape) key.
- Restarting a computer which is already running is referred to as __(a) starting(b) booting(c) rebooting(d) second-starting(e) None of these
(c)Explanation: (c) Rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Rebooting is of two types- Warm booting and Cold booting.
- The computer abbreviation KB usually means(a) Kernel Boot(b) Key Block(c) KiloByte(d) Kit Bit(e) None of these
(c)Explanation: (c) A KB (kilobyte) is a unit of memory or data which is equal to 1,024 (or 210) bytes.
- Terminal is(a) a point at which data enters or leaves the computer(b) a device to give power supply to the computer(c) the last instruction in a program(d) any input / output device(e) None of these
(d)Explanation: (d) A computer terminal is an electronic or electro mechanical hardware device that is used for entering data into and displaying data from a computer or a computing system. Generally, a terminal is a combination of keyboard and display screen. It enables the user to communicate with a computer.
- To keep files organised, related documents are often stored in _____ (also called directories) located on the storage medium.(a) labels(b) indexes(c) folders(d) programs(e) home pages
“(c)Explanation: (c) A folder (or directory) is a storage area that many files can be placed into to group them together and organize the computer. A folder may contain sub-folders. Folders allow people to organize their files in a way that makes sense to them. For eg. a college student might store all her photos in a folder named ““Pictures””, all her assignments in a folder names ““School Work”” and all her financial information in a folder named ““Finances””.”
- The primary goal of a computer system is to turn data into __(a) suggestions(b) ideas(c) information(d) reports(e) pictures
(c)Explanation: (c) Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions called programs and give the result (output) and saves the output for the future use. The output is in the form of meaningful information which helps in decision making.
- A key that will erase information from the computer’s memory and characters on the screen(a) delete key(b) edit(c) dummy out(d) trust key(e) esc key
“(a)Explanation: (a) When struck on a computer keyboard during text or command editing, the delete key (known less ambiguously as forward delete) discards the character ahead of the cursor’s position, moving all following characters one position ““back”” towards the freed letterspace.”
- A device that connects to a network without the use of cables is said to be __(a) wireless(b) distributed(c) centralised(d) open source(e) scattered
(a)Explanation: (a) A wireless device can refer to any kind of communication equipment that doesn’t require a physical wire for relaying information to another device. eg. wireless headphones fitted with a receiver use either radio frequency or infrared technology to communicate with a transmitter that is connected to the sound source, say a television.
- _____ is the process of dividing the disk into tracks and sectors.(a) Formatting(b) Tracking(c) Crashing(d) Allotting(e) Dicing
(a)Explanation: (a) Formating is the process of organizing the disk surface into areas called tracks and sectors. The formatting process sets up a method of assigning addresses to these different areas. It also sets up an area for keeping the list of addresses without formatting, there would be no way to know what data went with what. By dividing the tracks into sectors, data can be packed uniformly throughout the disk surface and hence it is used more efficiently.
- A computer’s type, processor, and operating system define its(a) size(b) brand(c) platform(d) speed(e) format
(c)Explanation: (c) In computers, a plateform is an underlying computer system on which applicationprograms can run. It defines a standard around which a system can be developed. eg. On personal computers, windows 2000 and Mac OS X are examples of two different platforms. A platform consists of an operating system, the computer system’s co-ordinating program, which in turn is built on the instruction set for a processor (CPU), the hardware that performs logic operations and manages data movement in the computer.
- Computers that are portable and convenient for users who travel are known as(a) laptops(b) supercomputers(c) minicomputers(d) file servers(e) None of these
(a)Explanation: (a) A laptop is a personal computer designed for mobile use (when person is travelling) and small and light enough to sit on a person’s lap while in use.
- A series of statements explaining how the data is to be processed is called(a) compiler(b) instruction(c) program(d) interpreter(e) None of these
(c)Explanation: (c) A computer program is a sequence of instructions, written to perform a specified task with a computer. A computer requires programs to function, typically executing the program’s instructions in a central processor. The series of instructions when executed, causes the computer to behave in a predetermined man ner.
- A _____ is hardware used to read disks.(a) hardware(b) floppy disk(c) software(d) disk drive(e) CPU
(d)Explanation: (d) A disk drive is a device that allows a computer to read from and write to computer disks. There are different types of disk drives for different types of disks, eg. a hard disk drive reads and writes hard disks, floppy drive access floppy disks. A magnetic disk drive reads magnetic disks and an optical drive reads optical disks.
- A keyboard is this kind of device(a) black(b) scanning(c) output(d) input(e) word processing
(d)Explanation: (d) A keyboard is an input device that is used to enter letters, numbers, symbols, commands, etc. into the computer for processing.
- Which of the following is not true ?(a) Chatting can only be done with a single person(b) Chatting is like e-mail(c) Chatting can involve multiple persons(d) Chatting is an electronic dialogue(e) None of these
(b)Explanation: (b) Chat refers to real-time communication between two or more users via Computer & Internet. For eg. when talking to someone in chat, any typed text is received by other participants immediately. This is different from other text-based communication such as email where it could be couple of hours, days or weeks to receive a response.
- Arithmetic operations(a) sort data items according to standard, predefined criteria in ascending order or descending order(b) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item.(c) use conditions with operators such as AND, OR, and NOT(d) include addition, subtraction, multiplication, and division(e) None of these
(d)Explanation: (d) An arithmetic operation refers to a mathematical operation involving numbers. There are four primary arithmetic operations a computer program can perform. These are- addition, subtraction, multiplication and division. They form the basis for determining the outcome of calculated numbers.
- A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is __(a) write-only(b) memory-only(c) read-only(d) run-only(e) non-changeable
(c)Explanation: (c) A CD-ROM is a pre-pressed compact disc which contains data. Data on CD-ROM is ‘read only’ or cannot altered or erased.
- The copy command saves to(a) the clipboard(b) the desktop(c) printer(d) Microsoft Word(e) paste
(a)Explanation: (a) A clipboard is a special file or memory area (buffer) where data is stored temporarily before being copied to another location. Many word processor, for example, use a clipboard for cutting and pasting. When you cut a block of text, the word processor copies the block of the text to the cl ipboard, when you paste the block, the word processor copies it from the clipboard to its final destination.
- A _____ is often used to select or highlight.(a) keyboard(b) icon(c) hard disk(d) floppy disk(e) mouse
(e)Explanation: (e) Many text-editors and programs allow you to highlight all or portions of text using the mouse, eg. place the cursor at the beginning of a paragraph in a text editor, hold down the shift key and click at the end of the paragraph to highlight the full paragraph. OR simply, click the mouse button three times on any text in the paragraph if you want to highlight the whole paragraph. Similarly, a word can be selected by double-clicking the word.
