Sie sind auf Seite 1von 34

To locate a data item for storage is

a. Field
b. Feed
c. Database
d. Fetch
ans.d. Fetch

2. programs designed to perform specific tasks is known as


a. system software
b. application software
c. utility programs
d. operating system
ans.b. application software

3. perforated paper used as input of output media is known as


a. paper tapes
b. magnetic tape
c. punched papers tape
d. card punch
ans.a. paper tapes

4. Time during which a job is processed by the computer is


a. Delay times
b. Real time
c. Execution time
d. Down time
ans.c. Execution time

5. a computer which CPU speed around 100 million instruction per second and with the word
length of around 64 bits is known as
a. Super computer
b. Mini computer
c. Micro computer
d. Macro computer
ans.a. Super computer
6. An approach that permits the computer to work on several programs instead of one is
a. On-line thesaurus
b. Multiprogramming
c. Over lapped processing
d. Outline processor
ans.a. Super computer

7. A directly accessible appointment calendar is feature of a … resident package


a. CPU
b. Memory
c. Buffer
d. ALU
ans.b. Memory

8. The term gigabyte refers to


a. 1024 bytes
b. 1024 kilobytes
c. 1024 megabytes
d. 1024 gigabyte
ans.1024 megabytes

9. Which of the following processors use RISC technology?


a. 486dx
b. Power PC
c. 486sx
d. 6340
ans.b. Power PC

10. A/n …. Device is any device that provides information, which is sent to the CPU
a. Input
b. Output
c. CPU
d. Memory
ans.a. Input

11. Current SIMMs have either … or … connectors (pins)


a. 9 or 32
b. 30 or 70
c. 28 or 72
d. 30 or 72
ans.d. 30 or 72

12. The storage subsystem in a microcomputer consists mainly of … or … media with varying
capacities
a. Memory or video
b. Magnetic or optical
c. Optical or memory
d. Video or magnetic
ans.b. Magnetic or optical

13. Which of the following is not an input device?


a. OCR
b. Optical scanners
c. Voice recognition device
d. COM (Computer Output to Microfilm)
ans.d. COM (Computer Output to Microfilm)

14. The central processing unit (CPU) consists of


a. Input, output and processing
b. Control unit, primary storage, and secondary storage
c. Control unit, arithmetic-logic unit and primary storage
d. Control unit, processing, and primary storage
ans.c. Control unit, arithmetic-logic unit and primary storage

15. EBCDIC can code up to how many different characters?


a. 256
b. 16
c. 32
d. 64
ans.a. 256

16. Which is considered a direct entry input device?


a. Optical scanner
b. Mouse and digitizer
c. Light pen
d. All of the above
ans.d. All of the above

17. Which is used for manufacturing chips?


a. Bus
b. Control unit
c. Semiconductors
d. A and b only
ans.c. Semiconductors

18. The computer code for the interchange of information between terminals is
a. ASCII
b. BCD
c. EBCDIC
d. All of above
ans.a. ASCII

19. A byte consists of


a. One bit
b. Four bits
c. Eight bits
d. Sixteen bits
ans.c. Eight bits

20. A hybrid computer


a. Resembles digital computer
b. Resembles analog computer
c. Resembles both a digital and analog computer
d. None of the above
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
27. The 0 and 1 in the binary numbering system are called binary digits or …….
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D)
28. A monitor’s …… is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B)
29. A directly accessible appointment calendar is a feature of a ……. resident package.
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are
expressed as
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)
34. A prefix for billion which is equal to …. is called as billi.
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c)
37-All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
38- A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
38. ____________terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
39. A(n) ____________ system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
40. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
41-. Which of the following is NOT one of the four major data processing functions of a
computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
42-. ____________ tags, when placed on an animal, can be used to record and track in a
database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
43-. Surgeons can perform delicate operations by manipulating devices through computers
instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
44-. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
45-. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
Status : Offline 11. ____________ is the science that attempts to produce machines that display
the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
46. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
47. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
48. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
49. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
50. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
52. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
53. In the binary language each letter of the alphabet, each number and each special character
is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
54. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
55. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
1. All of the following are examples of real security and privacy risks EXCEPT:

A. hackers.

B. spam.

C. viruses.

D. identity theft.

Answer: B

2. A process known as ____________ is used by large retailers to study trends.

A. data mining

B. data selection

C. POS

D. data conversion

Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex


inventory and sales computer systems.

