Computer Quiz For Bank and SSC CGL 14/05/2016

#dailyquizadda   #100Questions #ComputerQuiz #readdaily

1. When more than one window is open, to switch to the next window — is the key combination.

(1) CTRL+F5
(2) CTRL+F6
(3) CTRL+F7
(4) CTRL+F8
(5) None of these


2. Where are data and program stored when the processor uses them ?



(1) Main memory
(2) Secondary memory
(3) Disk memory
(4) Program memory
(5) None of these


 3. _______Represents raw facts, where- as.................is a meaningful data.

(1) Information, reporting
(2) Data, information
(3) Information, bits
(4) Records, bytes
(5) Bits, bytes
 

4. Saving is a process-

(1) To copy the document from memory to storage medium
(2) To bring change in present status of the document
(3) To change entire form
(4) All of the above
(5) None of these
 

5. PNG stands for________
 

(1) Potable Name Generator
(2) Portable Network Generator
(3) Printed Name Graphics
(4) Portable Network Graphics
(5) None of these
 

6. The maximum Zoom percentage in MS PowerPoint is________

(1) 100%
(2) 200%
(3) 400%
(4) 500%
(5) None of these
 

7. The word ‗FTP‘ stands for________

(1) File Translate Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these
 

8. Compiler in computer system is a_________

(1) Package
(2) System Software
(3) Process
(4) Application Software
(5) None of these
 

9. What is an intersection of a row and column in a spreadsheet?
 

(1) Formula
(2) Worksheet
(3) Address
(4) Cell
(5) None of these
 

10. What is the process of creating movement from still images?
 

(1) Transition
(2) Twining
(3) Bit-mapped graphic
(4) Animation
(5) None of these
 

11. A set of rules for creating markup languages that enables programming to capture specific types of data by
creating their own elements is called______

 

(1) XML
(2) HTML
(3) Ada
(4) XHTML
(5) None of these
 

12. Small plain text files that are written to your computer's hard disk by many of the Web sites you visit are
called_______

 

(1) RFIDs
(2) Web beacons
(3) GUIDs
(4) Cookies
(5) None of these
 

13. Which of the following is the proper way to denote a cell in a spreadsheet?
 

(1) 5C
(2) C5
(3) 2-15
(3) C
(4) None of these
 

14. Which broadband service is the most available?
 

(1) C-able
(2) POTS
(3) Satellite
(4) DSL
(5) None of these
 

15. _________ is a set of rules computers use to talk to each other.
 

(1) Protocol
(2) Syntax
(3) DOS command
(4) HTML
(5) None of these
 

16. Which backup method only backs up files that have been modified since the last backup?
 

(1) Incremental backup
(2) Partial backup
(3) Selective backup
(4) Full backup
(5) None of these
 

17. Which type of transmission media is known as regular telephone wire?
 

(1) Wi-Fi
(2) Twisted-pair wire
(3) Fiber optic cable
(4) Coaxial cable
(5) None of these
 

18. What is the purpose of a firewall on a computer?
 

(1) To protect a computer from unauthorized access
(2) To protect a computer in case of fire
(3) To protect a computer from spam
(4) All of the above
(5) None of these
 

19. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user
is_______________

 

(1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
 

20. In word, you can change Page Margins by ......
 

(1) Dragging the scroll box on the scroll bars
(2) Deleting the margin boundaries on the Ruler
(3) Dragging the margin boundaries on the Ruler
(4) Clicking the right mouse button on the Ruler

(5) None of these
 

21. Which part of the computer helps to store information?
 

(1) Monitor
(2) Keyboard
(3) Disk - drive
(4) Printer
(5) Plotter
 

22. Which key is used to delete one character to the left of the current position of the cursor ?
 

(1) Backspace
(2) Delete
(3) Insert
(4) Esc
(5) Ctrl
 

23. If you want to connect to your own computer through the Internet from another location, you can use–
 

(1) e-mail
(2) FTP
(3) instant message
(4) Telnet
(5) None of these
 

24. A (n) ……….is a special visual and audio effect applied in Power-point to text or content.
 

(1) Animation
(2) Flash
(3) Wipe
(4) Dissolve
(5) None of these
 

25. Where does most data go first with in a computer memory hierarchy?
 

(1) RAM
(2) ROM
(3) BIOS
(4) CACHE
(5) None of these
 

26. All of the following are examples of storage devices EXCEPT _______
 

(1) hard disk drives
(2) printers
(3) floppy disk drives
(4) CD drives
(5) Pen drives
 