- What are the two parts of an Email address?(a) Legal name and phone number(b) User name and street address(c) Initials and password(d) User name and domain name(e) None of these
(d)Explanation: (d) An email address is an address composed of two parts- a username and a domain name seperated by a @ sign eg. abc @ example. com. The username (abc) is the name you choose to be identified with for email purposes and that you have provided to the email host to create your email account. The domain name is the internet destination for the email-host, which may be a private site, company, organization or government entity. The extension can be any of many options such as .com, .org, .gov, .int, .info, etc.
- Files deleted from the hard disk are sent to the __(a) floppy disk(b) recycle Bin(c) clipboard(d) motherboard(e) None of these
(b)Explanation: (b) Recycle bin is a wastebasket icon on your computer desktop that works as a location or Directory for deleted files or folders. The recycle bin only stores files deleted from hard drives not fromremovable media such as memory cards, external USB connected hard drives or thumb drives and floppy disks. Nor does it stores files deleted from network drives.
- The ____ is the brain of the computer.(a) hard disk(b) hardware(c) CPU(d) floppy disk(e) keyboard &
(c)Explanation: (c) CPU is called as the brain of computer. It is here where most of the processing (i.e, calculations and comparison processes) of the computer occur.
- Sending an E-mail is similar to __(a) drawing a picture(b) writing a letter(c) talking on the phone(d) sending a package(e) None of these
(b)Explanation: (b) Although the means of communication may contrast between writing a letter versus sending an email, they both convey the same messages. A letter is a hand written or a printed mode of communication addressed to a person or organisation and usually send by post. An email, on the other hand, is a modern mode of communication, where digital messages are exchanged from an author to one or more than one person.
- A _____ is the general term for hardware not necessary to the basic function of the computer, connected externally.(a) bit(b) icon(c) keyboard(d) printer(e) None of these
(d)Explanation: (d) Printer is a peripheral device that is connected to the main computer system (or system unit). It doesn’t form the part of the core computer architechture. It is connected externally. Printer is an output device that produces output in the form of hard copy.
- Removable disks are often called what?(a) hard drives(b) floppies(c) RAM drives(d) expansion cards(e) None of these
(b)Explanation: (b) A removable storage device is a device that allows for transportation of information. There are different types of removable disks such as floppy disks, compact disks, optical disks; portable USB drives. Removable disk is so-called because it can be removed from a computer while the system is running.
- Mr. X has no printer to print his report. He wants to take it to Mr. Y’s computer because Mr. Y has a printer. Mr. X could save his report on a __(a) piece of paper(b) hard drive(c) scanner(d) monitor(e) floppy disk
(e)Explanation: (e) Mr. X could save his report on a floppy disk which is a portable storage medium. Report saved on floppy disk can be copied on Mr. Y computer and a print out can be taken out from Mr. Y’s printer.
- Computer equipment itself is called __(a) byte(b) hardware(c) mouse(d) software(e) default
(b)Explanation: (b) A computer is an electronic device (or machine) which allows the user to store all sorts of information and then process that information or data. Computer is basically a hardware i.e, physical equipment that can be seen and touched computers can be classified by size and power, eg. mainframe, mini, personal, super, etc are also types of computers.
- This is a permanent storage device on computer(a) monitor(b) floppy disk(c) RAM(d) cache(e) hard disk
(e)Explanation: (e) Hard disk is the computer’s main storage media device that permanently stores all data on the computer. Most computer hard drives are in an internal drive bay at the front of the computer and connect to the motherboard.
- What does a Browser do ?(a) Reads material really fast(b) Looks through magazines and books in the library(c) It wastes your time(d) It provides help menus(e) It is software used to view web pages
(e)Explanation: (e) A web browser is a software application used to enable computer users to locate and access web pages. Browsers translate the basic HTML code that allows us to see images, text videos and listen to audios on websites, along with hyperlinks that let us travel to different web pages. The browser gets in contact with the web server and request for information.
- The most frequently used piece of hardware for inputting data is the(a) floppy disk(b) keyboard(c) cursor(d) software(e) hardware
(b)Explanation: (b) Keyboard is the most commonly used hardware device for entering input (letters/symbols/ numbers/commands/etc) into the computer.
- If you are going to a site you use often, instead of having to type in the address every time, you should(a) save it as a file(b) make a copy of it(c) memorise it(d) bookmark it(e) note it in your diary
(d)Explanation: (d) Instead of memorizing long web addresses, use browser bookmarks to easily save the web pages you’d like to revisit. It is a great way to save the URL of a website. The simple way to create a bookmark is to click the star icon in the address bar.
- What part of the computer stores programs and files for later use?(a) hard drive(b) RAM memory(c) mother board(d) adapter board(e) None of these
(a)Explanation: (a) Hard drive is the storage area within the computer itself, where megabytes of space available to strore bits of information. Hard disk is non-volatile storage i.e, it stores information permanently for future use. The information doesn’t get lost when power is turned off.
- Windows 95, Windows 98, and Windows NT are known as what?(a) domain names(b) processors(c) modems(d) operating systems(e) None of these
(d)Explanation: (d) An operating system is a collection of software that manages computer hardware resources and provide common services for computer programs. Examples of operating system include Windows, DOS, Linux, etc. The windows family of operating systems (eg. NT, 95, 98, XP professional, etc), includes a Graphical user interface (GUI) that makes the software user fiendly.
- The __ of a system includes the programs or instructions.(a) software(b) peripheral(c) information(d) icon(e) hardware
(a)Explanation: (a) A computer software or a program is a set of computerised instructions that operate a computer, manipulate the data and execute particular functions or tasks. Computer software tells the hardware of a computer what to do.
- The _____ settings are automatic and standard.(a) default(b) icon(c) CPU(d) peripheral(e) user friendly
“(a)Explanation: (a) Default settings refers to the controls of a computer hardware or software (or of a device, equipment or machine) as preset by its manufacturers. A default is a predesigned value or setting that is used by a computer program or system when a value or setting is not specified by the user. Default settings are also called ““presets””, especially for electronic devices.”
- Something which has easily-understood instructions is said to be(a) icon(b) hyper(c) information(d) word processing(e) user friendly
(e)Explanation: (e) In computer, user-friendly refers to something which is easy to learn, understand and deal with eg. menu-driven programs are considered more user-friendly than command driven systems. Graphical user interfaces are also considered user friendly. They all make it easier for novices to use a computer.
- The _____ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display
(e)Explanation: (e) A computer monitor or screen is an electronic visual display for computers. It displays the information to the user.Q601. To make a notebook act as a desktop model, the notebook can be connected to a _____ which is connected to a monitor and other devices.(a) docking station(b) bay(c) port(d) network(e) None of these (a)Explanation: (a) Docking station refers to a small cabinet to which a laptop or network computer can be attached for use as a desktop computer, usually having a connector for externally connected devices such as hard drives or scanners; and parts that can be linked to components such as keyboard, monitor and printer.
