You are on page 1of 3

TEST - V : COMPUTER KNOWLEDGE

161. Correcting errors in a program is referred to as (1) debugging (2) bugging (3) rectifying (4) modifying (5) None of these 162. Which type of processing speed measurement is used primarily with supercomputers? (1) Flops (2) Fractions of second (3) Gigahertz (4) MIPS (5) None of these 163. What is the term associated with the second part of an e-mail address? (1) Local address (2) Eight characters long (3) User name (4) Domain name (5) None of these 164. Bold, Italic, Regular are known as : (1) font styles (2) font effects (3) word art (4) text effects (5) None of these 165. This is a group of servers that share work and may be able to back each other up if one server fails. (1) Channel bank (2) Cluster (3) Tiger team (4) Serverless backup (5) Logical unit 166. Smart Card is : (1) Special purpose Cards (2) Microprocessor Cards (3) Processing unit contains memory for storing data (4) Processing unit for software handling (5) None of these 167. A screen element of MS Word that is usually located below the title bar that provides categorized options is : (1) Menu mar (2) Tool Bar (3) Status Bar (4) All of the above (5) None of these 168. Which keys can be used together with other keys for special tasks ? (1) Insert, Delete (2) Ctrl, Shift (3) Left Arrow, Right Arrow (4) Page up, Page Down (5) None of these 169. Data related crime does not incorporate : (1) Data Didling (2) Data Spying (3) Data Leakage (4) Data Mining 170. DOS floppy disk does not have : (1) A Boot Record (2) A File Allocation Table (3) A Root Directory (4) Virtual Memory (5) None of these 171. A disk on which you store information (1) plate (2) data disk (3) paper disk (4) TV disk 172. Lets you leave a screen or program (1) boot (2) programs (3) exit (4) text 173. The operating system does all of the following EXCEPT: (1) provide a way for the user to interact with the computer. (2) manage the central processing unit (CPU). (3) manage memory and storage. (4) enable users to perform a specific task such as document editing. (5) None of these 174. MS-DOS is a operating system. (1) point-and-click (2) user-friendly (3) command-driven (4) Mac 175. Procedures are typically documented in manuals written by : (1) computer specialists (2) end users (3) Microsoft (4) service providers 16

(5) None of these

(5) None of these (5) None of these

(5) None of these (5) None of these

176. What deletes the entire file except the file structure ? (1) ERASE (1) Assembler (1) First Generation (5) Sixth Generation 179. Time during which a job is processed by the computer is : (1) Delay times (1) OCR (2) Real time (3) Execution time (4) Down time (5) None of these 180. Which of the following is not an input device? (2) Optical scanners (3) Voice recognition device (5) None of these (3) Both sequentially and parallel (4) COM (Computer Output to Microfilm) (1) Parallel only (4) All of above (2) Sequentially only (5) None of these (2) Pulse stretcher (5) None of these (5) None of these (5) None of these (5) None of these (4) Linus Torvalds (3) Query processing (2) DELETE (2) Interpreter (3) ZAP (3) Loader (4) PACK (4) Complier (5) None of these (5) None of these 177. takes one line, checks it for errors and then executes it. 178. Artificial Intelligence is associated with which generation? (2) Second Generation (3) Third Generation (4) Fifth Generation

181. In latest generation computers, the instructions are executed :

182. A technique used by codes to convert an analog signal into a digital bit stream is known as : (1) Pulse code modulation (4) Queue management

183. The number of bits that can be transmitted over a network in a certain period of time: (1) Latency (2) Delay (3) Bandwidth (4) Baud 184. Linux partitions are created using the file system: (1) FAT (2) FAT32 (3) EXT3 (4) NTFS 185. Which of the following data structure is widely used in a network model RDBMS? (1) Arrays (2) trees (3) graphs (4) stacks 186. The scientist who developed the idea of the WWW is : (1) James Gosling (5) Bill Gates (1) Simplex (1) ping (1) Editing 190. Easy to use (1) user friendly (2) select (3) helpful (4) ever-ready (2) Tim Berns Lee (3) Andrew Tannenbaum

187. What was the data transmission method in which bi-directional data flow is allowed? (2) Duplex (2) cmd (2) Writing (3) Analog (3) check (3) Formatting (4) Single side mode (5) None of these (4) ipconfig (4) All of above (5) connect (5) None of these (5) None of these 188. To check the presence of a computer in the network, use the command: 189. The word processing task associated with changing the appearance of a document is :

191. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs (1) menu bar (2) tool bar (3) user friendly (3) folder (4) word processor (4) boot (5) None of these (5) None of these 192. Anything written on the screen (1) cursor (2) text

17

193. Which of the following is not the major function of a computer ? (1) Processing data into information (4) Analysing data or information (1) multi processing (5) None of these 195. When you save to your data will remain intact even when the computer is turned off. (1) RAM (2) motherboard (3) secondary storage device (5) None of these (4) primary storage device 196. A one-time password is : (1) one that changes every time it is used (2) one that is assigned once and not changed at all. (3) one that can be used only at a particular time of the day (4) one that is assigned for all session that starts at a particular time (5) None of these 197. A hardware interface that allows for the connection of several peripheral devices to a single PCI board. (1) SCSI (2) SATA (3) ATA (4) PCI (5) None of these 198. is a language, instead of using numbers, programmers began using English like abbreviations (Mnemonics) to represent the elementary operations. (1) Machine language (3) Assembly level language (5) None of the these 199. Encryption decryption are functions of : (1) Transport layer (1) JAD (2) Session layer (2) RAD (3) Presentation layer (4) All of the above (3) templating (4) prototyping (5) None of these (5) TAD 200. The process of building a model that demonstrate the features of a proposed product, service or system is called a : (2) Mnemonics language (4) High level language (2) multiprogramming (2) Storing data or information (5) None of these (3) virtual processing (4) time sharing (3) Gathering data

194. A method of executing two or more programs concurrently using the same computer describe:

18

You might also like