A. Data

B. Point-of-sale (POS)
C. Sales

D. Query

Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag
and pulls up the current price (and any special offers) as you shop.

A. PSS

B. POS

C. inventory

D. data mining

Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:

A. robotics.

B. simulation.

C. computer forensics.

D. animation.

Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data

B. processing data into information

C. analyzing the data or information

D. storing the data or information

Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all
of the animal’s movements.

A. POS

B. RFID

C. PPS

D. GPS

Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of
manually. This technology is known as:

A. robotics.

B. computer forensics.

C. simulation.
D. forecasting.

Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:

A. proprietary.

B. open.

C. experimental.

D. in the public domain.

Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.

A. Nanoscience

B. Microelectrodes

C. Computer forensics

D. Artificial intelligence

Answer: A

Status : Offline 11. ____________ is the science that attempts to produce machines that display the
same type of intelligence that humans do.
A. Nanoscience

B. Nanotechnology

C. Simulation

D. Artificial intelligence (AI)

Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.

A. A process

B. Software

C. Storage

D. Information

Answer: D

13. The name for the way that computers manipulate data into information is called:

A. programming.

B. processing.

C. storing.

D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.

A. present

B. input

C. output

D. store

Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print
of the picture is considered:

A. data.

B. output.

C. input.

D. the process.

Answer: B

16. Computers use the ____________ language to process data.

A. processing
B. kilobyte

C. binary

D. representational

Answer: C

17. Computers process data into information by working exclusively with:

A. multimedia.

B. words.

C. characters.

D. numbers.

Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is
made up of a unique combination of:

A. eight bytes.

B. eight kilobytes.

C. eight characters.

D. eight bits.

Answer: D
19. The term bit is short for:

A. megabyte.

B. binary language.

C. binary digit.

D. binary number.

Answer: C

20. A string of eight 0s and 1s is called a:

A. megabyte.

B. byte.

C. kilobyte.

D. gigabyte.

Answer: B

Who is credited with the creation of WWW

Answer : Tim Berners-Lee

25.The function of key F4 is

Ans : To repeat the last action


26.The function of key F4 is

Ans : To repeat the last action

27. The 0 and 1 in the binary numbering system are called binary digits or …….

(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles

Ans (D)

28. A monitor’s …… is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.

(a) refresh rate (b) dot pitch (c) resolution

(d) colour depth (e) None of the above

Ans (B)

29. A directly accessible appointment calendar is a feature of a ……. resident package.

(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above

Ans (B)

30. Perforated paper used as input or output media is known as

(a) Paper tape (b) Magnetic tape (c) Punched paper tape

(d) Card punch (e) None of the above

Ans (A)

31. The invention of the slide rule is attributed to

(a) Babbage (b) Oughtred (c) Pascal

(d) Napier (e) None of the above


Ans (B)

32. Which of the following is not an advantage of magnetic disk storage.

(a) The access time of magnetic disk is much less than that of magnetic tape

(b) Disk storage is longer lasting than magnetic tape

(c) Disk storage is less expensive than tape storage

(d) All of the above

(e) None of the above

Ans (e)

33. The memory sizes in mainframe computers and advanced technology micro computer are
expressed as

(a) Bytes (b) Kilo-bytes (c) Bits

(d) Megabytes (e) None of the above

Ans (d)

34. A prefix for billion which is equal to …. is called as billi.

(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above

Ans (d)

35. Each model of a computer has a unique

(a) Assembly language (b) Machine language

(c) High level language (d) All of the above

(e) None of the above


Ans (b)

36. One kilobyte = ____ byte.

(a) 1250 (b) 2088 (c) 1024 (d) 1000

Ans (c)

37. Which of the following circuit is used as a ‘Memory device’ in computers?

(a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator

Ans (b)

38. To move the cursor to the end of the document press

Ans : Ctrl + End

39. In Word Processing the red underline indicates

Ans : Spelling mistakes

40. The shortcut key to print documents is

Ans : Ctrl + P

41. First layer in the OSI reference model is

(a) Data link (b) Network (c) Physical (d) Application

Ans (c)