- The ability to find an individual item in a file immediately ____ is used.(a) directory(b) file allocation table(c) sequential access(d) direct access(e) None of these
(d)Explanation: (d) Direct (Out of sequence or random) access by a computer (CPU) to any memory address of a data storage device, without starting from the first address every time the data needs to be read. A random access data file enables you to read or write information anywhere in the file.
- The primary purpose of software is to turn data into(a) information(b) Web sites(c) programs(d) objects(e) None of these
(a)Explanation: (a) The primary purpose of software is to turn raw data entered into the software into meaningful information after processing, For eg. The number of hours an employee worked in a month and his pay rate, when entered into a payroll software, gives salary of employee for that particular month.
- The most important or powerful computer in a typical network is(a) network client(b) desktop(c) network server(d) network station(e) None of these
(c)Explanation: (c) A network server is a computer designed to process requests and deliver data to other (clients) computers over a local network or the Internet. Server is the most powerful computer in the network. It manages network resources on the network. They are configured with additional processing, memory and storage capacity to handle the load of serving clients, eg. web servers, proxy servers, FTP servers, Online game servers.
- What menu is selected to cut, copy, and paste ?(a) Tools(b) File(c) Special(d) Edit(e) None of these
(d)Explanation: (d) The edit menu is a contextual menu that is displayed to offer commands that can be performed on a selection such as a word in a text view or an image. The edit menu is an integral part of copy, cut and paste operations, for which it display (potentially) the commands copy, cut, paste, select and select All. However, you can add custom menu items to the edit menu to perform other kinds of actions on selections.
- _____ is the process of finding errors in software code.(a) Testing(b) Compiling(c) Running(d) Debugging(e) None of these
(d)Explanation: (d) Debugging is the process of detecting and rectifying bugs in a software code that can cause it to crash, behave erratically or be susceptible to hacker or cracker attack. Bugs can be in a variety of forms : coding errors, design errors, complex interaction, poor user interface design and system failures.
- Which of the following is an example of connectivity ?(a) floppy disk(b) Internet(c) power cord(d) data(e) None of these
(b)Explanation: (b) An Internet is a global network connecting millions of computers in order to exchange data and information among connected computers.
- Storage that retains its data after the power is turned off is referred to as(a) non-volatile storage(b) volatile storage(c) sequential storage(d) direct storage(e) None of these
(a)Explanation: (a) Non-volatile storage refers to a computer memory that is able to hold saved data even if there is no power and doesn’t require periodic refreshes of its memory data. Non-volatile storage is commonly useful for secondary storage or long-term consistent storage.
- A collection of related files is called a ( 1) character ( 2) field (c) database (d) record (e) None of these
(c)Explanation: (c) A database is an integrated collection of logically related records or files. A database consolidates records previously stored in seperate files into a common pool of data records that provide data for many applications. The data is managed by system software called data base management system (DBMS).
- You can use the tab key to(a) indent a paragraph(b) move a cursor across the screen(c) move the cursor down the screen(d) Only (b) and (a)(e) None of these
(d)Explanation: (d) Tab key is a key on a computer keyboard that insects a tab character or moves the cursor to the next tab stop across the screen, eg. In spreadsheet, tab key moves the cursor to the next field or cell. Also, a tab is an identation at the beginning of a line to signify a new paragraph in a document. Usually about five spaces, tabs are primarily used to help create equal spacing between multiple lines and to start a new paragraph.
- The ____ key will launch the start buttons.(a) shift(b) esc(c) windows(d) shortcut(e) None of these
(c)Explanation: (c) To open the start menu, click the start button in the lower left corner of your screen or press the windows logo key on your keyboard. The windows logo key will launch the start button and the start menu appears.
- Computers use the _____ number system to store data and perform calculations.(a) hexadecimal(b) decimal(c) octal(d) binary(e) None of these
(d)Explanation: (d) Binary numbers are closely related to digital electronics. With digital electronics, a ‘1’ means that current is present and a ‘0’ means it is not present. The different parts of a computer communicate through pulses of current (1s and 0s) . Computers can calculate complex equations and perform complex calculations. Calculating using only 1s and 0 s is called Binary system. A computer can process only 1s and 0 s.
- Virtual memory is(a) in RAM(b) memory on the hard disk that the CPU uses as an extended RAM(c) only necessary if you do not have any RAM in your computer(d) a back up device for floppy disks(e) None of these
(b)Explanation: (b) Virtual memory is storage space on computer’s hard disk that windows uses in conjunction with RAM. That is, if your computer lacks the RAM needed to run a program or operation, windows uses virtual memory to compensate. Virtual memory combines computer’s RAM with temporary space on hard disk when RAM runs slow, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM to complete its work.
- Changing an existing document is called _____ the document.(a) editing(b) creating(c) modifying(d) adjusting(e) None of these
(a)Explanation: (a) Editing a document involves opening the existing document in the approximate editor application then saving the changes and checking the document back in . Document you edit are automatically checked out. For example: In MS-Word, depending on a document, its final format and its purpose, the editing can involve checking grammar and spelling, content, word choice and formatting.
- A _____ contains specific rules and words that express the logical steps of an algorithm.(a) programming structure(b) syntax(c) programming language(d) logic chart(e) None of these
(c)Explanation: (c) A programming language is a formal language designed to communicate instructions to a machine,particularly a computer. It can be used to create programs that control the behaviour of a machine and/or express algorithms precisely. The description of a programming language is usually split into the two components of syntax (form) and semanties (meaning).
- The _____ tells the computer how to use its components.(a) network(b) utility(c) operating system(d) application program(e) None of these
(c)Explanation: (c) Operating system is a software that controls the operation of a computer, directs the input & output of data, keep track of files and controls the processing of computer programs. Its role include managing the functioning of the computer hardware, running the application programs, serving as an interface between the computer and the user and allocating computer resource to various functions.
- Which of the following is the largest unit of storage ?(a) KB(b) GB(c) MB(d) TB(e) None of these
(d)Explanation: (d) 1 KB = 1024 bytes 1 MB = 1024 KB 1 GB = 1024 MB 1 TB = 1024 GB So, Terabyte (TB) is largest of kilobyte (KB), Megabyte (MB) and Gigabyte (GB).
