My Twitter Favorites


Don’t wait. The time will never be just right...

Monday, October 6, 2014

COMPUTER QUIZ

print this page

PART - I

[1]. The purpose of the primary key in a database is to : 
(1) unlock the database 
(2) provide a map of the data 
(3) uniquely identify a record 
(4) establish constraints on database operations 
(5) None of these
Ans -uniquely identify a record 

[2]. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(1) an open folder.
(2) the folder contains subfolders.
(3) a text file.
(4) a graphics file
(5) none of these
Ans - the folder contains subfolders.

[3]. All of the following statements concerning windows are true EXCEPT—
(1) windows are an example of a command-driven environment.
(2) windows can be resized and repositioned on the desktop.
(3) more than one window can be open at a time.
(4) toolbars and scrollbars are features of windows.
(5) None of these
Ans - windows are an example of a command-driven environment.

[4]. The memory resident portion of the operating system is called the—
(1) Registry
(2) API
(3) CMOS
(4) Kernel
(5) None of these
Ans - Kernel

[5]. The basic input/output system (BIOS) is stored in:
(1) RAM
(2) ROM
(3) The CPU
(4) The hard drive
(5) None of these
Ans - ROM

[6]. Which of the following is not a tower?
(1) CPU
(2) Motherboard
(3) Peripheral
(4) All of the above
(5) None of these
Ans - Peripheral

[7]. The horizontal and vertical lines on a worksheet are called—
(1) cells
(2) sheets
(3) block lines
(4) gridlines
(5) None of these
Ans - gridlines

[8]. What is usually used for displaying information at public places ?
(1) Monitors
(2) Overhead Projections
(3) Monitors and Overhead Projections
(4) Touch Screen Kiosks
(5) None of these
Ans - Touch Screen Kiosks

[9]. Which key is used in combination with another key to perform a specific task ?
(1) Function
(2) Control
(3) Arrow
(4) Space bar
(5) None of these
Ans - Control

[10]. Fax machines and imaging systems are examples of—
(1) bar-code readers
(2) imaging systems
(3) scanning devices
(4) pen-based systems
(5) None of these
Ans - scanning devices



PART - II

[1]. What is MP3?
(1) A mouse
(2) A Printer
(3) A Sound format
(4) A Scanner
(5) None of these
Ans - A Sound format

[2]. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP
addresses from the Internet.
(1) Routing
(2) Network address translation (NAT)
(3) Signature referencing
(4) Packet filtering
(5) None of these
Ans - Network address translation (NAT)

[3]. What characteristic of read-only memory (ROM) makes it useful ?
(1) ROM information can be easily updated.
(2) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
(3) ROM provides very large amounts of inexpensive data storage.
(4) ROM chips are easily swapped between different brands of computers.
(5) None of these
Ans - Data in ROM is nonvolatile, that is, it remains there even without electrical power.

[4]. Data representation is based on the………number system, which uses two numbers to represent all data.
(1) binary
(2) biometric
(3) bicentennial
(4) byte
(5) None of these
Ans - binary

[5]. To what temporary area can you store text and other data, and later paste them to another location?
(1) The clipboard
(2) ROM
(3) CD-ROM
(4) The hard disk
(5) None of these
Ans - The clipboard

[6]. Classes, instances, and methods are characteristics of:
(1) Testing plan construction
(2) Artificial intelligence techniques
(3) Object-oriented design
(4) Flowcharts and pseudo code
(5) None of these
Ans - Object-oriented design

[7]. Which of the following correctly describes the CD-R and DVD-R discs?
(1) You may record data to the disc surface multiple times and can read the current contents at any time.
(2) You may read data from the disc but may not alter its contents.
(3) You may record data to the disc surface multiple times but have no direct reading capability.
(4) You may record data to the disc surface once and then may only read its contents
(5) None of these
Ans - You may record data to the disc surface once and then may only read its contents

[8]. To move down a page in a document ……
(1) jump
(2) fly
(3) wriggle
(4) scroll
(5) None of these
Ans - scroll

[9]. CD-ROM stands for……
(1) central processing unit
(2) CD-remote open mouse
(3) CD-resize or minimize
(4) CD-read only memory
(5) None of these
Ans - CD-read only memory

[10]. Use this when you want to make all letters capital without having to use the shift key for each character………
(1) shifter
(2) upper case
(3) caps lock key
(4) icon
(5) None of these
Ans - caps lock key


[11] ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B

[12] All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B

[13] A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A

[14] Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C

[15] Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C



PART - III

[1] The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)

[2] Codes consisting of lines of varying widths or lengths that are computer-readable are known as–
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)

[3] A DVD is an example of a(n) –
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

[4] . ……….is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

[5] The……….enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)

[6] Which ports connect special types of music instruments to sound cards?
(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI
Ans : (D)

[7] What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (C)

[8] Video processors consist of……….and………., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)

[9] If you want to connect to your own computer through the Internet from another location, you can use–
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)

[10] Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information–
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)


[11] ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B

[12] All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B

[13] A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A

[14] Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C

[15] Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C



No comments:

Post a Comment

Please suggest your valuable comments here....