42. Viruses, Trojan horses and Worms are

(a) able to harm computer system

(b) unable to detect if affected on computer


(c) user-friendly applications

(d) harmless applications resident on computer

Ans (a)

43. Program threats are

(a) Trap doors (b) Trojan horse (c) Both (a) & (b

Ans (b)

44. Failure of passwords security due to exposure can result from

(a) Electronic monitoring (b) Visual (c) Both (a) & (b)

Ans (c)

45. Data security threats include

(a) Hardware failure (b) Privacy invasion

(c) Fraudulent manipulation of data (d) All of the above

Ans (b)

46. The bar which displays information about the current page number is

Ans : Status bar

47. Graphical pictures that represent an object like file, folder etc. are

(a) Task bar (b) Windows (c) Desktop (d) Icons

Ans (d)

48. Who invented the super-computer?


(a) P.T Farnsworth (b) J.R Whinfield

(c) J.H. Van Tassell (d) Charles Ginsberg

Ans (c)

49. Accessing records from a file directly without searching from the beginning of the file is

(a) Time sharing (b) Random

(c) Direct access (d) Access time (e) None of the above

Ans (c)

50. Time during which a job is processed by the computer is

(a) Delay time (b) Real time (c) Execution time

(d) Down time (e) None of the above

Ans (c)
1. Which of the following statement is not correct?
(A) Computer is capable of processing only digital signal
(B) Computer is capable of analyzing both quantitative and qualitative data
(C) Appropriate software is required for processing the data
(D) Computer is capable of processing digital as well as analog signals Ans: A.

2. Which of the following is the appropriate definition of Information Technology?


(A) Information Technology refers to the use of hardware and software for processing
information.
(B) Information Technology refers to the use of hardware and software for distribution of
useful information
(C) Information Technology refers to the use of hardware and software for storage, retrieval,
processing and distributing information of many kinds
(D) Information Technology refers to the use of principles of Physical sciences and Social
sciences for processing of information of many kinds Ans: C

3. Which of the following statement is correct?


(A) Virus improves the speed of processing information through computer
(B) Internet does not allow the virus to spread
(C) Virus is a part of software
(D) Virus is an operating system Ans: C

4. Which of the following is correct statement?


(A) Computers can be used for diagnosing the difficulty of a student in learning a subject (B)
Psychological testing can be done with the help of computer provided a software is available
(C) A set of instructions is called a program
(D) All of the above Ans: D

5. A parallel port is most often used by


(A) Mouse (B) Monitor (C) Printer (D) Keyboard Ans: C
6. Blue tooth technology allows:
(A) Landline phone to mobile phone communication
(B) Wireless communication between equipments
(C) Signal transmission on mobile phones only
(D) Satellite television communication Ans: B

7. Which of the following is an example of an optical disk? (A) Memory disk (B) Magnetic
disk (C) Hard disk (D) Digital versatile disk Ans: D

8. Which of the following is(are) an example of storage devices? (A) Tapes (B) DVDs (C)
Magnetic disks (D) All of these Ans: D

9. IC chips used in computers are made of (A) Silicon (B) Chromium (C) Lead (D) Silver
Ans: A
10. Which of the following is not an example of Operating System? (A) Microsoft Office (B)
Windows Vista (C) Unix (D) Ubuntu Linux Ans: A.

11. Which supercomputer is developed by the Indian Scientists? (A) Sequoia (B) Param (C)
Mira (D) Jaguar Ans: B.

12 ‘OS’ in computer system means ? (A) Open System (B) Open Software (C) Operating
System (D) All of these Ans: C.

13 ‘.MOV’ extension refers to: (A) Word file (B) Text file (C) Image file (D) Movie file Ans: D.

14‘.MPG’ extension refers to: (A) Word file (B) Text file (C) Image file (D) Movie file Ans: D.

15. ‘.INI’ extension refers to: (A) Image file (B) System file (C) Movie file (D) Word file
Ans: B.

