Sei sulla pagina 1di 19

bsc

4su
cce
ss.c
om

COMPUTER REFRESHER MCQ FOR


IBPS CLERK MAIN

1. In addition to keying data directly into a database, data entry can also be done from a (an)
1) field
2) table
3) data dictionary
4) input form
5) None of these
2. A word processor would most likely be used to do which of the following?
1) Doing a computer search in the media centre
2) Keeping an account of money spent
3) Maintaining an inventory
4) Typing a biography
5) None of these
3. What is the main folder on a storage device called?
1) Interface
2) Root directory
4) Device driver
5) None of these

3) Platform

4. In database, a field is a
1) table of information
4) category of information

2) label
5) None of these

3) group of related records

5. Computers BIOS is stored in


1) ROM
2) RAM

3) Hard disk

6. Bootstrap program is a program that


1) starts the working of a computer
3) is the middle part of the program
5) None of these

4) Flopy drive 5) None of these

2) terminates the working of a computer


4) Both 1 and 2

7. You can do transactions on Internet using your bank account. This is called
1) Banking
2) Online banking
3) Offline banking
4) Transactions
5) None of these
8. Which of the following is graphics solution for Word Processor?
1) Clipart
2) Wordart
3) Dropcap
4) All the above
5) None of these

9. The command that is used to format a drive through command prompt is


1) Scandisk
2) X Format
3) Chkdisk
4) Format
5) None of these
10. FIND option is available under which menu?
1) Tools
2) View
3) File
4) Edit

5) None of these

11. DSL is an example of


1) Wireless
2) Broadband

4) Slow

5) None of these

4) Project

5) None of these

3) Network

12. A saved document is referred to as


1) Folder
2) Object
3) File

Downloaded From: http://bsc4success.com

3) Hybrid Computer

14. PDF extension is used for which of the following?


1) MS-Excel
2) Adobe Reader
4) Pagemaker
5) None of these

3) Photoshop

bsc
4su
cce
ss.c
om

13 A computer that deals with physical quantities is known as


1) Digital Computer
2) Analog Computer
4) Mainframe Computer
5) None of these

15. Since viruses are only a form of software, they primarily infect
1) Data
2) Hardware 3) Peripherals 4) Programs
5) None of these
16. What is the other name of LAN card?
1) Modem
2) NIC
4) Internet card
5) None of these

3) Network connector

17. Which of the following is the name given to devices that make up a computer that you can see or
touch?
1) Print
2) Mouse
3) Hardware 4) Software
5) None of these
18. A(n)_____contains commands that can be selected.
1) icon
2) button
3) pointer
4) menu

5) None of these

19. Which of the following is not an image file?


1) TMP
2) BMP
3) GIF

5) None of these

4) JPEG

20. Which of the following is used to measure the speed of the processor?
1) Unit
2) Processing speed
3) Clock speed
4) Memory
5) None of these
21. What is a flowchart?
1) It represents process.
3) It represents process or algorithm.
5) None of these

2) It represents algorithm.
4) It represents mathematical subtraction.

22. Which of the following is used to find a saved document in the computers memory and bring it up
on the screen to view?
1) Rerun
2) Reverse
3) Retrieve
4) Return
5) None of these
23. A computer uses_____ system to process data.
1) kilobyte
2) processing
4) representational
5) None of these

3) binary

24. Why is the Caps Lock key referred to as a toggle key?


1) Because it cannot be used to delete
2) Because it cannot be used for entering number
3) Because it cannot be used to insert
4) Because its function goes back and forth every time it is pressed
5) None of these
25. Which of the following keys launches the Start button?
1) Windows
2) Shift
3) Shortcut
4) Esc

5) None of these

26. Which of the following is a collection of unprocessed items?

Downloaded From: http://bsc4success.com

1) Memory

2) Information 3) Data

4) Reports

5) None of these

bsc
4su
cce
ss.c
om

27. Which command is given to run or switch off the computer?


1) Ctrl+Alt
2) Ctrl+Alt+Del3) Alt+Del
4) Alt+Shift+Del
5) None of these

28. What do we call the keys that change the meaning of what you type?
1) Change keys
2) Disk space
3) Modifier keys
4) Keyboard
5) None of these
29. What kind of files do we care about the most? (letters, pictures, memos, etc.)
1) Document files
2) Application files
3) System files
4) User files
5) None of these

30. In which of the following was artificial intelligence introduced?


1) First generation
2) Second generation
3) Third generation
4) Fourth generation
5) Fifth generation
31. What is full form of VLSI?
1) Very Large Scale Integration
3) Very Large Scale Internet
5) None of these

2) Very Large Scale Intranet


4) Very Large Scale Internetwork

32. Which of the following is the location to store a file in a drive?


1) File Folder 2) Version
3) Pad
4) Folder
5) None of these
33. Which of the following is the default setting in a cell of Excel sheet?
1) Leftaligned
2) Rightaligned
3) Centred
4) Justified
5) None of these
34. Information on a computer is stored as
1) Analog data
2) Digital data
4) Modem data
5) None of these

