1. Accounting is the_______ of monetary transactions.
(a) recording (b) verification (c) tallying (d) all of them
Ans. d
2. Accounting is concerned with transactions involving________.
(a) money (b) no money (c) movement of humans (d) none of them
Ans. a
3. Accounting transactions relate to_______.
(a) income/expense (b) asset/liability (c) inventory (d) all of them
Ans. d
4. Form used to record accounting transactions contains _______columns.
(a) 3 (b) 5 (c) 8 (d) 11
Ans. c
5. First 4 columns of account sheet are used for recording ______.
(a) credit (b) debit (c) income (d) expense
Ans. b
6. Columns 5 to 8 of account sheet are used for recording_______ .
(a) credit (b) debit (c) income (d) expense
Ans. a
7. First column of debit/ credit form is used to record______ of transaction.
(a) date (b) particulars (c) Journal Folio (d) amount
Ans. a
8. Second column of debit/ credit transaction is used to record _____of transaction.
(a) date (b) particulars (c) Journal Folio (d) amount
Ans. b
9. Third column of debit/ credit form is used to record_____ of transaction.
(a) date (b) particulars (c) Journal Folio (d) amount
Ans. c
10. Fourth column of debit/ credit form is used to record______ of transaction.
(a) date (b) particulars (c) Journal Folio (d) amount
Ans. d
11. The technology which permits data transmission between devices like computers, mobile
phones, tablets, headsets, etc. is called _____ .
(a) bluetooth
(b) coaxial cable
(c) fibre optic cable
(d) twisted pair cable
Ans. a
12. Bluetooth permits ______.
(a) pairing by acceptance (b) pairing by password authentication
(c) pairing by verification (d) all of them
Ans. d
13. Bluetooth is a ____ technology that connects devices (called gadgets) in a small area.
a) wired LAN
b) wireless LAN
c) VLAN
d) none of these
Ans. b
14. In Bluetooth, multiple ____ form a network called a _____
a) scatternet; piconets
b) piconets: scatternet
c) Piconets: bluenet
d) bluenet; scatternet
Ans. b
15. In a piconet, there can be up to _____ parked nodes in the network.
a) 63 b) 127 c) 255 d) 511
Ans. c
16. Bluetooth is the wireless technology for ______
a) local area network b) personal area network
c) metropolitan area network d) wide area network
Ans. b
17. Bluetooth uses _____
a) frequency hopping spread spectrum b) orthogonal frequency division multiplexing
c) time division multiplexing d) channel division multiplexing
Ans. a
18. What is A2DP (advanced audio distribution profile)?
a) a bluetooth profile for streaming audio b) a bluetooth profile for streaming video
c) a bluetooth profile for security d) a bluetooth profile for file management
Ans. a
19. In a piconet, one master device _____
a) can not be slave b) can be slave in another piconet
c) can be slave in the same piconet d) can be master in another piconet
Ans. b
20. BIOS (Basic input output system) resides in
a) RAM
b) ROM
c) Cache
d) CPU
Ans. b
21 - Which of the following is used in mode string to open the file in binary mode?
A – a B – b C – B D - bin
Answer : B
Explanation: To perform unformatted data I/O a file is opened in binary mode and is represented
with the alphabet „b‟ in the mode string.
22. What is the output of the following code snippet?
#include<stdio.h>
main()
{
int x = 5;
if(x==5)
{
if(x==5) break;
printf("Hello");
}
printf("Hi");
}
A - Compile error B – Hi C – HelloHi D – Hello
Ans. A
Explanation: compile error, keyword break can appear only within loop/switch statement.
23 - What is the output of the following program?
#include<stdio.h>
main()
{
struct { int x;} var = {5}, *p = &var;
printf("%d %d %d",var.x,p->x,(*p).x);
}
A - 5 5 5 B - 5 5 garbage value C - 5 5 0 D - Compile error
Answer : A
Explanation: 5 5 5, the two possible ways of accessing structure elements using pointer is by
using -> (arrow operator) OR *.
24 - A local variable is stored in ___
A - Code segment B - Stack segment C - Heap segment D - None of the above
Answer : B
Explanation: All the local variables are stored in a memory called as stack.
25 - In C, what are the various types of real data type (floating point data type)?
A - Float, long double B - long double, short int
C - float, double, long double D - short int, double, long int, float
Answer : C
Explanation: There are three types of floating point data type
1) float with storage size 4 byte,
2) double with storage size 8 byte, and
3) long double with storage size 10 byte.
26 - For a structure, if a variable behave as a pointer then from the given below operators which
operator can be used to access data of the structure via the variable pointer?
A - . B - % C - -> D - #
Answer : C
Explanation: For a structure, Dot(.) operator can be used to access the data using normal
structure variable and arrow (->)can be used to access the data using pointer variable.
27 - Why to use fflush() library function?
A - To flush all streams and specified streams
B - To flush only specified stream
C - To flush input/output buffer
D - Invalid library function
Answer : A
Explanation: In C programming, the fflush() function writes any unwritten data in stream's buffer.
If, stream is a null pointer, fflush() function will flush all streams with unwritten data in the buffer.
int fflush(FILE *stream);
28 - According to ANSI specification, how to declare main () function with command-line
arguments?
A - int main(int argc, char *argv[])
B - int char main(int argc, *argv)
C -
int main()
{
Int char (*argv argc);
)
D - None of the above
Answer : A
Explanation: Some time, it becomes necessary to deliver command line values to the C
programming to execute the particular code when the code of the program is controlled from
outside. Those command line values are called command line arguments. The command line
arguments are handled by the main() function.
Declaration of main () with command-line argument is,
int main(int argc, char *argv[ ])
Where, argc refers to the number of arguments passed, and argv[ ] is a pointer array which points
to each argument passed to the program.
29) Study the following program:
main()
{printf("HEETSON");
main();}
What will be the output of this program?
a) Wrong statement
b) It will keep on printing HEETSON
c) It will print nothing
d) None of these
Ans. b
Explanation: In this program, the main function will call itself again and again. Therefore, it will
continue to print HEETSON.
30) . Which technology is used in Compact Disks?
a) Electro Magnetic
b) Laser
c) Mechanical
d) Electrical
Ans. b
31. What is CD means?
a) Compact disk
b) Common disk
c) Cassette disk
d) Compact drive
Ans. a
32. What will this program print?
main()
{
int i = 2;
{
int i = 4, j = 5;
printf("%d %d", i, j);
}
printf("%d %d", i, j);
}
a) 4525
b) 2525
c) 4545
d) None of the these
Ans. A
Explanation: In this program, it will first print the inner value of the function and then print the
outer value of the function.
33. CDs can hold up to _____of data or 80 minutes of audio.
a) 500 MB
b) 700 MB
c) 1 GB
d) 1024 KB
Ans. b
34. CD was co-developed by_____ and released in 1982.
a) Sony
b) Philips
c) Samsung
d) Both A and B
Ans. d
35. Standard CDs have a diameter of _______and can hold up to about 1 hour and 20 minutes of
uncompressed audio.
a) 120 millimetres (4.7 in)
b) 150 mm
c) 180 mm
d) 200 mm
Ans. a
36. Who is known as CD Inventor?
a) James Russell
b) John Sympson
c) Michal Tomson
d) Charles Deggi
Ans. a
37. CD is a ______ storage device?
a) Primary
b) Secondary
c) Teritory
d) None of these
Ans. b
38. The 10’s complement of ‘(52520)_(10)’ is.
a) 48240 b) 47480 c) 47840 d) 48470
Ans. b
39. If a multiplexer has 16 input lines, how many selection lines would be necessaiy?
a) 16 b) 8 c) 4 d) 2
Ans. c
40. _____ is used to restore the contents of the cells in synchronous DRAM.
a) Sense amplifier b) Refresh counter c) Restorer d) Restore counter
Ans. a
41. If a block can be placed in a limited set of places in the cache, the cache is said to be
a) Fully associative b) Set associative c) Direct mapped d) Restricted mapped
Ans. b
42. The three main parts of the processor are _______ [SBI Clerk, 2012]
(a) ALU, Control Unit and Registers
(b) ALU, Control Unit and RAM
(c) Cache, Control Unit and Registers
(d) Control Unit, Registers and RAM
(e) RAM, ROM and CD-ROM
Ans. A
43. Which printer cannot print more than one character at a time ? [SSC, CHSL, 2012]
(a) Line (b) Daisy-wheel
(c) Laser (d) Dot-matrix
Ans. B
44. ________key is the example of Toggle key [IBPS Clerk, 2012]
(a) Alt
(b) Shift
(c) Control
(d) Escape
(e) Caps Lock
Ans. E
45. Video controller [IBPS Clerk, 2012]
(a) Controls the resolution of images on screen
(b) Controls the signals to be sent and received from processor for display
(c) Handles the entire electronic work behind the formation of images on the screen
(d) Is responsible for allocating pixels for formation of images
Ans. C
46. Which of these is a point-and-draw device ? [IBPS PO, 2012]
(a) mouse
(b) scanner
(c) printer
(d) CD-ROM
(e) Keyboard
Ans. A
47. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits? [IBPS PO,2013]
(a) ANSI
(b) ASCII
(c) EBCDIC
(d) ISO
(e) None of the above
Ans. A
48. _______ devices convert human-understandable data and programs into a form that the computer can
process. [SBI PO, 2013]
(a) Printing
(b) Output
(c) Solid State
(d) Monitor
(e) Input
Ans. E
49. The CPU comprises of Control, Memory, and ________ units. [SBI PO,2013]
(a) Microprocessor (b) Arithmetic/Logic (c) Output (d) ROM (e) Input
Ans. B
50. A joystick is primarily used to/for ___________. [SBI PO, 2013]
(a) Control sound on the screen (b) Computer gaming (c) Enter text (d) Draw pictures (e) Print text
Ans. B
51. On the motherboard the connection points for chips are reffered to as
a) slots
b) sockets
c) ports
d) lines
Ans. B
52. The load instruction is mostly used to designate a transfer from memory to a processor register known as [IBPS
PO 2012]
a) accumulator
b) instruction register
c) program counter
d) memory address register
Ans. A
53. ‘C’ in CPU denotes
a) Common b) Central c) Convenient d) Computer
Ans. B
54. Arithmetic logic unit and control sections have special purpose locations called [SBI Clerk 2012]
a) registers
b) RAM
c) BIOS
d) I/O
Ans. A
55. Internal memory in a CPU is nothing but
a) a set of registers b) a set of ALU c) microprocessor d) bus
Ans. A
56.The word ‘computer’ usually refers to the central processing unit plus
a) external memory b) internal memory c) input devices d) output devices
Ans. A
57. Which of the following is a part of central processing unit?
a) Printer b) Keyboard c) Mouse d) Arithmetic and logic unit
Ans. D
58. Control unit of a digital computer is often called the
a) clock b) nerve centre c) Both A and B d) IC
Ans. B
59. The central processing unit (CPU) in a computer consists of
a) input, output and processing b) control unit, primary storage and secondary storage
c) control unit, arithmetic logic unit, registers d) None of the above
Ans. C
60. A group of bits that tells the computer to perform a specific operation is known as
a) instruction code b) micro operation c) accumulator d) register
Ans. A
61. Which Microsoft-based technology was built to link desktop applications to the World Wide Web?
[A] Active Channel
[B] Active Desktop
[C] ActiveX
[D] None of the above
Correct Answer: C [ActiveX]
Explanation: ActiveX is a software framework created by Microsoft that adapts its earlier Component
Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a
network, particularly from the World Wide Web. It is used till IE11 but not Microsoft Edge.
62. Which among the following is the most common source of Viruses to the hard disk of your computer?
[A] Incoming Email [B] Outgoing Email [C] CD ROMs [D] Websites
Ans. a
63. Symantec is the maker of which among the following popular antivirus software?
[A] Norton
[B] BitDefender
[C] Avast
[D] McAfee VirusScan
Ans. a
64. Which of the following lies within the CPU?
[A] Primary Memory
[B] Secondary Memory
Secondary Memory
[C] Mouse
[D] Keyboard
Ans. a
Explanation: All input data and instructions are stored in the memory which is of two types-primary
memory and the secondary memory. Primary memory resides within the CPU while the secondary
memory is external to it.
65. “Internet escrow ” is a term most commonly related to which of the following?
[A] E-commerce [B] Software Development
[C] Privacy Security [D] Database Management
Ans. a
Explanation: Escrow is a financial instrument whereby an asset is held by a third party on behalf of two
other parties that are in the process of completing a transaction. E commerce hold the asset of a merchant
before it is sold to a customer. So it is Internet escrow.
66. In the Windows XP, what does XP stands for?
[A] Extra-Powerful [B] Experience
[C] Extended Platform [D] Experience Platform
Ans. b
Explanation: Windows XP is an operating system introduced in 2001. It is from Microsoft’s Windows. The
“XP” in Windows XP stands for eXPerience. Microsoft called the XP release its one of the most important
product.
67. V-RAM is used for access of the following?
[A] Video & Graphics
[B] Text & Images
[C] programs
[D] None of the above
Ans. a
Explanation: V-Ram is also known as video Ram. It is a dual ported variant of dynamic RAM. VRAM is
basically RAM integrated in a card for using it for storing graphical textures, 3D models temporary. It is
used for video access and graphics.
68. The word bandwidth is also used to mean ________?
[A] width of the data cable
[B] amount of data transferred
[C] number of the computers on a particular network
[D] none of the above
Ans. b
Explanation: Bandwidth refers to the amount of data that can be transmitted in a fixed amount of time.
For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second.
69. Which among the following is correct about 4GL?
[A] A computer brand [B] A software brand
[C] A software program [D] A programming language
Ans. d
70. As a person working in internet banking environment, why you should be aware of the “Dictionary
attack”?
[A] It is used to inject worms or viruses in the system
[B] It is used to determine a password
*C+ It is used to access customer’s account by determining other details
[D] It is used for stealing info from the Credit Card
Ans. b
Explanation: A dictionary attack is a method of breaking into a password-protected computer or server. It
is done by systematically entering every word in a dictionary as a password. A dictionary attack is used as
an attempt to decrypt a message or document.
71. C is what kind of language?
a) An assembly language
b) A third generation high level language
c) A machine language
d) Future language
Ans. b
72. Identify the device through which data and instructions are entered into a computer?
a) Software
b) Output device
c) Input device
d) Heetson
Ans. c
73. Computer Monitor is also known as :
a) DVU
b) UVD
c) VDU
d) CCTV
Ans. c
74. Arrange in ascending order the units of memory TB, KB , GB, MB
a) TB > MB > GB > KB
b) MB > GB > TB > KB
c) TB > GB > MB > KB
d) GB > MB > KB > TB
Ans. c
75. Which one of these stores more data than a DVD?
a) CD Rom b) Floppy c) Blue Ray Disk d) Red Ray Disk
Ans. c
76. The output shown on the computer monitor is called
a) VDU b) Hard Copy c) Soft Copy d) Screen Copy
Ans. c
77. 8 Bits make up 1 _____
a) Byte
b) Megabyte
c) Kilobyte
d) None
Ans. a
78. Which one is the result of the output given by a computer?
a) Data b) Instruction c) Information d) Excursion
Ans. c
79. What is kind of CD-ROM?
a) Optical disk b) Magnetic disk c) Magneto Optical disk d) None of these
Ans. b
80. Which is known as the most powerful type of computer?
a) Super computer b) Iframes c) Mega Frames d) Super Access
Ans. a
81. What is Spoofing?
Ans. It is also known as „Masquerade”. It Pretends to be a legitimate user and access to its
computer via a network.
82. What is the main part of computer ?
a) Input device b) Output device
c) CPU d) All of these
Ans. D
83. What is input device?
a) Which take the data b) which give the data
c) Both d) None of these
Ans.A
84. Which of these is an input device ?
a) keyboard b) mouse c) scanner d) all of these
Ans. D
85. CPU stands for _________
a) central processing unit b) center process unit
c) common processing unit d) none of these
Ans.A
86. Which of these part of CPU ?
a) ALU (Arithmatic logic unit) b) CU (Control Unit)
c) MU (Memory Unit) d) All of these
Ans. D
87. What is output device?
a) Which give the data b) which take the data
c) both A and B d) none of these
Ans.A
88. Which of these is an output device?
a) monitor b) speaker c) printer d) all of these
Ans. D
89. Which is these component of computer?
a) hardware b) software c) both a and b d) none of these
Ans. C
90. The physical component of computer are called______
a) hardware b) software
c) both a and b d) none of these
Ans. A
91. Processor, main memory (RAM), hard disk, CD/DVD drive, CMOS, BIOS chip, etc. are housed
inside _____.
(a) input unit (b) Central Processing Unit (CPU)
(c) output unit (d) all of them
Ans. b
92. ______ contains slots for fixing/ connecting processor, main memory (RAM), hard disk,
CD/DVD drive, CMOS, BIOS chip, etc.
(a) Mother board (b) bread board
(c) key board (d) dash board
Ans. a
93. A stylus used to provide input through CRT monitor is called _______.
(a) scanner
(b) digital tablet
(c) light pen
(d) printer
Ans. c
94. VDU is expanded as ______.
(a) Visual Display Unit
(b) Virtual Display Unit
(c) Visual Deception Unit
(d) Visual Display University
Ans. a
95. In computer monitors, CRT stands for _____.
(a) Cadmium Ray Tube (b) Cathode Ray Tube
(c) Cathode Ray Twist (d) Cathode Rim Tube
Ans. b
96. Cathode Ray Tube (CRT) monitor has ______ level of power consumption amongst monitors.
(a) highest (b) lowest (c) zero (d) least
Ans. a
97. LCD is expanded as _____.
(a) Linear Crystal Display (b) Liquid Crystal Dialog
(c) Liquid Crystal Display (d) Liquid Canister Display
Ans. c
98. LED is expanded as _______.
(a) Linear Emitting Diode (b) Light Emitting Diode
(c) Liquid Emitting Diode (d) Light Emitting Display
Ans. b
99. The display of LCD monitor is ______ than that of LED monitor.
(a) lighter (b) heavier (c) brighter (d) duller
Ans. d
100. Height to width ratio of a monitor screen is called ______.
(a) aspect ratio (b) length ratio (c) width ratio (d) diagonal ratio
Ans. a
101. Which was the first Electronics digital programmable computing device?
a) Analytical Engine b) Difference Engine c) Colossus d) ENIAC
Ans. C
102. EDVAC stands for ______.
a) electronic discrete variable automatic calculator
b) electronic discrete variable automatic computer
c) electronic data variable automatic calculator
d) electronic data variable automatic computer
Ans. B
103. Which was the first commercial computer?
a) Ferranti Mark 1 b) analytical engine c) difference engine d) colossus
Ans. A
104. UNIVAC stands for_______.
a) universal automatic calculator b) universal native input automatic computer
c) universal native input automatic calculator d) universal automatic computer
Ans. D
105. ENIAC stands for ______.
a) electronic numerical integrator and computer b) electronic numerical integrator and calculator
c) electronic numerical integrator automatic computer d) electronic numerical integrator automatic
calculator
Ans. A
106. Who invented the punch card ?
a) Charles babbage b) semen Korsakov c) herman Hollerith d) joseph marie jacquard
Ans. C
107. Which Electronic components are used in Second Generation Computers?
a) Transistors b) Integrated Circuits c) Vacuum Tubes d) VLSI
Ans. A
108. Which Electronic components are used in Third Generation Computers?
a)Transistors b) Integrated Circuits c) Vacuum Tubes d) VLSI
Ans. B
109. Which Electronic components are used in fourth Generation Computers?
a)Transistors b) Integrated Circuits c) Vacuum Tubes d) VLSI
Ans. d
110. Which Electronic components are used in Fifth Generation Computers?
a)Transistors b) Integrated Circuits
c) Vacuum Tubes d) ULSI Microprocessor
Ans. D
111. Which software is not an file compression utility?
a) 7-zip
b) Win Rar
c) Win Zip
d) Compres
Ans. d
112. In which situation running applications of an user account remains active?
a) When we log off
b) When we switch User
c) When we Shut Down
d) When We Reboot
Ans. b
113. How can we bring “My Computer” icon on the desktop if it is not there?
a) From Wallpaper
b) From Settings
c) From Display Properties
d) From Explorer
Ans. c
114. In a PowerPoint Presentation Animation can be repeated how many time
a) 2 to 5 b) 1 to 5 c) 2 to 10 d) 1 to 20
Ans. c
115. Which one is an example of spreadsheet software?
a) MS Excel b) MS Word c) MS Access d) MS PowerPoint
Ans. a
116. Which software can be used for giving presentation (e.g. product demo)?
a) MS word b) MS Excel c) MS PowerPoint d) MS Access
Ans. c
117. Which is not an Image Editing software?
a) Photo Shop b) MS PowerPoint c) Corel Draw d) MS Paint
Ans. b
118. A window can have ____ states
a) 1 b) 2 c) 3 d) 4
Ans. c
119. Which one is not an image file?
a) .bmp b) .png c) .wmv d) .jpg
Ans. c
120. Which one is an example of database designing software?
a) MS Excel b) MS Word c) MS Access d) MS PowerPoint
Ans. c
121. The ____ performs simple mathematics for the CPU.
(a) ALU (b) DIMM (c) BUS (d) Register (e) None of these
Ans. a
122. The ALU performs ____ operation.
(a) ASCII (b) Logarithm (c) Algorithm (d) Arithmetic (e) None of these
Ans. d
123. ALU stands for
(a) Algorithm and logarithm unit
(b) Arithmetic and logarithm unit
(c) Arithmetic and logical unit
(d) Algorithm and logical unit
(e) None of these
Ans. c
124. Which of the following is responsible for all types of calculations?
(a) ALU (b) Control Unit (c) Registers (d) BUS (e) None of these
Ans. a
125. The first computer architecture was introduced in [Allahabad Bank Clerk 2010]
(a) 1970 (b) 1968 (c) 1971 (d) 1973 (e) 1972
Ans. a
126. Another word for the CPU is [Allahabad Bank Clerk 2010]
(a) microprocessor (b) execute (c) microchip (d) decode (e) None of these
Ans. a
127. The microprocessor of a computer [IBPS Clerk 2011]
(a) does not understand machine language
(b) understands machine language and high level language
(c) understands only machine language
(d) understands only high level languages
(e) understands only assembly language
Ans. c
128. The microprocessor is the brain of the computer and is also called a [Allahabad Bank PO 2011]
(a) microchip (b) macrochip (c) macroprocessor(d) calculator (e) None of these
Ans. a
129. A microprocessor with 12 address lines is capable of addressing [LIC Assistant Officer 2009]
(a) 1024 location (c) 4096 location (b) 2048 location (d) 64 location
Ans. c
130. The first microprocessor produced by Intel Corp and Texas instruments were used primarily to control
(a) calculators (b) cars (c) remotes (d) robotics (e) grinders
Ans. a
131. It takes advantages of basic hardware and software security characteristics.
(1) System design (2) Data access control (3) System access control (4) None of these
Ans. 1
132. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of [IBPS PO 2016]
(1) Authentication (2) Automation (3) Firewall (4) Encryption (5) None of these
Ans. 1
133. Cracked softwares are another source of
(1) E-mail attack (2) Virus attack (3) Trojan horse (4) All of these
Ans. 2
134. A malware is an
(1) program (2) hardware (3) a person (4) None of these
Ans. 1
135. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other
executable code or documents.
