Sie sind auf Seite 1von 13

Technology no longer protected by copyright, available to everyone, is considered to be: (A) proprietary (B) open (C) experimental (D)

in the public domain (E) None of these Answer: (A) 2. A typical modern computer uses (A) Magnetic cores (B) LSI chips (C) Magnetic tapes (D) More than 1000 vacuum tubes (E) None of these Answer: (B) 3.ALU is called for _____ of a computer (A) Heart (B) Master dispatcher (C) Primary memory (D) All of the above (E) None of these Answer: (C) 4. A single dimensional array is called (A) List (B) Subscripts (C) Matrix (D) File (E) None of these Answer: (A) 5.How many types of drawing objects are available in drawing Tool Bar ? (A) 4 (B) 5 (C) 10 (D) 12 (E) None of these Answer: (E) 6.Data processing is___ (A) data collection (B) similar to computer programming (C) associated with commercial work (D) akin to data coding

(E) None of these Answer: (C) 7.In computer terminology, information means (A) Raw data (B) Data in more useful (C) Alphanumeric data (D) Program (E) None of these Answer: (B) 8.What is meant by the term RAM? (A) Memory which can only be read (B) Memory which can be both read and written to (C) Memory which is used for permanent storage (D) Memory which can only be written to (E) None of these Answer: (B) 9. In UNIX, which command is used to sort the lines of data in a file in reverse order (A) sort (B) sh (C) st (D) sort r (E) None of these Answer: (D) 10. The commonly used UNIX commands like date, ls, cat etc. are stored in (A) /dev directory (B) /bin directory (C) /tmp directory (D) /unix directory (E) None of these Answer: (B) 11. In UNIX, which command is used to change the protection mode of files starting with the string emp and ending with 1, 2 or 3 ? (A) Chmod u+x emp[1-3] (B) Chmod 777 emp* (C) Chmod u+r ??? emp (D) Chmod 222 emp ? (E) None of these Answer: (A) 12. The variables which can be accessed by all modules in a C program, are known as

(A) Local variables (B) Internal variables (C) External variables (D) Global variables (E) None of these Answer: (D) 13. Which computer memory is used for storing programs and data currently being processed by the CPU ? (A) Mass memory (B) Internal memory (C) Non-volatile memory (D) PROM (E) None of these Answer: (B) 14. A record that follws a group of related records and contains data relevant to those records is called as.... (A) Trailer record (B) Traffic record (C) Transaction record (D) Transducer (E) None of these Answer: (A) 15. A type of semiconductor memory that usually has small capacity but very fast access is (A) PROM (B) RAM (C) Scratchpad (D) ROM (E) None of these Answer: (C) 16. ____ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. (A) Nanoscience (B) Microelectrodes (C) Computer forensics (D) Artificial intelligence (E) None of these Answer: (A) 17.A single pole, single throw switch with one common line and one output line is (A) Switch circuit (B) SPDT switch (C) SPST switch

(D) Star bit (E) None of these Answer: (C) 18.A one-bit signal that indicates the start of data transmission by an asynchronous device is (A) Parity bit (B) Status bit (C) Zero bit (D) Star bit (E) None of these Answer: (D) 19.__ is data that has been organized or presented in a meaningful fashion. (A) A process (B) Software (C) Storage (D) Information (E) None of these Answer: (D) 20. The name for the way that computers manipulate data into information is called (A) programming (B) processing (C) storing (D) organizing (E) None of these Answer: (B) 21. Computers gather data, which means that they allow users to _____ data. (A) present (B) input (C) output (D) store (E) None of these Answer: (B) 22. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered (A) data (B) output (C) input (D) the process (E) None of these Answer: (B)