3) Watts data

35. Which of the following is used for writing the webpage code?
1) Winzip
2) Hypertext markup language 3) Fifth generation language
4) Part
5) None of these
36. FLASH is a
1) Hardware

2) Game

4) EEPROM

5) None of these

37 Which of the following is a must for a computer?


1) Chip
2) Data
3) Mouse
4) Processor

5) None of these

38. Disk can be used to store


1) Random files
4) Horizontal files

3) RAM

2) Sequential files
5) None of these

3) Both 1 and 2

39. How many characters can be typed in a single cell in an Excel sheet?
1) 256
2) 1024
3) 32000
4) 65535
5) None of these
40. Whas is the full form of XP in Windows-XP?
1) XTRA Power
2) XTREME Programming
4) XTREME Power
5) None of these

3) XTRA Process

Downloaded From: http://bsc4success.com

41. Which key is used to send a digital signature?


1) Public key 2) Private key 3) Digital key 4) Keypad

5) None of these

bsc
4su
cce
ss.c
om

42. The group of processors combined together to create a program is referred to as


1) Multiprogramming
2) Multitasking
3) Multiprocessing
4) Thrashing
5) None of these
43. Which program searches the fault of any software?
1) Debug
2) Inverse
3) EBCDIC
4) LOG
44. What is the default paper size of a word document?
1) A4
2) Letter
4) Both 2 and 3 5) None of these

5) None of these

3) A3

45. A device that is connected to the motherboard is


1) called an adjunct device
2) called an external device
3) connected by using a ribbon cable
4) called a peripheral device
5) None of these

46. Which of the following is used to find an individual item in a file immediately?
1) File allocation table
2) Sequential access
3) Direct access
4) Directory
5) None of these
47. In Excel, charts are created using which of the following options?
1) Pivot table
2) Chart Wizard3) Pie chart
4) Bar chart
5) None of these

48. Which device is used to access your computer from another computer or for talk over phone?
1) CD-Rom Drive
2) Hard Drive
3) RAM
4) Modem
5) None of these
49. Which of the following is the name of the software which is used for sending or receiving a message?
1) Telnet
2) Browser
3) Messenger
4) Operating system
5) None of these
50. Which of the following software applications would be most appropriate for performing numerical
and statistical calculations?
1) Document Processor
2) Database
3) Graphics Package
4) Spreadsheet
5) None of these
51. Which of the following is the minimum zoom percentage supported by MS Word?
1) 10%
2) 15%
3) 25%
4) 4%
5) None of these
52. The default lines to drop for drop cap is
1) three lines 2) two lines
3) four lines

4) eight lines

53. The red wavyline in MS Word document indicates


1) spelling errors
2) grammar errors
4) All the above 5) None of these

5) None of these

3) address block

54. The ascending order of a data hierarchy is


1) bit byte record character database

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

2) bit byte field record file database


3) bit byte record field file database
4) All the above
5) None of these
55. Which of the following is a problem of file management system?
1) Lack of data independence 2) Data redundancy
3) Programme dependence
4) All the above
5) None of these
56. BASIC, ACGOL and COBOL are the examples of
1) High level language
2) Low level language
4) All the above 5) None of these

3) Middle level language

57. COBOL was developed by


1) Dennis Ritchie
4) Steve Jobs

3) John Burden

2) Grace Hopper
5) None of these

58. How many bits are there in one MB?


1) 220
2) 221
3) 222

4) 219

5) None of these

59. Which page orientation will you select if you want to print in wide format?
1) Landscape 2) Horizontal 3) Portrait
4) Vertical
5) None of these
60. Which type of server is responsible for storing files for users on the network?
1) Web server
2) File server
3) Print server
4) Both (2) and (3)
4) Both (1) and (2)

61. Which network architecture is defined in IEEE 802.3 standard?


1) Token ring 2) FDDI
3) Fiber
4) Ethernet
5) None of these
62. PDA stands for
1) Portable Digital Assistant
2) Personal Digital Assistant
4) All the above 5) None of these

3) Personal Duplex Assistant

63. Unix operating system was developed by


1) Walter Baatain
2) John Burdeen
4) All the above 5) None of these

3) Ken Thompson

64. Which of the following is represented by a cluster in hard disk?


1) Group of sectors
2) Total number of sectors in a disk
3) Total number of tracks
4) All the above
5) None of these
65. Comparison of two or more numbers depends on
1) ALU
2) MU
3) CU
4) CPU

5) None of these

66. In DOS, primary hard disk drive has the drive letter
1) A
2) B
3) C
4) D

5) None of these

67. Default page size for word document is


1) Legal
2) A4
4) All the above 5) None of these

3) Letter

68. We use ________ shortcut key to insert something in microsoft excel.

Downloaded From: http://bsc4success.com

1) ctrl + W

2) ctrl + P

3) Shift + F11 4) Shift + Alt

5) None of these

bsc
4su
cce
ss.c
om

69. GOTO statement is used in which of the following programming languages?


1) C++
2) Java
3) C
4) All the above 5) None of these
70. .rar stands for
1) Read and right
2) Roshal Archieve
4) All the above 5) None of these