(1) Keylogger (2) Worm (3) Virus (4) Cracker
Ans. 3
136. A computer virus is
(1) deliberately created (2) created accidently (3) produced as result of some program error (4) All of the above
Ans. 1
137. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and
downloading software from the Internet? [SBI PO 2014]
(1) Utility (2) Virus (3) Honey Pot (4) Spam (5) App
Ans. 2
138. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a
[RBI Grade B 2012]
(1) disease (2) torpedo (3) hurricane (4) virus (5) infector
Ans. 4
139. Computer virus is [IBPS Clerk 2011]
(1) a hardware (2) windows tool (3) a computer program (4) a system software (5) None of the above
Ans. 3
140. Which among the following is related to the internet and mail?
(1) Boot-UP (2) Magnetic Tapes (3) Applications Software (4) Paging (5) Virus
Ans. 5
141. Computer servers are used in applications.
(a) online reservation of tickets
(b) e-commerce
(c) tracking of consignments
(d) all of them
Ans. d
142. Your operating system will detect and install the appropriate device drivers for this type of
device:
a) Plug and play b) Plug and go c) Plug and continue d) Plug and commence
Ans. a
143. The component which makes a computer to work through commands is called _____.
(a) software (b) hardware
(c) malware (d) junkware
Ans. a
144. Software ______.
(a) consumes power through hardware (b) is inferred through the working of hardware
(c) controls the hardware (d) all of them
Ans. d
145. The component of computer which is not physically accessible, but can be realized through
its working is called _______.
(a) hardware (b) software (c) RAM (d) port
Ans. b
146. ______ helps to hardware to produce output based on given input.
(a) Game port (b) software (c) IEEE 1392 (d) SMPS
Ans. b
147. Operating system identifies and controls hardware in coordination with _____.
(a) power cable (b) mouse (c) SMPS (d) BIOS
Ans. d
148. _______ schedules processor time in such a way as to allow the user to feel that may
programs are running at the same time.
(a) application software (b) operating system (c) virus (d) malware
Ans. b
149. ______ schedules processor time and handles concurrency and parallel processing using
multiple processor cores.
(a) application software (b) virus (c) malware (d) operating system
Ans. d
150. ______ allots memory for each program and frees memory when it is no longer needed for a
program.
(a) application software (b) virus (c) malware (d) operating system
Ans. d
151. What is the average power (in watts) used by a 20 to 25 inch home color television…?
a) 70-100
b) 25-50
c) 500-800
d) Over 1000
Ans. a
152. “FET” is a type of transistor or ____ Effect Transistor.
a) Field
b) Factor
c) Flash
d) Force
Ans. a
153. Voltage is sometimes referred to as EMF, which means Electromotive ___
a) Field b) Factor c) Flash d) Force
Ans. d
154. A given signal‟s second harmonic is twice the given signal‟s ____ frequency.
a) fourier b) Foundation c) Fundamental d) Field
Ans. c
155. The frequency range which is called High Frequency band is?
a) 100 kHz b) 1 GHz c) 30 to 300 MHz d) 3 to 30 MHz
Ans. d
156. Once the active medium is excited, by which physical process is the first photons of light are
produced?
a) Blackbody radiation b) Spontaneous emission
c) Synchrotron radiation d) Planck‟s oscillation
Ans. b
157. Which process is responsible for amplification of the light after the first photons of light are
produced?
a) Blackbody radiation b) Stimulated emission
c) Planck‟s radiation d) Einstein oscillation
Ans. b
158. The active medium used in the first working laser ever constructed was?
a) A diamond block b) Helium-neon gas
c) A ruby rod d) Carbon dioxide gas
Ans. c
159. What are three types of lasers?
a) Gas, metal vapor, rock b) Pointer, diode, CD
c) Diode, inverted, pointer d) Gas, solid state, diode
Ans. d
160. What would you use for immediate, real-time communication with a friend?
a) Instant messaging b) E-mail c) Usenet d) A mailing list
Ans. a
161. ______is used by the CPU to communicate with devices that are contained within the
computer, through physical connections such as cable or printed circuits.
a) Bus b) Control Bus c) Program d) Stack pointer
Ans. b
162. Microprocessors as switching devices are for ______ generation.
Ans. Fourth
163. In a computer most processing takes place in_____
Ans. CPU
164. Large scale integration is used in _____ Processor.
Ans. Memory
165. The number of pins in 8085 microprocessor is _____
Ans. 40 pins
166. Memory location in INTEL 8085 microprocessor has ______ numbers.
Ans. 65536
167. The sign Flag sets in 8085 when ______.
Ans. 16 bits
168. The five Flip –Flop set in 8085 is called _____.
Ans. Flap
169. In 8085 there are _____ General purpose registers.
Ans. 6
170. The part of micro-processor which performs number crunching and logical comparisons is
called _______ .
(a) Arithmetic and Logic Unit (ALU)
(b) Register
(c) Cache
(d) timer
Ans. a
171. How can we change the background color of an element?
a) background-color
b) color
c) Both A and B
d) None of these
Ans. a
172. Which is the correct CSS syntax?
a) body: color = black;
b) body {color; black}
c) {body: color : black;}
d) {body : color = black;}
Ans. b
173. How can we select an element with a specific ID in CSS?
a) #
b) .
c) !
d) None of these
Ans. a
174. How can we select an element with a specific Class in CSS?
a) # b) . c) ! d) None of these
Ans. b
175. Can negative values be allowed in padding property?
a) Yes
b) No
c) Depends on property
d) None of these
Ans. b
176. The CSS property used to specify the transparency of an element is?
a) opacity
b) visibility
c) filter
d) None of these
Ans. a
177. How can we specify the spacing between each letter in a text in CSS?
a) alpha-spacing
b) letter-spacing
c) character-spacing
d) None of these
Ans. b
178. We can make rounded borders around element using which CSS element?
a) border-collapse
b) border-round
c) border-radius
d) None of these
Ans. c
179. Which of the following property specifies the look and design of an outline?
a) outline-style
b) outline
c) outline-font
d) None of these
Ans. a
180. Which of the following are valid CSS position property values?
a) static
b) relative
c) fixed
d)All of these
Ans. d
181. What is the full form of LDAP?
A Light Weight Directory Access Provider
B Light Weight Directory Access Protocol
C Light Weight Directory Access Program
D Light Weight Directory Access Protection
Ans. b
182. What is called the collective terms of malicious software, such as viruses, worms and
trojans?
A Spam B Phishing C Malware D Harm
Ans. c
183. What is the full form of CIA under information security?
A Confidentiality Integrity Availability B Criminal Investigation Agency
C Cost Information Agency D Credit Integrity Assement
Ans. a
184. What is called a single point of access for several networking services?
A Phishing B Web service C Directory service D Worms
Ans. c
185. Which activities endanger the sovereignty and integrity of nation?
A Cyber Terrorism B Cyber vandalism C Cyber squatting D Carding
Ans. a
186. Which crime involves the use of computer networks to create, distribute or access materials
tha sexually expoit underage persons?
A Assault by Threat B Cyber squatting C Cyber vandalism D Child pornography
Ans. d
187. Which method go through all the files or network elements with an intention to detect
something unusual?
A Probing B Phishing C Infecting D Scanning
Ans. d
188. Victims of cyber attack might loose _______.
(a) data (b) money (c) both a & b (d) none of them
Ans. c
189. Under information security, CIA stands for _______.
(a) Criminal Investigation Agency
(b) Confidentiality, Integrity, Availability
(c) Cost Information Agency
(d) Credit Integrity Assessment
Ans. b
190. Script files sent mostly through email attachment to attack host computer are called ______.
(a) Worms
(b) Phishing attacks
(c) Trojans
(d) Computer Viruses
Ans. a
191. To perform calculation on stored data computer, uses ……… number system. [SBI Clerk 2009]
(1) decimal (2) hexadecimal (3) octal (4) binary
Ans. 4
192. The number system based on ‘0’ and ‘1’ only, is known as
(1) binary system (2) barter system (3) number system (4) hexadecimal system
Ans. 1
193. Decimal number system is the group of ............ numbers.
(1) 0 or 1 (2) 0 to 9 (3) 0 to 7 (4) 0 to 9 and A to F
Ans. B
194. A hexadecimal number is represented by
(1) three digits (2) four binary digits (3) four digits (4) All of these
Ans. B
195. A hexadigit can be represented by [IBPS Clerk 2012]
(1) three binary (consecutive) bits (2) four binary (consecutive) bits
(3) eight binary (consecutive) bits (4) sixteen binary (consecutive) bits
Ans. 4
196. What type of information system would be recognised by digital circuits?
(1) Hexadecimal system (2) Binary system (3) Both ‘1’ and ‘2’ (4) Only roman system
Ans. 3
197. The binary equivalent of decimal number 98 is [IBPS Clerk 2012]
(1) 1110001 (2) 1110100 (3) 1100010 (4) 1111001 (5) None of these
Ans. 3
198. What is the value of the binary number 101?
(1) 3 (2) 5 (3) 6 (4) 101
Ans. 2
199. The binary number 10101 is equivalent to decimal number .............
(1) 19 (2) 12 (3) 27 (4) 21
Ans. 4
200. To convert binary number to decimal, multiply the all binary digits by power of
(1) 0 (2) 2 (3) 4 (4) 6
Ans. 2
201. Data Manipulation language is used to create_____.
Ans. Object
202. Every record of Relation is called ______.
Ans. Tuple
203. Architecture of the database can be viewed as ______.
Ans. Three levels
204. MVP architecture is followed in ____
Ans. CMS
205. What does “CIA” stands for in information security?
Ans. Confidentiality, integrity and availability
206. What is Privacy?
Ans. It ensure that individual has the right to use the information and allow to use that information.
207. A database contains ________ to help management of information.
(a) schemes
(b) tables
(c) queries/ views
(d) all of them
Ans. d
208. Creation and modification of databases and tables is called______ .
(a) update
(b) retrieval
(c) data definition
(d) administration
Ans. c
209. Querying and selecting data from a table is called ______ .
(a) data update
(b) data retrieval
(c) data definition
(d) database administration
Ans. b
210. Defining the users, passwords and roles for users to control a database is called _______.
(a) data update (b) data retrieval
(c) data definition (d) database administration
Ans. d
211. DOS command maximum length is _____ character including command name and related
Parameters.
Ans. 127
212. MS DOS Version 1.0 Developed in _____.
Ans. 1981
213. MS DOS version 2.0 Developed in _______.
Ans. 1983
214. DOS 3.0 Developed in ______
Ans. 1984
215. DOS 3.3 Developed in ______.
Ans. 1987
216. DOS 5.0 Developed in ______.
Ans. 1991
217. Dos 6.0 Developed in _______.
Ans. 1993
218. DOS 1.25 Developed in ______.
Ans. 1982
219. DOS 7.0 Developed in _______.
Ans. 1995 (This version is Part of MS window 95)
220. DOS 7.1 Developed in ________.
Ans. 1997
221. DOS OS Provide which type of Interface?
Ans. CLI or CUI (Command Line Interface or Character User interface)
222. How many wild card character in DOS?
Ans. Dos Provide Two wildcard character * and ?
( * means single character replacement and ? means any number of character)
223. What are internal commands?
Ans. Those commands that are loaded automatically in the memory when DOS is loaded into
memory during booting Process
224. What is Blocks in computer?
Ans. Every peripheral talks to the computer either one character at a time or in group of characters
called Blocks.
225.What is the name of hierarchical file system in DOS?
A Tree structure B Root structure
C Hybrid structure D Directory structure
Ans. b
226. DVD was invented and developed in year_____
a) 1985 b) 1995 c) 1975 d) 1998
Ans. b
227. Which of the following does not relate to Input Unit ? [SBI Clerk, 2012]
(a) If accepts data from the outside world.
(b) It converts data into binary code that is understandable by the computer
(c) It converts binary data into the human readable form that is understandable to the users.
(d) It sends data in binary form to the computer for further processing
(e) None of these
Ans. C
228. Which technology used in DVD to store information?
a) Optical data storage b) Radio technology
c) light wave technology d) microwave technology
Ans. a
229. Which of the following is not a type of optical disk?
a) DVD b) CD c) WORM d) Winchester
Answer: d
Explanation: The Winchester disk is a type of hard disk. Others are all optical disks. WORM is
nothing but CD-R i.e., CD recordable. Stands for write once read many.
230. DVD Full Form.
a) Digital versatile disk
b) Digital Video Disc
c) Digital video device
d) Both A and B
Ans. d
231. B2B stands for________.
a) Business to Buyer b) Business to Builder
c) Business to Business d) Builder to Business
Ans. c
232. B2C stands for________.
a) Business to Consumer b) Business to Company
c) Business to corporation d) Business to buyer
Ans. a
233. C2C stands for________.
a) Company to company b) consumer to consumer
c) corporation to consumer d) company to customer
Ans. b
234. C2B stands for________.
a) company to buyer b) company to customer
c) consumer to business d) company to business
Ans. c
235. B2A stands for_________.
a) Business to Administration b) Business to Automation
c) Buyer to Administrate d) Business to armer
Ans. a
236. C2A stands for____________.
a) company to administration b) consumer to administration
c) company to social d) customer to administration
Ans. b
237. Which of the following model is part of E-Governance:
a. G2B
b. G2C
c. B2G
d. C2G
Ans. d
238. What is the full form of E- commerce?
a) Engineering Commerce b) Electronic commerce
c) Internet Commerce d) Electrical commerce
Ans. b
239. Information Technology Act, 2000 is based on which Model Law of E-Commerce adopted by
United Nation:
a. UNICITIRAL b. UNCITRAL
c. UNICITRAL d. UNCITIRAL
Ans. b
240. Which one is not a layer of E-Commerce infrastructure:
a. Physical Layer b. Product Layer
c. Service Layer d. None
Ans. d
241. The Abbreviation of MFD?
(A) Master File Directory (B) Memory File Directory
(C) Main File Directory (D) Master Format Directory
Answer: (A) Master File Directory
242. Select the name of the files that appear as entries in the directories.
(A) Ordinary files (B) Duplicate files (C) Special files (D) Sub directories
Answer: (C) Special files
243. Select the Number of regions of the disk in a UNIX files management system.
(A) 1 (B) 4 (C) 3 (D) 2
Answer: (B) 4
Explanation: There are 4 regions in which the disk is divided. The first is for booting, second contains the
disk size, third includes the list of definitions and the remaining region contains the free blocks available.
244. The execution of multiple instructions at the same time is called
(A) parallel processing(B) processing (C) serial processing (D) multitasking
Answer: (A) parallel processing
245. ERK stands for ______.
a) English Region Kangris b) Electronic Record Kernel c) Electronic Record keeping d) None of these
Ans. C
246. Example of electronic records are _____.
a) Email messages b) Word document c) Digital images d) All of these
Ans. D
247. What are the types of electronic records?
Ans. Examples of electronic records include: emails, websites, Word/Excel documents, digital purchase
receipts, databases, text messages, social media postings, and information stored on SharePoint sites and
content management systems (Catalyst, Slack, DropBox, etc.)
248. An Electronic Banking is also known as _____.
a) Credit Banking
b) Commercial Banking
c) Cyber Banking
d) Macro Banking
Ans. C
249. QuickBooks is an ______.
a) Accounting software package
b) Children jungle books
c) Official Letters Books
d) Fast Reading Books
Ans. A
250. Peachtree is an ______.
a) Image Editor b) Accounting software
c) Graphics Software d) Architecture Designs
Ans. B
251. How can you tell the email that you have read from the email that you have not read?
a) The unread mail will be on top
b) The unread mail will be on botton
c) The unread mail will be bold
d) The unread mail will be blue
Ans. c
252. ______ is the exchange of computer stored messages by telecommunication.
a) Download b) E-mail c) Upload d) All of these
Ans. b
253. Which of the following is an advantage of an email?
a) Desired length
b) Ease of communication
c) Lower cost
d) All of these
Ans. d
254. Junk email is also called_______
Ans. Spam
255. Unwanted repetitious messages, such as unsolicited bulk email is known as _______
Ans. Spam
256. SMTP stands for
a) Short mail transmission protocol
b) Small mail transmission protocol
c) Server Mail Transfer Protocol
d) Simple Main Transfer Protocol
Ans. d
257. In MS Office, ______ is the software for managing emails.
(a) MS Access (b) MS Publisher
(c) MS Outlook (d) MS Onenote
Ans. c
258. Transmission and delivery of information containing text, image, video, documents etc. to
targeted recepient(s) over the Internet is called _______ .
(a) email
(b) world wide web
(c) e-commerce
(d) social media
Ans. a
259. E-mail address is made up of ______
a) Single part b) Two parts c) Three parts d) Four parts
Ans. b
260. The first part of email address identifies ______.
(a) name of individual user (b) name of the email server
(c) name of the mobile phone operator (d) name of bank
Ans. a
261. The basic principle of floppy disks involve
a) magnetic data reading
b) magnetic data recording
c) magnetic data recording and reading
d) None of these
Ans. c
262. Specification for a floppy drive is
a) TPI
b) CPI
c) DPI
d) FPI
Ans. a
263. The magnetic recording technique used for storing data onto the disks (floppy disks) is called
a) return to zero
b) non-return to zero
c) return to zero and Non-return to zero
d) none of the mentioned
Ans. b
264. In which one of the following year, floppy disk was patented?
a) 1905
b) 1977
c) 1967
d) 1932
Ans. c
265. The Double Density Double sided disks on each side are organized with
a) 20 tracks b) 30 tracks c) 40 tracks d) 50 tracks
Ans. c
266. Floppy disks drives were originally designed by
a) IBM b) Sony c) Panasonic d) Compaq
Ans. b
267. What is top down design?
Ans. Top down design breaks down the original set of Program specifications into smaller sections which is
much easier to solve.
268. What is Structured Programming?
Ans. A program design method that results in an easy to understand program with clear design and straight
forward program flow. Before programmers can start to write code they must design the program and a
structured program is one that is designed as a set of hierarchical modules or functions, each of which has
only one entry point and only one exit point.
269. What is the maximum storage capacity of a DVD for a single-layered?
a) 1 GB
b) 4.7 GB
c) 10 GB
d) 8.5 GB
Ans. b
270. What is the maximum storage capacity of a DVD for a dual-layered, single-sided disc.
a) 1 GB
b) 4.7 GB
c) 10 GB
d) 8.5 GB
Ans. d
271. The following box denotes?
a) Decision
b) Initiation
c) Initialization
d) I/O
Ans. a
272. Any algorithm is a program.
a) True
b) False
Ans. b
273. Another name for 1-D arrays.
a) Linear arrays b) Lists
c) Horizontal array d) Vertical array
Ans. a
274. A data structure that follows the FIFO principle.
a) Queue
b) LL
c) Stack
d) Union
Ans. a
275. When an algorithm is presented in the form of a Programming language it becomes a ______
a) Program
b) flowchart
c) Pseudo code
d) Syntax
Ans. a
276.This symbol denotes ______.
a) I/O
b) Flow
c) Terminal
d) Decision
Ans. c
277. _____ is a procedure or step by step process for solving a program.
a) Algorithm
b) Flowchart
c) Pseudocode
d) All of these
Ans. d
278. A detailed flowchart is called ______
a) Stack
b) Macro
c) Micro
d) Union
Ans. c
279. Which of the following is not an advantage of a flowchart?
a) Better communication b) Efficient coding
c) Systematic testing d) Improper documentation
Ans. d
280. A flowchart that outlines the main segments of a program.
a) Queue b) Macro c) Micro d) Union
Ans. b
281. What is Cluster?
Ans. Group of two or more contiguous sectors is called a cluster.
282. How many types of hard drive
a) 1 b) 2 c) 3 d) 4
Ans. b
283. Which hard drive is fast?
a) HDD
b) SSD
Ans. a
284. Computer memory can be referred to as either permanent or temporary. Of the followings,
which one is NOT a temporary storage area?
a) Virtual memory b) Cache
c) Hard drive d) RAM
Ans. c
285. Hard disk are organized as
a) cylinders
b) tracks
c) cylinders and tracks
d) Master boot record
Ans. c
286. Data for the hard disk type is stored in
a) Main memory
b) Partition table
c) CMOS RAM Set up
d) Boot Record
Ans. c
287. Hard disk can have ______ heads.
a) one
b) two
c) more then two
d) only one
Ans. c
288. Hard disk drives are considered ______ storage.
a) Flash
b) Nonvolatile
c) Floppy Disk
d) None of these
Ans. b
289. Which of the following can hold data of at least one GB?
a) Hard disk
b) CD-ROM
c) Floppy Disk
d) none of these‟
Ans. a
290. The full form of HDD is
a) High Disk Drive b) Hard disk drive
c) Hard digital Disk d) High digital drive
Ans. b
291. In html _______ tag defines paragraph.
a) <p> b) <para> c) <table> d) <section>
Ans. a
292. What is Default extension for a HTML document?
(a) .htm (b) .html (c) both a & b (d) none of them
Ans. c
293. HTML tag begins with______ symbol.
(a) < (b) > (c) <! (d) !>
Ans. a
294. HTML tag ends with _____symbol.
(a) < (b) > (c) <! (d) !>
Ans. b
295. HTML comment begins with_____ symbol.
(a) < (b) > (c) <! (d) !>
Ans. c
296. HTML comment ends with ______symbol.
(a) < (b) > (c) <! -- (d) -->
Ans. d
297. SGML stands for .
(a) Standard Grand Markup Language
(b) Synchronized Generalized Markup Language
(c) Standard Generalized Markup Language
(d) Simple Generalized Markup Language
Ans. c
298. DTD stands in markup language for_______.
(a) Document Type Definition
(b) Data Type Definition
(c) Digital Type Definition
(d) Design Type Definition
Ans. a
299. DDL stands for ______
(a) Data Description Library
(b) Data Description Language
(c) Data Description Liberty
(d) Data Description License
Ans. a
300. Most of the HTML tags have a corresponding closing tag, which begins with _____symbol.
(a) <! - - (b) < / (c) < : (d) <&nbsp;
Ans. b
301. VDU is also called_____
Ans. Screen or Monitor
302. ______ is the most common output device for a computer.
