You are on page 1of 31

1Computer Quiz for IBPS Clerk Exam 2014

1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
11. OCR stands for _____
(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these
12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be installed before the device
can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these
13. The software that allows users to surf the Internet is called a/an
(1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these
14. A tuple is a
1) column of a table
2) two-dimensional table
3) row of a table
4) key of a table
5) None of these
15. The method of file organization in which data records in a file are arranged in a specified order according to a key field
is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these
16. In Excel,_____ contains one or more worksheets.
1) Template
2) Workbook
3) Active cell
4) Label
5) None of these
17. Which of the following is a popular programming language for developing multimedia web pages, websites, and webbased applications?
1) COBOL
2) Java

3) BASIC
4) Assembler
5) None of these
18. Compiling creates a(n) _____ .
1) program specification
2) algorithm
3) executable program
4) subroutine
5) None of these
19. A CD-RW disk
(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten
(5) None of these
20. The first page of a Web site is called the
1) Home page
2) Index
3) Java Script
4) Book mark
5) None of these
Answers:
1

1
0

1
1
1
2
1
3
1
4
1
5
1
6
1
7
1
8
1
9
2
0

1
2
4
3
4
2
2
3
4
1

2Computer Quiz
1. Which of the following is part of the system unit?
(1) Keyboard
(2) Floppy disks
(3) Monitor
(4) Memory

(5) CD
2. Specialized programs that allow particular input or output devices to communicate with the rest of the
computer system are called ____.
(1) operating systems
(2) utilities
(3) device drivers
(4) language translators
(5) Connectors
3. The primary purpose of software is to turn data into:
(1) Websites
(2) graphs
(3) programs
(4) objects
(5) information
4. The _____________ enables you to simultaneously keep multiple web pages open in one browser
window.
(1) Tab bar
(2) pop-up helper
(3) Tab row
(4) Address bar
(5) None of these
5. Information is?
(1) Summarization process of data
(2) Data Information
(3) Textual form of data
(4) Facts and figures
(5) None of these
6. Total memory of system can be known using?
(1) DIR commands
(2) MEM commands
(3) Warm boot
(4) TOT MEM commands
(5) None of these
7. The first graphical web browser are?
(1) Gopher
(2) WAIS
(3) CERN
(4) Mosaic
(5) None of these
8. Which of the following is correct?
(1) POWER(2^3)
(2) POWER(2,3
(3) POWER(2#3)
(4) POWER(2*3)
(5) None of these
9. What what is the default font in MS Word?
(1) Gothic Bold

(2) MV Biol
(3) Times new roman
(4) Arial
(5) None of these
10. is the process of carrying out commands.
(1) Fetching
(2) Storing
(3) Executing
(4) Decoding
(5) None of these
11. Latest Entry Level Desktop PC have at least more than ------ of RAM.
(1) 100bit
(2) 100Byte
(3) 100KB
(4) 100 MB
(5) None of these
12. ---------- Bar is located at top of WordPad / Notepad /MS Word window.
(1) Title
(2) Menu
(3) Tool
(4) Format
(5) None of these
13. What is the decimal from of 3b4?
(1) 846
(2) 848
(3) 946
(4) 948
(5) None of these
14. The ---------- button on the quick access toolbar allow you to cancel your recent commands or action.
(1) Search
(2) Cut
(3) Document
(4) Undo
(5) None of these
15. What type of virus use computer hosts to reproduces it?
(1) Time bomb
(2) worm
(3) Melissa virus
(4) Macro virus
(5) None of these
16. ---------- is a signaling method that handles a relatively wide range of frequencies.
(1) Broadband
(2) DLF
(3) Dial-up
(4) both 1& 3
(5) None of these
17. Block on buffer caches are used:
(1) to handle interrupts

(2) to increase capacity of main memory


(3) to improve disk performance
(4)to speed up main memory read operation
(5) None of these
18. The term --- designate equipment that might be added to a computer system to enhance. Its
functionality.
(1) Digital device
(2) system add
(3) Disk pack
(4) Peripheral device
(5) None of these
19. A disk content that is recorded at the time of manufacture and that cannot be changed or erased by
the user.
(1) READ ONLY
(2) Memory only
(3) Run only
(4) WRITES ONLY
(5) None of these
20. A device designed to read information encoded onto a small plastic card is .
(1) light pen
(2) pun chard card
(3) magnetic tape
(4) magnetic
(5) badge reader

