MCQ on Computer Knowledge

Submitted by avimanyu pramanik on Wed, 11/20/2019 - 17:40

MCQ on Computer Knowledge

1. —— is when the more power hungry components, such as the monitor and the hard drive, are put in idle.

(A) Hibernation.        (B) Power down.      (C) Standby mode.       (D) The shutdown procedure

2.  Hard disk drives are considered —— storage.

(A) flash       (B) nonvolatile       (C) temporary       (D) nonpermanent

3. The —— key and the —— key can be used in combination with other keys to perform shortcuts and special tasks.

(A) Control, Alt       (B) Function, toggle        (C) Delete, Insert       (D) Caps Lock, Num Lock

4. The most common input devices are the —— and the ——

(A) microphone, printer     (B) scanner, monitor     (C) digital camera, speakers      (D) keyboard, mouse

5. To save an existing file with a new name or to a new location, you should use the — command.

(A) Save      (B) Save and Replace       (C) Save As        (D) New File

6. Which type of software manages the computer's processes functioning as an interface, connecting user, the application software, and the hardware ?

(A) System software       (B) Utility program        (C) Translator program       (D) Operating system

7. The portion of the CPU that coordinates the activities of all the other computer components is the

(A) motherboard       (B) coordination board       (C) control unit       (D) arithmetic logic unit

8. Something which has easily understood instructions is said to be

(A) user friendly        (B) information        (C) word processing        (D) icon

9. In a database, —— fields store numbers used to perform calculations.

(A) next       (B) key       (C) alphanumeric       (D) numeric

10. A(n) —— is a combination of hardware and software that facilitates the sharing of information between computing devices.

(A) network       (B) peripheral       (C) expansion board       (D) digital device

11. Which of the following statements is true ?

(A) Virtual memory is the space on the hard drive where the operating system begins to store data when it becomes memory-bound

(B) Accessing data from RAM is slower than accessing data from virtual memory

(C) When it is using virtual memory, the operating system builds a file called the RAM file

(D) If a computer is memory-bound, adding more RAM will not solve the problem

12. The term bit is short for

(A) megabyte       (B) binary language        (C) binary digit       (D) binary number

13. All of the following terms are associated with spreadsheet software except

(A) worksheet        (B) cell       (C) formula        (D) virus detection

14. —— are devices used to transmit data over telecommunications lines.

(A) Drives        (B) Drive bays        (C) Modems       (D) Platforms

15. A —— is approximately one billion bytes.

(A) kilobyte        (B) bit        (C) gigabyte       (D) megabyte

16. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)

(A) version       (B) patch       (C) tutorial       (D) FAQ

17. Computers gather data, which means that they allow users to —— data.

(A) present       (B) input        (C) output        (D) store

18. Which of the following terms is just the connection of networks that can be joined together ?

(A) virtual private network       (B) internet       (C) intranet        (D) extranet

19. —— is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off.

(A) The Network Interface Card (NIC)       (B) The CPU       (C) RAM       (D) ROM

20. Servers are computers that provide resources to other computers connected to a

(A) network        (B) mainframe        (C) supercomputer        (D) client

21. What menu is selected to print ?

(A) Edit        (B) Special       (C) File       (D) Tools

22. The name a user assigns to a document is called a(n)

(A) filename      (B) program       (C) record      (D) data

23. A —— is an electronic device that processes data, converting it into information.

(A) processor       (B) computer       (C) case       (D) stylus

24.  ——  are words that a progra­mming language has set aside for its own use.

(A) Control words       (B) Reserved words       (C) Reserved keys       (D) Control structures

25. What are the two types of output devices ?

(A) Monitor and printer

(B) Storage disks (floppy, CD)

(C) Keyboard and mouse

(D) Windows 2000, Windows NT

26. To access properties of an object, the mouse technique to use is  ——

(A) dragging       (B) dropping       (C) right-clicking       (D) shift-clicking

27. A(n) —— is a program that makes the computer easier to use.

(A) operating system       (B) application        (C) utility       (D) network

28. Connections to the Internet using a phone line and a modem are called —— connections.

(A) digital       (B) dial-up       (C) broadband       (D) dish

29. To access a mainframe or supercomputer, users often use a  ——

(A) terminal       (B) node       (C) desktop       (D) handheld

30. A flaw in a program that causes it to produce incorrect or inappropriate results is called a  ——

(A) bug       (B) byte       (C) attribute       (D) unit problem

31. A Website address is a unique name that identifies a specific  —— on the Web.

(A) Web browser        (B) PDA       (C) Website       (D) link

32. Every component of your computer is either  ——

(A) hardware or software

(B) software or CPU/RAM

(C) application software or system software

(D) input devices or output devices

33. To make the number pad act as directional arrows, you press the  —— key.

(A) num lock        (B) caps lock       (C) arrow lock       (D) shift

34. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form.