(a) monitor
(b) printer
(c) both a & b
(d) neither a nor b
Ans. c
303. Joystick typically have a button on _____ that is used to select the option pointed by the
cursor.
a) Bottom
b) Left
c) Right
d) Top
Ans. d
304. The joystick is a ___ stick that moves the graphic cursor in the direction the stick is moved.
a) Parallel
b) Horizontal
c) Straight
d) Vertical
Ans. d
305. A device for converting handwriting impression into coded characters & positional
coordinates for input to a computer is
a) Touch panel
b) Mouse
c) Wand
d) Writing tablet
Ans. d
306. Which of the following groups consists of only input devices?
a) Mouse, keyboard, Monitor b) Mouse, keyboard, printer
c) Mouse, keyboard, plotter d) Mouse, keyboard, Scanner
Ans. d
307. A bar code reader is an example of
a) processing device b) storage device c) input device d) output device
Ans. c
308. Keyboard, mouse, scanner, light pen, etc. are classified under ______ unit.
(a) input (b) central processing (c) output (d) none of them
Ans. a
309. Devices that allow you to put information into the computer.
a) Input b) Output c) Type d) Print
Ans. a
310. Which of the following is a temporary output?
a) Hard copy b) Soft copy c) Duplicate copy d) On paper
Ans. b
311. P3P stands for______.
Ans. Platform for Privacy Preferences
312. _______ is required for the internet connection.
Ans. Modem
313. Microcomputer are ______computers ( most of the time) in a client server system.
Ans. client
314. What is the meaning of Digital Divide?
Ans. The gulf between those who have ready access to computers and the internet, and those
who do not
315. IRC stands for_________.
a) internet radio community b) internet radio company
c) internet relay chat d) intel relay chart
Ans. C
316. ______Domain is the Part of a domain that comes after the dot
Ans. Top Level (Ex:- .com, .org, .net, all domains that are identified with a country or geographical
location for ex:- .uk, .in etc)
317. _____ are devices used to transmit data over telecommunication lines
a) Drives
b) Drive bays
c) Modems
d) Platform
Ans. c
318. CCTLD stands for______.
Ans. Country code top level domain
319. Naming of address is called as ______Naming system.
Ans. Domain
320. Who invent www ?
a) bob kahn b) Tim berners lee
c) vint cerf d) lady ada lovelace
Ans. B
321. Time sharing became possible in _____ generation of computers. [SBI PO 2011]
a) First b) Second c) third d) fourth
Ans. B
322. Computer is a/an
a) battery b) electronic machine c) All of these d) None of these
Ans. B
333. Name the first general purpose electronic computer. [IBPS PO 2012]
a) ADVAC b) ADSAC c) UNIVAC d) EDVAC
Ans. C
324. Which is not the example of special purpose computer?
a) Automatic aircraft landing b) word processor c) multimedia computer d) All of the above
Ans. B
325._____ is not an E-Commerce application.
a) House banking b) Buying stocks c) Conductiong an auction d) Evaluating an employee
Ans. D
326. Computer’s basic architecture was developed by
a) John Von Neumann b) Charles Babbage c) Blaise Pascal d) Jordan Mure
Ans. A
327. In production of IC chip of computer, what is needed in the following?
a) Chromium b) Silocon c) Platinum d) Gold
Ans. B
328. First supercomputer developed in india is
a) PARAM b) Aryabhatt c) Buddha d) RAM
Ans. A
329. Computers that are portable and convenient to use for users who travel, are known as
a) supercomputers b) minicomputers c) mainframe computers d) laptops
Ans. D
330. Speed of first generation computer was in [IBPS Clerk 2012]
a) nano-second b) miliseconds
c) nano-mili seconds d) micro seconds
Ans. B
Explanation: The Processing speed of computers in first generation was measured in Milliseconds. And, We
might know that Millisecond is very slow than today's processing speed measurements. Because of not
having transistors in computers, The speed of computers was not measured in Hz.
331. Which of the following is NOT one of the four major data processing functions of a computer?
a) gathering data
b) processing data into information
c) analyzing the data or information
d) storing the data or information
Ans. c
332. Surgeons can perform delicate operations by manipulating device through computers instead of
manually. This technology is known as:
a) robotics b) computer forensics c) simulation d) forecasting
Ans. a
333. In analog computer
a) Input is first converted to digital form
b) Input is never converted to digital form
c) Output is displayed in digital form
d) All of above
Ans. b
334. In latest generation computers, the instructions are executed
a) Parallel only b) Sequentially only c) Both sequentially and Parallel d) All of above
Ans. c
335. Modern computer are very reliable but they are not
a) Fast b) Powerful c) Infallible d) Cheap
Ans. c
336. A computer which CPU speed around 100 million instruction per second and with the word length of
around 64 bits is known as
a) Super computer b) Mini computer
c) Micro computer d) Macro computer
Ans. a
337. The storage subsystem in a microcomputer consists mainly of ___ or ___ media with varying
capacities.
a) Memory or video b) Magnetic or Optical
c) Optical or Memory d) Video or magnetic
Ans. b
338. The personal computer industry was started by
a) IBM b) Apple c) Compaq d) HCL
Ans. a
339. Which was the most popular first generation computer?
a) IBM 1650 b) IBM 360 c) IBM 1130 d) IBM 650
Ans. d
340. One millisecond is
a) 10 seconds b) 100 seconds c) 1000 seconds d) 1/1000 seconds
Ans. d
341. Which of the following shows the use of computer at home?
a) Watching movies
b) Treatment of diseases
c) None of these
Ans. A
342. ATM stands for ____
a) Automatic Teller Machine b) Automatic Transaction Machine
c) Automatic Treatment machine d) None of these
Ans. A
343. ____ refers to conversion of non-digital material to digital form.
(A) Digitization (B) Data transfer (C) Transcription (D) None of the given
Ans: A
344. A turnkey package includes
(A) Training (B) Software (C) Hardware (D) All of these
Ans: D
345. A server ____ a service.
a) Requests b) Provides c) A or B d) None of these
Ans. B
346. Wi-Fi is a short name for ____
a) Wired Fidelity b) Wireless Fidelity c) Wireless Frequency d) None of the above
Ans. B
347. Responsibility of implementation of IT/ITeS Policy lies with
a) State Technology park Unit b) Ministry of IT at State and Center
c) Director (IT) in consultation with DST d) Industrial Commissioner
Ans. C
348. In As per IT/ITeS Policy (2016-21), terms BPO refers to
a) Business Process Outsourcing b) Business Process Outcomes
c) Best Processing Outcomes d) Business Practices and Outcomes
Ans. A
349. Match the following terms:
a) 1-d, 2-b, 3-a, 4-c b) 1-d, 2-c, 2-b, 4-a c) 1-d, 2-a, 3-b, 4-c d) 1-b, 2-a, 3-d, 4-c
Ans. C
350. In India which of the following is not Correct about “DigiLocker” ?
a) Signing for Digilocker requires an individual‟s mobile number
b) DigiLocker is a platform for issuance and verification of documents & certificates in a digital way, thus
eliminating the use of physical documents.
c) Organizations registered with DigiLocker can store electronic copies of documents/ certificated directly
into citizen‟s lockers.
d) Citizens can download e-document but can not upload any document in their accounts.
Ans. D
351. Number of primitive data types in Java are?
a) 6 b) 7 c) 8 d) 9
Ans. c
352. What is the size of float and double in Java?
a) 32 and 64 b) 32 and 32 c) 64 and 64 d) 64 and 32
Ans. a
353. Automatic type conversion is possible in which of the possible cases?
a) Byte to int b) Int to long c) Long to int d) Short to int
Ans. b
354. Find the output of the following code.
int Integer = 24;
char String = ‘I’;
System.out.print(Integer);
System.out.print(String);
a) Compile error b) Throws exception c) I d) 24 I
Ans. d
355. Select the valid statement.
a) char[] ch = new char(5) b) char[] ch = new char[5]
c) char[] ch = new char()d) char[] ch = new char[]
Ans. b
356. When an array is passed to a method, what does the method receive?
a) The reference of the array b) A copy of the array
c) Length of the array d) Copy of the first element
Ans. a
357. Select the valid statement to declare and initialize an array.
a) int[] A = {} b) int[] A = {1, 2, 3} c) int[] A = (1, 2, 3) d) int[][] A = {1, 2, 3}
Ans. b
358. Arrays in java are-
a) Object references b) objects c) Primitive data type d) None
Ans. b
359. When is the object created with new keyword?
a) At run time b) At compile time c) Depends on the code d) None
Ans. a
360. Identify the correct definition of a package.
a) A package is a collection of editing tools b) A package is a collection of classes
c) A package is a collection of classes and interfaces d) A package is a collection of interfaces
Ans. c
361. NaN stands for_________.
a) Nano b) NanTech c) Not a number d) New attacted Nematic
Ans. c
362. ++ operator in Java Script is ____ Operator.
a) Unary b) Positive c) Increment d) Addition
Ans. a
363. A translator is described as ________ software.
a) Application b) System c) Utility d) Open Source
Ans. b
364. _______class provide an interface for invoking java script methods and examining java script
properties.
a) JSobject b) java script file c) jquary d) java wrapper
Ans. a
365. When a user views a page containing a java script program, which machine actually executes
the script?
a) The user‟s machine running offline b) The user‟s machine running a web browser
c) The user‟s machine running on a website d) The users cookies used by a website
Ans. b
366. Navigator Java script is also called _______side java script.
a) client b) Server c) Website d) Live wire
Ans. a
367. Live wire java script is also called _________side Java Script.
a) client b) Server c) Website d) Live wire
Ans. b
368. Storing numbers, dates or other values are ______ used for in java script program.
a) String b) Codes c) Variables d) Functions
Ans. c
369. ______ side java script statements embedded in a HTML Page can respond to user events
such as mouse-clicks, forms input and page navigation.
a) client b) Server c) Website d) Live wire
Ans. a
370.When a java script object is sent to java, the runtime engine creates a java wrapper of
type_______.
a) JSobject b) java script file c) jquary d) java wrapper
Ans. a
371. Functional keys used to perform _____.
Ans. Specific Task
372. To close a selected drop-down list, cancel a command and close a dialog box, key used is
a) Esc key b) End key c) Enter key d) Alt key
Ans. a
373. Which keys allows user to enter frequently used operations in a single key stroke?
a) Function keys b) Cursor control keys c) Trackball d) Control keys
Ans. a
374. What type of keys are „ctrl‟ and „shift‟?
a) adjustment b) function c) modifier d) alphanumeric
Ans. c
375. Why is the Caps Lock key referred to as a toggle key?
a) Because its function goes back and forth every time it is pressed
b) Because it cannot be used for entering numbers
c) Because it cannot be used to delete
d) Because it cannot be used to insert
Ans. a
376. The ____ key and the ____ key can be used in combination with other keys to perform
shortcuts and special tasks.
a) Control, Alt b) Function toggle c) Delete, Insert d) Caps Lock, Num Lock
Ans. a
377. Which key is used in combination with another key to perform a specific task?
a) Function
b) Control
c) Arrow
d) Space bar
Ans. b
378. The most common input devices include…….
a) Monitor and keyboard
b) Monitor and mouse
c) Mouse and keyboard
d) Printer and mouse
Ans. c
379. Letters, numbers and symbols found on a keyboard are …….
a) Icon
b) Screen
c) Keys
d) Menu
Ans. c
380. To make the number pad act as directional arrows, you press the _____ key.
a) num lock
b) caps lock
c) arrow lock
d) alt
Ans. a
381. Shortcut key for manage template in LibreOffice Writer____
a) Ctrl + B b) Ctrl + Shift + N c) Ctrl + Shift + O d) None of the above
Ans. b
382. Font size can’t be changed in LibreOffice writer.
a) True b) False
Ans. b
383. Shortcut key used for line break in LibreOffice writer is ____
a) Ctrl + M b) Ctrl + P c) Shift + Enter d) Ctrl + O
Ans. c
384. Which of the following key is used for align left of the text in LibreOffice?
a) Ctrl + M b) Ctrl + P c) Ctrl + L d) Ctrl + )
Ans. c
385. What is the minimum font size in LibreOffice writer?
a) 1 b) 2 c) 3 d) 4
Ans. b
386. Minimum zoom percentage in LibreOffice Writer is 20%.
a) True b) False
Ans. a
387. Bullets and numbering appears in the standard toolbar in LibreOffice writer.
a) True b) False
Ans. b
388. Eleven menu are found in LibreOffice writer.
a) True
b) false
Ans. a
389. LibreOffice writer template does not include style formatting.
a) False
b) True
Ans. a
390. What is the default file extension of LibreOffice Writer?
a) .doc b) .docx c) .odt d) None of the above
Ans. c
391. Multitasking and multiuser is feature of _____
Ans. Linux
392. The name “LINUX” is derived from it‟s inventor _____
Ans. Linus Torvalds
393. Linux is Pronounced with a short i, as in ______
Ans. LIH – NUX
394. Linux is multitasking and _____ bit support
Ans. 32
395. Which character is used to represent parent directory in Linux?
A). B)..
C)~ D)*
Ans. b
396.Which character is used to redirect output in to an existing file in Linux?
A >
B >>
C <
D <<
Ans. b
397.Which one of the following is the directory separator in Linux?
A /
B 
C //
D 
Ans. a
398.Which character is used to represent a range of values in Linux?
A ( )
B [ ]
C { }
D <>
Ans. b
399.Which character redirects the output of one command to another in Linux?
A . dot
B | pipe
C : colon
D ; semicolon
Ans. b
400.Which Linux command list the content of all sub directory?
A ls ~ B ls * /
C ls / D ls ../
Ans. b
401. Cache memory is used as a ___________memory.
a) primary b) secondary c) territory d) Scratch
Ans. d
402. MSB stands for_____.
a) mobile source bit b) most significant bit c) module significant bit d) more social bit
Ans. b
403. LSB stands for______.
a) local Heetson bit b) local significant bit
c) least significant bit d) large significant
Ans. c
404. _____ can be treated as the waiting room for the computers processor.
Ans. RAM
405. _______ store data or information temporarily and pass it on as directed by the control unit.
Ans. Register
406. Common type of storage devices are_____
Ans. Optical
407. _____ files contains permanent data and gets updated during the processing of Transactions.
Ans. Master
408. ______ helps to protect Floppy disks from data getting accidentally erased.
Ans. Write Protect notch
409. _____ memory is having more memory addresses than are physically available.
Ans. Virtual
410. A ______ is a location for storing files on your computer.
Ans. Directory
411. A collection of related information sorted and dealt with as a unit is a [SBI Clerk, 2009]
(a) disk (b) data (c) file (d) floppy (e) None of these
Ans. B
412. Reusable optical storage will typically have the acronym——— [SBI Clerk, 2009]
(a) CD (b) DVD (c) ROM (d) RW (e) None of these
Ans. C
413. The most common type of storage devices are— —— [SBI Clerk, 2009]
(a) persistent (b) optical (c) magnetic (d) flash (e) None of these
Ans. B
414. During the –– portion of the Information Processing Cycle, the computer acquires data from some
source. [SBI Clerk, 2009]
(a) storage and output (b) storage (c) input (d) output (e) None of these
Ans. C
415. The contents of ____ are lost when the computer turns off. [IBPS PO, 2011]
(a) storage (b) input (c) output (d) memory (e) None of these
Ans. D
416. A DVD is an example of a(n) [IBPS PO, 2011]
(a) hard disk
(b) optical disc
(c) output device
(d) solid-state storage device
(e) None of these
Ans. B
417. Which of the following are advantages of CDROM as a storage media? [IBPS PO, 2011]
(a) CD-ROM is an inexpensive way to store large amount of data and information.
(b) CD-ROM disks retrieve data and information more quickly than magnetic disks do.
(c) CD-ROMs make less errors than magnetic media.
(d) All the above
(e) None of these
Ans. A
418. Which of the following is billionth of a second? [SBI PO, 2011]
(a) Gigabyte (b) Terabyte (c) Nanosecond (d) Microsecond (e) Terasecond
Ans. C
419. The time for the actual data transfer after receiving the request for data from secondary storage is
referred to as the disk’s *IBPS Clerk,2011]
(a) transfer time (b) movement time (c) access time (d) data input time (e) None of these
Ans. C
420. The following computer’s memory is characterised by low cost per bit stored [IBPS Clerk, 2011]
(a) Primary
(b) Secondary
(c) Hard Disk
(d) All of these
Ans. B
421. FPGA means
a) Field Programmable Gate Array
b) Forward Programmable Gate Array
c) Forward Parallel Gate Array
d) Field Parallel Gate Array
Ans. a
422. Which language could be used for programming an FPGA.
a) Verilog
b) VHDL
c) Both A and B
d) Heetson
Ans. c
423. What is mean by ALU
a) Arithmetic logic upgrade b) Arithmetic logic unsigned
c) Arithmetic Local unsigned d) Arithmetic logic unit
Ans. d
424. In 8085 microprocessor, the RST6 instruction transfer programme execution to following
location
a) 0030H b) 0024H c) 0048H d) 0060H
Ans. a
425. HLT opcode means
a) load data to accumulator b) store result in memory
c) load accumulator with contents of register d) end of program
Ans. d
426. What is SIM?
a) Select interrupt mask b) Sorting interrupt mask
c) Set interrupt mask d) None of these
Ans. c
427. A field programmable ROM is called
a) MROM b) PROM c) FROM d) FPROM
Ans. b
428. The length of bus cycle in 8086/8088 is four clock cycle, T1, T2, T3, T4 and an indeterminate
number of wait clock cycles denoted by Tw. The wait states are always inserted between
a) T1& T2 b) T2& T3 c) T3& T4 d) T4& T5
Ans. c
429. Which one of the following circuits transmits two messages simultaneously in one direction
a) Duplex b) Diplex c) Simplex d) Quadruplex
Ans. b
430. The program counter in a 8085 micro-processor is a 16 bit register, because
a) It counts 16 bits at a time b) There are 16 address lines
c) It facilitates the user storing 16 bit data temporarily d) It has to fetch two 8 bit data at a time
Ans. b
431. Microsoft Access provides visual environment for design of _______.
(a) tables (b) reports (c) forms (d) all of them
Ans. d
432. By default, new table is displayed in ______view.
(a) Datasheet View (b) Design View (c) Report View (d) Form View
Ans. a
433. _______ is an alternate to datasheet view for design of table in MS Access.
(a) Datasheet View (b) Design View (c) Report View (d) Form View
Ans. b
434. An ordinary form for data entry in MS Access tables may be created using______ menu.
(a) Create>Form (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. a
435. In MS Access, a form with data records at one half and entry format at the other half may be
created using______ menu.
(a) Create>Form (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. b
436. In MS Access, multiple rows of data may be created using______ menu.
(a) Create>Form (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. c
437. In MS Access, blank form may be created using______ menu.
(a) Create>Form (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. d
438. In MS Access, form may created through a wizard using______ menu.
(a) Create>More Forms>Form Wizard (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. a
439. In MS Access, data sheet may be created using _______ menu.
(a) Create>More Forms>Form Wizard
(b) Create>More Forms>Data Sheet
(c) Create>More Forms>Modal Dialog
(d) Create>Blank Form
Ans. b
440. In MS Access, form dialog may be created using_______ menu.
(a) Create>More Forms>Form Wizard
(b) Create>More Forms>Data Sheet
(c) Create>More Forms>Modal Dialog
(d) Create>Blank Form
Ans. c
441) Explain what is IMAP (Internet Message Access Protocol)?
IMAP means Internet Message Access Protocol; it is a standard protocol for using e-mail
service from your local server.
442) Explain what is POP3 protocol?
POP3 means Post Office Protocol 3 is a protocol that offers a simple way for users to use
mailboxes and download messages to their computers. It allows users to download mails from the
mail server to the local server and enables you to read the mail even if you are offline.
443) Explain what is SMTP protocol?
SMTP or Simple Mail Transfer Protocol allows you to send emails and not to receive them, it act
as Mail Transfer Agent (MTA) to deliver your e-mail to the recipient‟s mail server.
444. What is Outlook?
Ans. Microsoft Outlook is the name of a software program that combines your e-mail, calendar,
meetings/appointments, contacts, address book and tasks.
445. What is Personal Storage Table (PST)?
Ans. A Personal Storage Table is an Open Proprietary file format used to store copies of
messages, calendar events, and other items within Microsoft software such as Microsoft
Exchange Client, Windows Messaging, and Microsoft Outlook.
446. What is OST file?
Ans. An OST file (.ost) is an offline folder file in Microsoft Outlook. Offline folders make it possible
for the user to work offline and then to synchronize changes with the exchange server the next
time they connect.
447. What is the difference between an OST and PST file?
a) The basic difference between OST and PST is that OST files are used to save data for offline
use and are stored in MS Exchange Server. Whereas PST files are personal folder data and
storage on client‟s hard disk.
448. Outlook has many tools that can do many thing. Which one of the following tasks is Outlook
NOT designed to do?
a) send out a newsletter b) balance your checkbox
c) arrange an online meeting d) keep track of your contacts
Ans. b
449. The CEO of your company just sent mail to all 10,000 of your fellow employees. You want to
reply to her and say, “Thanks!”. Which button should you click?
a) Reply b) Reply all
c) Reply with meeting d) Forward
Ans. a
450. Which tool would you use to view the calendars of your entire team at the same time?
a) Daily task list b) Share calendar
c) Scheduling assistant d) Open calendar
Ans. c
451.Which contains miniature representation of slides?
A Slides B Handout C Template D Slide master
Ans. b
452.Which button is used to add instant animation to the presentation and helps interactive
presentation?
A Add button B Start button C Insert button D Action button
Ans. d
453.Which tool allows user to select different layout for slide?
A Apply design B Bullets C New slide D Slide Layout
Ans. a
454.Which shortcut key is used to create new presentation in powerpoint?
A Ctrl + P B Ctrl + N C Ctrl + M D Ctrl + X
Ans. b
455.How many panes are these in backstage view in power point 2010?
A 3 B 5 C 7 D 9
Ans. a
456.Which menu is used to apply various effects to the text in a slide?