- Which groupings do you work with when formatting text in Word ?(a) Paragraphs, indexes and sections(b) Tables, paragraphs and indexes(c) Characters, sections and paragraphs(d) Indexes, characters and tables(e) None of these
(c)Explanation: (c) MS-Word helps you keep your documents, simple by organizing most formatting into 3 levels of related information: font, paragraph, and section. • Font formatting is any formatting that you can apply to as little as one characters, such as bold, underline, Time New Roman, etc. • Paragraph formatting is any formatting that you can apply to as little as one paragraph. Such as paragraph spacing before and after, line spacing, indents etc. • Section formatting can be thought of as page layout or document formatting, since this formatting applies to an entire document by default. Its named section because you insert a formatting mark called a section break in order to change settings for this type of formatting in only part of your document.
- When sending an e-mail, the ____ line describes the contents of the message. COMPUTER LITERACY & MODEL PRACTICE(a) subject(b) to(c) contents(d) CC(e) None of these
(a)Explanation: (a) The subject in an email is a description of the topic of the message. The subject line is the deciding factor whether your message is read or deleted. It needs to be truthful and informative and tempt the reader into wanting to know more about the content of the message.
- To move to the beginning of a line of text, press the _____ key.(a) a(b) home(c) page up(d) enter(e) None of these
(b)Explanation: (b) The home key moves the cursor to the top left corner of the screen (i.e, beginning of the document) or to the beginning of the line of a document.
- A flat metallic disk that contains a large amount of permanently stored information read optically is called a —-(a) ALU(b) Monitor(c) CD-ROM(d) RAM(e) None of these
(c)Explanation: (c) A compact disc is a plastic fabricated, circular medium made of molded polymer for electronically recording storing and playing back audio,video, text and other information in degital form. It contains data permanently. i.e, data doesn’t get lost when there is no power. Also, compact disc is an optical device which uses reflecting surfaces and laser technology to read and write data on a disk. Different versions of compact disc are CD-ROM, CD-R, CD-RW, DVD, etc.
- How do you save a presentation under a new file name?(a) When you close Power Point the file will automatically be saved(b) Select the file menu and choose Save As(c) Select the file menu and choose Save & (d) The file will automatically be saved under the new name if you change the title(e) None of these
(b)Explanation: (b) Save As allows you to save something with a new identify. Identify can be name, location or file type. Save As creates a copy of the oroginal. The original document will not have the changes your are saving with Save As; the changes will appear only in the new copy. Save as option is available under File Menu.
- The sequence of events that occurs in the computer when it is interpreting and executing an instruction is known as a(n).(a) Instruction cycle(b) Execution cycle(c) Working cycle(d) Machine cycle(e) None of these
(b)Explanation: (b) When a computer obeys the instructions in a computer program it is said to be running or executing the program. Before a computer can execute a computer program, the program must be resident in memory. Once the program is loaded into memory then the following sequence is carried out. Set instructions address to the address of the first instruction while program not finished { Fetch instruction from current instruction address, Update current instruction address execute the fetch instruction. } This sequence is called the execution cycle.
- The part of a computer that coordinates all its functions is called its——-(a) System board(b) ROM program(c) Arithmetic logic unit(d) Control unit(e) None of these
“(d)Explanation: (d) The control unit is the component of the processor that directs and co-ordinates most of the operations in the computer. It is the circuitry that controls the flow of information through the processor and co-ordinates the activities of the other units within it. In a way, it is the ““brain within the brain””, as it controls what happens inside the processor (CPU), which in turn controls the rest of the PC.”
- Periodically adding, changing and deleting file records is called file———(a) Upgrading(b) Updating(c) Restructuring(d) Renewing(e) None of these
(b)Explanation: (b) Updating alters the data (add, delete, etc) in one or more fields of any record contained in the file and writes that record back to the same file from which it is read.
- Digital Banking can be resorted through:(a) Internet(b) Mobile phones(c) Telephones(d) All of the above(e) None of these
(d)Explanation: (d) Digital banking refers to a system which allows individuals to perform banking activities using digital devices. eg. telephone (Telebanking or phone banking); mobile phone (mobile banking or SMS banking); computer (Internet or E-banking).
- Which of the following is appropriate method to shutdown computer?(a) Click ‘Start’ then select ‘Restart the computer’(b) Click ‘Start’ then select ‘Shutdown’ and finally select ‘Shut down’.(c) Switch off the Power(d) Switch off Monitor and Printer(e) None of these
“(b)Explanation: (b) Never just switch off your computer you may loose unsaved information and damage your computer’s hard disk drive. To shut down your computer properly, follow the steps : • Click the start button • Click shutdown • Select the ““Shut Down the Computer”” option by clicking on it. • Click the Yes button to confirm your selection.”
- The user generally applies— to access mainframe or super computer.(a) Node(b) Terminal(c) Desktop(d) Hand held(e) None of these
(b)Explanation: (b) Traditionally, users connected to a mainframe using a terminal which allowed them to input request to the mainframe. The mainframe would then handle all the computing before outputing aresponse. These terminals are called dumb terminals because they had no data-processing abilities of their own; they were simply windows through which users could access the mainframe. These days, terminal emulation software such as 3270 emulation is used in place of a terminal.
“629. A computer message is ““Do you really want to delete the selected files(s)?”” The user clicks ‘Yes’ key. It is called.(a) User output(b) Program response(c) User response(d) Program output(e) None of these”
(c)Explanation: (c) User response is the user’s answer to the computer’s question such as choosing OK, YES or NO or typing in text, for example, the name of a file.
- To open disk, mouse pointer is placed on disk icon and then(a) Mouse is double-clicked(b) Mouse is dragged pushing the button(c) Mouse is rotated around(d) Mouse is clicked after rotating it(e) None of these
(a)Explanation: (a) To double click an item, point to the item on the screen and then click twice quickly. A double click is used most often to open items (programs or files or folders) eg. to open a folder or start a program, placed on desktop, move the cursor over the icon of that folder or program and then click mouse twice.
- Restarting a computer that is already on is referred to as(a) Cold booting(b) Shut down(c) Warm booting(d) Logging off(e) None of these
(c)Explanation: (c) Warm booting refers to restarting a computer that is already turned on via the operating system. Restarting it returns the computer to its initial state. It is necessary when a program encounters an error from which it cannot recover. On PCs, you can perform a warm boot by pressing the control, Alt and Delete keys simultaneously.
- What is the purpose of Software Documenting?(a) To sell software to handsome price(b) Use and maintenance of software(c) To sell software to many customers(d) To show its importance(e) None of these
(b)Explanation: (b) Software documentation refers to a comprehensive information on the capabilities, design details, features and limitations of a system or application software. It may also include software licensing requirements, and comes usually as a printed document or as another piece of software on a disk or CD. It is also called software manual. It helps the user in guiding how to install, operate, maintain, etc system or software.