3) Right Attributes

71. First general-purpose electric digital computer ENIAC was developed by


1) JP Eckert
2) JW Mauchley
3) John Von Neumann
4) All the above 5) None of these
72. E-R stands for
1) Equity-Relationship
2) Entity-Relationship
4) All the above 5) None of these
73. In any table, record of any row is called
1) Entity
2) Tuple
3) Field

4) Attribute

74. Spelling check is performed by which of the following keys?


1) F2
2) F3
3) F5
4) F6
75. Linux is a
1) software
4) application software

2) operating system
5) None of these

3) Equal-Relationship

5) None of these

5) F7

3) application

76. NIC stands for


1) National Informatics Centre 2) Network Interface Card
4) Both (1) and (2)
5) None of these

3) National Interface Code

77. Shell and kernel is a feature of


1) operating system
2) application
4) All the above 5) None of these

3) software

78. An example(s) of universal gate is/are


1) NAND
2) NOT
4) Both (1) and (3)
5) None of these

3) NOR

79. Which of the following is not an example of a search engine?


1) Google
2) Protocol
3) Yahoo
4) Altavista

5) None of these

80. Which of the following is ones complement of the binary number 110010?
1) 111111
2) 001111
3) 010101
4) 001101
5) None of these
81. Which of the following will come next in the series?
10, 01, 100, 011, 11001, ....
1) 0101
2) 00110
3) 01101
4) 00101
82. Which of the following is not a type of error?
1) Logical error
2) Run time error
4) All the above
5) None of these

5) None of these

3) Syntax error

Downloaded From: http://bsc4success.com

83. Which key is used to search any data in a computer?


1) F1
2) F2
3) F3
4) F4

5) F5

3) website

85. In database, SQL stands for


1) Simple Query Language
4) All the above

3) Structure Question Language

bsc
4su
cce
ss.c
om

84. First page of any website is called


1) home page
2) web page
4) All the above
5) None of these

2) Structure Query Language


5) None of these

86. In which topology, terminals are connected in a circular manner?


1) Ring
2) Star
3) Mesh
4) Bus
5) Tree
87. .bmp extension is used by
1) MS-Powerpoint
4) Paint

2) MS-Word
5) All the above

3) MS-Excel

88. Which of the following is/are called flash memory?


1) RAM
2) Pen drive
4) Both 1 and 2
5) Both 2 and 3

3) ROM

89. An example of web browser is


1) Mozilla
2) Google Chrome
4) Safari
5) All the above

3) Epic

90. Which of the following is used to click to open any web page?
1) URL
2) Hyperlink
3) Navigation
4) URN
5) None of these
91. Which of the following is one of the most business-oriented languages?
1) BASIC
2) COBOL
3) ALGOL
4) FORTRAN 5) None of these
92. C language is a
1) High level language
2) High level and low level language
3) Low level language
4) High level language with some features of low level language
5) None of these

93. Which of the following codes needs 7 bits to represent any character?
1) EBCDIC
2) BCD
3) ASCII
4) All the above
5) None of these
94. For deleting data permanently, we use
1) Delete
2) Shift + Alt + Delete
4) Erase
5) All the above
95. Integrated circuits are made up of
1) Si
2) Al
3) Mn
96. WORM stands for
1) Wanted One Read Memory
4) All the above

4) Mg

2) Write Once Read Many


5) None of these

3) Shift + Delete

5) All the above

3) Write Original Read Many

Downloaded From: http://bsc4success.com

3) 8.0 inches

bsc
4su
cce
ss.c
om

97. Which of the following represents the size of a floppy?


1) 3.5 inches
2) 5.25 inches
4) All the above
5) None of these
98. Extension of a Word file in MS-Office 2007 is
1) .doc
2) .docx
4) All the above 5) None of these

3) .docxs

99. What is Outlook Express?


1) Scheduler
4) All the above

3) Address Book

2) E-mail Client
5) None of these

100.Which of the following is not a correct IP address?