A Animation B Design C Transitions D Slide show
Ans. a
457. Which menu is used to apply various visual effects to the slide in power point?
A Animation B Design C Slide show D Transitions
Ans. d
458.Which menu is used to select a predefined chart style?
A Animation B Design
C Slide show D Transitions
Ans. b
459.Which template makes specify common design elements in all slides in the presentation?
A Fax template
B User template
C Data template
D Master template
Ans. d
460.Which shortcut key is used to invoke thesaurus dialog box in Power Point?
A Shift+F7
B Ctrl+F7
C Alt+F7
D Ctrl+Alt+F7
Ans. a
461. Bus word take from latin word __________means for all.
a) Mini b) Omnibus c) Vehicle d) Heetson
Ans. b
462. CMOS is a type of RAM, which is constantly powered by _____.
(a) UPS battery (b) CMOS battery
(c) AC main (d) AA battery
Ans. b
463. In motherboard, BIOS is expanded as _____.
(a) Beginner Input Output System
(b) Bit Input Output System
(c) Basic Input Output System
(d) Basic Input Output Syntax
Ans. c
464. In motherboard, CNR stands for ______.
(a) Communication & Network Riser (b) Contact & Network Riser
(c) Communication & Network Ripper (d) Complementary & Networking Riser
Ans. a
465. In motherboard, AGP stands for ______.
(a) Automated Graphics Port (b) Accelerated Graphics Point
(c) Audio Graphics Port (d) Accelerated Graphics Port
Ans. d
466. In motherboard, SATA stands for ______.
(a) Serial Advanced Technology Attachment
(b) Synchronous Advanced Technology Attachment
(c) Synaptic Advanced Technology Attachment
(d) Systematic Advanced Technology Attachment
Ans. a
467. In motherboard, ___ chipset takes care of data transfer to and from the processor.
(a) Southbridge (b) Eastbridge
(c) Northbridge (d) Westbridge
Ans. c
468. In motherboard, _______ chipset takes care of data transfer to and from the secondary
storage devices (like hard disk, CD/DVD drive, etc.).
(a) Southbridge (b) Eastbridge (c) Northbridge (d) Westbridge
Ans. a
469. Missing slot covers on a computer can cause?
a) over heat b) power surges
c) incomplete path for ESD d) None of these
Ans. a
470. Which motherboard form factor use 120 pin connector?
a) ATX
b) AT
c) BABY AT
d) All of these
Ans. a
471. Computer device which is similar to mouse is
a) joystick b) keyboard c) trackball d) barcode reader
Ans. c
472. Hand-held device which is used to pick options that are displayed on a computer screen is
known as
a) keyboard b) mouse c) joystick d) stylus pen
Ans. b
473. The device which is used to position the screen cursor is
a) Mouse b) Joystick c) Data glove d) Both A and C
Ans. a
474. ____ is used for detecting mouse motion.
a) Optical sensor b) Rollers on the bottom of mouse
c) Both A and B d) Sensor
Ans. c
475. Which of the following type of mouse contain a ball on its underside and sensors to detect
direction of ball movement?
a) Mechanical mouse b) Opto-mechanical mouse
c) Optical mouse d) None of these
Ans. a
476. Cordless mouse or wireless mouse connects to the computer through
a) Infrared light
b) Radio wave
c) Both A and B
d) None of these
Ans. c
477. The _____ is a pointing device that is much like an inverted mouse.
a) joystick
b) Trackball
c) USB
d) Scanning Device
Ans. b
478. Which is an example of pointing device?
a) Mouse
b) Pointer
c) Cursor
d) HDMI port
Ans. a
479. The ______ helps to move the cursor on screen and point at specific icons.
(a) scanner (b) mouse
(c) keyboard (d) printer
Ans. b
480. Normally, pressing the _______ button of mouse opens a context menu.
(a) left (b) right
(c) centre (d) bottom
Ans. b
481. what is the extension file excel 2004 ?
a) .xls b) .excel c) .xcel d) .xcl
Ans. A
482. what is the extension file excel 2007 and above ?
a) .xls b) .excel c) .xlsx d) .xcl
Ans. C
483. Worksheet is also called an array of____.
a) column b) cells c) box d) formula
Ans. b
484.How Cells are named in MS Excel?
A Alphabetically B Numerically
C Alphanumerically D Special Character
Ans. c
485.What is the maximum limit of rows in MS Excel 2010?
A 1084567 B 1048567 C 1048576 D 1084576
Ans. c
486.What is the maximum limit of column in MS Excel 2010?
A 16384 B 16438 C 16843 D 16348
Ans. a
487.Which bar lies top of the window in Excel Screen?
A Status Bar B Ruler C Title Bar D Scroll Bar
Ans. c
488.How rows are numbered in MS Excel?
A Alphabetically B Numerically C Alphanumerically D Special characters
Ans. b
489.How columns are named in MS Excel?
A Alphabetically B Numerically C Alphanumerically D Special characters
Ans. a
490.Which tab is used to include pivot table, charts, hyperlinks to a spread sheet?
A Insert B Page Layout C Data D Review
Ans. a
491. Microsoft Office is a set of vital applications Primarily known as______.
Ans. Office suit
492. Starting with Microsoft Office 2003, Photo Editor was renamed to:
a) Photo Manager
b) Picture Manager
c) Picture Editor
d) Paint Editor
Ans. b
493. Is Microsoft Works is part of the Microsoft Office suite?
a) Yes b) No
Ans. b
494. What was the HTML editor that was part of Microsoft Office until 2003?
a) Web Page
b) Explorer
c) FrontPage
d) Dream Weaver
Ans. c
495. Office 365 is now the most popular cloud application in the world. But when did it debut?
a) 2008
b) 2010
c) 2011
d) 2014
Ans. c
496. Can we edit a Macro programmatically after recording it?
a) Yes b) No
Ans. a
497. We can start MS Word by typing _____ in the Run Dialog Box.
a) winword.exe b) word.exe
c) msword.exe d) docx.exe
Ans. a
498. Can we assign a keyboard shortcut of our choice to a Macro?
a) No b) Yes
Ans. b
499. Which one is the spreadsheet application that comes with MS Office software group?
a) MS Word b) MS excel
c) MS PowerPoint d) MS access
Ans. b
500. We can apply border to _____
a) Cell
b) Paragraph
c) Table
d) All of these
Ans. d
501. Which of the following software replace the MS Paint in Windows 10
a) Paint 3D b) New MS Paint c) Paint 3D d) Universal Paint
Ans. c
502. What is the Default Background color in MS Paint?
a) Yellow b) Aqua c) Blue d) White
Ans. d
503. What is the Default Foreground color in MS Paint ?
a) white b) black c) red d) yellow
Ans. b
504. Magnifier, Eraser, Fill color tools are available in MS Paint ?
a) Toolbox b) Menu bar c) color box d) status bar
Ans. a
505. Which key is used to draw straight line in MS Paint ?
a) Ctrl b) shift c) Alt d) window
Ans. b
506. Which tool is used to spray colors in MS paint ?
a) Fill color b) Airbrush c) brush d) Calibri brush
Ans. b
507. MS Paint file saved as _______.
a) .doc b) .xml c) .bmp d) .html
Ans. c
508. Which tool is used to draw a circle in MS paint?
a) Ellipse b) draw c) Curve d) Oval
Ans. d
509. Which tool is used to write name in MS Paint ?
a) Text tool b) Line tool c) Pencil tool d) Brush tool
Ans. a
510. Which of the following tool is not available in the Ribbon Bar?
a) Clipboard b) Image c) Tool d) View
Ans. d
511. Which menu item do I use to format my font styles and paragraph settings?
a) File b) Home c) Insert d) View
Ans. b
512. Why is it best not to use too much WordArt?
a) It becomes blurry and difficult
b) You can never use too much WordArt
c) Too much means it loses its effects & clutters your document
d) The faster your computer, the slower the display will update
Ans. c
513. When a publisher object is selected, _____ appears around the object
a) A red checkered border b) A light blue dashed line
c) A line with Multiple handles d) Arrows
Ans. c
514. This is one thing you can‟t create with MS Publisher
a) Brochure b) Greeting Cards
c) Spreadsheet d) Flyer
Ans. c
515. Is it possible to create a trifold brochure using MS Word?
a) Yes
b) No
Ans. a
516. How could you send out a colorful message about an upcoming company picnic?
a) create a flyer in Publisher b) create flyer in PowerPoint
c) create a trl fold brochure in Publisher d) create a flyer in Excel
Ans. a
517. You want an image to go behind the text on your brochure, which command do you use?
a) Align
b) Bring forward
c) Send backward
d) Rotate
Ans. c
518. Does Publisher and Word have similar navigation ribbons?
a) Yes b) No
Ans. a
519. MS Publisher has many procreated documents that you can edit. These are called…
a) edits b) templates c) slides d) images
Ans. b
520. Using white text on a black background is considered _______
a) Alignment
b) Proximity
c) Contrast
d) Black and white
Ans. c
521. Which command is used to store the active document permanently?
A Save
B Send
C Prepare
D Save as
Ans. a
522. Which shortcut key is used to high light the entire word document?
A ctrl + A
B ctrl + O
C ctrl + S
D ctrl + E
Ans. a
523. The print resolution (quality) and colour preferences may be set using ______option available
in print dialog.
(a) collate
(b) scale
(c) printer properties>Finishing->Print on both sides
(d) Properties>Paper/Quality
Ans. d
524.What is the purpose of quick access toolbar?
A To hold advance function
B To hold special function
C To hold basic function
D To hold familiar and repeated function
Ans. d
525. Which bar contains the current position of the cursor in MS Word?
A layout B title bar C status bar D horizontal ruler
Ans. c
526. Where does the close button appear in MS Word?
A top left corner of the window B bottom left corner of the window
C top right corner of the window D bottom right corner of the window
Ans. c
527.Which one of the following is text styling feature of MS Word?
A word fill B word art C word colour D word font
Ans. b
528.Which option is used to view an exiting word document?
A new B open C publish D prepare
Ans. b
529.Which document view given an appearance as in web browser?
A Draft view B Outline view C Web layout view D Full screen reading
Ans. c
530.How many groups are there in Home Menu?
A 4 B 5 C 6 D 7
Ans. b
531. What is the minimum and maximum value in Octal Number System?
a) 1 to 8
b) 0 to 7
c) 2 to 9
d) None of the above
Ans. b
Values in Different Number System
Binary 2 (0,1)
Octal 8 (0,1,2,3,4,5,6,7)
Decimal 10 (0,1,2,3,4,5,6,7,8,9)
Hexadecimal 16 (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F)
532. What number system is not understood by C language compiler directly?
a) Decimal
b) Octal
c) Binary
d) Hex Decimal
Ans. c
Explanation: Yes, C language can not understand Binary language directly. Because C language is a High
level language
533. Numbers are stored and transmitted inside a computer in which format?
a) binary form
b) ASCII code form
c) decimal form
d) alphanumeric form
Ans. a
534. The value of radix in binary number system is ___
a) 2
b) 8
c) 10
d) 1
Ans. a
Explanation: In a binary number system, the value of base or radix is 2. The binary system uses only two digits for
the representation of numbers.
535. A computer language that is written in binary codes only is _____
a) machine language
b) C
c) C#
d) Pascal
Ans. a
Explanation: Machine Language is written in binary codes only. It can be easily understood by the computer and is
very difficult for us to understand. A machine language, unlike other languages, requires no translators or
interpreters.
536. Which among the following is port number of TELNET server?
a) 21
b) 23
c) 25
d) 20
Ans. b
537. In which layer a proxy firewall filters data
a) Network layer b) Transport layer
c) Application layer d) Data Link Layer
Ans. c
538. A5 Algorithm is used in GSM for
a) Encryption b) Generation of Cipher key
c) Authentication d) Integrity
Ans. a
539. Which signal received by an 8086 processor indicates that an external device had requested
the use of System bus?
a) HOLD b) INTR c) TEST d) Ready
Ans. a
540. Who developed DVD?
a) Sony
b) Philips
c) Toshiba
d) All of these
541. What is Availability?
Ans. it ensure that system work promptly and service is not denied to authorized users.
542. PAN stands for _________
a) Personal area network b) Prompt area network
c) Private area network d) Pear area network
Ans. A
543. LAN stands for_______
a) Local Area network b) Line area network
c) live area network d) Long area network
Ans. A
544. CAN stands for _______
a) Campus area network b) College area network
c) Center area network d) Close area network
Ans. A
545. WAN stands for _______
a) wide area network b) wireless area network
c) wast area network d) work area network
Ans. A
546. GAN stands for__________
a) Global area network b) Ground area network
c) Gold area network d) Globe access network
Ans. A
547. ISP stands for_______.
a) Internet service provider b) Indian special police
c) International service provider d) Inspiration
Ans. A
548. IPS stands for _______.
a) IN plane switching b) Instructions Per second
c) Indian police service d) Both a and b
Ans. D
549. NTP stands for _______.
a) Network time protocol b) New terminal Point
c) Network time policy d) Network term policy
Ans. A
550. SMS stands for________.
a) Short message service b) Small message service
c) special message service d) short module set
Ans. A
551. Which one of the following is the correct way to open a notepad application?
a) Click on office button > windows accessories > All apps > Notepad
b) Start > Notepad > All apps > windows accessories
c) Click on Windows button > All apps > Windows accessories > Notepad
d) None of these
Ans. c
552. Which one of the following should be clicked to save the existing Notepad window?
a) Edit b) save c) Format d) None of these
Ans. b
553. Which menu in Notepad has only two options, word wrap and font?
a) Format b) Insert c) Title d) Edit
Ans. a
554. What should be clicked to open a previous saved file while working with Notepad application?
a) Open b) New c) Exit d) Save as
Ans. a
555. which is shortcut key is used to open saved file in Notepad?
a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + C
Ans. a
556. Which shortcut key is used to open a new file in Notepad?
a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + C
Ans. b
557. Which shortcut key is used to save the file in Notepad?
a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + C
Ans. c
558. Which shortcut key is used to print the document in notepad?
a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + p
Ans. d
559. In Notepad if page orientation in Horizontal then they are in ______
a) Landscape b) Portrait c) Both d) None of these
Ans. a
560. In Notepad if page orientation in Vertical then they are in ______
a) Landscape b) Portrait c) Both d) None of these
Ans. b
561. GIMP permits manipulation at ______ levels.
(a) image (b) layer
(c) color space (d) all of them
Ans. d
562. Simple painting can be done using ______ tools in GIMP.
(a) brush/ airbrush
(b) eraser
(c) ink
(d) all of them
Ans. d
563. Layers may be aligned using ______ tool in GIMP.
(a) crop tool (b) alignment tool
(c) rotate tool (d) scale tool
Ans. b
564. OpenOffice.org drawing file has extension of ______.
(a) .odt (b) .ods
(c) .odg (d) .odp
Ans. c
565. OpenOffice.org presentation file has extension of ______.
(a) .odt (b) .ods
(c) .odg (d) .odp
Ans. d
566. Pencil drawing can be done using ______ tool in GIMP.
(a) text (b) bucket fill
(c) blend (d) pencil
Ans. d
567. Colour difference between adjacent portions can be healed through proper gradient using
____ tool in GIMP.
(a) text (b) bucket fill
(c) blend (d) pencil
Ans. c
568. In OpenOffice.org, spreadsheet can be prepared using _______ application.
(a) writer (b) calc
(c) draw (d) impress
Ans. b
569. Filling can be done using _______ tool in GIMP.
(a) text
(b) bucket fill
(c) blend
(d) pencil
Ans. b
570. In OpenOffice.org, drawing can be prepared using ______application.
(a) writer (b) calc (c) draw (d) impress
Ans. c
571. What is a Copyright law?
a) Generally defines the own creator of a source code.
b) Generally defines a creator of an expression of an idea own that expression
c) Distribution strategy or development strategy
d) Many programmers working on same project
Ans. b
572. OSI stands for_____
a) Open source index b) Open source image
c) Open source initiative d) Open source Instant
Ans. c
573. The users must agree to the _____ terms and agreements when they use an open source
software.
a) System b) License c) Community d) Programmer
Ans. b
574. Which of the following is not a downside of OSS?
a) Lack of personalized support b) Restricted choice c) No warranty d) Multiple choices
Ans. d
575. An example of a web design OSS.
a) Nvu
b) KOffice
c) AbiWorld
d) Open Office
Ans. a
576. An image editor similar to Adobe Photoshop.
a) Nvu
b) Open Office
c) Bluefish
d) GIMPshop
Ans. d
577. An OSS for communication purpose.
a) Virtue Mart b) Drupal c) Pidgin d) ZenCart
Ans. c
578. A guideline for the OSS licenses other than the GPL.
a) OSI b) OSD c) OSE d) OSL
Ans. b
579. GPL of GNU says that every copy of a program governed by GPL license, even if modified,
must be subject to GPL again.
a) True b) False
Ans. a
580. Richard Stallman from MIT, established a special license, the ____ license.
a) GNU b) Free c) Package d) Commercial
Ans. a
581. DOS stands for_________.
a) Disk operating system b) Drive operating system
c) Disk operation socket d) disk open supply
Ans. A
582. In a single unit of computer we can use more than _______OS But at a time we may run only
one OS.
Ans. 1
583. GUI stands for_________.
a) Graphical user interface b) Graphics uniq icon
c) group user interface d) game user interface
Ans. A
584. UNIX stands for __________.
a) union interface Xerox b) user normal interface
c) user normal interface d) Unicode information computing system, source
Ans. D
585. Unix operating system developed in year_____.
a) 1969 b) 1981
c) 1984 d) 1954
Ans. A
586. Ken Thompson and Dennis Ritchie developed an operating system name______
a) MAC b) window
c) UNIX d) Linux
Ans. C
587. ________ is an open source software.
a) UNIX b) LINUX c) Window d) MAC
Ans. B
588. The first linux kernel was released in ________.
a) 1991 b) 1992 c) 1999 d) 1984
Ans. A
589. The computer and software system that control the machine is called _______
Ans. Embedded System
590. MAC operating system was developed by ________.
a) Steve jobs b) Abhinandan
c) sunder pichai d) Dennis Richie
Ans. A
591. The standard used in serial ports to facilitate communication is
a) RS-246 b) RS-HEETSON c) RS-232-C d) RST 3
Ans. c
592. Transformation between the parallel and serial ports is done with the help of
a) Flip flops b) logic circuits
c) Shift registers d) peripherals
Ans. c
593. Components used to increase the flexibility of the serial ports is
a) wire used for port is changed
b) ports are made to allow different clock signals for input and output
c) the drives are modified
d) connects the new cables
Ans. b
594. Physical ports are usually referred to as _______
a) jacks b) cables
c) interfaces d) hardware plugs
Ans. c
Explanation: Physical ports are connections that connect two systems for their interaction. LAN,
PS2 and DVI are example of physical ports
595. _______ are logical numbers assigned for logical connections.
a) Logical ports
b) Physical ports
c) Networking cables
d) IP address
Ans. a
Explanation: Logical ports are end-point to a logical connection. The numbers are pre-assigned
by IANA (Internet Assigned Numbers Authority) which ranges from 0-65536.
596. Number of logical ports ranges from ___ to _____
a) 0, 255
b) 1, 65535
c) 1, 65536
d) 0, 65536
Ans. d
597. Elimination –Yield Non-Preemptive Multiple Access Mechanism (EY-NPMA) is associated with which of the
following technologies?
a) LAN b) HIPERLAN
c) ATM d) TOKEN Ring
Ans. b
598. Which modulation mechanism is used in Bluetooth technology to transform bits to a signal?
a) ASK
b) PSK
c) OPSK
d) GFS
Ans. d
599. SEAL (Simple and Efficient Adaptation Layer) is associated with which AAL sub layer of ATM technology?
a) AAL1
b) AAL2
c) AAL3/4
d) AAL5
Ans. d
600. What is the Weight of standard size DVD?
a) 16 grams (0.56 oz)
b) 25 grams (2 oz)
c) 30 grams (3 oz)
d) 32 grams (0.95 oz)
Ans. a
601. Which of the following contains specific rules and words that express the logical steps of an
algorithm? [IBPS Clerk 2014]
(1) Programming language (2) Syntax (3) Programming structure (4) Logical chart (5) Flow chart
Ans. 3
602. A factor in the selection of source language is
(1) programmer skill (2) language availability (3) program compatibility with other software (4) All of the
above
Ans. 3
603. Machine language [SBI PO 2013]
(1) is the language in which programs were first written
(2) istheonlylanguageunderstoodbythecomputer
(3) differs from one type of computer to another
(4) All of the above (5) None of the above
Ans. 4
604. Each model of a computer has a unique
(1) assembly of a computer (2) machine language (3) high level language (4) All of the above
Ans. 2
605. The language which can be relocated easily is
(1) Machine language (2) Assembly language (3) Low level language (4) Middle level language
Ans. 2
606. Which language is CPU dependent ?
(1) C (2) Assembly (3) Java (4) All except Java
Ans. 2
607. ....... serves as the bridge between raw hardware and programming layer of a computer system.
(1) Medium level language (2) Low level language (3) High level language (4) Both ‘1’ and ‘2’
Ans. 1
608. Computer language used for calculation is
(1) LOGO (2) FORTRAN (3) BASIC (4) C + +
Ans. 2
609. Which of the following computer language is a mathematically oriented language used for scientific
problems?
(1) Fortran (2) Cobol (3) Lisp (4) Prolog
Ans. 1
610. Main application area of ALGOL is
(1) General (2) Scientific
(3) Engineering (4) Commercial
Ans. 2
611. Which type of programming does Python support?
a) Object-oriented programming b) structure programming
c) functional programming d) all of the mentioned
Ans. d
612. Is Python case sensitive when dealing with identifiers?
a) no b) yes c) Machine dependent d) None of the mentioned
Ans. b
613. All keywords in Python are in ________
a) Capitalized b) lower case
c) UPPER CASE d) None of the mentioned
Ans. d
614. What will be the value of the following Python expression?
4 + 3 % 5
a) 7
b) 2
c) 4
d) 1
Ans. a
Explanation: The order of precedence is: %, +. Hence the expression above, on simplification results
in 4 + 3 = 7. Hence the result is 7
615. Which of the following is used to define a block of code in Python language?
a) Indentation b) Key
c) Brackets d) All of the mentioned
Ans. a
616. What will be the output of the following Python code?
i = 1
while True:
if i%3 == 0:
break
print(i)
i + = 1
a) 1 2 3 b) error
c) 1 2 d) None of these
Ans. b
Explanation: SyntaxError, there shouldn‟t be a space between + and = in +=
617. Python supports the creation of anonymous functions at runtime, using a construct called ____
a) pi
b) anonymous
c) lambda
d) none of the mentioned
Ans. c
618. What is the order of precedence in python?
a) Exponential, Parentheses, Multiplication, Division, Addition, Subtraction
b) Exponential, Parentheses, Division, Multiplication, Addition, Subtraction
c) Parentheses, Exponential, Multiplication, Division, Subtraction, Addition
d) Parentheses, Exponential, Multiplication, Division, Addition, Subtraction
Ans. d
619. What will be the output of the following Python code snipped if x=1 ?
X<<2
a) 4
b) 2
c) 1
d) 8
Ans. a
Explanation: The binary form of 1 is 0001. The expression x<<2 implies we are performing bitwise left
shift on x. This shift yields the value: 0100, which is the binary form of the number 4.
