Sie sind auf Seite 1von 14

Computer-Awareness

Computer Awareness
1. C in CPU denotes
(1) Central
(2) Common(3)Convenient
(4) Computer
(5) Circuitry
2. A joystick is primarily used to/for
(1) control sound on the screen
(2) computergaming(3) enter text
(4) draw pictures (5) print text
3. Which is not a storage device?
(1) ACD
(2) A DVD(3)A floppy disk
(4) A printer
(5) A hard disk
4. Which of the following uses a handheld operating system?
(1) Asupercomputer(2) A personal computer
(3) A laptop
(4) A mainframe(5)A PDA
5. To display the contents of a folder in Windows
Explorer, you should
(1) click on it
(2) collapse it (3)name it
(4) give ita password(5)rename it
6. The CPU comprises of Control, Memory, and
......... Units.
(1) Microprocessor(2) Arithmetic/Logic
(3) Output
(4) ROM(5) Input
7. ......... is the most important/ powerful computer
in a typical network.
(1) Desktop
(2) Network client
(3) Network server (4) Network station
(5) Network switch
8. A(n)......... appearing on a web page opens another document when clicked.
(1) anchor
(2) URL (3) hyperlink
(4) reference
(5) heading
9. Which of the following refers to the rectangular area
for displaying information and running programs?
(1) Desktop
(2) Dialog box
(3) Menu
(4) Window (5) Icon
10. ......... is a windows utility program that locates and
eliminates unnecessary fragments and rearranges
files and unused disk space to optimise operations.
(1) Backup
(2) Disk cleanup
(3) Disk defragmenter
(4) Restore
(5) Disk restorer

11. Which of the following refers to too much electricity and may cause a voltage surge?
(1) Anomaly
(2) Shock(3) Spike
(4) Virus
(5) plash
12. The software that is used to create text-based
documents are referred to as
(1) DBMS
(2) suites
(3) spreadsheets (4) presentation software
(5) word processors
13. ......... devices convert human-understandable
data and programs into a form that the computer can process.
(1) Printing
(2) Output(3)Solid state
(4) Monitor
(5) Input
14. Where you are likely to find an embedded operating system?
(1) On a desktop operating system
(2) On a networked PC
(3) On a network server
(4) On a PDA
(5) On a mainframe
15. An online discussion group that allows direct
live communication is known as
(1) webcrawler (2) chat group
(3) regional service provider
(4) hyperlink
(5) e-mail
16. Which of the following is a program that uses a
variety of different approaches to identify and
eliminate spam?
(1) Directory search(2) Anti-spam program
(3) Web server
(4) Web storefront creation package
(5) Virus
17. Connection or link to other docu- . ments or
webpages that contain related information is
called
(1) dial-up
(2) e-commerce
(3) hyperlink
(4) e-cash(5) domain name
18. Which of the following is a programming language for creating special programs like applets?
(1) Java
(2) Cable (3) Domain name
(4) Net
(5) COBOL

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
19. The system unit
(1) coordinates input and output devices
(2) is the container that houses electronic components
(3) is a combination of hardware and software
(4) controls and manipulates data
(5) does the arithmetic operations
20. System software
(1) allows the user to diagnose and troubleshoot
the device
(2) is a programming language
(3) is part of a productivity suite
(4) is an optional form of software
(5) helps the computer manage internal resourses
21. Computer and communication technologies,
such as communication links to the internet that
provide help and understanding to the end user
is known as
(1) presentation file (2) information technology
(3) program
(4) worksheet file
(5) FTP
22. Which of the following is contained on chips connected to the system board and is a holding area
for data instructions and information? (processed
data waiting to be output to secondary storage)
(1) Program
(2) Mouse(3) Internet
(4) Memory
(5) Modem
23. Microsofts Messenger allows users to
(1) to bypass a browser to surf the web
(2) create a blog
(3) communicate via direct live communication
(4) identify and eliminate spam
(5) make graphic presentation
24. Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called
(1) general-purpose application
(2) internet
(3) scanner (4)printer
(5) notebook computer
25. The main circuit-board of the system unit is the
(1) computer program
(2) control unit (3) motherboard
(4) RAM
(5) None of the above

2
26. Which of the following is billionth of a second?
(1) Gigabyte
(2) Terabyte
(3) Nanosecond (4) Microsecond
(5) Terasecond
27. What is an internet?
(1) International network used to transfer information internally.
(2) Internal internet used to transfer information
to the outside company.
(3) Internal network designed to sesve the internal informational needs of a single organisation.
(4) Internal network designed to transfer the information between two organisations.
(5) None of the above
28. To send another station a message, the main thing
a user has to know is
(1) how the network works
(2) the other stations address
(3) whether the network is packet-switched or
circuit-switched
(4) whether this is a voice or data network
(5) None of the above
29. The database administrators function in an
organisation is
(1) to be responsible for the more technical aspects of managing the information contained
in organisational databases
(2) to be responsible for the executive level aspects of decisions regarding the information
management
(3) to show the relationship among entity classes
in a data warehouse
(4) to define which data mining tools must be
used to extract data
(5) None of the above
30. A ......... is a computer connected to two networks.
(1) link (2) server(3) gateway
(4) bridge way (5) None of these
31. Each of the following is a true statement except
(1) online systems continually update the master file
(2) in online processing, the user enters transactions into a device that is directly connected
to the computer system