23. A circut with about 100 transistors fabricated on a single chip is called (A) MCR (B) MSI (C) MIS (D) RJE (E) None of these Answer: (B)
1. Which of the following powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides? 1) Slide show 2) Slide master 3) Slide sorter 4) Notes Page 5) Design Slide 2. A set of rules for telling the computer what operations to perform is / are called: 1) Structures 2) Procedural Language 3) Command Language 4) Natural Language 5) Programming Language 3. Devices that enter information and let you communicate with the computer are called: 1) Software 2) Hardware 3) Output Devices 4) Input / Output devices 5) Input Devices 4. The speed of which of the following memory chips is faster? 1) Not Fixed 2) DRAM 3) SRAM 4) For smaller chips SRAM is faster 5) For larger chips DRAM is faster 5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that? 1) Keyboard 2) Mouse 3) Printer 4) Scanner 5) None of these 6. Which of the following is not a social networking site? 1) WAYN

2) Hi 5 3) Orkut 4) Yahoo 5) Facebook 7. In the URL https://twitter.com, what does 's' represent in 'https'? 1) Safe 2) System 3) Start-up 4) Semantic 5) Secured

8. Which among the following is the file extension for Word Documents? 1) .xls 2) .ppt 3) .docx 4) .worddoc 5) None 9. Linux Operating system is an example of which of the following? 1) Freeware 2) Open Source Software 3) Shareware 4) Complimentary 5) None of these 10. A device that connects to a network without the use of a cable is said to be: 1) Distributed 2) Non-Wired 3) Centralised 4) Open source 5) Wireless 11. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations: 1) Document Processor 2) Graphics Package II 3) Power Point 4) SpreadSheet 5) Meta Processor 12. Removing and replacing devices without turning off the computer is referred to as: 1) Search Engines 2) Operating System 3) Software 4) Resource Locators 5) Plug-n-Play

13. Mr. Prashanth has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as: 1) Data Redundancy 2) Multiple Data Places 3) Various File Places 4) Data Inconsistency 5) Data Independent 14. What is a Firewall? 1) A wall to protect against Fire 2) A software to protect from computer hacker intrusions 3) A software to destroy computer 4) A wall to make partitions in computer 5) None of these 15. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the following is true based on the given scenario? 1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu 2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi 3) Pavan Kalyan can view the email address of Nagababu only 4) Both 1 and 2 5) None of them is true 16. When data changes in multiple lists and all lists are not updated, this causes: 1) Data Population Problem 2) Data Reduction 3) Data Induction 4) Data Overload 5) Data Inconsistency 17. The legal right to use software based on specific restrictions is granted via a: 1) Software privacy policy 2) Software License 3) Software password manager 4) Software log 5) None of these 18. Which of the following is not an operating system? 1) Windows 2000 2) DOS 3) Windows 7 4) Mac Os X Lion 5) Google 19. Find the Mis-Matched pair. 1) Chrome - Google 2) Opera - Opera Software 3) Internet Explorer - Microsoft 4) Safari - Net Scape Communications

5) None of these 20. What is the full form of RISC? 1) Reduced Instruction Set Computing 2) Reformed Instruction System Computing 3) Reduced Information System Computing 4) Restoration of Information in System Computing 5) Reduced Instruction Sect Code 21. The common name for Modulator and Demodulator is: 1) Modem 2) Joiner 3) Networker 4) Connecter 5) Mom-dom 22. In order to delete a sentence from a document you would use ....... 1) Highlight and copy 2) Cut and Paste 3) Copy and Paste 4) Highlight and Delete 5) Select and Paste 23. What is the keyboard shortcut for Slide Show in Powerpoint ? : 1) F4 2) F8 3) F9 4) F5 5) F12 24. A ...... is a design tool that graphically shows the logic in a solution algorithm. 1) Flow chart 2) Hierarchy Chart 3) Structure Chart 4) Context Diagram 5) None 25. The justification that aligns text on both margins of a document in Word is ...... 1) Justify 2) Bold 3) Centre 4) Right 5) Balanced 26. The Open, Print and Save Buttons are all located on the ...... 1) Status Bar 2) Formatting Toolbar 3) Standard Toolbar 4) Titlebar