ANSWERS
1. 4
2. 3
3. 5
4. 3
5. 1
6. 2
7. 4
8. 2
9. 5
10. 3
11. 4
12. 1
13. 4
14. 4
15. 2
16. 1
17. 3
18. 4
19. 1
20. 5

3Computer Quiz
1. The vast network of computers that connects millions of people all over the world is called.
(1)LAN
(2)web
(3)hypertext
(4)internet
(5)None of these
2. The property that, when classes are arranged in a hierarchy, each class assumes the attributes and
methods of its ancestors is
(1) generalization
(2) inheritance
(3) encapsulation
(4) information hiding
(5) None of these
3. The software component of an expert system that draws conclusions is the.
(1)user interface
(2)database
(3)inference engine
(4)1/0 controller
(5)model base
4. The attributes and methods for each object are stored in.
(1) an object instance
(2) an object connection
(3) an assembly structure
(4) an object repository
(5) None of these
5. An E-R diagram is a graphic method of presenting
(1) primary keys and their relationships
(2) primary keys and their relationships to instances
(3) entity classes and their relationships
(4) entity classes and their relationships to primary keys
(5) None of the above
6. The OCR is used for the preparation of
(1) electricity bills
(2) insurance premium
(3) telephone bills
(4) All of these
(5) None of these
7. Speed of line printer is limited by the speed of
(1) paper movements
(2) cartridge used
(3) length of paper
(4) All of these
(5) None of these
8. In laser printers, printing is achieved by deflecting laser beam on to surface of a drum
(1) magnetized

(2) photosensitive
(3) magnetic
(4) Either (1)or (2)
(5) None of these
9. Resolution of laser printer is specified in terms of
(1) DPI
(2) LPM
(3) CPM
(4) PPM
(5) None of these
10. What are the units used to count the speed of a printer?
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these
11. The binary equivalent of decimal number 98 is
(1) 1110001
(2) 1110100
(3) 1100010
(4) 1111001
(5) None of these
12. The product of two binary numbers (1011) and (1001) is
(1) 1100011
(2) 1010100
(3) 1011001
(4) 100110
(5) None of these
13. A byte represents a group of
(1) 10 bits
(2) 40 bits
(3) 8 bits.
(4) 22 bits
(5) None of these
14. A hexadigit can be represented by
(1) three binary (consecutive) bits
(2) four binary (consecutive) bits
(3) eight binary (consecutive) bits
(4) sixteen binary (consecutive) bits
(5) None of the above
15. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits?
(1) ANSI
(2) ASCII
(3) EBCDIC
(4) ISO
(5) None of these
16. Which of the following statements in regard to directories is false?

(1) Directories with files can be deleted


(2) Directories cannot be renamed
(3) The root directory is always at the highest level
(4) Directories can exist inside directories
(5) None of the above
17. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk
drives, and parallel and serial ports_____
(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of these
18. MS-DOS is usually supplied on a
(1) hard disk
(2) cartridge tape
(3) CD ROM
(4) floppy disk or diskettes
(5) None of these
19. Which one of the following is not a DOS prompt ?
(1) C >
(2) B >
(3) A >
(4) ENTER
(5) None of these.
20. Which one of the following is not an internal DOS command?
(1) BACKUP
(2) COPY
(3) CLS
(4) BREAK
(5) None of these
ANSWERS
1. 4
2. 2
3. 3
4. 4
5. 3
6. 4
7. 1
8. 2
9. 1
10. 4
11. 3
12. 1
13. 3
14. 2
15. 1
16. 2
17. 1
18. 4

19. 4
20. 1

4Computer Quiz
1. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these
2. Who invented world wide web?
1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these
3. URL stands for ____.
1) Uniform Resource Locator
2) Universal resource locator
3) Address bar
4) All 1, 2 & 3 are correct
5) None of these
4. A thing present in real world in physical form is called____.
1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these
5. BUG is 1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these
6. Which of the following is not a type of key?
1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these
7. If a previously saved file is edited ___?
(1) it cannot be saved again
(2) the changes will automatically be saved in the file
(3) the file will only have to be saved again if it is more than one page in length
(4) its name must be changed
(5) the file must be saved again to store the changes
8. Which of the following converts all the statements in a program in a single batch and the resulting

collection of instructions is placed in a new file?