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(3) batch processing is still used today in older
systems or in some systems with massive
volumes of transactions
(4) information in- batch systems will always be
up-to-date
(5) None of the above
32. When you save a presentation,
(1) all slides in a presentation are saved in the
same file
(2) two files are created; one for graphics and
one for content
(3) a file is created for each slide
(4) a file is created for each animation or graphic
(5) None of the above
33. In a client/server model, a client program
(1) asks for information
(2) provides information and files
(3) serves software files to other computers
(4) distributes data files to other computers
(5) None of the above
34. Every device on the internet has a unique .........
address (also called an Internet Address) that
identifies it in the same way that a street address
identifies the location of a house.
(1) DH (2) DA (3) IP (4) IA
(5) None of these
35. In a customer database, a customers surname
would be keyed into a
(1) row (2) text field
(3) record
(4) computed field(5) None of these
36. A set of interrelated components that collect,
process, store and distribute information to support decision making and control in an
organisation best defines
(1) communications technology
(2) a network
(3) an information system
(4) hardware
(5) None of the above
37. Control in design of an information system is used to
(1) inspect the system and check that it is built
as per specifications
(2) ensure that the system processes data as it was
designed to and that the results are reliable
(3) ensure privacy of data processed by it

3
(4) protect data from accidental or intentional loss
(5) None of the above
38. Which of the following converts all the statements
in a program in a single batch and the resulting
collection of instructions is placed in a new file?
(1) Compiler
(2) Interpreter
(3) Converter
(4) Instruction
(5) None of the above
39. Digital photos and scanned images are typically
stored as ......... graphics with extensions such
as .bmp, .png, jpg, .tif, or gif.
(1) vector
(2) bitmap(3)Either (a) or (b)
(4) Neither (a) nor (b)(5) None of the above
40. Which of the following contains information
about a single entity in the database-like a person, place, event, or thing?
(1) Query
(2) Form (3) Record
(4) Table
(5) None of the above
41. When you install a new programme on your computer, it is typically added to the ......... menu.
(1) all programmes(2) select programmes
(3) startprogrammes (4) desktop programmes
(5) None of the above
42. After a user has saved and deleted many files,
many scattered areas of stored data remain that
are too small to be used efficiently, causing
(1) disorder
(2) turmoil
(3) disarray
(4) fragmentation
(5) None of the above
43. Which of the following is the communications
protocol that sets the standard used by every
computer that accesses web-based information?
(1) XML(2) DML (3) HTTP(4) HTML
(5) None of the above
44. A ......... is a computer attached to the internet that
runs a special web server software and can send
webpages out to other computers over the internet.
(1) web client
(2) web system (3) webpage
(4) web server (5) None of the above
45. ......... are a type of inexpensive digital camera
that remains tethered to a computer and used
for video conferencing, video chatting, and live
web broadcast.

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(1) Webcams
(2) Webpics
(3) Browsercams (4) Browserpics
(5) None of these
46. Whichoneofthefollowingisakeyfunctionofafirewall?
(1) Monitoring
(2) Deleting(3)Copying
(4) Moving
(5) None of these
47. The standard protocol of the internet is
(1) TCP/IP
(2) Java (3) HTML
(4) Flash
(5) None of these
48. A program that generally has more user-friendly
interface than a DBMS, is called a
(1) front end
(2) repository
(3) back end
(4) form (5) None of these
49. The acronym HTML stands for
(1) High Transfer Machine Language
(2) High Transmission Markup Language
(3) Hyper Text Markup Language
(4) Hypermedia Markup Language
(5) None of the above
50. Computers connected to a LAN can
(1) run faster
(2) share information and/or share peripheral
equipment
(3) e-maii
(4) go online
(5) None of the above
51. The ......... of a system includes the programs or
instructions.
(1) hardware
(2) icon (3) information
(4) software
(5) None of the above
52. Which of the following displays programs that
are currently running? A single click on one of
the program icons will bring the Windows up.
(1) Menu bar
(2) Task bar (3)Title bar
(4) Status bar
(5) None of the above
53. In order to save a Word document as a webpage,
you need to
(1) put the appropriate graphics and links on the
document
(2) save the document in simple text format
(3) use your web browser as an editor and save
as URL
(4) save as HTML (5)None of the above