620. Which of the following is true for variable names in Python?
a) underscore and ampersand are the only two special characters allowed
b) unlimited length
c) all private members must have leading and trailing underscores
d) none of the mentioned
Ans. b
621. Which of the following is used in Readt.js to increase performance?
a) Virtual DOM b) Original DOM c) Both A and B d) None of the above
Ans. A
622. What is ReadtJS?
a) Server-side framework b) user interface framework c) both a and b d) none of the above
Ans. B
623. Identify the one which is used to pass data to components from outside
a) Render with arguments b) setState c) PropTypes d) props
Ans. D
624. Who created React.Js?
a) Jordan Mike b) Jordan Walke c) Tim Lee d) Jordan Lee
Ans. B
625. In Which language is React.js written?
a) Python b) JavaScript c) Java d) PHP
Ans. B
626. What is Babel?
a) JavaScript compiler b) JavaScript interpreter
c) JavaScript transpiler d) None of these
Ans. A
627. Identify the command used to create a react app.
a) npm install create-react-app b) npm install –g create-react-app
c) install –g create-react-app d) none of the above
Ans. B
628. Which of the following port is the default where webpack-dev-server runs?
a) 3000 b) 3306 c) 3030 d) 8080
Ans. D
629. How many elements can a valid react component return?
a) 1 b) 2 c) 3 d) 4
Ans. A
630. A state in React.js is also known as?
a) The internal storage of the component b) External storage of the component
c) Permanent storage d) All of the above
Ans. A
631. We get list of sites after typing a word in search bar called _______.
a) Key Phrase b) Single Word c) Heetson d) Sonu
Ans. a
632. The search results are generally presented in a line of results often referred to as _______
a) Category List
b) Tag list
c) search Engine Results Pages
d) Search Engine Pages
Ans. c
633. Search Engines maintain heavy database of keywords and urls !
a) True
b) False
Ans. a
634. Web search engines stores information about many web pages by a ______.
a) Web indexer
b) Web Crawler
c) Web Organizer
d) Web Router
Ans. b
635. Web Crawler is also called as ______.
a) Link Directory b) Web Spider
c) web Manager d) Search Optimizer
Ans. b
636. Search engine optimization is the process of _______ of a website or a web page in a search
engine‟s search results.
a) Affecting the visibility b) None of these
c) Generating Cached files d) Getting Meta Tags
Ans. a
637. SEO is all about optimizing a web site for search engines.
a) True b) False
Ans. a
638. SEO is to improve the volume and ______ to a web site from search engines.
a) Look and feel b) Advertisement c) Quality of traffic d) None of these
Ans. c
639. SEO can be called as art of ranking in the search engines.
a) True b) False
Ans. a
640. A keyword search engines:
a) allows all users to change its content
b) returns a list of sites that have been reviewed by humans
c) returns a list of sites based on the search terms you enter
d) searches a variety of other search engines
Ans. c
641. Word processing, spreadsheet, and photo-editing are examples of:
a) application software b) system software
c) operating software d) platform software
Ans. a
642. _____ is a set of computer programs used on a computer to help perform tasks.
a) An instruction b) Software c) Memory d) A Processor
Ans. b
643. System software is the set of programs that enables your computer’s hardware devices and ___
software to work together.
a) management b) processing c) utility d) application
ans. d
644. The two broad categories of software are:
a) Word processing and spreadsheet b) Transaction and application
c) Windows and Mac OS. d) System and Application
Ans. d
645. Personnel who design, program, operate and maintain computer equipment refers to
a) Console-operator b) Programmer c) Peopleware d) System Analyst
Ans. b
646. A computer program that convert an entire program into machine language is called a/an
a) Interpreter b) Simulator c) Compiler d) Commander
Ans. c
647. A computer program the translates one program instructions at a time into machine language is called
a) Interpreter b) CPU c) Compiler d) Simulator
Ans. a
648. Program designed to perform specific tasks is known as
a) System software
b) application software
c) utility program
d) operating system
Ans. b
649. Each model of a computer has a unique
a) Assembly language
b) Machine language
c) High level language
d) All of the above
Ans. b
650. The language that the computer can understand and execute is called
a) Machine language b) Application software
c) System program d) All of the above
Ans. a
651. Company restore option is available in ________.
a) Company reset b) New company c) company information d) Edit company
Ans. c
652. To change current Date from Gateway of tally press the key ____.
a) F1 b) F2 c) F3 d) F4
Ans. b
653. Tally supports ________ system of accounting.
(a) single entry (b) double entry (c) no entry (d) null entry
Ans. b
654. Tally can maintain ________ for stock keeping, so that fresh inventory may arrive before the
old stock is exhausted.
(a) reorder level (b) profit (c) loss (d) cash
Ans. a
655. Balance sheet is produced ________when accounts are maintained in Tally.
(a) manually (b) automatically (c) remotely (d) randomly
Ans. b
656. The statement of account debits, credits, assets and liabilities is called______.
(a) stock & inventory report (b) profit & loss account (c) balance sheet (d) cash balance
Ans. c
657. Pressing _______button in the Gateway of Tally opens company info in Tally.
(a) Alt+F3 (b) F11 (c) F5 (d) F6
Ans. a
658. Pressing______ key opens accounting features.
(a) Alt+F3 (b) F11 (c) F5 (d) F6
Ans. b
659. Payroll, budgeting and scenario management may be enabled through ______menu in Tally.
(a) Accounting Features (b) Inventory Features
(c) Statutory and Taxation (d) none of them
Ans. a
660. Account Groups, Ledgers, Budget and scenario are available under ______ in Tally.
(a) Payroll Info (b) Inventory Info (c) Accounts Info (d) none of them
Ans. c
661. In which decade was the American Institute of Electrical Engineers (AIEE) founded?
a) 1850s b) 1880s c) 1930s d) 1950s
Ans. b
662. In Which decade with the first transatlantic radio broadcast occur?
a) 1850s b) 1880s c) 1930s d) 1900s
Ans. d
663. ‘.MOV’ extension refers usually to what kind of file?
a) Image file b) Animation/movie file c) Audio file d) MS office document
Ans. b
664. In which decade was the SPICE simulator introduced?
a) 1950s
b) 1960s
c) 1972s
d) 1980s
Ans. c
665. Most modern TV’s draw power even if turned off. The power is used in does what function?
a) Sound
b) Remote Control
c) Color balance
d) High voltage
Ans. b
666. Which is a type of Electrically-Erasable Programmable Read-Only Memory?
a) Flash b) Flange c) Fury d) FRAM
Ans. a
667. The purpose of Choke in Tube light is ?
a) To decrease the current b) To increase the current
c) To decrease the voltage momentarily d) To increase the voltage momentarily
Ans. d
668. ‘.MPG’ extension refers usually to what kind of file?
a) Word Perfect Document file b) MS Office document
c) Animation/movie file d) Image file
Ans. c
669. Who is largely responsible for breaking the German Enigma codes, created a test that provided a
foundation for artificial intelligence?
a) Anan Turing b) Jeff Bezos c) George Boole d) Charles Babbage
Ans. a
670. Made from a variety of materials, such as carbon, which inhibits the flow of current ..?
a) Choke b) Inductor c) Resistor d) Capacitor
Ans. c
671. What is the interface between the user and operating system in UNIX.
Ans. Shell
672. One can write Programs using shell which is known as _______.
Ans. Shell Scripts
673. Bourne Shell indicated by ______ Prompt.
Ans. $
674. C shell indicated by ______ Prompt.
Ans. %
675. Super user indicated by ________Prompt.
Ans. #
676. UNIX was one of the first operating systems to support _______.
(a) multi-tasking (b) Internet
(c) email (d) all of them
Ans. d
677. UNIX was developed in the year _______.
(a) 1970 (b) 1984 (c) 1985 (d) 1993
Ans. a
678. POSIX stands for _______.
(a) Power Operating System Interface (b) Portable Operating System Interface
(c) Portable Operating System Internet (d) Portable Overall System Interface
Ans. b
679. Early versions of UNIX supported a graphical user environment called _____.
(a) KDE (b) CDE
(c) GNOME (d) none of them
Ans. c
680. CDE stood for _____ .
(a) Common Desktop Environment (b) Command Desktop Environment
(c) Common Desktop Entry (d) Common Directory Environment
Ans. a
681. The programming environment which permits coding, compilation, running and debugging
from a single window is called
(a) Integrated Development Environment (IDE) (b) Editor (c) Highlighter (d) Compiler
Ans. a
682. The IDE of VBA supports since it permits drag and drop approach for design of user
interface.
(a) Procedural Approach (b) reverse approach
(c) Rapid Application Development (RAD) (d) postfix approach
Ans. c
683. VBA permits of data from spreadsheets.
(a) reading (b) writing (c) both reading and writing (d) neither reading nor writing
Ans. c
684. VBA supports ready made user interface components like .
(a) User Form, Command Button (b) Label, Text Box, Combo Box, List Box
(c) Tab Strip, Option Button, Toggle Button (d) all of them
Ans. d
685. VBA supports through class module.
(a) Object Oriented Programming System (OOPS)
(b) Procedural programming
(c) Functional programming
(d) property based model
Ans. a
686. VBA can be used to automate carried out through MS Excel.
(a) data processing (b) graphing
(c) accessing cell values (d) all of them
Ans. d
687. VBA code is compiled into an intermediate code called code.
(a) P-Code
(b) Micro Soft Intermediate Code (MSIL)
(c) Java Virtual Machine (JVM) code
(d) Android Virtual Device (AVD) code
Ans. a
688. MS Excel creates to execute VBA code.
(a) real time computer (b) mobile computer
(c) tablet computer (d) virual machine
Ans. d
689. ____is the shortcut to open VBA IDE from MS Excel.
(a) Alt+F11 (b) Alt+F8 (c) Ctrl+ Break (d) Ctrl+ G
Ans. a
690._______ is the shortcut to open immediate window in VBA IDE.
(a) Alt+F11 (b) Alt+F8 (c) Ctrl+ Break (d) Ctrl+ G
Ans. d
691. There are _________ types of computer virus.
a) 5 b) 7 c) 10 d) 12
Answer: c
Explanation: There are a total of 10 types of virus. These are categorized based on their working and
characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus, Multipartite
Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro Virus, Rootkit virus.
692. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
Ans. b
693. In which year Apple II virus came into existence?
a) 1979
b) 1980
c) 1981
d) 1982
Answer: c
Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into existence. It
was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.
694. The virus hides itself from getting detected by ______ different ways.
a) 2 b) 3 c) 4 d) 5
Answer: b
695. _______________ infects the master boot record and it is challenging and a complex task to remove
this virus.
a) Boot Sector Virus b) Polymorphic
c) Multipartite d) Trojans
Answer: a
Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task to
remove such virus. Mostly such virus spreads through removable devices.
696. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.
a) Boot Sector Virus b) Direct Action Virus
c) Polymorphic Virus d) Multipartite Virus
Answer: b
Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such type of
virus stays involved to the specific type of files which it infects.
697. ______________ infects the executables as well as the boot sectors.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: d
Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the computer
or get into any system through multiple mediums and are hard to remove.
698. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: c
Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and signature.
They’re not easily detectable by traditional antivirus. It usually changes the signature pattern whenever it
replicates itself.
699. Which of the below-mentioned reasons do not satisfy the reason why people create a computer
virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
Answer: d
Explanation: Computer virus is not created for protection. Virus writers may have other reasons like for
research purpose, pranks, vandalism, financial gain, identity theft, and some other malicious purposes.
700. The virus that spread in application software is called as
1. Boot virus 2. Macro virus
3. File virus 4. Anti virus
Ans. b
701. Documents in Microsoft One Drive can be edited using _____.
(a) online version of Microsoft office tools using browser
(b) installed version of Microsoft office tools
(c) both a & b
(d) none of them
Ans. c
702. Which document view given an appearance as in web browser?
A Draft view B Outline view C Web layout view D Full screen reading
Ans. c
703. What is the full form of BOM?
A Browser Object Method B Browser Object Model
C Browser Oriented Method D Browser Oriented Model
Ans. b
704. What is the purpose of Alt + W key in Tally?
A Change the financial period B Invoke Tally Reference Manual
C Open default web browser D Exist Tally without confirmation
Ans. c
705. What‟s a web browser ?
a) A kind of spider
b) A computer that store www files
c) A person who likes to look at websites
d) A software program that allows you to access sites on the world wide web
Ans. d
706. A _____ is a document commonly written and is accessible through the internet or other
network using a browser?
a) Accounts b) Data c) Web page d) Search engine
Ans. c
707. Which of the following is used to read HTML code and to render Webpage?
a) Web Server b) Web Browser c) Web Matrix d) Web Heetson
Ans. b
708. First Web Browser was created in _______.
a) 1991 b) 1992 c) 1993 d) 1990
Ans. d
709. First web browser was created by _______.
a) Tim Berners lee b) Mozilla Foundation
c) Marc Andreessen d) Jacobs
Ans. a
710. A free open source software version of Netscape was the developed called ______.
a) Opera Mini
b) IE
c) Google Chrome
d) Mozilla
Ans. d
711. Website is a collection of
a) HTML documents
b) Graphic files
c) Audio and video files
d) All of these
Ans. d
712. A _____ is the simplest form of website, in which the site‟s content is delivered without the
use of server side processing.
a) Dynamic Website
b) E-Commerce Website
c) Static website
d) Social Networking Website
Ans. c
713. WordPress can be called as ______.
a) Content Manager of Website
b) Static Website
c) Dynamic Website
d) E-Commerce Website
Ans. a
714. Which of the following website type is used to create beautiful animation?
a) Dynamic b) E-Commerce
c) Static d) Flash
Ans. d
715. Flash is proprietary software developed by ______.
a) Yahoo b) Macromedia c) Google d) Sencha
Ans. b
716. Website used to sell and buy something are categorized under _____.
a) Search engine b) Social Networking
c) E-Commerce Website d) Entertainment Sites
Ans. c
717. Which of the following is example of micro blogging?
a) Facebook b) Twitter c) Orkut d) Google+
Ans. b
718. Which of the following is not used as blogging platform?
a) WordPress b) TypePad c) Pinterest d) Blogger
Ans. c
719. ______ programs are automatically loaded and operates as a part of browser.
a) Add-ons b) Utilities c) Widgets d) Plug-ins
Ans. d
720. Which of the following language is used to write animation and games in browser?
a) HTML b) C Programming c) Java d) None of these
Ans. c
721. A wireless network uses ___ waves to transmit signals.
a) mechanical
b) radio
c) sound
d) None of these
Ans. b
722. What device sends and receives radio signals in a wireless network?
a) modem
b) digital translator
c) router
d) All of these
Ans. c
723. ______ of the following networking standards, which is not used in Wi-Fi data
transmisstions?
a) 802.11g b) 802.11q c) 802.11b d) None of these
Ans. b
724. Which networking standard is the slowest and least expensive?
a) 802.11a b) 802.11b c) 802.11n d) All of these
Ans. b
725. Which networking standard was the first to use orthogonal frequency division multiplexing
(OFDM) as a coding technique?
a) 802.11g b) 802.11a c) 802.11n d) None of these
Ans. b
726. Which short range wireless standard is used for Wireless Personal Area Networks (WPANs)?
a) 802.16 b) 802.15 c) 802.13 d) None of these
Ans. b
727. You can change the settings on your wireless router through a Web interface. One option you
can change is channel. What channel do routers use by default?
a) 2 b) 7 c) 6 d) None of these
Ans. c
728. Which Operates in the 2.4GHz Industrial, Scientific and Measurement (ISM) band (2.4 GHz
to 2.4835 GHz) and provides signaling rates of up to 11 Mbit/sec.
a) 802.11a b) 802.11b c) 802.11e d) 802.11g
Ans. b
729. Which Wi-Fi security is impossible to crack?
a) WEP b) WPA c) MAC Filtering d) None of these
Ans. d
730. What should you do to keep unauthorized users from changing your home router settings?
a) Change the firewall settings on your computer
b) Change the default administrator password and SSID
c) Change the MAC address of the router
d) Nothing, only the administrator can change router settings
Ans. b
731. How many types of alignment available in word pad?
a) 1 b) 2 c) 3 d) 4
Ans. d
732. What is the Default file extension of Wordpad?
a) .rtf b) .pdf c) .docx d) .pptx
Ans. a
733. In Wordpad .rtf stands for ____
a) Rich text file b) rich text format c) Real text file d) None of these
Ans. b
734. In wordpad Home and view is called ?
a) Group b) Tab c) Alignment d) None of these
Ans. b
735. If you copy and cut the text in Word pad they temporary stored in ____
a) Clipboard b) Format Painter c) Hard Disk d) Footer
Ans. a
736. What is Maximum Zoom size in Wordpad?
a) 500 b) 400 c) 300 d) 200
Ans. a
737. What is Minimum Zoom size in Wordpad ?
a) 10 b) 5 c) 34 d) 100
Ans. a
738. What is the shortcut key for special paste in wordpad?
a) Alt + Ctrl + V b) Ctrl + V c) Ctrl + Shift + V d) All of these
Ans. a
739. If you want to use another program inside the wordpad then which option will be use?
a) Insert Object b) Font c) Paragraph d) Replace
Ans. a
740. How many number of Text Highlight color is present.
a) 10 b) 15 c) 20 d) 25
Ans. b
741. CMS stands for ____.
a) Content Management System b) Creator Management System
c) Content Manager Source d) None of these
Ans. A
742. Which of these is a feature of WordPress?
a) User Management b) Provides tools for Search Engine Optimisation
c) Contains multiple themes to style our websited) All of these
Ans. D
743. Which of these is an advantage of WordPress?
a) PHP requirement b) SEO tools make on-site SEO easier
c) Frequent updates require multiple backup copies. d) All of these
Ans. B
744. Which WordPress type can be installed on a user’s computer?
a) WordPress.com b) WordPress.org c) Both d) None of these
Ans. B
745. Which database is required by WordPress?
a) MySQL b) MongoDB c) RDB d) None of these
Ans. A
746. The Quick draft section in WordPress is used for_____.
a) Creating mini-posts with titles and small details b) Editing posts
c) Creating pages d) All of these
Ans. A
747. Which of these is displayed using the WordPress news widget?
a) Software version b) Software updates c) Alerts d) All of these
Ans. D
748. Which of these is not seen on the WordPress dashboard?
a) Site traffic b) Menu options c) Welcome text d) All of these
Ans. A
749. Which of these are general settings of WordPress?
a) Site title b) Data format c) Time format d) All of these
Ans. D
750. What task does search engine visibility performs in WordPress?
a) Removes site visibility on Google b) Discourage search engine from indexing the site
c) Both d) None of these
Ans. A
751.An operating system version designed for use with a media center PC is Microsoft Window
XP
Ans. Media center edition
752. Which one is the default „word Processor‟ for Microsoft Windows?
a) MS Word b) MS Paint c) Word Pad d) Notepad
Ans. c
753.Which mode loads minimal set of drivers when starting Windows?
Ans. Safe Mode
754. Which operating system doesn‟t support networking between computers?
a) Windows 3.1 b) Windows 95 c) Windows 2000 d) Windows NT
Ans. a
755. Which key combination is used to minimize all open windows and displays in the screen?
Ans. Windows key + D
756. How many users can access a share folder simultaneously from a Windows XP machine?
a) 8 b) 9 c) 10 d) Unlimited
Ans. c
757. Which of the following windows do not have start button
a) Windows Vista b) Windows 7 c) Windows 8 d) Windows 95
Ans. c
758. Which of the following Operating systems is better for implementing a Client Server network
a) MS DOS b) Windows 95 c) Windows 98 d) Windows 2000
Ans. d
759. Which one is the latest release of Windows Client Operating system?
a) Windows XP b) Windows 7
c) Windows 8 d) Windows 10
Ans. d
760. Which function key needs to be press during reboot to enter in Safe Mode of a Windows
machine?