1) 192.28.238.191
2) 193.224.212.225
4) 198.225.285.255
5) 224.252.252.251

101.The common name for the crime of stealing passwords is


1) spooling
2) identity theft 3) spoofing
4) hacking
102.Malicious software is known as
1) hardware
2) malware
4) illegal ware
5) None of these

3) 138.124.256.225

5) None of these

3) malicious ware

103.HTML viruses infect


1) your computer
2) a Web page in the HTML code
3) both a Web page and the computer that is viewing it
4) All the above
5) None of these

104.____ is the measurement of things such as fingerprints and retinal scans used for security access.
1) Biometrics
2) Bio measurement
3) Computer security
4) Smart weapon machinery
5) None of these
105.The scrambling of code is known as
1) encryption 2) firewall
3) scrambling

4) password-proofing 5) None of these

106.Which is the part of a computer that one can touch and feel?
1) Programs
2) Software
3) Hardware 4) Output

5) None of these

107.Which of the following moves the cursor one space to the right to puts spaces in between words?
1) Control key 2) Space bar
3) Printer
4) Mouse
5) None of these
108.When your computer stops working suddenly, it is referred to as a
1) crash
2) die
3) death
4) penalty
5) None of these

109.A symbol or question on the screen that prompts you to take action and tell the computer what to
do next is called
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these

Downloaded From: http://bsc4success.com

110.A place that a user can create to store files is called


1) cursor
2) text
3) folder
4) boot

5) None of these

bsc
4su
cce
ss.c
om

111.Name the key that will erase information from the computers memory and characters on the screen.
1) Edit
2) Delete key 3) Dummy out 4) Trust key
5) None of these
112.A program that works like a calculator for keeping track of money and making budgets.
1) Calculator 2) Spreadsheet 3) Budgeter
4) Financier
5) None of these
113. The OSI model is divided into _______ processes called layers.
1) five
2) six
3) seven
4) eight
5) None of these

114._____ are specially designed computer chips that reside inside other devices such as your car or
your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
115.The goal of data mining is
1) to explain some observed event or condition
2) to confirm that data exists
3) to analyse data for expected relationships
4) to create a new data warehouse
5) None of these

116. A database management system (DBMS) is a


1)hardware system used to create, maintain and provide controlled access to a database.
2)hardware system used to create, maintain, and provide uncontrolled access to a database.
3)software system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create, maintain, and provide controlled access to a database.
5)None of these
117.Which of the following describes database fields?
1) Structures
2) Field markers
4) Field names
5) None of these

3) Field definition

118.A goal of normalization is to


1) minimize the number of relationships
2) minimize the number of entities
3) minimize the number of tables
4) minimize the number of redundancy
5) None of these

119.The code that relational database management systems use to perform their database task is referred
as
1) QBE
2) SQL
3) OLAP
4) Sequel Server 5) None of these
120.Chip is a common nickname for a (n)
1) transistor
2) resistor
3) integrated circuit 4) semiconductor 5) None of these

121.The most frequently used instructions of a computer program are likely to be fetched from
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

122.____ are viruses that are triggered off by the passage of time or on a certain date.
1) Boot-sector viruses
2) Macro viruses
3) Time bombs
4) Worms
5) None of these
123.Which of the following places the common data elements in order from smallest to largest?
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) bit, byte, character, record, field, file, database,
5) None of these
124.The Internet is
1) a large network of networks
2) an internal communication system for a business
3) a communication system for the Indian government
4) All the above
5) None of these

125.Verification of a login name and password is known as


1) configuration2) accessibility 3) authentication 4) logging in 5) None of these
126.Which of the following would most likely NOT be a symptom of a virus?
1) Existing program files and icons disappear.
2) The CD-ROM stops functioning.
3) The Web browser opens to an unusual home page.
4) Odd messages or images are displayed on the screen.
5) None of these

127.The PC and the Apple Macintosh are examples of two different


1) platforms
2) applications 3) programs
4) storage devices 5) None of these
128. The metal or plastic case that holds all the physical parts of the computer is the
1) system unit 2) CPU
3) mainframe 4) platform
5) None of these

129.The ability to recover and read deleted or damaged files from a criminals computer is an example
of a law enforcement specialty called
1) robotics
2) simulation 3) computer forensics 4) animation 5) None of these
130.______ server stores and manages files for network users.
1) Authentication 2) Main
3) Web
4) File

5) None of these

131.In a ring topology, the computer in possession of the ____ can transmit data.
1) packet
2) data
3) access method 4) token
5) None of these
132.When data changes in multiple lists and all lists are not updated, this causes
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these
133.____arewordsthataprogramminglanguagesetsasideforitsownuse.
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these

Downloaded From: http://bsc4success.com

134.You must instal a(n) ____ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

bsc
4su
cce
ss.c
om

135. A dedicated computer is one


1) which is used by one person only.
2) which is assigned one and only one task.
3) which uses one kind of software.
4) which is meant for application software.
5) None of these

136.The system unit of a personal computer typically contains all of the following except
1) Microprocessor
2) Disk controller
3) Serial interface
4) Modem
5) None of these

137.A small or intelligent device is so called because it contains within it a


1) Computer 2) Microcomputer 3) Programmable data 4) Sensor 5) None of these
138.Which technology is used in compact disks?
1) Mechanical 2) Electrical
3) Electro Magnetic 4) Laser

5) None of these

139.EPROM can be used for


1) Erasing the contents of ROM
2) Reconstructing the contents of ROM
3) Erasing and reconstructing the contents of ROM
4) Duplicating ROM
5) None of these
140.Algorithm and Flow Chart help us to
1) Know the memory capacity
2) Identify the base of a number system
3) Direct the output to a printer
4) Specify the problem completely and clearly
5) None of these

141.Which of the following is not a valid size of a Floppy Disk?