(1) Compiler
(2) Interpreter
(3) Converter
(4) Instruction
(5) None of these
9.A program that generally has more user-friendly interface than a DBMS is called a ____?
(1) front end
(2) repository
(3) back end
(4) form
(5) None of these
10.When you install new programs on your computer, it is typically added to the ___?
(1) All programs
(2) Select programs
(3) Start programs
(4) Desktop programs
(5) None of these
11. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3) File extension is another name for file type
(4) The file extension comes before the dot (.) followed by the file name
(5) None of these
12. Which of the following is the key function of a firewall?
(1) Monitoring
(2) Deleting
(3) Record
(4) Copying
(5) Moving
13. Programming language built into user programs such as Word and Excel are known as____?
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
14. In MS Word Key F12 opens ____?
(1) Save dialog box
(2) print dialog box
(3) New dialog box
(4) Save as dialog
(5) none
15. What is gutter margin?
(1) Margin that is added to the left margin when printing
(2) Margin that is added to right margin when printing
(3) Margin that is added to the binding side of page when printing
(4) Margin that is added to the outside of the page when printing
(5) None of these

ANSWERS
1. 2
2. 3
3. 1
4. 2
5. 3
6. 5
7. 5
8. 1
9. 1
10. 1
11. 4
12. 1
13. 4
14. 4
15. 3

5. COMPUTER QUIZ
1. What do we call the HTML codes written in a text editor to make web pages?
(1) Source code
(2) HTML tags
(3) Source elements
(4) Roots
(5) None of these
2. EEPROM permits?
(1) Read Permission only
(2) read and byte erase permission
(3) Read, byte erase and byte write operations
(4) Read, byte erase, byte write and chip erase operations
(5) None of these
3. The process of identifying specific rows and columns so that so that certain columns and rows are always visible
on the screen is called:
(1) Freezing
(2) locking
(3) Selecting
(4) fixing
(5) none
4. Where can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these
5. A microprocessor is generally?
(1) Single chip SSI
(2) Single chip MSI
(3) Single Chip LSI
(4) Both 1and 2
(5) None of these
6. What is a portion of a document in which you set certain page formatting options?
(1) Page
(2) Document
(3) Section
(4) Page Setup
(5) None
7. XML stands for(1) Xtreme Markup Language
(2) Extensible Markup Language
(3) X-Markup Language
(4) Xpensive Markup Language
(5) None of these
8. Lycos is known as(1) website

(2) internet radio


(3) search engine
(4) messenger
(5) None of these
9. _____ is when the more power hungry components such as the monitor and the hard drive are put to idle.
(1) Hibernation
(2) Power down
(3) Standby mode
(4) The Shut down procedure
(5) None of these
10. A human being who writes programs, operate and maintain computer is known as(1) live ware
(2) freeware
(3) spyware
(4) shareware
(5) None of these
11. WWW uses ____ protocol.
(1) FTP
(2) HTTP
(3) SMTP
(4) Telnet
(5) None of these
12. .com is related to(1) Personal Site
(2) Art
(3) Organization
(4) Commercial Organization
(5) None of these
13. Time sharing systems require:
(1) a number of terminals connected to a system
(2) memory protection mechanism to prevent a jobs instructions
(3) job status preservation mechanism to preserve a jobs status s
(4) an alarm clock mechanism to send an interrupt
(5) All of the above
14. Computers use the ____language to process data.
(1) processing
(2) kilobyte
(3) binary
(4) representational
(5) None of these
15. By default, your document will print in __ mode
(1) landscape
(2) portrait
(3) page setup
(4) print view
(5) None of these