Ans. F8
761. Microsoft 10 was launched in the year _____. [DRDO GTRE 2017]
a) 2013 b) 2014 c) 2016 d) 2015
Ans. d
762. Which of the following is true for testing and debugging? [DRDO CVRDE 2017]
a) Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the
program.
b) Testing and debugging indicate the same thing.
c) Testing detects the syntax errors in the program while debugging corrects those errors in the program.
d) All of the above
Ans. a
763. Computer systems that store instructions and data without any differences and data from the same memory
unit are based on _____ structure. [DRDO CVRDE 2017]
a) Harvard b) Babbage
c) Knuth d) Von-Neumann
Ans. d
764. In the screen is maximized, then the maximize button will be temporarily replaced by the _____ button. [DRDO
GTRE 2017]
a) Close
b) Open
c) Re-store
d) Minimize
Ans. c
765. Which of the following is not a ‘over write’ virus ? [RRB Ranchi Asst. Loco Pilot]
a) Trj. Reboot
b) Meve
c) Way
d) Trivial.88.D
Ans. b
766. Which of the following are machine level languages? [ISRO Satelite Centre Bengaluru]
a) C++ b) Java c) Python d) None of these
Ans. d
767. Program Counter (PC) register stores the-
a) Address of the first memory block
b) Address of the last memory block
c) Address of the next instruction to be executed
d) Size of the primary memory
Ans. c
768. Which of the following function(s) is/are provided by operating system? [RRB Ranchi Asst. Loco Pilot]
a) Process management b) Security Management
c) File management d) All of these
Ans. d
769. ____ was the first computer language developed for electronic computer in 1949? [RRB Ajmer Asst. Loco Pilot]
a) Short code
b) FORTRAN
c) COBOL
d) Pascal
Ans. a
770. How many layers are there in TCP/IP Model? [Indian Ordnance Factory]
a) 2
b) 4
c) 5
d) 7
Ans. b
771. Program that duplicate the functionality of one system on another system is known as [RRB Chandigarh Asst.
Loco Pilot]
a) Emulators
b) Simulators
c) Evaluators
d) PCB
Ans. a
772. Which of the following is an application protocol? [RRB Ahamadabad Asst. Loco Pilot]
a) HTTP b) TCP c) IP d) UDP
Ans. a
773. Which among them is not an example of mobile operating system? [RRB Chandigarh Asst. Loco Pilot]
a) Android b) Bada
c) Fedora d) Symbian
Ans. c
774. Which of the following is included in Paragraph Formatting in a word processor? [RRB Ahmadabad Asst. Loco
Pilot]
a) Subscript b) Font
c) Underline colour d) Line spacing
Ans. d
775. To declare the version of XML, the correct syntax is:
a) ? xml version =’1.0’/
b) ? xml version =”1.0”/
c) * xml version =’1.0’/
d) /xml version = ‘1.0’/
Ans. b
776. On which of the following storage media, storage of information is organized as a single continuous spiral
groove?
a) RAM
b) Floppy disk
c) Hard disk
d) CD-ROM
Ans. d
777. The addressing mode used in an instruction of the from ADD X,Y is:
a) Absolute
b) Indirect
c) Immediate
d) Index
Ans. d
778. What is garbage collection in the context of java?
a) The operating system periodically deletes all of the Java files available on the system.
b) When all references to an object are gone, and then the memory use by the object is automatically reclaimed.
c) Any java package imported in a program and not being used is automatically deleted.
d) The java virtual machine (JVM) checks the output of any java program and delete anything that does not make
sense at all
Ans. b
779. Which of the following represents the life-cycle of software development?
a) Analysis – design – coding – testing- operation and maintenance
b) Analysis – Design – Coding – Operation and maintenance – testing
c) Design – Analysis – Coding – testing – operation and maintenance
d) Design – analysis – coding – operation and maintenance – testing
Ans. a
780. In a relational database model, cardinality of a relation means
a) The number of tuples b) The number of tables
c) The number of attributes d) The number of constraints
Ans. a
781. The 10 base 5 cabling is also known as _____.
a) Thick Ethernet b) Gigabit Ethernet c) Thin Ethernet d) Fast Ethernet
Ans. a
782. What is the length of an IP address in bytes (pre-IPv6)?
a) 1 b) 4 c) 2 d) 8
Ans. b
783. Program Counter contents indicate:
a) The time elapsed since execution begins
b) The count of programs being executed after switching the power ON.
c) The address where next instruction is stored
d) The time needed to execute a program
Ans. c
784. Which of the following is the most appropriate format for graphics that are to be embedded within an internet
document?
a) BMP
b) GIF
c) TIFF
d) HTML
Ans. b
785. In relational databases, the natural join of two tables is:
a) Combination of Union and filtered Cartesian product.
b) Combination of projection and filtered Cartesian product
c) Combination of selection and filtered Cartesian product
d) Cartesian product always.
Ans. b
786. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit
rate of the signal are ______ and ______.
a) 1000 bauds/ sec, 500 bps
b) 2000 bauds/sec, 1000 bps
c) 4000 bauds/sec, 1000 bps
d) 1000 bauds/sec, 4000 bps
Ans. d
787. Which of the following data structures is most suitable for evaluating postfix expressions?
a) Stacks b) Queue
c) Linked list d) Tree
Ans. a
788. The number of bits required to represent decimal number 4096 in binary form is _____.
a) 10 b) 13 c) 12 d) 16
Ans. b
789. In the context of visual basic, multiple controls of the same type can be grouped into an array, in the same
manner as a collection of data items. Such a grouping is known as:
a) Primary array b) An integer array c) Secondary array d) Control array
Ans. d
790. Conceptual level, internal level and external level are three components of the three-level RDBMS architecture.
Which of the following is not of the conceptual level?
a) Entities, attributes, relationships
b) Semantic information
c) Constraints
d) Storage dependent details
Ans. d
791. Consider two database relations R and S having 3 tuples in R and 2 tuples in S. What is the maximum number of
tuples that could appear in the natural join of R and S?
a) 2 b) 5 c) 3 d) 6
Ans. d
792. When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML Page
contains?
a) All ASP.NET code
b) As much ASP.NET code as is in the ASP.NET file
c) all HTML code
d) A mix of ASP.NET and HTML code
Ans. c
793. What result set is returned from the following SQL query? Select customer_name, telephone from customers
where city in (‘Jaipur’,’Delhi’,’Agra’)
a) The customer_name and telephone of all customers
b) The customer_name and telephone of all customers living in Jaipur, Delhi and Agra
c) The customer_name and telephone of all customer Living in either Jaipur, Delhi or Agra
d) The customer _name and telephone of all customers who are not living in Jaipur, Delhi or Agra
Ans. c
794. Semaphores are used to solve the problem of ______.
a) Race Condition b) The belady’s problem
c) Process synchronization d) mutual exclusion
Ans. d
795. A condition that is caused by run-time error in a computer program is known as:
a) Syntax error b) Fault
c) Semantic error d) Exception
Ans. d
796. A register in the microprocessor that keeps track of the answer or result of any arithmetic or logic operation is
the _.
a) Stack pointer
b) Instruction pointer
c) Program counter
d) Accumulator
Ans. d
797. Which of the following is true to define a variable for ASP?
a) DIM b) Sets c) $ d) Var
Ans. a
798. ______ is an intermediate storage are used for data processing during the extract, transform and load process
of data warehousing.
a) Buffer b) Virtual memory c) Staging area d) inter-storage area
Ans. c
799. Which of the following Java statements declare and allocate a 2 dimensional array of integers with four rows
and five columns?
a) int array [4][5]; b) int array [][]==new int [4][5];
c) int array [5][4]; d) int array [][]=new int [5][4]
Ans. b
800. In ____ all the logic are implemented using registors and transistors.
Ans. Resistor and Transistor logic
801. _____ logic family implements the logic gates using MOSFET devices
Ans. MOS logic
802. For which logic gate, the output is “true” if either, but not both, of the inputs are “true”.
Ans. XOR
803. The ____ latch is hazard free.
Ans. Earle Latch
804. The flag size of an HDLC frame is ______.
Ans. 8 bits
805. Contents of one disk to another disk can be done using the command ____
Ans. DISK COPY
806. The assembler takes as its source code in _____ language program.
Ans. Assembly
807. In computer graphics, digital differential analyzer is used for ______ of lines, triangles and polygons.
Ans. Rasterization
808. The language that doesn’t use user defined functions, pointers and used defined types is ______
Ans. COBOL
809. ______ is a channel access method used by various radio communication technologies.
Ans. CDMA
810. _____ acts as a multiple input and single output switch.
Ans. Multiplexer
811. The small extremely fast, RAM’s are called as _______
Ans. Cache
812. The decoded instruction is stored in ______
Ans. Instruction Register
813. The instruction, Add#45, R1 does ______
Ans. Adds 45 to the value of R1 and stores it in R1
814. To make an algorithm in to a program which system can be used that defined by Turing Machine?
Ans. binary
815. Which instinct determines the basic learning problem?
Ans. Feedback
816. What will be the outcome if the true function is contained by hypothesis?
Ans. Unrealizable
817. Decision tree technique culminates its decision with _____
Ans. Sequence of tests
818. In a graphic system the number of pixels in a buffer is called ______
Ans. Resolution
819. Electrical Energy can be converted into light using _____ device?
Ans. Emitters
820. Which body transformation will make the objects to move without deformation?
Ans. Translation
821. Cyclomatic complexity can also be called as ____
Ans. White box testing
822. ______ interface transfer data to and from the memory through memory bus.
Ans. Direct Memory Access
823. Most common register, used to store data taken out from the memory is _____.
Ans. Accumulator
824. Unplanned interrupts which are produced during execution of program is called _____
Ans. Exception
825. ____ algorithm determines whether there is a path between any two nodes in the graph.
Ans. Warshall
826. The unformatted I/O command for reading a tape in FORTRAN is ______
Ans. READTAPE
827. How many units in a single bus structure communicate at a time?
Ans. Two
828. An _____ is a collection of operators and operands that represent a specific value.
Ans. Expression
829. A Grammar which produces more than one parse tree for a sentence is called _____.
Ans. Ambiguous
830. The computer language generally translated to pseudo-code is _____
Ans. Assembly
831. Type 0 Grammar is known as _____ grammar.
Ans. Context free
832. The tuple ‘Q’ in Turing machine refers to ____
Ans. States
833. In C++, the ______ cannot be passed to a function.
Ans. Structure
834. The _____ will scan partition table located within sector, for an active partition.
Ans. Master Boot Record
835. _______ is a file system used to help user to hide different file system complexities.
Ans. Virtual File system
836. We can look up a directory object by supplying its name to the _______ service.
Ans. Directory
837. _____ is a description of sequences of events taken together, lead to a system doing something useful.
Ans. Usecase diagram
838. A ______ model is an abstract model that describes how data is represented and used.
Ans. Data model
839. A _____ typically simulates few aspects and may be completely different from final product.
Ans. Prototype
840. The _____ layer provides link between two directly connected nodes.
Ans. Data Link layer
841. Data items that cannot be divided are called as _____.
Ans. Elementary items
842. In MIMD, each processor is connected to its _____ immediate neighbors.
Ans. Four
843. A _____ is a general reusable solution to a commonly occurring problem in Software design.
Ans. Design Pattern
844. _____ is the allocation of a Computer’s processor power to specific tasks.
Ans. Scheduling
845. In, a physical contact is required to be established with the actuator of it, to make/break a connection.
a) proximity switch
b) limit switch
c) relay switch
d) all the above
Ans. b
846. -(i) CDMA uses spread spectrum technology
(ii) GSM Stands for Global System for Mobile
(iii) GSM uses TDMA
A:- (i) and (ii) are correct B:- (i) and (iii) are correct
C:- (ii) and (iii) are correct D:- (i),(ii) and (iii) are correct
Ans. d
847. Why is a trailer often added to the end of a frame in the data link layer?
a) Flow control b) Error Control
c) Addressing d) Access control
Ans. B
848. How many bytes are used in an Ethernet physical address?
a) 6
b) 4
c) 2
d) 8
Ans. a
849. DVD refers to [SSC MTS 2013]
a) Digital video developer
b) Digital video device
c) Digital video disc
d) None of the above
Ans. c
850. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called
a) instructions
b) the operating system
c) application software
d) the system unit
Ans. a
851. A linker program
a) places the program in the memory for the purpose of execution
b) relocates the program to execute from the specific memory area allocated to it
c) links the program with other programs needed for its execution
d) interfaces the program with the entities generation its input data
Ans. c
852. Which of the following system software resides in main memory always? [IBPS Clerk 2011]
a) Text editor
b) Assembler
c) Linker
d) Loader
Ans. d
853. Coral Ventura, Illustrator are the examples of
a) Word processing b) Graphic c) Multimedia d) DTP
Ans. d
854. DirectX is a [RBI Grade B 2013]
a) computer part
b) a user interface
c) operating system
d) software that drives graphic software
Ans. d
855. Which type of software is used in organisations to keep track of products in stocks?
a) Enterprise Resource Planning (ERP) software
b) Payroll Software
c) Human resource planning software
d) Accounting software
e) Inventory management software
Ans. e
856. Text editor is a/an [RBI Grade B 2013]
a) application software
b) system software
c) utility software
d) all purpose software
Ans. c
857. The primary purpose of the Windows operating system is
a) to make the most efficient use of the computer hardware
b) to allow people to use the computer
c) to keep systems programmer’s employed
d) to make computers easier to use
Ans. d
858. Every computer has a(n) ____ many also have _____ [RBI Grade B 2014]
a) Operating system, a client system b) operating system, instruction sets
c) application programs, an operating system d) operating system, application programs
Ans. d
859. When a file contains instructions that can be carried out by the computer, it is often called a(n) ____ file.
a) data
b) information
c) executable
d) application
Ans. c
860. Grouping and processing all of a firm’s transactions at one time, is called [IBPS Clerk 2011]
a) a database management
b) a real time system
c) batch processing
d) on-time system
Ans. c
861. ____ is a feature for scheduling and multi-programming to provide an economical interactive system of two or
more users. [IBPS Clerk 2012]
a) Time sharing b) Multisharing
c) Time tracing d) Multiprocessing
Ans. a
862. The first graphical user interface was designed by
a) Apple Inc.
b) Microsoft
c) Xerox Corporation
d) None of these
Ans. c
863. In 1973, Xerox PARC developed the Alto personal computer. It had a bitmapped screen, and was the first
computer to demonstrate the desktop metaphor and graphical user interface (GUI).
Restart of computer is called _____ when computer is already ON.
a) cold booting
b) warm booting
c) shut down
d) logging off
Ans. b
864. Which of the following is the latest version of MS Windows?
a) Windows 7
b) Windows 8
c) Windows 14
d) Windows 8.2
Ans. b
Explanation: Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was
released to manufacturing on August 1, 2012 and Windows 10 was launched in 2015.
865. The purpose of DISKCOPY command is to [RBI Grade B 2014]
a) format the disk if it is not formatted before a write operation is initiated on it
b) overwrite the existing contents of the destination disk as it copies the new information to it
c) make an exact copy of a floppy disk
d) all of the above
Ans. d
866. In DOS, the DIR command is used to [SSC CGL 2013]
a) display content of a file
b) delete file
c) display list of files and sub-directories
d) copy files
Ans. c
867. A factor in the selection of source language is
a) programmer skill
b) language availability
c) program compatibility with other software
d) all of the above
Ans. c
868. Language which can easily interact with the hardware are called
a) High level languages b) Low level language
c) Middle level language d) All of the above
Ans. b
869. ____ Serves as the bridge between raw hardware and programming layer of a computer system.
a) Medium level language b) Low level language
c) High level language d) Both 1 and 2
Ans. a
Explanation: Medium-level language (MLL) is a computer programming language that interacts with the
abstraction layer of a computer system. Medium-level language serves as the bridge between the raw hardware
and programming layer of a computer system.
870. Which of the following is a machine independent program?
a) High level language b) Low level language
c) Assembly language d) Machine language
Ans. a
871. Main application area of ALGOL is
a) General
b) Scientific
c) Engineering
d) Commercial
Ans. b
Explanation: ALGOL is short for algorithmic language. It is a family of portable programming languages for scientific
computations that had a strong influence on other languages.
872. LISP is designed for
a) Artificial intelligence
b) GUI
c) CUI
d) Optical fibre
Ans. a
Explanation: Lisp is a family of programming languages with fully parenthesized prefix notation. Originally specified
in 1958, Lisp is the second-oldest high-level programming language still in common use. Only Fortran is older, by one
year. Lisp's ability to compute with symbolic expressions rather than numbers makes it convenient for artificial
intelligence (AI) applications. While it isn't as popular as C, Python or Perl, Lisp is still used for AI programming as
well as several other functions.
873. Which of the following is not characteristic of COBOL?
a) It is a very standardised language
b) It is a very efficient in terms of coding and execution
c) It had limited facilities for mathematical notation
d) It is very readable language
Ans. b
Explanation: COBOL (Common Business Oriented Language) is an easy-to-learn language that can be compiled and
executed on a variety of computers. It supports a wide syntax vocabulary and features an uncluttered coding style.
Business-oriented capabilities. COBOL's advanced file handling capabilities enable it to handle huge volumes of data.
874. Which of the following is not a computer language? [SBI PO 2014]
a) BASIC
b) COBOL
c) LOTUS
d) FORTRAN
Ans. c
Explanation: Lotus 1-2-3 is a discontinued spreadsheet program from Lotus Software. It was the first killer
application of the IBM PC, was hugely popular in the 1980s.
875. Translator program used in assembly language is called [SBI Clerk 2012]
a) Compiler
b) Interpreter
c) Translation
d) Assembler
Ans. d
876. Windows XP released in
a) 2000
b) 1998
c) 1999
d) 2001
Ans. d
877. In the split window mode, one title bar looks darker than the other, because [RBI Grade B 2012]
a) Darker title bar shows window not in use
b) Darker title bar shows active window
c) Darker title bar shows unavailable window
d) Both ‘1’ and ‘2’
Ans. b
878. Which of the following refers to the rectangular area for displaying information and running programs? [SBI PO
2013]
a) Desktop
b) Dialog box
c) Menu
d) Window
Ans. d
879. Which of the following are lists of commands that appear on the screen? [IBPS Clerk 2015]
a) GUIs b) Icons
c) Menus d) Windows
Ans. c
880.The extension of paint file is/are
a) .png b) .jpg
c) .bmp d) All of these
Ans. d
881. When embedding object into document, one of the following occurs [RBI Grade B 2014]
a) embedded object becomes a part of the document
b) embedded object remains outside object to the document, but loaded with document
c) Both becomes a zip file
d) Both ‘1’ and ‘2’
Ans. b
882. A ___ is an additional set of commands that the computer displays after you make a selection from main menu.
[SBI Clerk 2009]
a) dialog box
b) sub menu
c) menu selection
d) All of these
Ans. b
883. In order to choose the font for a sentence in a word document [IBPS Clerk 2011]
a) select font in the format menu
b) select font in the Edit menu
c) select font in the tools menu
d) select font in the view menu
Ans. a
884. Which of the following is not a font style?
a) Bold b) Italic c) Regular d) Superscript
Ans. d
885. Auto-text can be used to insert ____ in document. [RBI Grade B 2014]
a) Text b) Graphics c) Either 1 or 2 d) Both ‘1’ and ‘2’
Ans. d
886. In Word, you can force a page break [IBPS PO 2011]
a) by positioning your cursor at the appropriate place and pressing the F1 key
b) by positioning your cursor at the appropriate place and pressing the Ctrl + Enter
c) by using the insert/section break
d) by changing the font size of your document
Ans. c
887. Where you can find the horizontal split bar on MS-Word screen?
a) On the left of horizontal scroll bar
b) On the right of horizontal scroll bar
c) On the top of the vertical scroll bar
d) On the bottom of vertical scroll bar
Ans. c
888. Which of the following is not available on the ruler of MS-Word screen?
a) Left indent b) Right indent
c) Centre indent d) All of these
Ans. c
889. You specify the save details of your file in the [RBI Grade B 2013]
a) “Save as a file” dialog box
b) “Save the file as” dialog
c) “File save” dialog box
d) Any of ‘1’ and ‘2’
Ans. a
890. Magnifier button is available on [RBI Grade B 2014]
a) Print Preview toolbar
b) Standard toolbar
c) Formatting toolbar
d) Both ‘A’ and ‘B’
Ans. a
891. Which command is used to calculate total characters in a cell? [RBI Grade B 2014]
a) Len b) Length c) Mid d) Sid
Ans. a
Explanation: LEN returns the number of characters in a text string. LENB returns the number of bytes used to
represent the characters in a text string.
892. The function TODAY( ) in Excel, enters the current [RBI Grade B 2014]
a) System time in a cell
b) System date and time in a cell
c) System date only
d) Time at which the current file was opened
Ans. d
893. =Sum(B1:B10) is an example of a
a) function
b) formula
c) cell address
d) value
Ans. b
894. In Excel, an active cell can be represented by
a) 4A
b) A4
c) A$4
d) $A$4
Ans. b
895. Cell address $A4 in a formula means it is a
a) mixed cell reference
b) absolute cell reference
c) relative cell reference
d) All of the above
Ans. a
Explanation: A mixed cell reference is either an absolute column and relative row or absolute row and relative
column. When you add the $ before the column letter you create an absolute column or before the row number you
create an absolute row. For example, $A1 is absolute for column A and relative for row 1, and A$1 is absolute for
row 1 and relative for column A. If you copy or fill the formula across rows or down columns, the relative references
adjust, and the absolute ones don’t adjust.
896. In a worksheet in MS-Excel, what is short-cut key to hide entire row? [SBI PO 2014]
a) Ctrl + 2
b) Ctrl + 9
c) Ctrl + N
d) Ctrl –
Ans. b
897. To select entire row, which shortcut is used? [SBI PO 2014]
a) Shift + Space b) Ctrl + Space c) Alt + Space d) None of these
Ans. a
898. Which of the following bypasses the print dialog box when printing individual slides or an entire presentation?
a) File, Print preview b) Print button c) File, Print d) Ctrl + P
Ans. d
899. How many types of relationships are there in MS-Access?
a) 3 b) 4 c) 5 d) 6
Ans. a
900. What is the default size of the data type in MS-Access? [SBI Clerk 2010]
a) 50 b) 60 c) 70 d) 80
Ans. a
901. We can’t make query by Insert menu? *RBI Grade B 2013+
a) True
b) False
c) Cannot say
d) Sometimes
Ans. a
902. The cardinality property of a relation, refers to the
a) number of database b) number of columns
c) number of rows d) number of tables
Ans. c
Tip: cardinality of a relationship is the number of tuples (rows) in a relationship.
903. What is the overall term for creating, editing, formatting, storing, retrieving a text document? [IBPS PO 2012]
a) Word processing
b) Spreadsheet design
c) Web design
d) Database management
Ans. d
904. In which, the database can be restored up to the last consistent state after the system failure?
a) Backup
b) Recovery
c) Redundancy
d) Security
Ans. b
905. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
[IBPS Clerk 2012]
a) E-R model b) Database
c) Data Model d) DBMS
Ans. c
906. ____ means that the data contained in a database is accurate and reliable.
a) Data redundancy b) Data integrity c) Date reliability d) Data consistency
Ans. b
907. Which of the following contains data descriptions and defines the name, data type and length of each field in
the database?
a) Data dictionary b) Data table c) Data record d) Data field
Ans. a
908. Which database language is used to access data in existing database?
a) DDL b) DML c) DCL d) None of these
Ans. b
Tip: Data Manipulation Language (DML) is a set of special commands that allows us to access and manipulate data
stored in existing schema objects
909. An E-R diagram is a graphic method of presenting [IBPS Clerk 2011]
a) Primary keys and their relationships
b) Primary keys and their relationships to instances
c) entity classes and their relationships
d) entity classes and their relationships to primary keys
Ans. c
910. In an E-R diagram, an entity set is are represented by
a) rectangle
b) square
c) ellipse
d) triangle
Ans. a
911. In E-R diagram, relationship type is represented by [IBPS Clerk 2012]
a) ellipse
b) dashed ellipse
c) rectangle
d) diamond
Ans. d
912. _____ is the transmission of data between two or more computers over communication links.
a) Communication
b) Networking
c) Data communication
d) Data networking
Ans. c
913. Communication channel having _____ types.
a) 1 b) 2 c) 3 d) 4
Ans. c (simplex, half-duplex, and full-duplex)
914. Which of the following is the fastest communication channel?
a) Radio wave b) Microwave
c) Optical fibre d) All are operating at nearly the same propagation speed
Ans. b
Explanation: A microwave is the fastest communication channel whereas optical fiber is a way of transferring data
not a way of communication. Microwave is a line-of-sight wireless communication technology that uses high
frequency beams of radio waves to provide high speed wireless connections that can send and receive voice, video,
and data information.