4
54. Which of the following displays to the right of the
space where the text will be inserted when you type?
(1) Screen tip
(2) Insertion point
(3) Rulers
(4) Office assistant
(5) None of the above
55. Something which has easily-understood instructions is said to be
(1) user friendly (2) information
(3) word processing (4) icon
(5) None of the above
56. The copy command saves to
(1) the desktop (2) the clipboard
(3) Microsoft Word(4) Paste
(5) None of the above
57. An example of non-numeric data is
(1) bank balance (2) examination marks
(3) real numbers (4) employee address
(5) None of the above
58. Which of the following displays the buttons for
changing text style, alignment and size?
(1) Standard toolbar(2) Status bar
(3) Drawing toolbar (4) Formatting toolbar
(5) None of the above
59. Arranging of data in a logical sequence is known as
(1) classifying
(2) searching
(3) sorting
(4) reproducing
(5) None of these
60. Which of the following tools is not normally used
during system analysis?
(1) Program flow chart
(2) Grid chart
(3) System flow chart
(4) Question check-list
(5) None of the above
61. A single application that combines the major features of several types of applications, is called
(1) integrated software
(2) a suite
(3) a combo package
(4) high-end
(5) None of the above
62. The word processing task associated with changing the appearance,of documents is
(1) writing
(2) formatting
(3) editing
(4) storing(5)None of these

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
63. In order to save an existing document with a
different name, you need to
(1) retype the document and give it a different name
(2) use the Save As command
(3) copy and paste the original document to a
new document and then save
(4) use Windows Explorer to copy the document
to a different location and then rename it
(5) None of the above
64. It is better to copy a file from a floppy disk to a
hard disk, then open the copy on the hard disk
because
(1) a floppy disk is easily moved from one computer to another
(2) you can store more on a hard disk
(3) the computer cannot open a file stored on a
floppy disk
(4) reading a hard disk is much faster and safer
(5) None of the above
65. The best reason that a computer needs to have
a hard disk is because
(1) it can then use the same programs as other
computers
(2) it would not work without one
(3) it can store information, when it is switched off
(4) it can store information while it is working
(5) None of the above
66. The primary goal of a computer system is to turn
data into
(1) ideas
(2) suggestions
(3) information (4) reports(5)None of these
67. The government of India is planning to create a
SEBI like regulatory body for which of the following business activities, which is whopping in
India these days?
(1) Print media
(2)Horse racing
(3) Cement manufacturing
(4) Electronic media (5)Lottery
68. What is back-up?
(1) Adding more components to.your network
(2) Protecting data by copying it from the original source to a different destination

5
(3) Filtering old data from the new data
(4) Accessing data on tape
(5) None of the above
69. Sending an e-mail is similar to
(1) writing a letter (2) drawing a picture
(3) talking on the phone
(4) sending a package
(5) None of the above
70. What is the main folder on a storage device called?
(1) Platform
(2) Interface
(3) Root directory (4) Device driver
(5) None of these
71. The blinking symbol on the computer screen is
called the
(1) mouse
(2) hand (3) light
(4) cursor
(5) None of these
72. What is correcting errors in a program called?
(1) Interpreting (2) Translating
(3) Debugging
(4) Compiling
(5) None of these
73. A ......... is an organised collection of data about
a single entity.
(1) file
(2) library(3) database
(4) dictionary
(5) None of the above
74. The type of software that controls the internal operations in the computer, and controls how the computer
words with all its parts is which of the following?
(1) Shareware
(2) Operating system software
(3) Application software
(4) Public domain software
(5) None of the above
75. A word processor would most likely be used to
do which of the following?
(1) Keep an account of money spent
(2) Maintain an inventory
(3) Type a biography
(4) Do a computer search in the media centre
(5) None of the above
76. In addition to keying data directly into a database, data entry can be done from a(n)
(1) input form
(2) table
(3) field
(4) data dictionary(5) None of these

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
77. What is an e-mail attachment?
(1) A receipt sent by the recipient.
(2) A separate document from another program
sent along with an e-mail message.
(3) A malicious parasite that feeds off of your
messages and destroys the contents.
(4) A list of CC: or BCC: recipients.
(5) None of the above
78. What happens when you boot up a PC?
(1) Portions of the operating system are copied
from disk into memory.
(2) Portions of the operating system are copied
from memory onto disk.
(3) Portions of the operating system are compiled
(4) Portions of the operating system are emulated
(5) None of the above
79. Manipulating data to create information is known as
(1) feedback
(2) programming
(3) processing
(4) analysis
(5) None of these
80. A hard copy of a file created on a computer
refers to data
(1) saved on a floppy disk
(2) printed on a printer
(3) backed up on a tape drive
(4) sent as an e-mail(5) None of the above
81. Macros stored in the global macro sheet can be used
(1) in the current document only
(2) in any document
(3) can be used only with other macros of the
global macro sheet
(4) not consistent behaviour
(5) None of the above
82. About pasting from the clip board
(1) a part of the clip board contents can be pasted
(2) whole of the contents of clip board can be pasted
(3) sometimes (1) and sometimes (2)
(4) (1) and (2)
(5)None of the above
83. One of the following statements is not true for
BUFFERS command
(1) Increasing numbers of BUFFERS can speed
program execution, but only to a certain extent