1) 8

2) 5

3) 2

4) 5

142.The 16-bit microprocessor means that it has


1) 16 address lines 2) 16 buses 3) 16 data lines 4) 16 routes
143.Data going into the computer is called
1) Output
2) Algorithm 3) Input

5) None of these

5) None of these

4) Calculations 5) Flow chart

144.Which of the following is the fastest memory?


1) DDR RAM 2) DDR2 RAM 3) DDR3 RAM 4) Swap Memory 5) Buffer Memory

145.Which protocol is used by the operating system to generate error message like Host Unreachable
over a TCP/IP network?
1) HTTP/1.1 2) ICMP
3) PPP
4) ICGM
5) TCP/IP
146.What does SNMP stand for?

Downloaded From: http://bsc4success.com

1) Simple Network Mail Protocol


2) Single Network Mail Protocol
3) Single Network Message Protocol

bsc
4su
cce
ss.c
om

4) Simple Network Management Protocol


5) None of these

147.On a school computer, Lucy learned how to copy programs. A classmate asked her to copy a program
for his home use. Her most ethical response would be which of the following?
1)Ill copy it, but you have to promise not to tell anyone.
2)I dont know how to copy disks.
3)I cant copy it because it will break copyright laws.
4)Ill copy it for you, but you cant copy it for anyone else.
5)None of these
148.Which of the following is not true?
1) LOGO stands for Live On Googles Orkut.
2) BIOS is a system software.
3) GRUB is a Linux boot loader.
4) Ruby is a web scripting language.
5) LILO is a Linux boot loader.

149.What is Mail-Merge?
1)a web based e-mail service with no spam
2)a name of Yahoo! MINDSET search feature
3)a new virus hoax which can delete data from mail inbox
4)a feature of MS-Word used to create multiple documents like letters, mailing labels, name tags etc
5)None of these
150.In MS-Word, a menu item in dim color (gray) indicates that the menu is?
1) toggle menu
2) unavailable for current context
3) not much required menu
4) over-used menu
5) None of these

151.Which of the following cant be a proper virus detection and prevention tip?
1)Do not open any file attached to an email unless you know what it is, even if it appears to come
from a dear friend or someone you know. Some viruses can replicate themselves and spread through
email. Better be safe than sorry and confirm that they really sent it.
2)Do not open any file attached to an email if the subject line is questionable or unexpected. If the
need to do so is there, always save the file to your hard drive before doing so.
3)Open chain emails or junk mail and forward it to others.
4)Do not download any file from strangers.
5)None of these
152._____ temporarily holds program instructions, data and output until they are no longer needed by
the computer.
1) Hard disk
2) Motherboard 3) CD
4) RAM
5) Floppy disk
153.Which of the following statements is true about a storage media?
1)Storage media are non-volatile.
2)Hard disk has a very high access time as compared to RAM (10-20 million ns).
3)Hard disk is very cheap as compared to RAM and large in capacity.
1) Only 1
2) Only 2
3) Both 1 and 3

Downloaded From: http://bsc4success.com

4) Both 1 and 2

5) All 1, 2 and 3

bsc
4su
cce
ss.c
om

154.Basic Input Output System (BIOS) is necessary for


1) boot-up
2) mouse and keyboard only
3) resolution
4) audio and video system
5) None of these
155.255.255.0.0 is default mark of
1) Class A networks
2) Class B networks
3) Class C networks
4) Class D networks
5) None of these
156.SQL stands for
1) Structured Query Language
2) Solution to Query language
3) Sub Query Language
4) Structural Query Language
5) None of these

157.In which type of channel messages may flow in two directions but never at the same time?
1) Full duplex
2) Half duplex
3) Simplex
4) In data com, it is not possible.
5) None of these
158.The first line of the C program contains a/an _____, indicated by # include.
1) preprocessing directive
2) processing directive
3) main directive
4) new line character
5) None of these

159._____ technology standards have been used in the past, but Ethernet over twisted pair cabling and
Wi-Fi are the two most common technologies currently used to build LANs.
1) ARCNET, Token Ring 2) CIR 3) X.25
4) VoFR
5) None of these
160.POST stands for
1) Positive Operating System Test
2) Particle Of Static Transfer
3) Power-On Self-Test
4) Printer Online Static Test
5) None of these

161.Which of the following statements is true about Bluetooth?