27. Select the Odd one_____
 

(1) Operating system
(2) Interpreter
(3) Compiler
(4) Assembler
(5) None of these
 

28. Which of the following is not an advantage of magnetic disk storage?
 

(1) The access time of magnetic disk is much less than that of magnetic tape
(2) Disk storage is longer lasting than magnetic tape
(3) Disk storage is less expensive than tape storage
(4) All of the above
(5) None of these
 

29. Perforated paper used as input or output media is known as_____
 

(1) Paper tape
(2) Magnetic tape
(3) Punched paper tape
(4) Card punch
(5) None of these
 

30. 30 The first generation computer system used________
 

(1) Vacuum tubes
(2) Transistors
(3) Registers
(4) Magnetic cores
(5) Silicon chip
 

31. To access properties of an object, the mouse technique to use is _______
 

(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these
 

32. The ALU and Control Unit jointly known as_______
 

(1) RAM
(2) ROM
(3) CPU
(4) PC
(5) none of these
 

33. Computers process data into information by working exclusively with ______
 

(1) multimedia
(2) words
(3) characters
(4) numbers
(5) None of these
 

34. COBOL stands for _______
 

(1) Common Business Oriented Language
(2) Computer Business Oriented Language
(3) Common Business Operated Language
(4) Common Business Organized Language
(5) None of these
 

35. What is the other name for programmed chip?
 

(1) RAM
(2) ROM
(3) LSIC
(4) PROM
(5) None of these
 

36. ___________ Store data temporarily and pass it on as directed by the control unit.
 

(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these
 

37. RAID stands for________
 

(1) Reproduce Array of Intelligent Disks
(2) Reproduce Array of Inexpensive Disks
(3) Redundant Array of Inexpensive Drives
(4) Redundant Array of Inexpensive Disks
 

38. Select the smallest memory size:-
 

(1) Terabyte
(2) Gigabyte
(3) Kilobyte
(4) Megabyte
(5) None of these
 

39. In most Microsoft programs, what does 'alt+f4' do?
 

(1) Ends the program
(2) Opens the program
(3) Run the program
(4) Modify the program
(1) none of these
 

40. A device that is used to transmit data from one location to another is known as ________
 

(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these
 

41. Programs developed by an outside supplier and provided to the user in a machine readable form is known
as___________.

 

(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these
 

42. Which of the following describe one or more characteristics of a modem computer?
 

(1) An electronic device
(2) A mechanical device
(3) An electro-mechanical device
(4) All of the above
(5) None of these
 

43. Octal number system has a base ______.
 

(1) Two
(2) Four
(3) Eight
(4) Ten
(5) None of these
 

44. PL 1 (Programming Language One) Is __________.
 

(1) High level programming language
(2) Low level programming language
(3) Machine language
(4) Assembly language
(5) None of these
 

45. Which of the following is a disadvantage of machine language?
 

(1) Machine Dependent
(2) Slower Execution
(3) Machine Independent
(4) all of the above
(5) None of these
 

46. Android Operating system is an example of which kind of Source Model?
 

(1) Vertical Market Software
(2) Open Source
(3) Horizontal Market Software
(4) Shareware
(5) None of these
 

47. You can use the tab key to___________.
 

(1) Move a cursor across the screen
(2) Indent a paragraph
(3) Move the cursor down the screen
(4) Only ((1) and (2)
(5) None of these
 

48. Which process checks to ensure the components of the computer and operating are connected properly?
 

(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) None of these
 

49. What is the correct association between a hardware component and a computer function?
 

(1) Monitor > input
(2) Mouse > input
(3) CPU > storage
(4) Hard disk > processing
(5) None of these
 