6
(2) The more buffers that exist the more sectors
can be stored in memory; hence fewer accesses of disk are necessary
(3) The BUFFERS command is used to establish the number of disk buffers set-up by MSDOS during booting
(4) All of the above
(5) None of the above
84. EPROM can be used for
(1) erasing the contents of ROM
(2) reconstructing the contents of ROM
(3) erasing and reconstructing the contents of ROM
(4) duplicating the ROM
(5) None of the above
85. Attributes can be defined for
(1) entity
(2) switchboard
(3) macro
(4) pages (5) Noneoftheabove
86. Where will we find the referential integrity command?
(1) Tools
(2) View (3) Format
(4) Table
(5) None of these
87. Anything that is typed in a worksheet appears
(1) in the formula bar only
(2) in the active cell only
(3) in both active cell and formula bar
(4) in the formula bar first and when we press
ENTER it appears in active cell
(5) None of the above
88. Which bar is usually located below the Title Bar
that provides categorised options?
(1) Menu Bar
(2) Status Bar
(3) Toolbar
(4) Scroll Bar
(5) None of these
89. A pixel is
(1) a computer program that draws picture
(2) a picture stored in the secondary memory
(3) the smallest resolvable part of a picture
(4) a virus
(5) None of the above
90. How many types of cell references are available
in Excel?
(1) 3
(2) 4
(3) 8
(4) 10
(5) None of these

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
91. VIRUS stands for
(1) Very Important Record User Searched
(2) Verify Interchanged Result Until Source
(3) Virtual Information Resource Under Seize
(4) Very Important Resource Under Search
(5) None of the above
92. Unlike filters queries can be saved as ......... in a
database.
(1) objects
(2) filters (3) database
(4) Any of these (5) None of these
93. Table of contents can be prepared by using
(1) macros
(2) headings as H1, H2, H3 and more in the
document
(3) by table of contents in tools menu
(4) (2) and (3)
(5) None of the above
94. Table in Word is a grid of rows and columns,
with each cell can have
(1) text or graphics (2) only text
(3) only graphics (4) both
(5) None of the above
95. What is a database?
(1) It is a collection of data arranged in rows
(2) It is a collection of data arranged in columns
(3) It is a collection of data arranged in rows
and columns
(4) All of the above
(5) None of the above
96. Which switch should be used in the DIR command to view files in a directories?
(1) /p (2) /w (3) /S (4) /L
(5) None of these
97. When a key is pressed on the keyboard, which
standard is used for converting the keystroke
into the corresponding bits?
(1) ANSI
(2) ASCII(3) EBCDIC
(4) ISO
(5) None of the above
98. External database is
(1) Database created in EXCEL
(2) Database created using DBMS package
(3) Database created in MS-Word
(4) All of the above
(5) None of the above

7
99. Which command we will give if we want to show
the database objects with its decription?
(1) Details
(2) Show(3) List
(4) Any of these (5) None of these
100. Word allows user to import graphics from
(1) the library which comes bundled with Word
(2) any where in the computer
(3) various graphics format like gif, bmp, png, etc
(4) only gif format (5) None of the above
101. Allows users to upload files to an online site so they
can be viewed and edited from another location.
(1) General-purpose applications
(2) Microsoft Outlook
(3) Web-hosted technology
(4) Office Live (5) None of the above
102. What feature adjusts the top and bottom margins so that the text is centered vertically on the
printed page?
(1) Vertical justifying(2) Vertical adjusting
(3) Dual centering (4) Horizontal centering
(5) Vertical centering
103. Which of these is not a means of personal communication on the Internet?
(1) Chat
(2) Instant messaging
(3) lnstanotes
(4) Electronic mail
(5) None of these
104. What is the overall term for creating editing, formatting, storing, retrieving and printing a text document?
(1) Word processing(2) Spreadsheet design
(3) Web design (4) Database management
(5) Presentation generation
105. Fourth-generation mobile technology provides
enhanced capabilities allowing the transfer of both
......... data, including full-motion video, highspeed Internet access, and videoconferencing.
(1) video data and information
(2) voice and non-voice
(3) music and video
(4) video and audio (5) None of the above
106. ......... is a form of denial of service attack in
which a hostile client repeatedly sends SYN
packets to every port on the server using fake
IP addresses.