16. Track ball is _______.


(1) Programming devices
(2) Pointing device
(3) Output device
(4) Software device
(5) Printing device
17. What is the meaning of page break up
(1) Page of document is break into small parts.
(2) Next part of the document will be started on the new page.
(3) Page of the document is break in small 2 sentences.
(4) Page of the document is break into small paragraph
(5) None of these
18. _____ is a procedure that requires users to enter an identification code and a matching password
(1) paging
(2) logging on
(3) time sharing
(4) Multitasking
(5) None of these
19. Antivirus software is an example of.....................
(1) business software
(2) an operating system
(3) a security utility
(4) an office suite
(5) None of these
20. Computer programs are written in a high-level programming language; however, the human-readable version of
a program is called..............
(1) cache
(2) instruction set
(3) source code
(4) word size
(5) None of these
21. Which of the following refers to the memory in your computer?
(1) RAM
(2) DSL
(3) USB
(4) LAN
(5) CPU
22. Information travels between components on the motherboard through
(1) Flash memory
(2) CMOS
(3) Bays
(4) Buses
(5) Peripherals
23. UNIVAC is an example of:
(1) 1st generation computer
(2) 2nd generation computer

(3) 3rd generation computer


(4) 4th generation computer
(5) None of these
24. The __ is the Administrative section of the computer system :
(1) input unit
(2) control unit
(3) Memory unit
(4) central processing unit
(5) Arithmetic logic unit
25. A series of instructions that tells a computer what to do and how to do it is called a(1) Program
(2) command
(3) user response

(4) processor
(5) None of these

6 Computer Quiz
1. IP address contains ........... bits.
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these
2. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these
3. Which is the example of spread sheet ?
(1) MS word
(2) MS excel
(3) Power point
(4) MS Access
(5) None of these
4. Name of the executable file of MS word is(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these
5. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these
6._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these
7. ____________ are viruses that are triggered by the passage of time or on a certain date.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these
8. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft

(3) Windows
(4) Mac
(5) None of these
9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a systems information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these
10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database,
(5) None of these
11. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these
12. The vast network of computers that connects millions of people all over the world is called
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
13.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these
14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base
15.________ is an invalid type of database key.
1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these
16. The OSI model is divided into_______ processes called layers.
(1) five
(2) six

(3) seven
(4) eight
(5) None of these
17. System software is the set of programs that enables your computers hardware devices
and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside other devices, such as
your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
19. The following are all computing devices , except
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)

Computer Quiz
1. When you save to _______, your data will remain intact even when the computer is turned off.
a. RAM
b. motherboard
c. secondary storage device
d. primary storage device
e. None of these
2. The motherboard is the
a. circuit board that houses peripheral devices
b. same as the CPU chip
c. the first chip that is accessed when the computer is turned on
d. circuit board that contains a CPU and other chips
e. None of these
3. A computer-intensive problem runs on a _______.
1) server
2) mainframe
3) supercomputer
4) super PC
5) None of these
4. A(n) _______ converts and executes one statement at a time.
1) compiler
2) interpreter
3) converter
4) instructions
5) None of these
5. The term _______ designates equipment that might be added to a computer system to enhance
its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
6. Approximately how many bytes make one Megabyte?
1) One Thousand
2) Ten Thousand
3) One Hundred
4) One Million
5) None of these
7. What is MP3?
1) A mouse
2) A printer
3) A sound format
4) A scanner
5) None of these

8. All the deleted files go to


1) Recycle Bin
2) Task Bar
3) Tool Bar
4) My Computer
5) None of these
9. _______ is the act of copying or downloading a program from a network and making multiple
copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
10. A directory within a directory is called a _______.
1) Mini Directory
2) Junior Directory
3) Part Directory
4) Sub Directory
5) None of these
11. Which is the best definition of a software package?
a. An add-on for your computer such as additional memory
b. A set of computer programs used for a certain function such as word processing
c. A protection you can buy for a computer
d. The box, manual and licence agreement that accompany commercial software
e. None of these
12. In MICR, C stands for
1) Code
2) Colour
3) Computer
4) Character
5) None of these
13. Fax machines and imaging systems are examples of
1) bar-code readers
2) imaging systems
3) scanning devices
4) pen-based systems
5) None of these
14. When writing a document, you can use the _______ feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.
1) dictionary
2) word finder
3) encyclopedia
4) thesaurus
5) None of these
15. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar

5) None of these
16. A disks content that is recorded at the time of manufacture and that cannot be changed or
erased by the user is
1) read-only
2) memory-only
3) run-only
4) write-only
5) None of these
17. In an information system, alphanumeric data normally takes the form of
a. Sentences and paragraphs
b. Numbers and alphabetical characters
c. Graphic shapes and figures
d. Human voice and other sounds
e. None of these
18. A Web sites main page is called its _______
1) home page
2) browser page
3) search place
4) bookmark
5) None of these
19. When installing _______, the user must copy and usually decompress program files from a
CD-ROM or other medium to the hard disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
20. A collection of interrelated files in a computer is a _______.
1) file manager
2) field
3) record
4) database
5) None of these

ANSWERS
ANSWERS
1. c
2. d
3. 3
4. 2
5. 4
6. 4
7. 3
8. 1
9. 3
10. 4
11. b
12. 4
13. 3

14. 4
15. 2
16. 1
17. b
18. 1
19. 4
20. 4

Computer Quiz
1. A device operating at the physical layer is called a
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these
2. For separating channels in FDM, it is necessary to use
1) Time slots
2) Bandpass filters
3) Differentiation
4) All of the above
5) None of these
3. Encryption and decryption are functions of
1) Transport layer
2) Session layer
3) Presentation layer
4) All of the above
5) None of these
4. Which of the following computer language is a mathematically oriented
languages used for scientific problems?
1) FORTRAN
2) COBOL
3) LISP
4) PROLOG
5) APPLE
5. ________ is when the more power-hungry components, such as the monitor and
the hard drive, are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
5) None of these
6. Hard disk drives are considered ________ storage.
1) flash
2) non-volatile
3) temporary
4) nonpermanent
5) None of these
7. The ________ key and the ________ key can be used in combination with other keys
to perform shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
5) None of these

8. The most common input devices are the ________ and the ________.
1) microphone, printer
2) scanner, monitor
3) digital camera, speakers
4) keyboard, mouse
5) None of these
9. To save an existing file with a new name or to a new location, you should use
the ________ command.
1) Save
2) Save and Replace
3) Save As
4) New File
5) None of these
10. A(n) ________ is a combination of hardware and software that facilitates the
sharing of information between computing devices.
1) network
2) peripheral
3) expansion board
4) digital device
5) None of these
11. The term bit is short for ________
1) megabyte
2) binary language
3) binary digit
4) binary number
5) None of these
12. Computers gather data, which means that they allow users to ________ data.
1) present
2) input
3) output
4) store
5) None of these
13. Which of the following terms is just the connection of networks that can be
joined together ?
1) virtual private network
2) internet
3) intranet
4) extranet
5) None of these
14. ________ is a form of permanent memory that holds all the instructions the
computer needs to start up and does not get erased when the power is turned off.
1) The Network Interface Card (NIC)
2) The CPU
3) RAM
4) ROM
5) None of these
15. Servers are computers that provide resources to other computers connected
to a ________

1)
2)
3)
4)
5)

network
mainframe
supercomputer
client
None of these

1. 3
2. 2
3. 3
4. 1
5. 3
6. 2
7. 1
8. 4
9. 3
10. 1
11. 3
12. 2
13. 2
14. 4
15. 1

Computer Quiz
1. What is the responsibility of the logical unit in the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data
2. Abacus was the first ___
a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip
3. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K
4. Instructions and memory address are represented by ___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code
5. The terminal device that functions as a cash register, computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above
6. A set of flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above
7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data
8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit

c) Semiconductors
d) a and b only
e) None of the above
9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8
10. The first computer introduced in Nepal was ___
a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405
11. Bluetooth is a type of radio wave information transmission system that is good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles
12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler
13. Acredit card-sized expansion board that is inserted into portable computers that connects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem
14. A modem that is contained within the system unit is called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth
15. A modem that doesn't need to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL
16. Aspecial high-speed line used by large corporations to support digital communications is known as:
a) satellite/air connection service lines

b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above
17. An affordable technology that uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU
18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data
19. A relatively new technology that allows wireless connectivity:
a) Bluetooth
b) Black tooth
c) Blue band
d) Broadband
e) Wi- fi
20. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0

1) b;
2) d;
3) b;
4) b;
5) d;
6) c;
7) c;
8) c;
9) c;
10) b
11) a;
12) a;
13) c;
14) b;
15) c;
16) d;
17) d;

18) a;
19)a

20)d

You might also like