50. The sharing of a medium and its path by 2 or more devices is called ________.
 

(1) Modulation
(2) Encoding
(3) Line discipline
(4) Multiplexing
(5) None of these
 

51. The server on the internet is also known as ___________.
 

(1) Repeater
(2) Host
(3) Gateway
(4) AND Gate
(5) None of these
 

52. A database management system (DBMS) is a__________.
 

(1) Hardware system used to create, maintain and provide controlled access to a data- base
(2) hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) Software system used to create, maintain, and provide uncontrolled access to a database.
(4) Software system used to create, maintain and provide controlled access to a database.
(5) None of these
 

53. Which of the following is an example of connectivity?
 

(1) Internet
(2) floppy disk
(3) power card
(4) data
(5) None of these
 

54. What menu is selected to cut, copy and paste?
 

(1) File
(2) Tools
(3) Special
(4) Edit
(5) None of these
 

55. To save a document in different location use ______.
 

(1) Save
(2) Save as
(3) Save as web page
(4) All of above
(5) None of these
 

56. Programming language built into user programs such as Word and Excel are known as _______.
 

(1) 4GLs
(2) Macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
 

57. Codes consisting of lines of varying widths or lengths that are computer-readable are known as______.
 

(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code 

(5) None of these
 

58. To reload a Web page, press the __________ button.
 

(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh
 

59. Personal computers can be connected together to form a_______.
 

(1) server
(2) supercomputer
(3) network
(4) enterprise
(5) None of these
 

60. Which of the following is true?
 

(1) Byte is a single digit in a binary number
(2) Bit represents a grouping of digital numbers
(3) Eight-digit binary number is called a byte
(4) Eight-digit binary number is called a bit
(5) None of these
 

61. Which of the following can be used to select the entire document?
 

(1) CTRL+A
(2) ALT+F5
(3) SHIFT+A
(4) CTRL+K
(5) CTRL+H
 

62. A concentric circle on a disk is called a________
 

(1) cylinder
(2) track
(3) head
(4) sector
(5) none of these
 

63. DSL is an example of a(n) ____________ connection.
 

(1) network
(2) wireless
(3) slow
(4) broadband
(5) none of these
 

64. Instructions and data that are processed by the CPU are located in________
 

(1) CD-ROM
(2) RAM
(3) the hard disk
(4) the motherboard
(5) none of these
 

65. All of the following are considered to be storage devices EXCEPT_______
 

(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these
 

66. The commonly used UNIX commands like date, ls, cat etc. are stored in_________
 

(1) dev directory
(2) bin directory
(3) tmp directory
(4)unix directory
(5) None of these
 

67. A circuit with about 100 transistors fabricated on a single chip is called _____
 

(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these
 

68. One megabyte equals approximately ___________
 

1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes


69. A computer checks the _____ of user names and passwords for a match before granting access.
 

(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these
 

70. Computers that are portable and convenient for users who travel are known as _____
 

(1) Super computers
(2) Lap tops
(3) Mini computers
(4) File servers
(5) None of these
 

71. What is the term for unsolicited e-mail?
 

(1) News group
(2) Use net
(3) Backbone
(4) Flaming
(5) Spam
 

72. The _____ tells the computer how to use its components.
 

(1) Utility
(2) Network
(3) Operating system
(4) Application program
(5) None of these
 

73. When sending an e-mail, the _____ line describes the contents of the message.
 

(1) to
(2) subject
(3) contents
(4) CC
(5) None of these
 

74. The _____ key will launch the start buttons.
 

(1) Esc
(2) Shift
(3) Windows
(4) Shortcut
(5) None of these
 

75. What is the ultimate purpose of Defragmentation?
 

(1) Make the PC faster
(2) Create More Free Space
(3) Delete temporary files
(4) Reduce Power consumption
(5) none of these
 

76. Which input device cannot be used to work in MS Office?
 

(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen
 

77. . ........... Is a method in which multiple communication devices are connected to one another efficiently.
 