16. Select the odd term out? (A) Windows (B) Linux (C) Unix (D) Internet Ans: D.
17. What is the full form of WWW in Internet? (A) World Wide Web (B) World Wide
Word (C) World Wide Wood (D) None of these Ans: A.

18. Which Command is used to reboot the computer? (A) Ctrl+Shift+Del (B) Ctrl+Del+End
(C) Ctrl+Alt+Del (D) Both (A) and (C) Ans: C.

19. The blinking symbol on the computer screen: (A) Mouse (B) Cursor (C) Character (D)
Blinker Ans: B.

20. Father of the computer


(A) Charles Babbage (B) Vint Cerf (C) Bob Khan (D) David Filo Ans: A.

21. Inventor of Email system? (A) Alan Turing (B) Mark Zuckerburg (C) Vint Cerf (D)
Ray Tomilson Ans: D.

22. ROM Stands for (A) Range Of Motion (B) Read On Memory (C) Read Only Memory
(D) None of these Ans: C.

23. One Terabyte (TB) is equal to (A) 1000 megabytes (B) 2048 megabytes (C) 1024
gigabytes (D) 1024 megabytes Ans: C.

24. Super computer developed by Indian scientists? (A) Param (B) Cray I (C) Blue Gene
(D) IBM Sequoia Ans: A.

25. A process used by large retailers to study trends (A) data selection (B) data mining (C)
both (A) and (B) (D) None of the above Ans: B.

26. Technology no longer protected by copyright, available to everyone (A) Proprietary (B)
Open (C) Private (D) Either (A) or (B) Ans: B.
27. Computers use ——– language to process data (A) English (B) powerful (C) decimal (D)
binary Ans: D.
28. The term ‘bit’ is a short for (A) binary digit (B) binary number (C) digit (D) byte Ans:
A.

29. Which of the following is not an example of input device? (A) Keyboard (B) mouse (C)
Printer (D) scanner Ans: C.

30. DSL is an example for ——— connection (A) network (B) wireless
(C) internet (D) Broadband Ans: D.

31. ———— is the program that manages CPU, memory, storage devices and input/output
devices. (A) Super system (B) Application software (C) Operating system (D) Control
system Ans: C.

32. Binary language consists of ——- (A) 2 digits (B) 3 digits (C) 4 digits (D) 10 digits Ans:
A.

33. What combination of short cut keys will you use to change a text in upper case to lower
case in MS Word? (A) Ctrl+L(B) Shift+F3 (C) Ctrl+Shift+A(D) Shift+Alt+F5 Ans: B.

34. Which Nobel Laureate is also known as the Father of Artificial Intelligence? (A)
Herbert A. Simon (B) Howard Aiken (C) Charles Babbage (D) Alan Turing Ans: A.

35. The Father of Modern Computer is: (A) Charles Babbage (B) Blaize Pascal (C) Howard
Icons (D) Shanon Ans: A.

36. UNIX, DOS and Windows are examples of: (A) Application Programs (B) Operating
Systems (C) Word Processing (D) Commercial Computer Brands Ans: B.

37. Which is not a search engine? (A) Microsoft (B) Alta Vista (C) Google (D) Search Bug
Ans: A.
38. The presentation package and slides are usually presented by: (A) Power Point (B)
Excel (C) MS Word (D) All the above Ans: A.

39. What is the storage capacity of a single layered Blue Ray disc? (A) 80 GB (B) 50 GB (C)
10 GB (D) 25 GB Ans: D.

40. What is the storage capacity of a dual layered Blue Ray disc? (A) 80 GB (B) 50 GB
(C) 10 GB (D) 25 GB Ans: B.

41. What is the storage capacity of a CD ROM? (A) 700 MB (B) 500 MB (C) 7000 MB (D)
4.7 GB Ans: A.
42. What is the storage capacity of a DVD? (A) 700 MB (B) 500 MB (C) 7000 MB (D) 4.7
GB Ans: D.

43. Education combined with entertainment is called ————— (A) Simulation (B) CAI
(C) Edutainment (D) Synchronization Ans: C.

44. Pick out E-commerce application from the following (A) DTP (C) SQL (C) Tally (D)
ATM Ans: D.

45. Which of the following is not a browser program? (A) MOSAIC (B) Windows Explorer
(C) Internet Explorer (D) Netscape Navigator. Ans: B.