(A) Editing text      (B) Inserting tables and indexes      (C) Formatting text      (D) Proofing documents

35. The —— performs simple mathematics for the CPU.

(A) ALU        (B) DIMM       (C) BUS        (D) Register

36. Reusable optical storage will typically have the acronym  ——

(A) CD.       (B) RW        (C) DVD        (D) ROM

37.  —— is processed by the computer into information.

(A) numbers        (B) processor        (C) input        (D) data

38. Personal computers can be connected together to form a  ——

(A) server       (B) supercomputer        (C) enterprise        (D) network

39. A word in a web page that, when clicked, opens another document is called ——

(A) anchor        (B) hyperlink       (C) reference        (D) URL

40. The —— of software contains lists of commands and options.

(A) title bar       (B) menu bar       (C) formula bar      (D) tool bar

41. How many values can be represented by a single byte ?

(A) 4       (B) 16       (C) 64       (D) 256

42. Transformation of input into output is performed by

(A) Peripherals       (B) Memory       (C) Storage       (D) The CPU

43. Which of the following can handle most system functions that aren't handled directly by the operating system ?

(A) Vertical-market applications       (B) Utilities      (C) Algorithms        (D) Integrated software

44. Device drivers are

(A) tiny power cords for external storage devices

(B) experts who know how to maximise the performance of devices

(C) small, special-purpose programs

(D) the innermost part of the operating system

45. Which of the following refers to a small, single-site network ?

(A) LAN       (B) DSL       (C) RAM       (D) USB

46. A set of instructions telling the computer what to do is called

(A) mentor       (B) instructor       (C) compiler       (D) program

47. Data going into the computer is called ——.

(A) output       (B) algorithm       (C) input       (D) calculations

48. If you receive an e-mail from someone you don't know, what should you do ?

(A) Forward it to the police immediately

(B) Delete it without opening it

(C) Open it and respond to them saying you don't know them

(D) Reply and ask them for their personal information

49. How many options does a binary choice offer ?

(A) It depends on the amount of memory in the computer       (B) One        (C) Two       (D) None

50. A collection of programs that controls how your computer system runs and processes information is called —— .

(A) operating system        (B) compiler       (C) office        (D) interpreter

****

COMPUTER KNOWLEDGE  (page 61 CSR Sep 2019)

1. —— is when the more power hungry components, such as the monitor and the hard drive, are put in idle.

(A) Hibernation.        (B) Power down.      (C) Standby mode.       (D) The shutdown procedure

2.  Hard disk drives are considered —— storage.

(A) flash       (B) nonvolatile       (C) temporary       (D) nonpermanent

3. The —— key and the —— key can be used in combination with other keys to perform shortcuts and special tasks.

(A) Control, Alt       (B) Function, toggle        (C) Delete, Insert       (D) Caps Lock, Num Lock

4. The most common input devices are the —— and the ——

(A) microphone, printer     (B) scanner, monitor     (C) digital camera, speakers      (D) keyboard, mouse

5. To save an existing file with a new name or to a new location, you should use the — command.

(A) Save      (B) Save and Replace       (C) Save As        (D) New File

6. Which type of software manages the computer's processes functioning as an interface, connecting user, the application software, and the hardware ?

(A) System software       (B) Utility program        (C) Translator program       (D) Operating system

7. The portion of the CPU that coordinates the activities of all the other computer components is the

(A) motherboard       (B) coordination board       (C) control unit       (D) arithmetic logic unit

8. Something which has easily understood instructions is said to be

(A) user friendly        (B) information        (C) word processing        (D) icon

9. In a database, —— fields store numbers used to perform calculations.

(A) next       (B) key       (C) alphanumeric       (D) numeric

10. A(n) —— is a combination of hardware and software that facilitates the sharing of information between computing devices.

(A) network       (B) peripheral       (C) expansion board       (D) digital device

11. Which of the following statements is true ?

(A) Virtual memory is the space on the hard drive where the operating system begins to store data when it becomes memory-bound

(B) Accessing data from RAM is slower than accessing data from virtual memory

(C) When it is using virtual memory, the operating system builds a file called the RAM file

(D) If a computer is memory-bound, adding more RAM will not solve the problem

12. The term bit is short for

(A) megabyte       (B) binary language        (C) binary digit       (D) binary number

13. All of the following terms are associated with spreadsheet software except

(A) worksheet        (B) cell       (C) formula        (D) virus detection

14. —— are devices used to transmit data over telecommunications lines.