A.Bluetooth is a proprietary open-wireless-technology standard for exchanging data over short
distances
B.Bluetooth uses a radio technology called frequency-hopping spread spectrum.
C.A PC that does not have embedded Bluetooth can be used with a Bluetooth adapter that will
enable the PC to communicate with other Bluetooth devices.
1) Only A
2) Only B
3) Both A and C 4) Both B and D 5) All A, B and C
162.Short keys for FIND in MS Office Word 2003 are
1) Ctrl + B
2) Alt + Ctrl + A 3) Alt + Y
4) Ctrl + F

5) None of these

163._____ is an electronic spreadsheet. You can use it to organise your data into rows and columns. You
can also use it to perform mathematical calculations quickly.
1) Microsoft Excel
2) Microsoft Word
3) Microsoft PowerPoint
4) Microsoft Calculator
5) None of these

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

164.A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic
media.
1) plates
2) disks
3) relays
4) memories
5) platters
165.The power supply supplies power to every single part in the PC. The power supply is to convert the
230 VAC into 3.3 V, 5 V and 12 VDC power that the system requires for the operations. It is
commonly known as
1) Simple mode power supply 2) Switch mode power supply
3) Uninterrupted power supply 4) Invertor
5) Convertor
166.Which of the following statements is NOT true about a computer?
1)8085 is an example of 8-bit microprocessor.
2)Software is used to make computer usable.
3)Based on the microprocessor, systems are classified as PC-XT and PC-AT.
4)SMPS converts AC (Alternate Current) into DC (Direct Current).
5)None of these

167.The Intel 8085 is a/an _____ microprocessor introduced by Intel in the year _____.
1) 16-bit, 1976 2) 16-bit, 1977 3) 8-bit, 1978 4) 8-bit, 1977 5) 8-bit, 1967
168.Which of the following is NOT a goal of transaction processing system?
1)Capture, process and store transactions
2)Produce a variety of documents related to routine business activities
3)Reduce manual effort associated with processing business transactions
4)Produce standard reports used for management decision making
5)None of these
169.Which of the following is not an example of a virus?
1) Polymorphic 2) Logic Bombs
3) Worms
4) Tartan

5) Trojan

170.Timing and Control unit is a part of a(an)


1) ALU
2) Processor
3) Memory

5) BIOS

4) CMOS

171._____ is a software that is available for use at no cost or for an optional fee, but usually with one or
more restricted usage rights.
1) Firmware
2) Teachware 3) Testware
4) Freeware
5) Groupware
172.____ involves checking or logging the data in; checking the data for accuracy; entering the data into
the computer; transforming the data and developing and documenting a database structure that
integrates the various measures.
1) Data mining 2) Database
3) Data preparation 4) Data structuring 5) Data validation
173.Which of the following is true for OCR?
A)OCR is an improvement over OMR.
B)It is the mechanical or electronic translation of scanned images of handwritten, typewritten or
printed text into machine-encoded text.
C)It is widely used to convert books and documents into electronic files, to computerise a recordkeeping system in an office or to publish the text on a website.
D)OCR systems require calibration to read a specific font; early versions needed to be programmed
with images of each character, and worked on one font at a time.
1) Only A)
2) Only B)
3) Only A), C) and D)
4) Only B), C) and D)
5) All the above

Downloaded From: http://bsc4success.com

2) International Service Provider


4) Internet Service Provider

bsc
4su
cce
ss.c
om

174.ISP stands for


1) Internet Surfing Provider
3) Indian Service Provider
5) Indian Surfing Provider

175.Every Web page is stored as a (an)


1) Hypertext markup language document
3) Hypertext message language document
5) Internet explorer document

2) Web document
4) Hyperlink document

176._____ is the amount of time a computer will repeat a single character when its key is held down.
1) Typematic rate
2) Recycle rate
3) Holding rate
4) Baud rate
5) Typewriter rate
177.Database that spreads information across different tables while maintaining links between them is
referred as
1) Relational database
2) Rotational database
3) Database connection
4) Tabular database
5) None of these.
178.Which is the first electronic spreadsheet on a microcomputer that helped turn the Apple II computer
into a success and greatly assisted in their widespread application?
1) Visi Calc
2) Lotus 1-2-3 3) Excel
4) TRS-80
5) None of these
179.____ is a process where an external device can get the attention of the microprocessor. The process
starts from the I/O device and is asynchronous.
1) Request
2) Control
3) Interrupt
4) Interaction 5) None of these
180.In relation to computer which of the following is arranged in proper sequence?
1)HardwareAssembly languageMachine language- Highlevel language
2)HardwareMachine languageHigh-level language-Assembly Language
3)Machine languageAssembly languageHigh-level languageHardware
4)HardwareMachine languageAssembly languageHigh-level language
5)None of these

181.Which of the following statements is true about a computer language?


1)Machine languages are the only languages understood by computers. While easily understood by
computers, machine languages are almost impossible for humans to use because they consist entirely
of numbers.
2)An assembly language contains the same instructions as a machine language, but the instructions
and variables have names instead of being just numbers.
3)Every CPU has its own unique machine language.
4)1) and 2) are true
5) 1), 2) and 3) are true
182.Which of the following is NOT a current spreadsheet software?
1) IBM Lotus Symphony (2007) 2) KSpread
3) ZCubes-Calci
4) GNU Oleo
5) None of these

183.Databases overall structure is maintained in a file called


1) Redolog file 2) Data file
3) Control file 4) Reload file 5) None of these

184.Which of the following is not an advantage of a client/server model?