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(1) Cybergaming crime
(2) Memoryshaving (3) Synflloding
(4) Software piracy(5) None of the above
107. Which of these is a point-and-draw device?
(1) Mouse
(2) Scanner (3)Printer
(4) CD-ROM
(5) Keyboard
108. The letter and number of the intersecting column and row is the
(1) cell location (2) cell position
(3) cell address (4) cell coordinates
(5) cell contents
109. A set of rules for telling the computer what operations to perform is called a
(1) procedural language
(2) structures
(3) natural language
(4) command language
(5) programming language
110. A detailed written description of the programming cycle and the program, along with the test
results and a printout of the program is called
(1) documentation (2) output(3) reporting
(4) spec sheets (5) directory
111. Forms that are used to organize business data
into rows and columns are called
(1) transaction sheets(2) registers
(3) business forms (4) sheet-spreads
(5) spreadsheets
112. In Power Point, the Header & Footer button
can be found on the Insert tab in what group?
(1) Illustrationsgroup(2) Object group
(3) Text group
(4) Tables group
(5) None of the above
113. A(n)......... is a set of programs designed to manage the resources of a computer, including starting the computer, managing programs, managing memory and coordinating tasks between input and output devices.
(1) application suite (2) compiler
(3) input/output system
(4) interface
(5) operating system (OS)
114. A typicalslide in a slide presentation would not include
(1) photo images charts, and graphs

8
(2) graphs and clip art
(3) clip art and audio clips
(4) full-motion video
(5) content templates
115. The PC productivity tool that manipulates data
organized in rows and column is called a
(1) spreadsheet (2) word processing document
(3) presentation mechanism
(4) database record manager
(5) EDI creator
116. In the absence of parentheses, the order of operation is
(1) exponentiation, addition or subtraction, multiplication or division
(2) addition or subtraction, multiplication or division, exponentiation
(3) multiplication or division, exponentiation, addition or subtraction
(4) exponentiation, multiplication or division,
addition or subtraction
(5) addition or subtraction, exponentiation, multiplication or division
117. To find the Paste Special option, you use the Clipboard group on the ......... tab of Power Point.
(1) Design
(2) Slide Show
(3) Page Layout (4) Insert(5) Home
118. A(n)......... program is one that is ready to run
and does not need to be altered in any way.
(1) interpreter
(2) high-level (3)compiler
(4) COBOL
(5) executable
119. Usually downloaded into folders that hold temporary Internet files,......... are written to your
computershard diskbysomeof theWeb sitesyou visit.
(1) anonymous files (2) behaviour files
(3) banner ads
(4) large files(5)cookies
120. What is the easiest way to change the phrase,
revenues, profits, gross margin, to read revenues,
profits, and gross margin?
(1) Use the insert mode, position the cursor before the g in gross, then type the word and
followed by a space
(2) Use the insert mode, position the cursor after the g in gross, then type the word and
followed by a space

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(3) Use .the overtype mode, position the cursor
before the g in gross, then type the word and
followed by a space
(4) Use the overtype mode, position the cursor
after the g in gross, then type the word and
followed by a space
(5) None of the above
121. A program, either talk or music, that is made
available in digital format for automatic download over the Internet is called a
(1) wiki
(2) broadcast
(3) vodcast
(4) blog (5) podcast
122. Which Power Point view displays each slide of
the presentation as a thumbnail and is useful for
rearranging slides?
(1) Slide Sorter (2) Slide Show
(3) Slide Master (4) Notes Page
(5) Slide Design
123. Different components on the motherboard of a
PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
(1) Conductors (2) Buses(3) Connectors
(4) Consecutives (5) None of the above
124. What is the name given to those applications that
combine text, sound, graphics, motion video,
and/ or animation?
(1) Motionware (2) Anigraphics
(3) Videoscapes (4) Multimedia
(5) Maxomedia
125. A USB communication device that supports data
encryption for secure wireless communication
for notebook users is called a
(1) USB wireless network adapter
(2) wireless switch (3) wireless hub
(4) router
(5) None of the above
126. A(n)......... language reflects the way people think
mathematically.
(1) cross-platform programming
(2) 3GL business programming
(3) event-driven programming
(4) functional
(5) None of the above
127. When entering text within a document, the Enter key is normally pressed at the end of every

9
(1) line
(2) sentence
(3) paragraph
(4) word (5) file
128. When a real time telephone call between people is
made over the Internet using computers, it is called
(1) a chat session (2) an e-mail
(3) an instant message
(4) Internettelephony(5) None of the above
129. Whichofthefollowingisthefirststepinsizingawindow?
(1) Point to the title bar
(2) Pull down the View menu to display the toolbar
(3) Point to any corner or border
(4) PulldowntheViewmenuandchangetolargeicons
(5) None of the above
130. Which of the following software could assist someone who cannot use their hands for computer input?
(1) Videoconferencing
(2) Speech recognition
(3) Audio digitizer
(4) Synthesizer (5) None of these
131. ......... a document means the fileis transferred
from another computer to your computer.
(1) Uploading
(2) Really Simple Syndication (RSS)
(3) Accessing
(4) Downloading
(5) Upgrading
132. Which computermemoryis used forstoring programs
and data currently being processed by the CPU?
(1) Mass memory (2) Internal memory
(3) Non-volatile memory
(4) PROM
(5) None of these
133. Computers that control processes accept data
in a continuous
(1) data traffic pattern
(2) data highway (3) infinite loop
(4) feedback loop (5) slot
134. Whatrefers to a set of characters of a particular design?
(1) Keyface
(2) Formation
(3) Calligraph
(4) Stencil (5)Typeface
135. ......... is used by public and private enterprises
to publish and share financial information with
each other and industry analysts across all computer platforms and the Internet.