46. A kiosk offers ————— (A) Digital Certificate (B) Touch Screen Application (C)
Internet Services (D) None of these Ans: C.

47. VAN refers to————— (A) Virtual Analog Network (B) Value Added Network (C)
Variable Address Network (D) Virtual Additional Network Ans: B.

48. A Laser printer is: (A) an input device (B) an output device (C) both (A) and (B) (D)
None of these Ans: B.
49. Which one of the following is not a computer language? (A) Java (B) COBOL (C) ASP
(D) LOTUS Ans: D.

50. Which of the following refers to a small local network? (A) LAN (B) WAN (C) MAN (D)
SLN Ans: A.

51. ATM means? (A) Any Time Money (B) Automatic Tele Money (C) Automatic Teller
Machine (D) Any Time Marketing Ans: C.

52. The term PC means? (A) Personal Computer (B) Public Computer (C) Private
Computer (D) Professional Computer Ans: A.

53. When a key is pressed on the keyboard, which standard is used for converting the
keystroke into corresponding bits? (A) ANSI (B) EBCDIC (C) ASCII (D) ISO Ans: A.

54. Software, such as Explorer and Firefox, are referred to as…………… (A) Systems
software (B) Utility software (C) Browsers (D) Internet tools Ans: C.

55. Which of the following is not an output device? (A) Plotter (B) Scanner (C) Flat Screen
(D) Touch Screen Ans: B.

56. Which technology is used in Compact disks? (A) Electrical (B) Mechanical (C)
Electromagnetic (D) Laser Ans: D.

57. The programs which are as permanent as hardware and stored in ROM is known as:
(A) Software (B) Firmware (C) Algorithm (D) ROM-ware Ans: B.

58. Which access method is used for obtaining a record from a cassette tape? (A) Sequential
(B) Direct (C) Random (D) None of these Ans: A.
59. ASCII stands for: (A) American Security Code for Information Interchange (B)
American Standard Code for Information Interchange (C) American Scientific Code
for Interchanging Information (D) American Standard Code for Interchanging
Information Ans: B
BASIC KNOWLEDGE