915. What do we call a network whose elements may be separated by some distance? It usually involves two or
more network and dedicated high speed telephone lines. [SBI Clerk 2015]
a) LAN b) WAN c) URL d) Server
Ans. a
916. Ethernet, token ring and token bus are types of [SBI Associates 2012]
a) WAN b) LAN c) Communication channels d) Physical media
Ans. b
917. _____ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) All of the above
Ans. c
Tip: A file server is a computer containing files available to all users connected to a local-area network (LAN). In
some LANs, a microcomputer is designated as the file server, while in others it is a computer with a large disk drive
and specialized software.
918. Which of the following items is not used in Local Area Network (LANs)? [SSC CGL 2012]
a) Interface card
b) Cable
c) Computer
d) Modem
Ans. d
919. P2P is a _____ application architecture. [IBPS Clerk 2012]
a) client/server b) distributed
c) centralised d) 1-tier
Ans. a
Explanation: In a peer-to-peer (P2P) network, each computer acts as both a server and a client—supplying and
receiving files—with bandwidth and processing distributed among all members of the network. Such a decentralized
network uses resources more efficiently than a traditional network and is less vulnerable to systemic failure.
920. In OSI network architecture, the routing is performed by [IBPS Clerk 2012]
a) Network layer b) Data link layer
c) Transport layer d) Session layer
Ans. a
921. How many bits are there in the Ethernet address? [SBI Clerk 2011]
a) 64 bits b) 48 bits c) 32 bits d) 16 bits
Ans. b
Explanation: The Ethernet address is 48 bits long and normally displayed as 12 hexadecimal digits. The MAC address
is often referred to as the Ethernet Address on an Ethernet network.
922. An IP address is ____ bit address [SSC CGL 2017]
a) 8 bit b) 16 bit
c) 32 bit d) 64 bit
Ans. c
Explanation: An IPv4 address is 32 bits. An IP Address is shown as 4 decimal numbers representing 4 bytes: d.d.d.d
where d = decimal number (0 - 255). High order bits are the network identifier and lower order bits are the host
identifier.
923. The ____ service allows a group of Internet users to exchange their views on some common topic.
a) nicnet
b) milnet
c) telnet
d) usenet
Ans. d
Explanation: Usenet is a worldwide distributed discussion system available on computers. It was developed from the
general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the
idea in 1979, and it was established in 1980.
924. The ____ uses an addressing schema known as URL indicate the location of files on the web. [SSC CGL 2017]
a) Java Script b) World Wide Web c) SQL d) String
Ans. b
925. Which of the following is most commonly used to identify returns visitors to a website?
a) logged-in visitors b) digital certificates
c) electronic time stamping d) cookies
Ans. d
926. Cracked software are another source of
a) E-mail attack
b) Virus attack
c) Trojan horse
d) All of these
Ans. b
927. A computer virus is
a) deliberately created
b) created accidently
c) produced as result of some program error
d) All of the above
Ans. a
928. The first PC virus was developed in
a) 1980 b) 1984 c) 1986 d) 1988
Ans. c
Explanation: Brain is the industry standard name for a computer virus that was released in its first form on 19
January 1986, and is considered to be the first computer virus for the IBM Personal Computer and compatibles.
929. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk
2014]
a) Cyber Terrorist
b) Black-hat-Hacker
c) Cyber Cracker
d) Hacktivist
Ans. c
Tip: computer cracker as "an individual who attempts to access computer systems without authorization. These
individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a
system."
930. A firewall operated by [SBI Clerk 2010]
a) The pre-purchase phase
b) isolating intranet from extranet
c) screening packets to/from the network and provide controllable filtering of network traffic
d) All of the above
Ans. c
931. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself? *SBI PO 2011+
a) Trojan Horse b) Logic bomb c) Cracker d) Firewall
Ans. b
Explanation: A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious
function when specified conditions are met. For example, a programmer may hide a piece of code that starts
deleting files, should they ever be terminated from the company.
932. What will you insert, when you need to see all the information from two tables on one form?
a) A page break
b) A subform
c) A linked command button
d) All of the above
Ans. b
Explanation: A subform is a form within a form. It is generally used whenever you want to display data from
multiple tables where there is a one-to-many relationship. For example, you would use a subform if you wanted to
display an order with the order details.
933. To select several cells or ranges that are not touching each other, what would you do while selecting?
a) Hold down the Ctrl key
b) Hold down the Shift key
c) Hold down the Alt key
d) Hold down Ctrl + Shift key
Ans. a
934. In computer science, by information we mean
a) any output coming out from computer b) processed data put in an intelligent form
c) a report printed by the computer d) plural of data
Ans. b
935. A software used to convert convert source program instructions to object instruction is known as
a) compiler b) assembler c) Interpreter d) Language processor
Ans. d
Explanation: The language processor is a special translator system that is used for turning a program written in a
high language into a machine code.
936. There are 3 types of language processors:
1. Assembler
2. Interpreter
3. Compiler
The physical arrangement of elements on a page is referred to as a document’s
a) feature b) format c) pagination d) grid
Ans. b
937. Computer systems are comprised of
a) hardware, programs, information, people and network
b) hardware, software, procedures, networks and people
c) hardware, programs, information, people and procedures
d) hardware, programs, processors, procedures, networks and people
Ans. c
938. Press _____ to move the insertion point to the address box or to highlight the URL in the address.
a) Alt + D b) Alt + A c) Shift + Tab d) Tab + Ctrl
Ans. a
939. In analog computer,
a) input is first converted to digital form
b) input is never converted to digital form
c) output is displayed in digital form
d) All of the above
Ans. b
940. The ____ file format is a method of encoding pictures on a computer.
a) HTML b) JPEG c) FTP d) URL
Ans. b
941. All the characters, that a device can use are called its
a) skill set
b) character alphabet
c) characters codes
d) character set
Ans. d
942. Internet requires
a) an international agreement to connect computers
b) a local area network
c) a commonly agreed set of rules to communicate between computers
d) a world wide web
Ans. c
943. Which of the following is billionth of a second?
a) Gigabyte
b) Terabyte
c) Nanosecond
d) Microsecond
Ans. c
Explanation: A nanosecond (ns) is a unit of time in the International System of Units (SI) equal to one billionth of a
second, that is, 1⁄1 000 000 000 of a second, or 10−9
seconds.
944. In an ER diagram, attributes are represented by
a) rectangle b) square c) ellipse d) triangle
Ans. c
Explanation: Attributes are included to include details of the various entities that are highlighted in a conceptual ER
diagram. Attributes are characteristics of an entity, a many-to-many relationship, or a one-to-one relationship.
945. Which is a shortcut key to insert a new worksheet in MS-Excel?
a) Ctrl + W b) Ctrl + n c) Ctrl + 1w d) Shirt + F11
Ans. d
Tip: Shift+F11 inserts a new worksheet. Alt+F11 opens the Microsoft Visual Basic For Applications Editor, in which
you can create a macro by using Visual Basic for Applications (VBA). F12 Displays the Save As dialog box
946. Which of the following machines is called a smart machine? [Cyber Olympiad 2014]
a) Mobile phones b) Television c) Computer d) Microwaves
Ans. c
947. Which of the following jumbled words can complete the sentence given below?
Computer is a _____ machine.
a) Digir
b) Budm
c) Lows
d) Marts
Ans. d
Tip: This is an character arranging question from reasoning. After arrange the word “Marts” we make “Smart”.
948. What is common between Man and Computer?
a) Both can get tired
b) Both can draw and calculate
c) Both can take decisions
d) Both can show emotions
Ans. b
949. Serial printers are slower than-
a) Dot matrix b) Laser c) Inkjet d) All of these
Ans. d
950. Helical-scan cartridge are type of magnetic tape that uses the same technology as –
a) VCR tapes
b) Audio tapes
c) Data tape
d) None of these
Ans. a
Tip: A type of magnetic tape that uses the same technology as VCR tapes. The term helical scan usually refers to
8mm tapes, although 4mm tapes (called DAT tapes)
951. It consists of low-level programs that interact with the computer at a very basic level-
a) System software b) Utility software
c) Application software d) None of these
Ans. a
952. It is a program that performs a very specific task, usually related to managing system resources. Operating
systems contain a number of them for managing disk drives, printers, and other devices –
a) System software b) Utility software
c) Application software d) None of these
Ans. b
953. In Assembly language –
a) Mnemonics are used to code operations
b) Alphanumeric symbols are used for addresses
c) Language lies between high-level language and machine language
d) All the above
Ans. d
954. The latest PC keyboards use a circuit that sense the movement by the change in its capacitance. These
keyboards are referred as –
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
Ans. a
955. The alternative name for application software is –
a) Utility software
b) Practical software
c) End-user software
d) Practical software
Ans. c
956. Program promised by publisher but never released –
a) Vaporware b) Shareware c) Software d) Mindware
Ans. a
Tip: software or hardware that has been advertised but is not yet available to buy, either because it is only a concept
or because it is still being written or designed.
957. Computer derives its name from the word _____ which means calculation. [Bank Clerk 2008]
a) Computare
b) Calcite
c) Calculator
d) Both (A) and (B)
Ans. a
Tip: The word 'compute' comes from the Latin word computare, meaning "arithmetic, accounting, reckoning".
958. Computer gathers data, which means that they allow users to ____ data. [Bank Clerk 2010]
a) present b) input c) output d) store
Ans. b
959. The word ‘Abacus’ was derived from the greek word _____, which means a table or a board covered with dust.
a) Abax b) Addition c) Abqua d) Substraction
Ans. a
960. Antikythera mechanism was mainly used to perform
a) addition b) multiplication and division c) astronomical calculation d) logarithm
Ans. c
Tip: The Antikythera mechanism is an Ancient Greek hand-powered orrery, described as the oldest example of an
analogue computer used to predict astronomical positions and eclipses decades in advance.
961. Rabdologia was the technology used for calculation purpose introduced in
a) 1917
b) 1901
c) 1617
d) 1801
Ans. c (Rabdology Book written by John Napier)
962. Napier’s bones performs
a) addition and subtraction
b) multiplication and division
c) only addition
d) Both (A) and (B)
Ans. b
963. Pascaline is also known as [BOB Assistant 2009]
a) mechanical machine
b) adding machine
c) division machine
d) difference machine
Ans. b
964. _____ was the first digital mechanical calculator, which was designed to perform addition, subtraction,
multiplication and division. It can also extract square root by a series of repeated addition.
a) Punch card system
b) Pascaline
c) Stepped reckoner
d) ABC Computer
Ans. c
Tip: The stepped reckoner or Leibniz calculator was a mechanical calculator invented by the German mathematician
Gottfried Wilhelm Leibniz around 1672 and completed in 1694. The name comes from the translation of the German
term for its operating mechanism, Staffelwalze, meaning "stepped drum".
965. The first mass-produced mechanical calculating device was
a) Pascaline b) Arithmometer c) Punch card d) Mark-1
Ans. b
Tip: The arithmometer, invented by Charles Xavier Thomas de Colmar in 1820, was the first commercially successful
calculating machine capable of performing addition, subtraction, multiplication and division.
966. What do you mean by Jacquard loom? [SBI PO 2011]
a) A bird found in Japan
b) A weaving machine used punched cards
c) The first computer controlled loom
d) A machine for writing match tables
Ans. b
967. The first electro-mechanical computer MARK-1 invented by
a) John W Mauchly b) Atanasoff-Berry
c) Howard Aiken d) Clifford Berry
Ans. c
Explanation: The Harvard Mark I, or IBM Automatic Sequence Controlled Calculator, was a general-purpose
electromechanical computer used in the war effort during the last part of World War II. One of the first programs to
run on the Mark I was initiated on 29 March 1944 by John von Neumann.
968. Which of the following computer system introduced the idea of binary calculation?
a) ABC computer
b) Colossus
c) ENIAC
d) EDSAC
Ans. a
Tip: The Atanasoff–Berry computer was the first automatic electronic digital computer in 1937.
969. The first electronic digital computer contained? [SBI PO 2008]
a) Electronic valves b) Vaccum tubes
c) Transistors d) Semiconductor memory
Ans. a
970. In second generation, which type of memory was used to store data? [IBPS RRB 2011]
a) Paper tapes b) Magnetic drum c) Magnetic core d) Magnetic tape
Ans. c
971. In which generation did multi-programming start? [SBI Clerk 2010]
a) First generation b) Second generation
c) Third generation d) Fourth generation
Ans. c
972. Oracle was introduced in
a) first generation b) second generation c) third generation d) fourth generation
Ans. d
973. A micro computer can be defined as
a) a small, low-cost digital computer b) which consists of a microprocessor
c) a storage unit and input/output channel d) all of the above
Ans. d
974. Which of the following is the smallest computer? [SBI Clerk 2011]
a) Notebook b) Laptop c) Desktop d) Workstation
Ans. a
975. Which was the world’s first mini computer?
a) PDP-I b) PDP-II c) IBM System/36 d) VAX 11/780
Ans. a
Tip: The PDP-1 (Programmed data processor-1) is the first computer in Digital Equipment Corporation's PDP series
and was first produced in 1959. It is famous for being the computer most important in the creation of hacker culture
at Massachusetts Institute of Technology, BBN and elsewhere.
976. Which organisation developed a SAGA-220 super computer in 2011?
a) C-DAC b) FCC c) ISRO d) BARC
Ans. c
Tip: SAGA-220 (Supercomputer for Aerospace with GPU Architecture-220 teraflops) is a supercomputer built by the
Indian Space Research Organisation (ISRO).
977. What is an embedded system? [IOB PO 2011]
a) A program that comes wrapped in a box
b) A program that is permanently part of a computer
c) A computer that is part of a large computer
d) A computer and software system that controls a machine or appliance
Ans. d
978. Which characteristic of computer distinguishes it from electronic calculators? [Allahabad Bank PO 2011]
a) Accuracy b) Storage c) Versatility d) Automatic
Ans. b
Tip: Computer can store data but calculator does not.
979. Which of the following does not describe one or more characteristic(s) of a computer?
a) Electronic b) External storage
c) Stored program d) Program modification at execution
Ans. d
980. The proper definition of a modern digital computer is [SBI PO 2010]
a) an electronic automated machine that can solve problem involving words and numbers
b) a more sophistic and modified electronic pocket calculator
c) any machine that can perform mathematical operations
d) a machine that works on binary code
Ans. d
981. Computer system are comprised of
a) hardware, programs, information, people and networks
b) hardware, software, procedure, network and people
c) hardware, programs, information, people and procedure
d) hardware, programs, processors, procedures, networks and people
Ans. c
982. Which of the following program is not a utility? [DRDO GTRE 2017]
a) Editor b) Debugger c) Spooler d) None of these
Ans. c
Explanation: The Spooler is a special process that manages access to printers by multiple users. For most users, the
function of the Spooler is transparent. They generate a job for a printer and go to the printer to pick up the output. The
Spooler permits users to continue working without waiting for a print job to finish printing.
Utility Program: A program that performs a specific task related to the management of computer functions, resources, or
files, as password protection, memory management, virus protection, and file compression.
983. A Common LED is made up of – [DRDO 2008]
a) Intrinsic Semiconductor b) Direct Semiconductor
c) Degenerate semiconductor d) Indirect Semiconductor
Ans. b
984. GSM system uses TDMA with – [DRDO 2008]
a) 32 users per channel b) 16 users per channel
c) 8 users per channel d) 4 users per channel
Ans. c
985. In the register indirect addressing mode of 8085 microprocessor, data is stored – [DRDO 2008]
a) At the address contained in the register pair b) In the register pair
c) In the accumulator d) In a fixed location of the memory
Ans. a
986. What is the keyboard shortcut for opening a new tab in the Google chrome web browser for windows? [DRDO
CVRDE 2017]
a) Alt + N b) Ctrl + T c) Alt + Ctrl + T d) Alt + T
Ans. b
987. For which one of the following ultraviolet light is used to erase the stored contents? [DRDO 2008]
a) PROM
b) EPROM
c) EEPROM
d) PLA
Ans. b
988. In 8085 microprocessor, the accumulator is a – [DRDO 2008]
a) 4 bit register b) 8 bit register c) 16 bit register d) 32 bit register
Ans. b
989. Which of the following memory has highest access speed? [DRDO CVRDE 2017]
a) Hard Disk b) RAM c) ROM d) Cache Memory
Ans. d
990. The multiple access communication scheme in which each user is allocated the full available channel spectrum
for a specific duration of time is known as – [DRDO 2008]
a) CDMA b) FDMA c) TDMA d) MC-CDMA
Ans. a
991. Thermal printer uses _____ coated paper, which turns black when heat is applied. [DRDO CVRDE 2017]
a) Chromium b) Bisphenol-A c) Nickel d) Toner powder
Ans. b
992. Natural language understanding is used in: [DRDO CURDE 2017]
a) natural language interfaces b) natural language front ends
c) text understanding systems d) all of the above
Ans. d
993. The device used in the third generation computers is _____ (DRDO GTRE 2017)
a) Vacuum tubes b) Transistors c) Integrated Circuit d) VLSI
Ans. c
994. Which of the following GUI component user should choose one or more options from one set allow? [DRDO
CVRDE 2017]
a) Radio Button b) Dropdown list c) Check box d) Text Box
Ans. c
995. Which of the following/statement are correct? (DRDO, CVRDE 2017)
(i) Access to primary memory is more than the access time of secondary memory.
(ii) For the same storage capacity, DRAM is cheaper than SRAM.
a) only (i) b) Both (i) and (ii) c) Only (ii) d) Both are wrong
Ans. c
996. Which of the following is an example of High speed microprocessor? (DRDO GTRE 2017)
a) Pentium b) C.D. Rom c) Keyboard d) Printer
Ans. a
997. _____ gave stored program concept in which program and data to be processed are stored in the same
memory. [DRDO CVRDE 2017]
a) John Von Neumann b) Alan Turing c) Charles Babbage d) Bill Gates
Ans. a
998. In a desktop computer the board containing micro-processor, RAM and other components is called ______
board. (DRDO GTRE 2017)
a) Graphics b) Motherboard c) White d) Black
Ans. b
999. Program counter (PC) register is an integral part of: [DRDO CVRDE 2017]
a) Hard Disk b) RAM c) Cache memory d) CPU
Ans. d
1000. The set of wires, connecting the microprocessor and the main memory, through which the data flows is called:
[DRDO GTRE 2017]
a) Memory
b) Data wire
c) Database
d) Databus
Ans. d
Computer Best MCQ E-Book for all Competitive Exams [9000+ Exam Question in English]
Rs.25/-
Computer Best MCQ E-Book for all Competitive Exams (2400+ Exam Question in Hindi)
Rs.19/-
HEETSON
Telegram https://t.me/Heetson_Official
WhatsApp Channel
/heetsoniti
/heetsoniti
WhatsApp: 8901025610

Computer MCQ Question Bank in English for all Competitive Exams - Heetson Publication

  • 2.
    1. Accounting isthe_______ of monetary transactions. (a) recording (b) verification (c) tallying (d) all of them Ans. d 2. Accounting is concerned with transactions involving________. (a) money (b) no money (c) movement of humans (d) none of them Ans. a 3. Accounting transactions relate to_______. (a) income/expense (b) asset/liability (c) inventory (d) all of them Ans. d 4. Form used to record accounting transactions contains _______columns. (a) 3 (b) 5 (c) 8 (d) 11 Ans. c 5. First 4 columns of account sheet are used for recording ______. (a) credit (b) debit (c) income (d) expense Ans. b 6. Columns 5 to 8 of account sheet are used for recording_______ . (a) credit (b) debit (c) income (d) expense Ans. a 7. First column of debit/ credit form is used to record______ of transaction. (a) date (b) particulars (c) Journal Folio (d) amount Ans. a 8. Second column of debit/ credit transaction is used to record _____of transaction. (a) date (b) particulars (c) Journal Folio (d) amount Ans. b 9. Third column of debit/ credit form is used to record_____ of transaction. (a) date (b) particulars (c) Journal Folio (d) amount Ans. c 10. Fourth column of debit/ credit form is used to record______ of transaction. (a) date (b) particulars (c) Journal Folio (d) amount Ans. d 11. The technology which permits data transmission between devices like computers, mobile phones, tablets, headsets, etc. is called _____ . (a) bluetooth (b) coaxial cable (c) fibre optic cable (d) twisted pair cable Ans. a 12. Bluetooth permits ______. (a) pairing by acceptance (b) pairing by password authentication (c) pairing by verification (d) all of them Ans. d
  • 3.
    13. Bluetooth isa ____ technology that connects devices (called gadgets) in a small area. a) wired LAN b) wireless LAN c) VLAN d) none of these Ans. b 14. In Bluetooth, multiple ____ form a network called a _____ a) scatternet; piconets b) piconets: scatternet c) Piconets: bluenet d) bluenet; scatternet Ans. b 15. In a piconet, there can be up to _____ parked nodes in the network. a) 63 b) 127 c) 255 d) 511 Ans. c 16. Bluetooth is the wireless technology for ______ a) local area network b) personal area network c) metropolitan area network d) wide area network Ans. b 17. Bluetooth uses _____ a) frequency hopping spread spectrum b) orthogonal frequency division multiplexing c) time division multiplexing d) channel division multiplexing Ans. a 18. What is A2DP (advanced audio distribution profile)? a) a bluetooth profile for streaming audio b) a bluetooth profile for streaming video c) a bluetooth profile for security d) a bluetooth profile for file management Ans. a 19. In a piconet, one master device _____ a) can not be slave b) can be slave in another piconet c) can be slave in the same piconet d) can be master in another piconet Ans. b 20. BIOS (Basic input output system) resides in a) RAM b) ROM c) Cache d) CPU Ans. b 21 - Which of the following is used in mode string to open the file in binary mode? A – a B – b C – B D - bin Answer : B Explanation: To perform unformatted data I/O a file is opened in binary mode and is represented with the alphabet „b‟ in the mode string.
  • 4.