(A) Drives        (B) Drive bays        (C) Modems       (D) Platforms

15. A —— is approximately one billion bytes.

(A) kilobyte        (B) bit        (C) gigabyte       (D) megabyte

16. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)

(A) version       (B) patch       (C) tutorial       (D) FAQ

17. Computers gather data, which means that they allow users to —— data.

(A) present       (B) input        (C) output        (D) store

18. Which of the following terms is just the connection of networks that can be joined together ?

(A) virtual private network       (B) internet       (C) intranet        (D) extranet

19. —— is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off.

(A) The Network Interface Card (NIC)       (B) The CPU       (C) RAM       (D) ROM

20. Servers are computers that provide resources to other computers connected to a

(A) network        (B) mainframe        (C) supercomputer        (D) client

21. What menu is selected to print ?

(A) Edit        (B) Special       (C) File       (D) Tools

22. The name a user assigns to a document is called a(n)

(A) filename      (B) program       (C) record      (D) data

23. A —— is an electronic device that processes data, converting it into information.

(A) processor       (B) computer       (C) case       (D) stylus

24.  ——  are words that a progra­mming language has set aside for its own use.

(A) Control words       (B) Reserved words       (C) Reserved keys       (D) Control structures

25. What are the two types of output devices ?

(A) Monitor and printer

(B) Storage disks (floppy, CD)

(C) Keyboard and mouse

(D) Windows 2000, Windows NT

26. To access properties of an object, the mouse technique to use is  ——

(A) dragging       (B) dropping       (C) right-clicking       (D) shift-clicking

27. A(n) —— is a program that makes the computer easier to use.

(A) operating system       (B) application        (C) utility       (D) network

28. Connections to the Internet using a phone line and a modem are called —— connections.

(A) digital       (B) dial-up       (C) broadband       (D) dish

29. To access a mainframe or supercomputer, users often use a  ——

(A) terminal       (B) node       (C) desktop       (D) handheld

30. A flaw in a program that causes it to produce incorrect or inappropriate results is called a  ——

(A) bug       (B) byte       (C) attribute       (D) unit problem

31. A Website address is a unique name that identifies a specific  —— on the Web.

(A) Web browser        (B) PDA       (C) Website       (D) link

32. Every component of your computer is either  ——

(A) hardware or software

(B) software or CPU/RAM

(C) application software or system software

(D) input devices or output devices

33. To make the number pad act as directional arrows, you press the  —— key.

(A) num lock        (B) caps lock       (C) arrow lock       (D) shift

34. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form.

(A) Editing text      (B) Inserting tables and indexes      (C) Formatting text      (D) Proofing documents

35. The —— performs simple mathematics for the CPU.

(A) ALU        (B) DIMM       (C) BUS        (D) Register

36. Reusable optical storage will typically have the acronym  ——

(A) CD.       (B) RW        (C) DVD        (D) ROM

37.  —— is processed by the computer into information.

(A) numbers        (B) processor        (C) input        (D) data

38. Personal computers can be connected together to form a  ——

(A) server       (B) supercomputer        (C) enterprise        (D) network

39. A word in a web page that, when clicked, opens another document is called ——

(A) anchor        (B) hyperlink       (C) reference        (D) URL

40. The —— of software contains lists of commands and options.

(A) title bar       (B) menu bar       (C) formula bar      (D) tool bar

41. How many values can be represented by a single byte ?

(A) 4       (B) 16       (C) 64       (D) 256

42. Transformation of input into output is performed by

(A) Peripherals       (B) Memory       (C) Storage       (D) The CPU

43. Which of the following can handle most system functions that aren't handled directly by the operating system ?

(A) Vertical-market applications       (B) Utilities      (C) Algorithms        (D) Integrated software

44. Device drivers are

(A) tiny power cords for external storage devices

(B) experts who know how to maximise the performance of devices

(C) small, special-purpose programs

(D) the innermost part of the operating system

45. Which of the following refers to a small, single-site network ?

(A) LAN       (B) DSL       (C) RAM       (D) USB

46. A set of instructions telling the computer what to do is called

(A) mentor       (B) instructor       (C) compiler       (D) program

47. Data going into the computer is called ——.

(A) output       (B) algorithm       (C) input       (D) calculations

48. If you receive an e-mail from someone you don't know, what should you do ?

(A) Forward it to the police immediately

(B) Delete it without opening it

(C) Open it and respond to them saying you don't know them

(D) Reply and ask them for their personal information

49. How many options does a binary choice offer ?

(A) It depends on the amount of memory in the computer       (B) One        (C) Two       (D) None

50. A collection of programs that controls how your computer system runs and processes information is called —— .

(A) operating system        (B) compiler       (C) office        (D) interpreter

****

 

Tags

Comments

Related Items