- If you want to move an icon on your desktop, this is called—-(a) Highlighting(b) Double clicking(c) Dragging(d) Pointing(e) None of these
(c)Explanation: (c) You can move items around the screen by dragging them. To drag an object, point to the object on the screen, press and hold the primary button, move the object to a new location, and then release the primary button. Dragging is most often used to move files and folders to a different location and to move windows and icons around on your screen.
- A group of related records in a database is called a(n):(a) Object(b) Column(c) Key(d) Table(e) None of these
(d)Explanation: (d) A relational database consists of data & information organized into different tables. A table is used to define a specific, single group of information, like a table of customers for a business or a table of products that the business sells. Each record in that table should include a key field. A key field is a field or combination of fields that uniquely identify a row (or record) in a table.
- RAM stands for:(a) Readily Accessible Memory.(b) Random Access Memory.(c) Randomly Accessible Memory.(d) Read Access and Memorize.(e) None of these
(b)Explanation: (b) RAM (Random Access Memory) is used in computers to store temporary instructions and data needed to complete tasks. It is the main memory or working memory of the computer.
- All of the following are examples of input devices except a :(a) Mouse(b) Scanner(c) Keyboard(d) Printer(e) None of these
(d)Explanation: (d) Printer is an output device that produces the output to the user in the form of hard copy. • Scanner, mouse, keyboard are input devices that allow data & instructions to enter a computer.
- The name for the way that computers manipulate data into information is called:(a) Processing(b) Programming(c) Storing(d) Organizing(e) None of these
(a)Explanation: (a) The computer performs useful operations, manipulating the data in many ways. This manipulation is called processing. Examples of processing include performing calculations, sorting lists of words or numbers, modifying documents and pictures according to use instructions and drawing graphs. A computer processes data in the CPU. So, processing refers to a systematic series of actions a computer performs to manipulate data.
- A (n) _______ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.(a) POS(b) PSS(c) inventory(d) data mining(e) None of these
(b)Explanation: (b) A PSS give a personal touch to each visit to a store, offering special discounts based on your purchases, videos of product into and co-ordinating with inventory and checkout system software.
- ____ is data that has been organized or presented in a meaningful fashion.(a) Software(b) process(c) Storage(d) Information(e) None of these
(d)Explanation: (d) Data usually refers to raw or unprocessed figures. That is, it is the basic form of data, which has not been analyzed or processed in any manner. Once the data is processed, organized, structured or presented in a given context, it can become useful. That is, data becomes information (or knowledge). Information is a sequence of symbols that can be interpreted as a message. It provides knowledge or insightabout a certain matter.
- All of the following are examples of real security and privacy risks EXCEPT:(a) Spam(b) Hackers(c) Viruses(d) Identity theft(e) None of these
(a)Explanation: (a) Spam or junk email is unsolicited email that wants to sell you something. Spams is not an example of real security and privacy risks. One may simply delete spam mails or use ficters to avoid receiving them.
- In windows, by default the files when deleted are sent to_____(a) Recycle Bin(b) Dust Bin(c) Waste Bin(d) Recycle Waste Bin(e) None of these
(a)Explanation: (a) Recycle bin a wastebasket icon on desktop that works as a location or Directory for deleted files or folders. All the files, folders, programs that you discard gets stored in it by default and you must empty it to permanently delete them from your computer.
- The network connecting several computers all over the world is______(a) Internet(b) Intranet(c) ARPnet(d) Network(e) LAN
(a)Explanation: (a) The Internet is a global network connecting millions of computer. It is a network of networks that consist of millions of private, public, academic, business and government networks of local to global scope, that are linked by a broad array of electronic and optical networking technologies.
- Which type of software is similar to an accountant’s worksheet ?(a) Database(b) Word processing(c) Spreadsheets(d) Graphics(e) File Manager
(c)Explanation: (c) A speadsheet is a grid that organizes data into columns and rows. Spreadsheets make it easy to display information and people can insert formula to work with the data. It records such things as items in inventory, income & expenses, debits & credits, etc.
- Which key should be pressed to start a new page in MS-Word ?(a) Enter Key(b) Down Cursor Key(c) Shift + Enter(d) Ctrl + New(e) Shift + Ctrl + Enter
(e)Explanation: (e) Ctrl + Enter is the keyboard shortcut in MS-Word that starts a new page. It inserts page break, you can click the page break option in the pages group on the insert tab. Shift + Ctrl + Enter is a column break. When you insert a column break in the last column on a page, the break also acts as a page break.
- Outlook Express is a______(a) Scheduler(b) E-Mail client(c) Address Book(d) All of the above(e) None of these
(d)Explanation: (d) Outlook express is an email account i.e, it can be used to receive, read, send and manage mail in mailbox. It is a scheduler. It helps in scheduling an appointment/event/meeting. Also, it is an addressbook which helps in creating and managing contacts. Address book is a directory of address lists. It is a list of names that you can address mail to.
- In a spreadsheet, a cell is defined as the_____(a) intersection of a file and a database(b) intersection of a table and a tuplet(c) intersection of a row and column(d) intersection of a field and a record(e) None of these
(c)Explanation: (c) In any spreadsheet program such as Excel, each rectangular box in a worksheet is referred to as a cell. A cell is the intersection point of a column and a row. Data entered into Excel is always stored in a cell.
- The most popular Internet activity is______ COMPUTER 17 SET(a) watching movie trailers(b) downloading music(c) shopping for books(d) e-mailing(e) None of these
(d)Explanation: (d) Sending and Receiving emails is the most popular activity on Internet. Almost 92% users of Internet send & receive emails. It is then followed by 89% of users who use search engines to find information on internet.
- The keys labelled 0-9 on the keyboard are called______(a) Numeric keys(b) Function keys(c) Typewriter keys(d) Special keys(e) Alpha keys
(a)Explanation: (a) A numeric keypad refers to a section of a computer keyboard with numbered keys from 0 to 9 (called numeric keys) like a calculator. It enables you to enter numbers quickly.
- A terminal that cannot process any information is called______(a) Intelligent terminal(b) Direct access terminal(c) Smart terminal(d) Blind terminal(e) Dumb terminal
(e)Explanation: (e) Traditionally, users connect to a mainframe using a terminal which allowed them to input request to the mainframe. The mainframe would then handle all the computing before outputing a response. These terminals are called dumb-terminals because they had no data processing abilities of their own, they were simply windows through which users could access the mainframe.
- Which of the following is an Operating System ?(a) Mac(b) MS Windows(c) MS DOS(d) Windows NT(e) All of the above
(e)Explanation: (e) Windows NT/MS DOS belong to the family of Microsoft (MS) windows operating systems. Microsoft windows is a series of of graphical user interface operating systems developed marketed and sold by Microsoft. Similarly, Mac operating system is developed, marketed and sold by Apple Macintosh.