5) Status and Title bars 27. SMPS in a computer stands for? 1) Switched-Mode Power Supply 2) Simple-Mode Power Supply 3) Simple-Mode Power System 4) Switched-Menu Power Supply 5) None of these 28. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as: 1) Decryption 2) Encryption 3) Alphabet Coding 4) Encrography 5) Deptography 29. ..... is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory. 1) DRAM 2) PRAM 3) NRAM 4) NORAM 5) None 30. A computer network that uses Internet protocol technology to share information, Operational system, within an organization is usually referred to as ...... 1) Internet 2) MAN 3) PAN 4) NPN 5) Intranet 31. What is the symbol for attachments in yahoo mail? 1) Envelope 2) Letter A 3) Paper Clip 4) Pen 5) None 32. Which of the following computers is used in Scientific researches? 1) Super Computers 2) Main Frame 3) Laptop 4) Micro Computers 5) None of these 33. Winzip is an example of : 1) Free ware

2) Shareware 3) Open Source 4) Vertical Market Software 5) None 34. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do 1) Nanoscience 2) Nanotechnology 3) Simulation 4) Artificial intelligence (AI) 5) None 35. COBOL is an acronym for ............. 1) Common Business Oriented Language 2) Computer Business Oriented Language 3) Common Business Operated Language 4) Common Business Organized Language 5) None of these 36. The human readable version of a software program is called: 1) cache 2) instruction set 3) source code 4) word size 5) None of these 37. Which of the following is not a programming language with Object Oriented Features? 1) COBRA 2) ABAP 3) C++ 4) C# 5) C 38. Which of the following programming language is favoured for Artificial Intelligence? 1) ABAP 2) COBOL 3) LISP 4) JAVA 5) C# 39. The quickest and easiest way in Word, to locate a particular word or phrase in a document 1) Replace 2) Find 3) Lookup 4) Search 5) None of these 40. What symbol is present on the number key '2' on the keyboard?

1) ! 2) % 3) ^ 4) 5) @ 1. A (n) ____ program is one that is ready to run and does not need to be altered in any way. 1) Interpreter 2) High-level 3) Compiler 4) COBOL 5) Executable 2. Which of the following is true about URL? 1) It is a computer program 2) It is a type of Programming object 3) It is the address of a document or page on the World Wide Web 4) It is an acronym for Unlimited Resources for Listening 5) It is a piece of hardware 3. Universal Product Code (UPC) is a _ 1) Scanner 2) Hardware Equipment 3) Antivirus 4) Graphics Adapter 5) Barcode system 4. Facsimile Transmission Machine is popularly known as: 1) ATM 2)Scanner 3) Fax Machine 4) Format Machine 5) None 5. What is the significance of a faded/ dimmed command in a pull-down menu? 1) Screen becomes faded / dimmed if the command is selected 2) The command is not accessible currently 3) A dialog box appears if the command is selected. 4) A help window appears if the command is selected. 5) None 6. The main folder on a storage device is called _____ 1) Root Directory 2) Interface 3) Device driver 4) Platform 5) Main directory 7. To protect the computer from hacker intrusions, ____ must be installed.

1) Firewall 2) Mailer 3) Script 4) Yahoo Messenger 5) None of these 8. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory? 1) Printer 2) Laser beam 3) Scanner 4) Touchpad 5) None 9. A program designed to destroy data on the computer which can travel to infect other computers is called a ____ 1) Hurricane 2) Infector 3) Disease 4) Virus 5) None 10. Thesaurus option is available in ___ menu. 1) Page layout 2) References 3) Review 4) View 5) Layout 11. Which of the following is/ are the functions of operating system 1) Memory Management 2) Access to I/O devices 3) Controlled Access to files 4) All the above 5) None of these 12. The easiest way to select text is to left click the mouse and _____ 1) Hold the Shift key 2) Hold the Ctrl key 3) Move the mouse 4) Drag Over the words you want to highlight 5) None 13. Which part of the URL http://www.sbi.co.in will specify the rules to be followed when accessing a file? 1) http:// 2) www 3) sbi 4) .in 5) sbi.co.in 14) Moving the page around to view all the pages in the document on the screen is referred to as:

1) Surfing 2) Navigating 3) Hyperlink 4) Scrolling 5) Browsing 15 Which of the following is the short-cut key to close an active tab of a browser? 1) Alt + F4 2) Ctrl + C 3) Ctrl + F4 4) Shift + C 5) Ctrl + W

Das könnte Ihnen auch gefallen