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(1) Extensible Markup Language (EML)
(2) ExtensibleBusiness ReportingLanguage (XBRL)
(3) Enterprise Application Integration (EAI)
(4) Sales Force Automation (SFA) software
(5) None of the above
136. Which part of the computer is used for calculating and comparing?
(1) ALU (2) Control unit (3) Disk unit
(4) Modem
(5) None of these
137. The method of Internet access that requires a
phone line, but offers faster access speeds than
dial-up is the ......... connection.
(1) cable access (2) satellite access
(3) fiber-optic service
(4) Digital Subscriber Line (DSL)
(5) modem
138. ......... software creates a mirror image of the
entire hard disk, including the operating system,
applications, files, and data.
(1) Operatingsystem(2) Backup software
(3) Utility programs(4) Driver imaging
(5) None of the above
139. What is a URL?
(1) A computer software program
(2) A type of programming object
(3) The address of a document or page1 on the
World Wide Web
(4) AnacronymforUnlimited ResourcesforLearning
(5) A piece of hardware
140. What is the significance of a faded (dimmed)
command in a pull-down menu?
(1) The command is not currently accessible
(2) A dialog box appears if the command is selected
(3) AHelp windowappears ifthe commandis selected
(4) There are no equivalent keystrokes for the
particular command
(5) None of the above
141. Your business has contracted with another company to have them host and run an application for
your company over the Internet. The company providing this service to your business is called an
(1) Internet service provider
(2) Internet access provider

10
(3) Application service provider
(4) Application access provider
(5) Outsource agency
142. A(n)......... allows you to access your e-mail from
anywhere.
(1) forum
(2) webmail interface
(3) message board(4) weblog
(5) None of the above
143. Which of the following would you find on
Linkedln?
(1) Games
(2) Connections (3) Chat
(4) Applications (5) None of these
144. ......... is a technique that is used to send more
than one call over a single line.
(1) Digital transmission
(2) Infrared transmission
(3) Digitizing
(4) Streaming
(5) Multiplexing
145. The Search Companion can
(1) locate all files containing a specified phrase
(2) restrict its search to a specified set of folders
(3) locate all files containing a specified phrase and
restrict its search to a specified set of folders
(4) cannot locate all files containing a specified
phrase or restrict its search to a specified set
of folders
(5) None of the above
146. Which of the following cannot be part of an email address?
(1) Period (.)
(2) At sign (@)
(3) Space ( )
(4) Underscore (_)
(5) None of thes
147. Which of the following must be contained in a URL?
(1) A protocol identifier
(2) The letters, www.
(3) The unique registered domain name
(4) www. and the unique registered domain name
(5) A protocol identifier, www, and the unique
registered domain name
148. Which of the following information systems focuses on making manufacturing processes more
efficient and of higher quality?

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(1) Computer-aided manufacturing
(2) Computer-integrated manufacturing
(3) Computer-aided software engineering
(4) Computer-aided system engineering
(5) None of the above
149. A mistake in an algorithm that causes incorrect
results is called a
(1) logical error
(2)syntax error
(3) procedural error (4)compiler error
(5) machine error
150. A device for changing the connection on a connector to a different configuration is
(1) a converter (2) a component
(3) an attachment (4) an adapter
(5) voltmeter
151. Computers use the ......... number system to
store data and perform calculations.
(1) binary
(2) octal (3) decimal
(4) hexadecimal
(5) None of these
152. A disks content that is recorded at the time of
manufacture and that cannot be changed or
erased by the user is
(1) memory-only (2) write-only
(3) once-only
(4) run-only(5)read-only
153. Which of the following can be used to select the
entire document?
(1) CTRL+A
(2) ALT+F5 (3)SHIFT+A
(4) CTRL+K
(5) CTRL+H
154. ......... are attempts by individuals to obtain confidential information from you byfalsifying their identify.
(1) Phishing trips (2) Computer viruses
(3) Spyware scams(4) Viruses
(5) Phishing scams
155. Part number, part description and number of
parts ordered are examples of
(1) control
(2) output
(3) processing
(4) feedback
(5) input
156. A Web sites main page is called its
(1) Home Page (2) Browser Page
(3) Search Page (4) Bookmark
(5) None of these