- A______contains buttons and menus that provide quick access to commonly used commands.(a) menu bar(b) toolbar(c) window(d) find(e) None of these
(b)Explanation: (b) A toolbar is a graphical presentation of commands optimized for efficient access.Toolbars can be more efficient than menu bars because they are direct (always displayed instead of being displayed on mouse click); immediate (instead of requiring additional input) and contain the most frequently used commands (instead of comprehensive list). They are quick and convenient. For eg. a formatting toolbar in Microsoft Excel or word would give the user access to functions such as making text bold, aligning text or other commonly used formatting buttons,
- Programs designed specifically to address general-purpose applications and special-purpose applications are called_____.(a) system software(b) operating system(c) application software(d) management information systems(e) None of these
(c)Explanation: (c) Software can be divided into a categories- System software and application software. Application software refers to programs designed to make users more productive and/or assist them with personal taskes. They can further divided into- General purpose applications (basic applications which are widely used in nearly every discipline & occupation, eg. browsers, word processors, spreadsheets, DBMS, presentation graphics) and special purpose applications (advanced applications which narrowly focused on specific disciplines and occupations. eg. graphic programs, Audio/video editor, multimedia creator, virtual reality, etc).
- A file that contains definitions of the paragraph and character styles for your document and all things you customised like toolbars and menus is called a_____(a) pattern(b) guide(c) base document(d) template(e) None of these
(d)Explanation: (d) A template is a tool for enforcing a standard layout and look and feel across multiple pages or within content regions. When you change a template, any pages or regions that are based on that template are automatically changed as well. It is something which is pre-formatted.
- A_______is a design tool that graphically shows the logic in a solution algorithm.(a) hierarchy chart(b) flowchart(c) structure chart(d) context diagram(e) None of these
(b)Explanation: (b) To help document a solution algorithm, programmers use design tools. Two structured design tools are program flowchart and psuedocode. A program flowchart (or simply flowchart) graphically shows the logic in a solution algorithm. ANSI published a set of standards for flowcharts in the early 1960s. These standards specify symbols for various operations in a Program’s logic eg. is a decision symbol. It signifies the condition that determines a specified path to follow.
“655. ““GUI”” stands for_____(a) Graphical User Interface(b) Gnutella Universal Interface(c) Graphic Uninstall/Install(d) General Utility Interface(e) None of these”
(a)Explanation: (a) GUI (Graphical User Interface) is a type of user interface that allows to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text based interfaces, typed command lables or text navigation.
- Example of non-numeric data is(a) Examination score(b) Employee address(c) Bank balance(d) All of the above(e) None of these
(b)Explanation: (b) Non-numeric data is any form of data that is measured in non-number (or word) form. It makes use of symbols and letters. Such data can only be identified in a word format. eg. Employee address, date of birth, name, etc. Numeric data comprises of numbers on which calculations can be performed eg. age, bank balance, Examination score, etc.
- The ability of an OS to run more than one application at a time is called(a) object-oriented programming(b) multitasking(c) multi-user computing(d) time-sharing(e) None of these
(b)Explanation: (b) Multitasking refers to the ability to execute more than one task (or program) at the same time. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.
- When you want to move some text from one page to a different page, the best method is______(a) cut and paste(b) drag and drop(c) delete and retype(d) find and replace(e) None of these
(a)Explanation: (a) In word processing, block of text are moved from one place to another by cutting and pasting. When you cut a block of text, the word processor removes the block from your file and place it in a temporary holding area (buffer) called as clipboard. You can then paste the block of text in the buffer to another file or part of document.
“659. A computer cannot ““boot”” if it does not have the_______(a) Loader(b) Compiler(c) Operating System(d) Assembler(e) None of these”
(c)Explanation: (c) Booting refers to loading the first piece of software that starts a computer. Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the boot process.
- A CPU contains ________(a) an analytical engine and a control unit(b) a card reader and a printing device(c) a control unit and an arithmetic logic unit(d) an arithmetic logic unit and a card reader(e) None of these
(c)Explanation: (c) A CPU consists of 2 parts- Arithmetic Logic Unit (ALU) which performs arithmetic operations like addition, multiplication, division, subtraction and logical comparisons like greater than, less than, equal to, etc. and Control Unit (CU) which directs and co-ordinates most of the operations in the computer.
- Which of the following peripheral devices displays information to a user ?(a) Keyboard(b) Monitor(c) Secondary storage devices(d) Secondary storage media(e) None of these
(b)Explanation: (b) A computer monitor is an output device that displays the result of the processing to the user on display or screen of the computer.
- ____ represents raw facts, whereas ____ is data made meaningful.(a) Data, information(b) Information, reporting(c) Information, bits(d) Records, bytes(e) Bits, bytes
(a)Explanation: (a) Data is raw, unorganized facts that needs to be processed. Data can be something simple or seemingly random and useless until it is organized. When data is processed, organized, structured or presented in a given context so as to make it useful, it is called information.
- What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer ?(a) Compiling(b) Assembling(c) Translating(d) Uploading(e) None of these
(a)Explanation: (a) Compiling is the process of translating a source program written in some high-level programming language (such as C, C++, Java) into machine code for some computer architecture (such as Intel Pentium Architecture). The generated machine code can be executed later many times against different data each time.
- What characteristic of read-only memory (ROM) makes it useful ?(a) Data in ROM is nonvolatile, that is, it remains there even without electrical power(b) ROM information can be easily updated(c) ROM provides very large amounts of inexpensive data storage(d) ROM chips are easily swapped between different brands of computers(e) None of these &
“(a)Explanation: (a) ROM (Read Only Memory) is a ““built-in”” memory that is capable of holding data and having that data or read from the chip, but not written to. Data is prepressed on ROM chip by manufacturer. Unlike RAM, ROM retains its contents even when the computer is turned off ROM is referred to as being non-volatile whereas RAM is volatile.”
- Coded entries which are used to gain access to a computer system are called(a) Passwords(b) Entry codes(c) Security commands(d) Codewords(e) None of these
(a)Explanation: (a) A password is a secret word or string of characters used for user authentication to prove identify or access approval to gain access to a resource. (eg. a software; website on World Wide Web, etc); which should be kept secret from those not allowed access.
- .bas, .doc. and . htm are examples of(a) Extension(b) Database(c) Domain(d) Protocol(e) None of these
(a)Explanation: (a) A filename extension is a suffix (separated from the base filename by a dot or space) to the name of a computer file applied to indicate the encoding (file format) of its contents or usage. eg, .bar, .doc, .htm, etc.