VDU stands for Visual Display Unit


One kilobyte is approximately 1000 bytes
DOS stands for Disk Operating System
WORD STAR is a popular Word processing programme
WORD STAR was developed by Micro pro Company
PC stands for Personal Computer
ALU stands for Arithmetic Logic Unit
The VDU and Keyboard together form a TERMINAL
The speed of the dot matrix printers is measured by CPS which stands for characters per second
The speed of the line printers is measured by LPM which stands for Lines per second
DBMS stands for Database Management System
IBM is a famous computer company.IBM stands for International Business Machines
Corporation
ROM stands for Read Only Memory
The actual machine of the computer is commonly known as Hardware
The programs run on the computer are commonly known as Software
All the output which is printed on paper is called Hard Copy
The number of pixels on a computer screen determines a screes’s Resolution
A processor’s speed is measured in Megahertz
A software that assists the computer in performing instructions,is called as system software
CAM stands for Computer Aided Manufacturing
DPI stands for Dots per Inch
DTP stands for Desk Top Publishing
EPROM stands for erasable and Programmable Read
only Memory
A magnetic storage disk made out of a thin piece of plastic is called Floppy Disk
A pictorial representation of the step by step sequence for solving a problem is Flow Chart
known as a
A measure of storage capacity equal to one thousand megabytes is one Gigabyte
A variable whose value is accessible throughout the program is called Global Variable
A huge,worldwide network of computers that communicate with each Internet
other,allowing global communications between users is known popularly known
as
KB stands for Kilobyte
LAN stands for Local Area Network
A printer which uses light to transfer the image to paper is the Laser Printer
Memory which retains all its contents even after the power is turned off is Non-Volatile Memory
known as
The result that is generated by the computer after processing the information Output
provided to it is known as
Electronic mail is more popularly known as E-Mail
PILOT stands for Programmed Inquiry Learning Or
Teaching
PILOT was developed by Doug Engelbardt
IQL stands for Interactive Query Language
LOGO was developed by Dr.seymour Papert
CAL stands for Computer Assisted Learning
APT stands for Automatically Programmed Tooling
`C’language was invented by Dennis M.Ritchie
Modula-2 was developed by Niklaus Wirth
Terminals that have their own memory are called Smart terminals
The memory that needs electric power to sustain its contents is known as Volatile Memory
MOS stands for Metallic Oxide Semiconductors
Dvorak key board was designed by August Dvorak
A simple device which functions as a simpler alternative to the keyboard is the Mouse
Automatic drawing input device is called Scanner
In the second generation computers,magnetic cores were used as Main Memory Devices
LCD stands for Liquid Crystal Display
RADAR stands for Radio Detection and Ranging
RADAR works on the principle of Echo
software-in-Hardware modules are called Firmware
A device by which any microcomputer can use ordinary television set for RF modulator
producing output is called
EDSAC stands for Electronic Delayed Storage
Automatic Computer
EDVAC stands for Electronic Discrete Variable
Automatic Computer
EDSAC was developed in the year 1949
EDVAC was developed in the year 1952
ENIAC stands for Electronic Numerical Integrator and
Calculator
The most successful computing device in the ancient time was Abacus
Use of some mechanism for the operation of a machine is known as Automation
Radar contact with the moon was first made in 1945
Radar contact with Venus was first made in 1961
A system in which information is displayed on a television screen is known as Video Text System
A modern means of communication in which the information is stored in a Teletext
computer at a TV station is known as
Global communication became possible by using Satellites
Morse code was invented by Samuel Morse
The code used in a teleprinter is the Baudot Code
Teleprinter exchange is popularly known as Telex
A device which converts sound waves into electrical waves is called Microphone
AVC stands for Automatic Volume Control
The device used to measure wavelengths of radio waves is Wavemeter
A hollow metallic tube used in place of wire in electric circuits carrying high Waveguide
frequency currents is called
An instrument used to measure the intensity of radiations is the Radiometer
An instrument used to measure electrical voltage is the Voltmeter
VTVM stands for Vacuum Tube Volt Meter
A circuit which maintains a constant voltage is called Voltage Stabilizer
SCR stands for Silicon Controlled Rectifier
A device used to increase or decrease electric voltageis called a Transformer
A magnetic tape that records both audio and video signals is called a Video Tape
The first electronic calculator was manufactured in 1963 by Bell Punch Company,USA
MASER stands for Microwave Amplification by
stimulated Emission of Radiation
A computer which can handle a large volume of numbers is called a Number cruncher
POST stands for Power on Self Test
POST is a test carried out just after the computer has been Switched on
An index of the files stored on a disk is called Directory
CP/M stands for Control program for
Microcomputers
CP/M was developed by digital Research Inc.,USA
MVS stands for Multiple Virtual Storage Operating
System
MVS is used in Mainframe computers
The process of starting a computer is called Booting
A group of four binary digits is called a NIBBLE
BPI stands for Bit per Inch
A smart card is a multifunctional microprocessor
LIPS stands for Logical Inferences Per Second
A computerized machine is normally called a Robot
A robot is a machine directed by a Computer
A robot which resembles a human being is called an Android
PL/1 stands for Programme Language-1
The language PL/1 has combined features of COBOL and FORTRAN
BASIC stands for Begineers All Purpose Symbolic
Instruction Code
COBOL stands for Common Busines Oriented
Language
ALGOL stands for Algorithmic Language
ALGOL was developed in the early 1960s in Europe
COBOL was first introduced in the year 1961
FORTRAN stands for Formula Translation
FORTRAN was developed and introduced by IBM in the year 1957
PL/1 was introduced in the 1960s by IBM
COMAL stands for Common Algorithmic Language
BASIC was developed by John Kemeny and Thomas Kurtz
SNOBOL stands for String Oriented Symbolic Language
SNOBOL was developed in 1962
LISP stands for List Processing Language
LISP was developed by John McCarthy
Loud speaker was invented by Rice Kellogg
PROM stands for Programmable Read Only Memory
Two types of RAM chips are Dynamic,static
Data is fed into the computer by first converting it into Binary codes

Das könnte Ihnen auch gefallen