11
157. The simultaneous processing of two or more
programes by multiple processors is
(1) multiprogramming
(2) multitasking (3) time-sharing
(4) multiprocessing(5) None of these
158. Codes consisting of lines of varying widths or
lengths that are computer-readable are known as
(1) an ASCII code(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
159. To instruct word to fit the width of a column to
the contents of a table automatically, click the .........
button and then point to Auto Fit Contents.
(1) Fit to Form (2) Formal
(3) Autosize
(4) Contents(5)Autofit
160. Why is it unethical to share copyrighted files with
your friends?
(1) It is not unethical, because it is legal
(2) It is unethical because the files are being given
for free
(3) Sharing copyrighted files without permission
breaks copyright laws
(4) It is not unethical because the files are being
given for free
(5) It is not unethical, anyone can access a computer
161. Reusable optical storage will typically have the
acronym
(1) CD (2) DVD (3) ROM(4) RW (5) ROS
162. The most common type of storage devices are
(1) persistent
(2) optical(3)magnetic
(4) flash
(5) steel
163. A device that connects to a network without the
use of cables is said to be
(1) distributed
(2) free (3) centralized
(4) open source (5) None of these
164. A person who used his or her expertise to gain
access to other peoples computers to get information illegally or do damage is a
(1) hacker
(2) analyst
(3) instant messenger
(4) programmer (5) spammer
165. To access properties of an object, the mouse
technique to use is

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
(1) dragging
(2) dropping
(3) right-clicking (4) shift-clicking
(5) None of these
166. To change selected text to all capital letters, click
the change case button, then click
(1) UPPER CASE (2) UPPER ALL
(3) CAPS LOCK (4) Lock Upper
(5) Large Size
167. The basic unit of a worksheet into which you
enter data in Excel is called a
(1) tab (2) cell (3) box (4) range
(5) None of these
168. You can keep your personal files/folders in
(1) My folder
(2) My Documents
(3) My Files
(4) My Text (5) None of these
169. In Word you can force a page break
(1) By positioning your cursor at the appropriate place and pressing the F1 key
(2) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(3) By using the. Insert/Section Break
(4) By changing the font size of your document
(5) None of the above
170. A DVD is an example of a(n)
(1) hard disk
(2) optical disc
(3) output device (4) solid-state storage device
(5) None of the above
171. The default view in Excel is ......... view.
(1) work
(2) auto (3) normal
(4) roman
(5) None of these
172. ......... is the process of dividing the disk into
tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
(5) None of these
173. Help Menu is available at which button?
(1) End
(2) Start (3) Turnoff
(4) Restart
(5) Reboot
174. The contents of......... are lost when the computer turns off
(1) storage
(2) input (3) output
(4) memory
(5) None of these

12
175. When you save to this, your data will remain
intact even when the computer is turned off
(1) RAM
(2) motherboard
(3) secondary storage device
(4) primary storage device
(5) None of the above
176. A central computer that holds collections of data
and programs for many PCs, workstations, and
other computers is a(n)
(1) supercomputer (2) minicomputer
(3) laptop
(4) server
(5) None of the above
177. The ......... folder retains copies of messages that
you have started but are not yet ready to send.
(1) drafts
(2) outbox
(3) address Book
(4)sent Items
(5) inbox
178. Grouping and processing all of a firms transactions at one time is called
(1) a database management system
(2) batch processing (3)a real-time system.
(4) an on-line system (5)None of the above
179. The ......... enables you to simultaneously keep
multiple Web pages open in one browser window.
(1) tab box
(2) pop-up helper
(3) tab row
(4) address bar
(5) Esc key
180. Which ports connect special types of music instruments to sound cards?
(1) BUS (2) CPU (3) USB (4) MIDI(5) MINI
181. You can ......... a search by providing more information the search engine can use to select a
smaller, more useful set of results.
(1) refine
(2) expand
(3) load
(4) query(5) slowdown
182. What is the permanent memory built into your
computer called?
(1) RAM
(2) Floppy(3)CPU
(4) CD-ROM
(5) ROM
183. What displays the contents of the active cell in Excel?
(1) Namebox
(2) Row Headings
(3) Formulabar (4) Taskpane
(5) None of these

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness
184. The piece of hardware that converts your
computers digital signal to an analog signal that
can travel over telephone lines is called a
(1) red wire
(2) blue cord
(3) tower
(4) modem(5)None of these
185. Video processors consist of......... and ..........
which store and process images.
(1) CPU and VGA(2)CPU and memory
(3) VGA and memory
(4) VGI and DVI (5) None of the above
186. If you want to connect to your own computer
through the Internet from another location,
you can use
(1) e-mail
(2) FTP (3) instant message
(4) Telnet
(5) None of the above
187. To reload a Web page, press the ......... button.
(1) Redo
(2) Reload
(3) Restore
(4) Ctrl (5) Refresh
188. This first step in the transaction processing cycle
captures business data through various modes
such as optical scanning or at an electronic commerce website
(1) document and report generation
(2) database maintenance
(3) transaction processing start-up
(4) data entry
(5) None of the above
189. A(n)......... is a special visual and audio effect
applied in Powerpoint to text or content.
(1) animation
(2) flash (3) wipe
(4) dissolve
(5) None of these
190. When the pointer is positioned on a .......... it is
shaped like a hand.
(1) grammar error (2) formatting error
(3) screentip
(4) spelling error
(5) hyperlink
191. Personal computers can be connected together
to form a
(1) server
(2) supercomputer
(3) network
(4) enterprise
(5) None of these
192. A ......... is the term used when a search engine returns a Web page that matches the search criteria.
(1) blog (2) hit (3) link (4) view(5)success
193. ......... are words that a programming language
has set aside for its own use.