- Which of the following displays the contents of active cell?(a) Menubar(b) Toolbar(c) Namebox(d) Formula bar(e) None of these
(d)Explanation: (d) The formula bar in Excel is located above the work area of the spreadsheet. It displays the data or formula stored in the active cell. The formula bar can be used to enter or edit a formula, a function, or data in a cell.
- Which of the following terms is used to describe the movement of an item with the help ofmouse to a new position on screen ?(a) double clik(b) clik(c) drag and drop(d) point(e) right clik
(c)Explanation: (c) In computer graphical user interface, drag and drop is a pointing device gesture which allows you to drag objects to specific location on the screen to perform actions on them, eg. in Macintosh environment, you can drag a document to the trash can icon to delete it.
- Which type of resource does have greater probability to become shared resource in a computer network ?(a) Speakers(b) Printers(c) Floppy Disc Drivers(d) Keyboards(e)None of these
(b)Explanation: (b) A shared resource typically refers to a hardware or software resource that can be accessed by one or more remote systems over a network. Hardware devices such as printers and scanners are often set up on a network for use by numerous users in an organization. Printer acts as a shared resource for a set number of computers, allowing users to send documents to the print queue, which would then send those documents to the printer. This allows multiple users to share a single or more printers on a network. This is cost-effective as printers are expensive.
- When we move any row or column, the text of moved cells(a) remains at its place but formatting moves(b) moves with the cell(c) moves with cells and formatting is lost(d) moves with cells and some formatting are changed(e) None of these
(b)Explanation: (b) When you move or copy rows and columns, microsoft office Excel moves or copies all data that they contain, including formulas and their resulting values, comments, cell formats and hidden cells. You can use the cut command or copy command to move or copy selected rows and columns
- In shell programming, which of the following command is used for character translation?(a) dd(b) tr(c) grep(d) sed(e) None of these
(b)Explanation: (b) The tr command copies the given input to produce the output with substitution or deletion of selected characters. tr abbreviated as translate or transliterate. It takes as parameters two sets of characters, and replaces occurences of the characters in the first cell with the corresponding elements from the other set i.e, it is used to translate characters.
- In a computer network, a computer that can control a group of other computers for sharing information as well as hardware utilities is known as(a) Hub(b) Client(c) Switch(d) Server(e) Control Panel
(d)Explanation: (d) A network server is a computer designed to process requests and deliver data to other (clients) computers over a local network or the Internet. Server is the most powerful computer in the network. It manages network resources on the network. They are configured with additional processing, memory and storage capacity to handle the load of serving clients. eg. Web servers, Proxy servers, FTP servers, Online game servers.
- In order to move from one worksheet to another in excel workbook, one should clik(a) Scroll bar(b) Active cell(c) Sheet tab(d) Tab button(e) None of these
(c)Explanation: (c) A sheet tab appears at the bottom of the worksheet. It has the name of the worksheet on it. It is used for navigating between worksheets quickly. By default, in Excel there are three worksheets per file. Switching between worksheets is done by clicking on the sheet tab.
- _____, a printed information, exists in real sense and is more permanent from of out put than the output existing on display device.(a) Carbon copy(b) Soft copy(c) Hard copy(d) Desk copy(e) None of these
(c)Explanation: (c) A hard copy is a physical reproduction or representation of the data or information from a computer. Such as printed page or photograph. A hard copy is so-called because it exists as a physical object.
- Saving is the process(a) To change the content of any document(b) To copy document from memory to storage medium(c) To change the display or entire document(d) To develop document by entering text using keyboard(e) None of these
(b)Explanation: (b) Saving is the process of copying data from a temporary area to a more permanent storage medium. For eg. when you edit a file with a word processor, the word processor copies the entire file, or portions of the file, into an area of main memory called a buffer. Any changes you make to the file are made to the copy in the buffer not to the real file on the disk. The buffer is temporary-as soon as you exit the program or turn off the computer, the buffer disappears. To record your modifications to the file on the disk, you must save the file. When you do this, the word processor copies the contents of the buffer to the file on the disk, replacing the previous version of the file.
- Which bar is usually located below that Title Bar that provides categorized options?(a) Status Bar(b) Menu bar(c) Tool bar(d) Scroll bar(e) None of these
“(b)Explanation: (b) A menu bar is a horizontal bar, typically located at the top of the browser or application window below the title bar, containing drop-down menus like File, Edit, Font, Tools, Help that allow the user to interact with the content or application in various ways. For eg. in microsoft word, ““file”” menu provides options to open a file, create a new one, save it, print, etc. ““Edit”” menu allows the user to Copy, Paste, Find and Replace text , etc.”
- The program which takes user input, interprets it and takes necessary action is—(a) System calls(b) Kernel(c) Shell(d) Scheduler(e) None of these
(c)Explanation: (c) The shell is an interactive program that gets user input, interprets it and then takes necessary action accordingly. it acts like a command interpreter for the user. As soon as a command is received from a user, the shell looks for a matching intrinsic command and executes it. If it doesn’t find an instrinsic command, it searches for a disk file corresponding to the command and execute it. During this process it substitutes any variables and other commands listed in the command line. It also handles I/ O redirection and can execute batch files containing other UNIX commands and control structures.
- Dialogue control is a function of the ____ layer.(a) Session(b) Transport(c) Presentation(d) Application(e) None of these
(a)Explanation: (a) Session establishment, maintenance & termination; Session support and dialog control are functions of a session layer of OSI model. Dialog control determines which device will communicate first and the amount of data that will be sent. The types of dialog control that can takes place include simplex, half duplex and full duplex.
- In a network with 25 computers, which topology would require the more extensive cabling ?(a) Star(b) Mesh(c) Bus(d) Ring(e) None of these
(b)Explanation: (b) In a mesh topology, each device is connected to another device in a network. It is a way of interconnecting devices on a network. eg. if there are N devices each devices will have (N-1) connections to get to every other devices. So, in a work this 25 computers, each computer will be connected other using 24 cables. Which will represent most extensive cabl ing structure when compared with other topologies.
- Which UNIX command would append a file called test to the end of a file called output ?(a) Append output»_space; test(b) Cat output»_space; test(c) Write output»_space; text(d) Cat text»_space; output(e) None of these
(d)Explanation: (d) The cat command reads one or more files and prints them to standard output. The operator > can be used to combine multiple files into one. The operator»_space; can be used to append (add data) to an existing file. eg. Cat file 1» file 2 will append (add) the contents of file 1 to file 2 at the end.
- A _______ is a microprocessorbased computing device.(a) mainframe(b) personal computer(c) workstation(d) server(e) None of these
(b)Explanation: (b) A personal computer (PC) is a microprocessor based computing device that enables manufacturers to put an entire CPU on one chip. It is designed to meet the computing needs of an individual.