1)A client/server model allows centralised control of data and centralised implementation of business
rules.

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

2)A client/server model increases developers productivity.


3)A client/server model is suitable for all applications.
4)A client/server model decreases developers productivity.
5)None of these
185.____ is a method of storing data on two or more hard drives that work in combination to do the job
of a larger drive.
1) DAID
2) RAID

3) Shadowing 4) Casting

5) MiniSD

186.Which of the following is FALSE regarding SQL?


1) It can execute queries against a database.
2) It can retrieve data from a database.
3) It can insert records in a database.
4) It can update records in a database.
5) It cant delete records from a database.

187.Which of the following is not a design principle of BASIC?


1)It is easy for beginners to use.
2)It is a general-purpose programming language.
3)Allow advanced features to be added for experts (while keeping the language simple for beginners).
4)It is not interactive
5)It provides clear and friendly error messages.
188.C is a programming language originally developed for developing
1) LINUX operating system
2) Windows NT
3) Unix Operating system
4) Mac OS X
5) Windows ME

189.Which of the following is/are examples of upper layer technologies in the OSI model?
1) TCP
2) HTTP, SSL and NFS
3) IP
4) Ethernet
5) None of these

190.In a Batch Processing Operating System, interaction between the user and the processor is
1) limited
2) not possible
3) unlimited
4) depends upon user only
5) depends upon amount of work
191.In case of computer, JUMPER is
1) used to configure the hard disk
2) used to configure the primary memory
3) used to play computer game
4) a software language
5) machine language

192.Which of the following statements is true about FAT?


1)The initial version of FAT designed for 16-bit microprocessors is now referred to as FAT16.
2)FAT file systems are not found on floppy disks, flash memory cards and digital cameras.
3)FAT was not commonly used on hard disks throughout the DOS and Windows 9x eras.
4)FAT is a computer file system architecture now widely used on many computer systems.
5)None of these
193.First RAM chip was introduced by which of the following?
1) Microsoft 2) Intel
3) Dell
4) HP

5)Apple

Downloaded From: http://bsc4success.com

194.____ is a system that pre-dates the World Wide Web for organising and displaying files on internet
servers.
1) HTML
2) SGML
3) Telnet
4) Gopher
5) None of these

bsc
4su
cce
ss.c
om

195.A specialised network device that determines the next network point to which it can forward a data
packet towards the destination of the packet is commonly known as
1) bridge
2) router
3) switch
4) hub
5) repeater
196.Which of the following is a computer network service which allows clients to make indirect network
connections to other network services?
1) Firewall
2) Proxy
3) Network address translator 4) Hub
5) Bridge
197.In a computer, a hardware and/or software that duplicates the functions of a first computer system
in a different second computer system, so that the behaviour of the second system closely resembles
the behaviour of the first system is known as
1) Stimulator 2) Emulator
3) Scanner
4) Copier
5) None of these
198.A _____ is the basic unit of data storage on a hard disk.
1) track
2) sector
3) zone
4) gap

5) None of these

199.A method of transferring information directly from a mass storage device such as hard disk or from
adapter card into memory (or vice versa) without information passing through processor is commonly
known as
1) Direct memory access
2) Casting
3) Standard memory access
4) Directional memory access
5) None of these
200.____ is the portion of the data block (oracle block) that contains information about the table having
rows in this block.
1) Table directory
2) Table row
3) Table column
4) Header
5) Footer

ANSWERS:

1. 4
2. 4
3. 2
4. 3
5.1; BIOS is Basic Input Output System. It is stored in computers permanent memory ROM.
6.1; Boot strap is a program which is loaded in BIOS and it is responsible to start a computer.
7.2; Transactions can be performed on Internet through online banking
8.1
9.4; Format drive name is used to format a drive through command prompt.
10.4; FIND option is used to find a particular word or group of words. It is available under
EDIT menu.
11.2
12. 3
13. 2
14.2; PDF files can be opened through only PDF readers such as Adobe Reader.
15.4; Because programs are software
16.2; NIC, ie Netowork Interface Card, is another name of LAN card which provides interface
between a computer and a network.
17.3
18. 4
19.1; TMPIt is an extension of temporary file.
20. 3
21.3; Flowchart is a man-made diagram on paper, to represent algorithm and process both.