(1) Switching
(2) Redundancy
(3) Capacity
(4) Detecting
(5) None of these
 

78. ............. is a collection of web - pages and .......... is the very first page that we see on opening of a website.
 

(1) Home page, Web page
(2) Website, Home page
(3) Web page, Home page
(4) Web page, Website
(5) None of these
 

79. What's considered the 'backbone' of the World Wide Web?
 

(1) URL
(2) HTML
(3) HTTP
(4) FTP
(5) None of these
 

80. SMTP stands for _________
 

(1) Simple Mail Transfer Protocol
(2) Serve Message Text Process
(3) Short Messaging Text Process
(4) Short Messaging Transfer Protocol
(5) None of these
 

81. Small application programs that run on a Web page and provide animation are known as _________
 

(1) flash
(2) spiders
(3) cookies
(4) applets
(5) none of these
 

82. The errors that can be pointed out by the compiler known as ______.
 

(1) Syntax errors
(2) Semantic errors
(3) Logic errors
(4) System errors
(5) None of these
 

83. A _______ contains specific rules and words that express the logical steps of an algorithm?
 

(1) syntax
(2) programming structure
(3) programming language
(4) logic chart
(5) None of these
 

84. A Proxy server is used for which of the following?
 

1)To provide security against unauthorized users
(2)To process client requests for web pages
(3)To provide TCP/IP
(4)To process client requests for database access
(5) None of these
 

85. Storage that retains its data after the power is turned off is referred to as?
 

(1) Volatile storage
(2) non-volatile storage
(3) sequential storage
(4) direct storage
(5) None of these
 

86. Which term identifies main page of the entire site?
 

(1) URL
(2) Web site address
(3) Hyperlink
(4) Domain name
(5) None of these
 

87. A hard copy of a document is_________
 

(1) stored in the hard disk 
(2) stored on a floppy
(3) stored on a CD
(4) printed on the printer
(5) None of these
 

88. Which is the part of a computer that one can touch and feel?
 

(1) Programs
(2) Software
(3) Hardware
(4) Output
(5) None of these
 

89. CPU stands for _________
 

(1) CD-run on memory
(2) central processing unit
(3) call powers up
(4) create programs user
(5) None of these
 

90. Start or restart the computer known as _____________
 

(1) exit
(2) kick
(3) boot
(4) kick-start
(5) None of these
 

91. This is not a function category in Excel ________
 

(1) Logical
(2) Data Series
(3) Financial
(4) Text
(5) None of these
 

92. The operating system that is self-contained in a device and resident in the ROM is ______
 

(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these
 

93. To be able to 'boot', the computer must have a(n) ..........
 

(1) Compiler
(2) Loader
(3) Operating System
(4) Assembler
(5) None of these
 

94. On-line real time systems become popular in..........Generation.
 

(1) First Generation
(2) Second Generation
(3) Third Generation
(4) Fourth Generation
(5) None of these
 

95. ___________is the ability of a device to "jump" directly to the requested data.
 

(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these
 

96. . ............ is the combination of keys to switch between the last four places that you have edited.
 

(1) ALT + CTRL + Z
(2) ALT + CTRL + Y
(3) ALT + TAB + Z
(4) ALT + SHIFT + Z
(5) None of these
 

97. ............ is the functional key to display save-as box.
 

(1) F5
(2) F6
(3) F9
(4) F12
(5) None of these
 

98. Accessing data on tapes is much ....... than that accessing data on disks.
 

(1) Slower
(2) Faster
(3) Same
(4) All of the above
(5) None of these
 

99. Who amongst the following is called the father of modern computing?
 

(1) Charles Babbage
(2) Hollerith
(3) Gottfried von Leibnitz
(4) Joseph M. jacquard
(5) None of these
 

100. If you begin typing an entry into a cell and then realize that you don't want your entry placed into a cell, you
_________

 

(1) Press the Erase key
(2) Press esc Key
(3) Press the Enter button
(4) Press the Edit Formula button
(5) none of these


#dailyquizadda #SSC #IBPS #SBI #RBI #NABARD #NICL #NIACL #CAT #NMAT

No comments:

Post a Comment

Printfriendly