13
(1) Control words (2) Control structures
(3) Reserved words (4) Reserved keys
(5) None of the above
194. Mobile Commerce is best described as
(1) The use of Kiosks in marketing
(2) Transporting products
(3) Buying and selling goods/services through
wireless handheld devices
(4) Using notebook PCs in marketing
(5) None of the above
195. Which of the following is a storage device that
uses rigid, permanently installed magnetic disks
to store data/information
(1) floppy diskette(2) hard disk
(3) permanent disk (4) optical disk
(5) None of the above
196. The computer abbreviation KB usually means
(1) Key Block
(2) Kernel Boot
(3) Key Byte
(4) Kit Bit(5)Kilo Byte
197. What is the process of copying software programs from secondary storage media to the hard
disk called?
(1) configuration (2) download
(3) storage
(4) upload(5)installation
198. In Excel,......... allows users to bring together
copies of workbooks that other users have
worked on independently.
(1) copying
(2) merging
(3) pasting
(4) compiling
(5) None of the above
199. Which of the following are advantages of CDROM as a storage media?
(1) CD-ROM is an inexpensive way to store
large amount of data and information
(2) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(3) CD-ROMs make less errors than magnetic media
(4) All of the above(5) None of the above
200. To navigate to a new web page for which you
know the URL, type that URL in the browsers
......... and press Enter.
(1) Address bar (2) Domain bar
(3) Address button (4) Name button
(5) None of the above

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Computer-Awareness

14

ANSWERS
1. (1)
11. (3)
21. (4)
31. (4)
41. (1)
51. (4)
61. (1)
71. (4)
81. (2)
91. (3)
101. (2)
111. (5)
121. (4)
131. (2)
141. (1)
151. (1)
161. (4)
171. (3)
181. (1)
191. (3)

2. (2)
12. (5)
22. (2)
32. (1)
42. (4)
52. (3)
62. (2)
72. (3)
82. (2)
92. (1)
102. (1)
112. (3)
122. (1)
132. (2)
142. (2)
152. (5)
162. (3)
172. (2)
182. (5)
192. (3)

3. (4)
13. (5)
23. (3)
33. (4)
43. (3)
53. (4)
63. (2)
73. (1)
83. (4)
93. (2)
103. (3)
113. (5)
123. (2)
133. (3)
143. (2)
153. (1)
163. (4)
173. (2)
183. (1)
193. (2)

4. (5)
14. (4)
24. (5)
34. (3)
44. (4)
54. (1)
64. (2)
74. (2)
84. (3)
94. (1)
104. (1)
114. (3)
124. (4)
134. (3)
144. (5)
154. (2)
164. (1)
174. (4)
184. (4)
194. (3)

5. (1)
15. (2)
25. (3)
35. (3)
45. (3)
55. (1)
65. (3)
75. (3)
85. (1)
95. (3)
105. (2)
115. (1)
125. (1)
135. (2)
145. (1)
155. (4)
165. (3)
175. (3)
185. (2)
195. (2)

6. (2)
16. (2)
26. (3)
36. (3)
46. (1)
56. (2)
66. (3)
76. (1)
86. (5)
96. (3)
106. (1)
116. (4)
126. (4)
136. (1)
146. (3)
156. (1)
166. (1)
176. (4)
186. (4)
196. (5)

7. (3)
17. (3)
27. (1)
37. (2)
47. (1)
57. (2)
67. (4)
77. (2)
87. (3)
97. (1)
107. (1)
117. (4)
127. (2)
137. (5)
147. (4)
157. (2)
167. (2)
177. (1)
187. (5)
197. (5)

8. (3)
18. (1)
28. (2)
38. (1)
48. (4)
58. (4)
68. (2)
78. (1)
88. (1)
98. (2)
108. (3)
118. (5)
128. (4)
138. (2)
148. (1)
158. (4)
168. (2)
178. (3)
188. (4)
198. (2)

9. (1)
19. (4)
29. (1)
39. (2)
49. (3)
59. (3)
69. (1)
79. (3)
89. (3)
99. (1)
109. (4)
119. (5)
129. (1)
139. (3)
149. (2)
159. (5)
169. (3)
179. (3)
189. (2)
199. (4)

10. (3)
20. (5)
30. (2)
40. (3)
50. (2)
60. (2)
70. (3)
80. (2)
90. (1)
100. (3)
110. (1)
120. (1)
130. (2)
140. (4)
150. (4)
160. (3)
170. (2)
180. (4)
190. (2)
200. (1)

Vidya Guru Tilak Nagar - 9311566241, Karol Bagh - 8376934679/81, Pitampura - 8376934648, Munirka - 9650549487

www.vidyaguru.in

Das könnte Ihnen auch gefallen