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

22.4
23.3; Computer understands only binary system, so it uses binary system to process data
24.4
25. 1
26. 3
27. 2
28.3; Modifier key is a key which is used to change the meaning what we write.
29.1; Document files are the special type of files where we can store letters, photos and memories.
30.5; Artifical intelligence is the feature in which computers behave like human beings.
31.1
32. 4
33. 1
34. 2
35. 2
36.3; FLASH memory is based on time memory that means all data will be lost whenever current is
discontinued. So it is RAM.
37.4
38.3; Both Sequential and Random files can be stored on a disk.
39.4
40. 2
41.2; Private key is used, because it is known to user only .
42.3
43. 1
44. 2
45. 4
46.3
47. 2
48. 4
49.3; We can interchange the messages through Messenger, for example Yahoo Messenger, gtalk
etc.
50.4
51. 1
52. 1
53. 1
54. 2
55. 4
56. 2
57. 2
58. 5
59. 1
60. 4
61. 5
62. 2
63. 3
64. 2
65. 1
66. 3
67. 2
68. 3
69. 3
70. 2
71. 1
72. 2
73. 2
74. 5
75. 2
76. 4
77. 1
78. 4
79. 2
80. 4
81. 2
82. 5
83. 3
84. 1
85. 2
86. 1
87. 4
88. 4
89. 5
90. 2
91. 2
92. 4
93. 3
94. 3
95. 1
96. 2
97. 4
98. 2
99. 2
100. 3
101. 3
102. 2
103. 4
104. 1
105. 1
106. 3
107. 2
108. 5
109. 3
110. 3
111. 2
112. 2
113. 3
114. 2
115. 1
116. 4
117. 4
118. 4
119. 2
120. 3
121. 2
122. 3
123. 3
124. 1
125. 3
126. 2
127. 1
128. 1
129. 3
130. 4
131. 4
132. 4
133. 2
134. 1
135. 2
136. 4
137. 4
138. 4
139. 3
140. 4
141. 2
142. 3
143. 3
144. 5
145. 2
146. 4
147. 3
148. 1
149. 4
150. 2
151. 3
152. 4; RAM is called primary memory of a computer.
153. 5
154. 1
155.2;Class As default mask is 255.0.0.0
Class Bs default mask is 255.255.0.0
Class Cs default mask is 255.255.255.0
156. 1
157. 2; Half duplex is bidirectional connection, with the restriction that data can travel in one
direction at a time.
158. 1
159. 1

Downloaded From: http://bsc4success.com

bsc
4su
cce
ss.c
om

160. 3; POST: Power-On Self-Test refers to routines run immediately after power is applied, by
nearly all electronic devices.
161. 5
162. 4
163. 1
164. 5
165. 2
166. 5
167. 4
168. 2
169. 4
170. 2
171. 4; Freeware (from free and software) is a computer software that is available for use at no
cost or for an optional fee, but usually with one or more restricted usage rights.
172. 3
173. 5
174. 4
175. 1
176. 1
177. 1; A relational database stores information across different tables and connects them with links
in the computer.
178. 1; VisiCalc: It was the first spreadsheet that combined all essential features of modern spreadsheet
applications.
179. 3
180. 4
181. 5
182. 5
183. 3
184. 3
185. 2; RAID (redundant Arrays of Independent Disks) is a method of storing data on two or more
hard drives that work in combination to do the job of a larger drive. Although RAID can be
used to increase performance, it is most often used to protect critical data on a storage server.
186. 5
187. 4
188. 3; C is a computer programming language developed for general purpose between 1969 and
1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
system.
189. 2; OSI designates the application, presentation and session stages of the stack as the upper
layers. Generally speaking, software in these layers performs application-specific functions like
data formatting encryption, and connection management. Examples of upperlayer technologies
in the OSI model are HTTP, SSL and NFS.
190. 1; In a batch processing operating system, interaction between the user and the processor is
limited or there is no interaction at all during the execution of work. Data and programs that
need to be processed are bundled and collected as a batch and executed together.
191. 1; Several different connectors and jumpers are used to configure the hard disk and connect it
to the rest of the system. The number and types of connectors on the hard disk depend on the
data interface it uses to connect to the system, the manufacturer of the drive and any special
features that the drive may possess.
192. 5; File Allocation Table (FAT) is a computer file system architecture now widely used on many
computer systems and most memory cards, such as those used with digital cameras. FAT file
systems are commonly found on floppy disks, flash memory cards, digital cameras and many
other portable devices because of their relative simplicity. FAT was also commonly used on hard
disks throughout the DOS and Windows 9x eras, but its use on hard drives has declined since the
introduction of Windows XP, which primarily uses the newer NTFS.The initial version of FAT
designed for 16-bit microprocessors is now referred to as FAT12.
193. 2
194. 4; Gopher is a system that pre-dates the World Wide Web for organising and displaying files on
Internet servers. A Gopher server presents its contents as a hierarchically structured list of files.
With the ascendance of the Web, many gopher databases were converted to Web sites which can
be more easily accessed via Web search engines
195. 2
196. 2; Proxy is the computer network service which allows clients to make indirect network
connections to other network services.
197. 2
198. 2; A sector is the basic unit of data storage on a hard disk. The term sector emanates from a
mathematical term referring to that pie-shaped angular section of a circle.
199. 1
200. 1

Downloaded From: http://bsc4success.com

Potrebbero piacerti anche