You are on page 1of 6

www.sakshieducation.

com

COMPUTER KNOWLEDGE
1.

A hard disk is divided into tracks, which is further subdivided into ___.
a) Clusters
b) Sectors
c) Vectors
d) Heads
e) None of these

2.

What is the radix of Binary Number System?


a) 3
b) 1
c) 2
d) 4

e) 0

3.

Which of the following holds the ROM, RAM, CPU?


a) Hard Disk
b) ALU
c) Mother Board
d) All of the above
e) None of the above

4.

Portable program means a) Program with wheels


c) Independent of platform
e) None of the above

5.

b) Independent from its authors


d) All of the above

1 GB is equal to ____.
a) 230 bits
b) 230 bytes
d) 220 bytes
e) None of these

c) 220 bits

6.

Which of the following are the 5 generic software engineering framework


activities?
a) Communication, Planning, Modeling, Construction, Deployment
b) Communication, Risk management, Measurement, Production, Reviewing
c) Analysis, Designing, Programming, Debugging, Maintenance
d) Analysis, Planning, Designing, Programming, Testing
e) None of these

7.

The principal electronic payment system for electronic commerce is ____.


a) Credit Card
b) Digital Wallet
c) Electronic Cheque
d) All of the above
e) None of these

www.sakshieducation.com

www.sakshieducation.com
8.

The name of first super computer of India a) Saga 220


b) PARAM 8000
c) ENIAC
d) PARAM 6000
e) None of these

9.

The machine readable form of a program is called as ___.


a) Source code
b) Object code
c) Compiler
d) Executable File
e) All of the above

10. AVI format was developed by a) IBM


b) Apple
d) Macromedia
e) Sun Microsoft

c) Microsoft

11. Which of the following IP address class is a multicast address?


a) Class A
b) Class B
c) Class C
d) Class D
e) Class F
12. Each character on the keyboard of computer has an ASCII value which
stands for a) African Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) American Stock Code for Information Interchange
d) American Standard Code for Information Interfere
e) None of these
13. Which layer of OSI reference model uses the ICMP (Internet Control
Message Protocol)?
a) Network layer
b) Data link layer
c) Transport layer
d) Application layer
e) Mac layer
14. What is the meaning of Hibernate in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) None of these
www.sakshieducation.com

www.sakshieducation.com
15. The basic unit of a worksheet into which you enter data in Excel is called
a ___
a) Cell
b) Table
c) Box
d) Column
e) None of these
16. Which of the following is a correct format of e-mail address?
a) sales@website; info
b) sales@website.info
c) saleswebsite.info
d) sales.website.info
e) All of the above
17. What is the shortcut key of printing a document for computer having
windows?
a) Shift + P
b) Alt + P
c) Ctrl + P
d) Ctrl + Shift + P
e) None of these
18. The operating system does all of the following EXCEPT:
a) Provide a way for the user to interact with the computer
b) Manage the Central Processing Unit (CPU)
c) Manage memory and storage
d) Enable users to perform a specific task such as document editing
e) All of the above
19. ____ is the ability of an operating system to control the activities of
multiple programs at the same time.
a) Streamlining
b) Multiuser
c) Multitasking
d) Simulating
e) None of these
20. Verification of a login name and password is known as a) Configuration
b) Accessibility
c) Authentication
d) Logging in
e) Logging off
21. All of the following statements concerning windows are true EXCEPT a) Windows are an example of a command-driven environment
b) Windows can be resized and repositioned on the desktop
c) More than one window can be open at a time
www.sakshieducation.com

www.sakshieducation.com
d) Toolbars and scrollbars are features of windows
e) None of these
22. All of the following statements concerning files are true EXCEPT a) A file is a collection of related pieces of information stored together for
easy reference
b) Files can be generated from an application
c) Files are stored in RAM
d) Files should be organized in folders
e) None of these
23. What are the four things needed to connect to the Internet?
a) Monitor, Keyboard, Mouse and Modem
b) Telephone line, PDA, Modem and Computer
c) Telephone line, Modem, Computer and an ISP
d) Modem, Computer, PDA and ISP
e) None of the above
24. Which of the following is true about firewalls?
a) Follows a set of rules
b) Can be either a hardware or software device
c) Filters network traffic
d) All of the above
e) None of these
25. Data that are accumulated and processed in group called a) Group processing
b) Batch Processing
c) Time sharing
d) All of the above
e) None of the above
26. Allocation of resources in a time dependent manner to several program
simultaneously called as a) Multi user
b) Multi tasking
c) Time sharing
d) All of the above
e) None of the above

www.sakshieducation.com

www.sakshieducation.com
27. The ability to recover and read deleted or damaged files from a criminal's
computer is an example of a law enforcement specialty called a) Simulation
b) Animation
c) Robotics
d) Computer forensics
e) None of these
28. In the binary language each letter of the alphabet, each number and each
special character is made up of a unique combination of a) Eight bytes
b) Eight characters
c) Eight bits
d) Eight kilobytes
e) None of the above
29. Servers are computers that provide resources to other computers
connected to a a) Mainframe
b) Supercomputer
c) Network
d) Client
e) User
30. The difference between people with access to computers and the Internet
and those without this access is known as the a) Digital divide
b) Internet divide
c) Web divide
d) Cyber way divide e) All of the above
31. The simplest, but most expensive, approach to introductory redundancy
is duplicate to every disk. This technique is called as a) Swap space
b) Mirroring
c) Page slots
d) All of the above
e) None of the above
32. If user is not able to see the image on the web page, the text that is
displayed in place of the image, is specified by which of the following
attributes in HTML?
a) ALTERNATE
b) ALTLINK
c) ALT_TEXYT
d) ALT
e) None of these
33. Which command will be used to duplicate the entire disk?
a) Copy
b) Undo
c) Format
d) Disk copy
e) None
www.sakshieducation.com

www.sakshieducation.com
34. To select the entire column in a worksheet, which of the following
options can be used a) Shift + Space
b) Alt + Space
c) Shift + Alt
d) Ctrl + Space
e) None of these
35. The errors that can be pointed out by the compiler are?
a) Semantic errors
b) Logic errors
c) System errors
d) Syntax errors
e) None of these

Answers
1) b

2) c

3) c

4) c

5) b

6) a

7) d

8) b

9) b

10) c

11) d

12) b

13) a

14) d

15) a

16) b

17) c

18) d

19) c

20) c

21) a

22) c

23) c

24) d

25) b

26) c

27) d

28) c

29) c

30) a

31) b

32) d

33) d

34) d

35) d

www.sakshieducation.com

You might also like