- An area of a computer that temporarily holds data waiting to be processed is __________.(a) Memory(b) CPU(c) Storage(d) File(e) None of these
(a)Explanation: (a) Memory refers to an area within a cmputer system that holds data writing to be processed by CPU. Example of processing include performing calculations, sorting lists of words or numbers, modifying documents and pictures according to user instructions and drawing graphs.
- C, BASIC, COBOL, and Java are examples of _________languages.(a) Computer(b) low-level(c) System programming(d) High-level(e) None of these
(d)Explanation: (d) C, BASIC, COBOL are all high level languages which can easily by understood by humans. They use English like statements for programming.
- RAM can be thought of as the ____ for the computer’s processor.(a) operating room(b) factory(c) waiting room(d) planning room(e) None of these
“(a)Explanation: (a) RAM (Random Access Memory) or computer’s main memory is called as ““Operating room”” or ““Working memory”” of the computer as it stores data and programs that CPU is currently running. RAM hold the programs and data on temporary basis i.e, as soon as the computer is switched off, this gets lost.”
- The instructions that tell a computer how to carry out the processing tasks are referred to as computer __________.(a) processors(b) programs(c) input devices(d) memory modules(e) None of these
(b)Explanation: (b) A computer program is a sequence of instructions, written to perform a specified task with a computer. A computer requires programs to function, typically executing the program’s instructions in a central processor. The series of instructions when executed, causes the computer to behave in a predetermined manner.
- A set of computer programs that helps a computer monitor itself and function more efficiently is a/an __________.(a) System Software(b) Windows(c) DBMS(d) Application Software(e) None of these
(a)Explanation: (a) System software is a set of programs that control or maintain the operation of the computer and its device. System software saves as the interface between the user, the application software and the computer’s hardware. Two types of system software are the operating system and utility programs.
- Data becomes ______ when it is presented in a format that people can understand and use.(a) graphs(b) processed(c) information(d) presentation(e) None of these
(c)Explanation: (c) Data is raw, unorganized facts that needs to be processed. Data can be something simple or seemingly random and useless until it is organised. When data is processed, organised, structured or presented in a given context so as to make it useful, it is called information.
- An email account includes a storage area, often called a (n) ____.(a) hyperlink(b) attachment(c) mailbox(d) IP address(e) None of these
(c)Explanation: (c) A mailbox refers to an area in memory or a storage device where email is placed. In email system, each user has a private mailbox, when the user receives email, the email system automatically puts it in the mail box.
- The term ___________ designates equipment that might be added to a computer system to enhance its functionality.(a) system add-on(b) digital device(c) disk pack(d) peripheral device(e) None of these
(d)Explanation: (d) A peripheral device (or auxiliary device) is a hardware device that allows a computer to perform an additional function, but it is not something the computer needs in order to work. It includes inputdevices such as keyboard, mouse, etc; Output devices such as monitor, printer, etc; and storage devices such as hard disk; floppy disk, etc.
- You use a(n) _______, such as a keyboard or mouse, to input information.(a) input device(b) Output device(c) storage device(d) processing device (e) None of these
(a)Explanation: (a) Input devices refers to those peripheral devices that allow data and instructions to enter a computer. eg. keyboard, mouse, scanner. Input devices translate data from human understandable form into machine readable form.
- A _______ is an additional set of commands that the computer displays after you make a selection from the main menu.(a) submenu(b) dialog box(c) menu selection(d) All of the above(e) None of these
(a)Explanation: (a) A sub menu is a secondary menu that appears which you are holding the cursor over an item on the primary menu. In other words, a sub menu is an additional list of options within a single menu selection. There can be many levels of sub menus.
- One thousand bytes is a _____(a) megabyte(b) kilobyte(c) gigabyte(d) terabyte(e) None of these
(b)Explanation: (b) A KB (kilobyte) is a unit of memory or data which is equal to 210 bytes or 1,024 bytes which is approximately equal to 1,000 bytes.
- A_____converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.(a) compiler(b) converter(c) interpreter(d) instruction(e) None of these
(a)Explanation: (a) A compiler is a piece of code that translates the high level language (source code) into machine language (object code). The compiler scans the entire program first and then translates it into machine code which will be executed by the computer processor and the corresponding tasks will be performed.
- The ______ is the amount of data that a storage device can move from the storage medium to the computer per second. COMPUTER LITERACY & MODEL PRACTICE(a) data digitizing rate(b) data migration rate(c) data transfer rate(d) data access rate(e) None of these
(c)Explanation: (c) The speed of a secondary storage device is measured by its access time and data transfer rate. Data transfer rate is the amount of data that can be transferred between main memory and a storage device per second (units-bps). The higher the data transfer rate, the faster the reading/writing process is. Whereas, data access time is the average time taken for the device to search and read the required data on the storage medium.
“695. ______ is the ability of a device to ““jump”” directly to the requested data.(a) Random access(b) Sequential access(c) Quick access(d) All of the above (e) None of these”
(a)Explanation: (a) Random (or Direct) access refers to the ability to access data at random. For eg. to go from point ‘A’ to point ‘Z’, you must pass through all intervening points (i.e, ‘A’ through ‘Y’) in a sequential access. Whereas, in a random access system, you can jump directly to point ‘Z’
- Computers manipulate data in many ways, and this manipulation is called ______.(a) processing(b) upgrading(c) batching(d) utilising(e) None of these
(a)Explanation: (a) The computer performs useful operations manipulating the data in many ways. This manipulation is called processing. examples of processing include performing calculations, sorting lists of words or numbers, modifying documents and pictures according to user instructions, and drawing graphs. A computer process data in the CPU which perform arithmetic and logic calculations.
- A(n)______is software that helps a computer control itself to operate efficiently and keep track of data.(a) hardware system(b) application system(c) software system(d) operating system(e) None of these
(d)Explanation: (d) Operating system is a software that controls the operation of a computer, directs the input & output of data, keep track of files and controls the processing of computer programs. Its role include managing the functioning of the computer hardware, running the application programs, serving as an interface between the computer and the user and allocating computer resources to various functions.
- The ALU performs ______ operations.(a) ASCII(b) arithmetic(c) algorithm-based(d) logarithm-based(e) None of these
(b)Explanation: (b) An arithmetic operation refers to a mathematical operation involving numbers. There are four primary arithmetic operations a computer program can perform. These are addition, subtraction, multiplication division. They form the basis for determining the outcome of calculated numbers. All arithmetic operations are carried out in Arithmetic Logic Unit (ALU) of a computer’s processor.
- ________ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.(a) Multithreading(b) Multitasking(c) Multiprocessing(d) Multicomputing(e) None of these &
(b)Explanation: (b) Multitasking refers to the ability to execute more than one task (or program) at the same time. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.