    22. What isthe output of the following code snippet? #include<stdio.h> main() { int x = 5; if(x==5) { if(x==5) break; printf("Hello"); } printf("Hi"); } A - Compile error B – Hi C – HelloHi D – Hello Ans. A Explanation: compile error, keyword break can appear only within loop/switch statement. 23 - What is the output of the following program? #include<stdio.h> main() { struct { int x;} var = {5}, *p = &var; printf("%d %d %d",var.x,p->x,(*p).x); } A - 5 5 5 B - 5 5 garbage value C - 5 5 0 D - Compile error Answer : A Explanation: 5 5 5, the two possible ways of accessing structure elements using pointer is by using -> (arrow operator) OR *. 24 - A local variable is stored in ___ A - Code segment B - Stack segment C - Heap segment D - None of the above Answer : B Explanation: All the local variables are stored in a memory called as stack. 25 - In C, what are the various types of real data type (floating point data type)? A - Float, long double B - long double, short int C - float, double, long double D - short int, double, long int, float Answer : C Explanation: There are three types of floating point data type 1) float with storage size 4 byte, 2) double with storage size 8 byte, and 3) long double with storage size 10 byte. 26 - For a structure, if a variable behave as a pointer then from the given below operators which operator can be used to access data of the structure via the variable pointer? A - . B - % C - -> D - # Answer : C Explanation: For a structure, Dot(.) operator can be used to access the data using normal structure variable and arrow (->)can be used to access the data using pointer variable.
  • 5.
    27 - Whyto use fflush() library function? A - To flush all streams and specified streams B - To flush only specified stream C - To flush input/output buffer D - Invalid library function Answer : A Explanation: In C programming, the fflush() function writes any unwritten data in stream's buffer. If, stream is a null pointer, fflush() function will flush all streams with unwritten data in the buffer. int fflush(FILE *stream); 28 - According to ANSI specification, how to declare main () function with command-line arguments? A - int main(int argc, char *argv[]) B - int char main(int argc, *argv) C - int main() { Int char (*argv argc); ) D - None of the above Answer : A Explanation: Some time, it becomes necessary to deliver command line values to the C programming to execute the particular code when the code of the program is controlled from outside. Those command line values are called command line arguments. The command line arguments are handled by the main() function. Declaration of main () with command-line argument is, int main(int argc, char *argv[ ]) Where, argc refers to the number of arguments passed, and argv[ ] is a pointer array which points to each argument passed to the program. 29) Study the following program: main() {printf("HEETSON"); main();} What will be the output of this program? a) Wrong statement b) It will keep on printing HEETSON c) It will print nothing d) None of these Ans. b Explanation: In this program, the main function will call itself again and again. Therefore, it will continue to print HEETSON. 30) . Which technology is used in Compact Disks? a) Electro Magnetic b) Laser c) Mechanical d) Electrical Ans. b
  • 6.
    31. What isCD means? a) Compact disk b) Common disk c) Cassette disk d) Compact drive Ans. a 32. What will this program print? main() { int i = 2; { int i = 4, j = 5; printf("%d %d", i, j); } printf("%d %d", i, j); } a) 4525 b) 2525 c) 4545 d) None of the these Ans. A Explanation: In this program, it will first print the inner value of the function and then print the outer value of the function. 33. CDs can hold up to _____of data or 80 minutes of audio. a) 500 MB b) 700 MB c) 1 GB d) 1024 KB Ans. b 34. CD was co-developed by_____ and released in 1982. a) Sony b) Philips c) Samsung d) Both A and B Ans. d 35. Standard CDs have a diameter of _______and can hold up to about 1 hour and 20 minutes of uncompressed audio. a) 120 millimetres (4.7 in) b) 150 mm c) 180 mm d) 200 mm Ans. a 36. Who is known as CD Inventor? a) James Russell b) John Sympson c) Michal Tomson d) Charles Deggi Ans. a
  • 7.
    37. CD isa ______ storage device? a) Primary b) Secondary c) Teritory d) None of these Ans. b 38. The 10’s complement of ‘(52520)_(10)’ is. a) 48240 b) 47480 c) 47840 d) 48470 Ans. b 39. If a multiplexer has 16 input lines, how many selection lines would be necessaiy? a) 16 b) 8 c) 4 d) 2 Ans. c 40. _____ is used to restore the contents of the cells in synchronous DRAM. a) Sense amplifier b) Refresh counter c) Restorer d) Restore counter Ans. a 41. If a block can be placed in a limited set of places in the cache, the cache is said to be a) Fully associative b) Set associative c) Direct mapped d) Restricted mapped Ans. b 42. The three main parts of the processor are _______ [SBI Clerk, 2012] (a) ALU, Control Unit and Registers (b) ALU, Control Unit and RAM (c) Cache, Control Unit and Registers (d) Control Unit, Registers and RAM (e) RAM, ROM and CD-ROM Ans. A 43. Which printer cannot print more than one character at a time ? [SSC, CHSL, 2012] (a) Line (b) Daisy-wheel (c) Laser (d) Dot-matrix Ans. B 44. ________key is the example of Toggle key [IBPS Clerk, 2012] (a) Alt (b) Shift (c) Control (d) Escape (e) Caps Lock Ans. E 45. Video controller [IBPS Clerk, 2012] (a) Controls the resolution of images on screen (b) Controls the signals to be sent and received from processor for display (c) Handles the entire electronic work behind the formation of images on the screen (d) Is responsible for allocating pixels for formation of images Ans. C
  • 8.
    46. Which ofthese is a point-and-draw device ? [IBPS PO, 2012] (a) mouse (b) scanner (c) printer (d) CD-ROM (e) Keyboard Ans. A 47. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits? [IBPS PO,2013] (a) ANSI (b) ASCII (c) EBCDIC (d) ISO (e) None of the above Ans. A 48. _______ devices convert human-understandable data and programs into a form that the computer can process. [SBI PO, 2013] (a) Printing (b) Output (c) Solid State (d) Monitor (e) Input Ans. E 49. The CPU comprises of Control, Memory, and ________ units. [SBI PO,2013] (a) Microprocessor (b) Arithmetic/Logic (c) Output (d) ROM (e) Input Ans. B 50. A joystick is primarily used to/for ___________. [SBI PO, 2013] (a) Control sound on the screen (b) Computer gaming (c) Enter text (d) Draw pictures (e) Print text Ans. B 51. On the motherboard the connection points for chips are reffered to as a) slots b) sockets c) ports d) lines Ans. B 52. The load instruction is mostly used to designate a transfer from memory to a processor register known as [IBPS PO 2012] a) accumulator b) instruction register c) program counter d) memory address register Ans. A 53. ‘C’ in CPU denotes a) Common b) Central c) Convenient d) Computer Ans. B
  • 9.
    54. Arithmetic logicunit and control sections have special purpose locations called [SBI Clerk 2012] a) registers b) RAM c) BIOS d) I/O Ans. A 55. Internal memory in a CPU is nothing but a) a set of registers b) a set of ALU c) microprocessor d) bus Ans. A 56.The word ‘computer’ usually refers to the central processing unit plus a) external memory b) internal memory c) input devices d) output devices Ans. A 57. Which of the following is a part of central processing unit? a) Printer b) Keyboard c) Mouse d) Arithmetic and logic unit Ans. D 58. Control unit of a digital computer is often called the a) clock b) nerve centre c) Both A and B d) IC Ans. B 59. The central processing unit (CPU) in a computer consists of a) input, output and processing b) control unit, primary storage and secondary storage c) control unit, arithmetic logic unit, registers d) None of the above Ans. C 60. A group of bits that tells the computer to perform a specific operation is known as a) instruction code b) micro operation c) accumulator d) register Ans. A 61. Which Microsoft-based technology was built to link desktop applications to the World Wide Web? [A] Active Channel [B] Active Desktop [C] ActiveX [D] None of the above Correct Answer: C [ActiveX] Explanation: ActiveX is a software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly from the World Wide Web. It is used till IE11 but not Microsoft Edge. 62. Which among the following is the most common source of Viruses to the hard disk of your computer? [A] Incoming Email [B] Outgoing Email [C] CD ROMs [D] Websites Ans. a 63. Symantec is the maker of which among the following popular antivirus software? [A] Norton [B] BitDefender [C] Avast [D] McAfee VirusScan Ans. a
  • 10.
    64. Which ofthe following lies within the CPU? [A] Primary Memory [B] Secondary Memory Secondary Memory [C] Mouse [D] Keyboard Ans. a Explanation: All input data and instructions are stored in the memory which is of two types-primary memory and the secondary memory. Primary memory resides within the CPU while the secondary memory is external to it. 65. “Internet escrow ” is a term most commonly related to which of the following? [A] E-commerce [B] Software Development [C] Privacy Security [D] Database Management Ans. a Explanation: Escrow is a financial instrument whereby an asset is held by a third party on behalf of two other parties that are in the process of completing a transaction. E commerce hold the asset of a merchant before it is sold to a customer. So it is Internet escrow. 66. In the Windows XP, what does XP stands for? [A] Extra-Powerful [B] Experience [C] Extended Platform [D] Experience Platform Ans. b Explanation: Windows XP is an operating system introduced in 2001. It is from Microsoft’s Windows. The “XP” in Windows XP stands for eXPerience. Microsoft called the XP release its one of the most important product. 67. V-RAM is used for access of the following? [A] Video & Graphics [B] Text & Images [C] programs [D] None of the above Ans. a Explanation: V-Ram is also known as video Ram. It is a dual ported variant of dynamic RAM. VRAM is basically RAM integrated in a card for using it for storing graphical textures, 3D models temporary. It is used for video access and graphics. 68. The word bandwidth is also used to mean ________? [A] width of the data cable [B] amount of data transferred [C] number of the computers on a particular network [D] none of the above Ans. b Explanation: Bandwidth refers to the amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second. 69. Which among the following is correct about 4GL? [A] A computer brand [B] A software brand [C] A software program [D] A programming language Ans. d
  • 11.
    70. As aperson working in internet banking environment, why you should be aware of the “Dictionary attack”? [A] It is used to inject worms or viruses in the system [B] It is used to determine a password *C+ It is used to access customer’s account by determining other details [D] It is used for stealing info from the Credit Card Ans. b Explanation: A dictionary attack is a method of breaking into a password-protected computer or server. It is done by systematically entering every word in a dictionary as a password. A dictionary attack is used as an attempt to decrypt a message or document. 71. C is what kind of language? a) An assembly language b) A third generation high level language c) A machine language d) Future language Ans. b 72. Identify the device through which data and instructions are entered into a computer? a) Software b) Output device c) Input device d) Heetson Ans. c 73. Computer Monitor is also known as : a) DVU b) UVD c) VDU d) CCTV Ans. c 74. Arrange in ascending order the units of memory TB, KB , GB, MB a) TB > MB > GB > KB b) MB > GB > TB > KB c) TB > GB > MB > KB d) GB > MB > KB > TB Ans. c 75. Which one of these stores more data than a DVD? a) CD Rom b) Floppy c) Blue Ray Disk d) Red Ray Disk Ans. c 76. The output shown on the computer monitor is called a) VDU b) Hard Copy c) Soft Copy d) Screen Copy Ans. c 77. 8 Bits make up 1 _____ a) Byte b) Megabyte c) Kilobyte d) None Ans. a
  • 12.
    78. Which oneis the result of the output given by a computer? a) Data b) Instruction c) Information d) Excursion Ans. c 79. What is kind of CD-ROM? a) Optical disk b) Magnetic disk c) Magneto Optical disk d) None of these Ans. b 80. Which is known as the most powerful type of computer? a) Super computer b) Iframes c) Mega Frames d) Super Access Ans. a 81. What is Spoofing? Ans. It is also known as „Masquerade”. It Pretends to be a legitimate user and access to its computer via a network. 82. What is the main part of computer ? a) Input device b) Output device c) CPU d) All of these Ans. D 83. What is input device? a) Which take the data b) which give the data c) Both d) None of these Ans.A 84. Which of these is an input device ? a) keyboard b) mouse c) scanner d) all of these Ans. D 85. CPU stands for _________ a) central processing unit b) center process unit c) common processing unit d) none of these Ans.A 86. Which of these part of CPU ? a) ALU (Arithmatic logic unit) b) CU (Control Unit) c) MU (Memory Unit) d) All of these Ans. D 87. What is output device? a) Which give the data b) which take the data c) both A and B d) none of these Ans.A 88. Which of these is an output device? a) monitor b) speaker c) printer d) all of these Ans. D 89. Which is these component of computer? a) hardware b) software c) both a and b d) none of these Ans. C
  • 13.
    90. The physicalcomponent of computer are called______ a) hardware b) software c) both a and b d) none of these Ans. A 91. Processor, main memory (RAM), hard disk, CD/DVD drive, CMOS, BIOS chip, etc. are housed inside _____. (a) input unit (b) Central Processing Unit (CPU) (c) output unit (d) all of them Ans. b 92. ______ contains slots for fixing/ connecting processor, main memory (RAM), hard disk, CD/DVD drive, CMOS, BIOS chip, etc. (a) Mother board (b) bread board (c) key board (d) dash board Ans. a 93. A stylus used to provide input through CRT monitor is called _______. (a) scanner (b) digital tablet (c) light pen (d) printer Ans. c 94. VDU is expanded as ______. (a) Visual Display Unit (b) Virtual Display Unit (c) Visual Deception Unit (d) Visual Display University Ans. a 95. In computer monitors, CRT stands for _____. (a) Cadmium Ray Tube (b) Cathode Ray Tube (c) Cathode Ray Twist (d) Cathode Rim Tube Ans. b 96. Cathode Ray Tube (CRT) monitor has ______ level of power consumption amongst monitors. (a) highest (b) lowest (c) zero (d) least Ans. a 97. LCD is expanded as _____. (a) Linear Crystal Display (b) Liquid Crystal Dialog (c) Liquid Crystal Display (d) Liquid Canister Display Ans. c 98. LED is expanded as _______. (a) Linear Emitting Diode (b) Light Emitting Diode (c) Liquid Emitting Diode (d) Light Emitting Display Ans. b 99. The display of LCD monitor is ______ than that of LED monitor. (a) lighter (b) heavier (c) brighter (d) duller Ans. d
  • 14.
    100. Height towidth ratio of a monitor screen is called ______. (a) aspect ratio (b) length ratio (c) width ratio (d) diagonal ratio Ans. a 101. Which was the first Electronics digital programmable computing device? a) Analytical Engine b) Difference Engine c) Colossus d) ENIAC Ans. C 102. EDVAC stands for ______. a) electronic discrete variable automatic calculator b) electronic discrete variable automatic computer c) electronic data variable automatic calculator d) electronic data variable automatic computer Ans. B 103. Which was the first commercial computer? a) Ferranti Mark 1 b) analytical engine c) difference engine d) colossus Ans. A 104. UNIVAC stands for_______. a) universal automatic calculator b) universal native input automatic computer c) universal native input automatic calculator d) universal automatic computer Ans. D 105. ENIAC stands for ______. a) electronic numerical integrator and computer b) electronic numerical integrator and calculator c) electronic numerical integrator automatic computer d) electronic numerical integrator automatic calculator Ans. A 106. Who invented the punch card ? a) Charles babbage b) semen Korsakov c) herman Hollerith d) joseph marie jacquard Ans. C 107. Which Electronic components are used in Second Generation Computers? a) Transistors b) Integrated Circuits c) Vacuum Tubes d) VLSI Ans. A 108. Which Electronic components are used in Third Generation Computers? a)Transistors b) Integrated Circuits c) Vacuum Tubes d) VLSI Ans. B 109. Which Electronic components are used in fourth Generation Computers? a)Transistors b) Integrated Circuits c) Vacuum Tubes d) VLSI Ans. d 110. Which Electronic components are used in Fifth Generation Computers? a)Transistors b) Integrated Circuits c) Vacuum Tubes d) ULSI Microprocessor Ans. D
  • 15.
    111. Which softwareis not an file compression utility? a) 7-zip b) Win Rar c) Win Zip d) Compres Ans. d 112. In which situation running applications of an user account remains active? a) When we log off b) When we switch User c) When we Shut Down d) When We Reboot Ans. b 113. How can we bring “My Computer” icon on the desktop if it is not there? a) From Wallpaper b) From Settings c) From Display Properties d) From Explorer Ans. c 114. In a PowerPoint Presentation Animation can be repeated how many time a) 2 to 5 b) 1 to 5 c) 2 to 10 d) 1 to 20 Ans. c 115. Which one is an example of spreadsheet software? a) MS Excel b) MS Word c) MS Access d) MS PowerPoint Ans. a 116. Which software can be used for giving presentation (e.g. product demo)? a) MS word b) MS Excel c) MS PowerPoint d) MS Access Ans. c 117. Which is not an Image Editing software? a) Photo Shop b) MS PowerPoint c) Corel Draw d) MS Paint Ans. b 118. A window can have ____ states a) 1 b) 2 c) 3 d) 4 Ans. c 119. Which one is not an image file? a) .bmp b) .png c) .wmv d) .jpg Ans. c 120. Which one is an example of database designing software? a) MS Excel b) MS Word c) MS Access d) MS PowerPoint Ans. c
  • 16.
    121. The ____performs simple mathematics for the CPU. (a) ALU (b) DIMM (c) BUS (d) Register (e) None of these Ans. a 122. The ALU performs ____ operation. (a) ASCII (b) Logarithm (c) Algorithm (d) Arithmetic (e) None of these Ans. d 123. ALU stands for (a) Algorithm and logarithm unit (b) Arithmetic and logarithm unit (c) Arithmetic and logical unit (d) Algorithm and logical unit (e) None of these Ans. c 124. Which of the following is responsible for all types of calculations? (a) ALU (b) Control Unit (c) Registers (d) BUS (e) None of these Ans. a 125. The first computer architecture was introduced in [Allahabad Bank Clerk 2010] (a) 1970 (b) 1968 (c) 1971 (d) 1973 (e) 1972 Ans. a 126. Another word for the CPU is [Allahabad Bank Clerk 2010] (a) microprocessor (b) execute (c) microchip (d) decode (e) None of these Ans. a 127. The microprocessor of a computer [IBPS Clerk 2011] (a) does not understand machine language (b) understands machine language and high level language (c) understands only machine language (d) understands only high level languages (e) understands only assembly language Ans. c 128. The microprocessor is the brain of the computer and is also called a [Allahabad Bank PO 2011] (a) microchip (b) macrochip (c) macroprocessor(d) calculator (e) None of these Ans. a 129. A microprocessor with 12 address lines is capable of addressing [LIC Assistant Officer 2009] (a) 1024 location (c) 4096 location (b) 2048 location (d) 64 location Ans. c 130. The first microprocessor produced by Intel Corp and Texas instruments were used primarily to control (a) calculators (b) cars (c) remotes (d) robotics (e) grinders Ans. a
  • 17.
    131. It takesadvantages of basic hardware and software security characteristics. (1) System design (2) Data access control (3) System access control (4) None of these Ans. 1 132. If you are allowing a person on the network based on the credentials to maintain the security of your network, then this act refers to the process of [IBPS PO 2016] (1) Authentication (2) Automation (3) Firewall (4) Encryption (5) None of these Ans. 1 133. Cracked softwares are another source of (1) E-mail attack (2) Virus attack (3) Trojan horse (4) All of these Ans. 2 134. A malware is an (1) program (2) hardware (3) a person (4) None of these Ans. 1 135. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents. (1) Keylogger (2) Worm (3) Virus (4) Cracker Ans. 3 136. A computer virus is (1) deliberately created (2) created accidently (3) produced as result of some program error (4) All of the above Ans. 1 137. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and downloading software from the Internet? [SBI PO 2014] (1) Utility (2) Virus (3) Honey Pot (4) Spam (5) App Ans. 2 138. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a [RBI Grade B 2012] (1) disease (2) torpedo (3) hurricane (4) virus (5) infector Ans. 4 139. Computer virus is [IBPS Clerk 2011] (1) a hardware (2) windows tool (3) a computer program (4) a system software (5) None of the above Ans. 3 140. Which among the following is related to the internet and mail? (1) Boot-UP (2) Magnetic Tapes (3) Applications Software (4) Paging (5) Virus Ans. 5 141. Computer servers are used in applications. (a) online reservation of tickets (b) e-commerce (c) tracking of consignments (d) all of them Ans. d 142. Your operating system will detect and install the appropriate device drivers for this type of device: a) Plug and play b) Plug and go c) Plug and continue d) Plug and commence Ans. a
  • 18.
    143. The componentwhich makes a computer to work through commands is called _____. (a) software (b) hardware (c) malware (d) junkware Ans. a 144. Software ______. (a) consumes power through hardware (b) is inferred through the working of hardware (c) controls the hardware (d) all of them Ans. d 145. The component of computer which is not physically accessible, but can be realized through its working is called _______. (a) hardware (b) software (c) RAM (d) port Ans. b 146. ______ helps to hardware to produce output based on given input. (a) Game port (b) software (c) IEEE 1392 (d) SMPS Ans. b 147. Operating system identifies and controls hardware in coordination with _____. (a) power cable (b) mouse (c) SMPS (d) BIOS Ans. d 148. _______ schedules processor time in such a way as to allow the user to feel that may programs are running at the same time. (a) application software (b) operating system (c) virus (d) malware Ans. b 149. ______ schedules processor time and handles concurrency and parallel processing using multiple processor cores. (a) application software (b) virus (c) malware (d) operating system Ans. d 150. ______ allots memory for each program and frees memory when it is no longer needed for a program. (a) application software (b) virus (c) malware (d) operating system Ans. d 151. What is the average power (in watts) used by a 20 to 25 inch home color television…? a) 70-100 b) 25-50 c) 500-800 d) Over 1000 Ans. a 152. “FET” is a type of transistor or ____ Effect Transistor. a) Field b) Factor c) Flash d) Force Ans. a
  • 19.
    153. Voltage issometimes referred to as EMF, which means Electromotive ___ a) Field b) Factor c) Flash d) Force Ans. d 154. A given signal‟s second harmonic is twice the given signal‟s ____ frequency. a) fourier b) Foundation c) Fundamental d) Field Ans. c 155. The frequency range which is called High Frequency band is? a) 100 kHz b) 1 GHz c) 30 to 300 MHz d) 3 to 30 MHz Ans. d 156. Once the active medium is excited, by which physical process is the first photons of light are produced? a) Blackbody radiation b) Spontaneous emission c) Synchrotron radiation d) Planck‟s oscillation Ans. b 157. Which process is responsible for amplification of the light after the first photons of light are produced? a) Blackbody radiation b) Stimulated emission c) Planck‟s radiation d) Einstein oscillation Ans. b 158. The active medium used in the first working laser ever constructed was? a) A diamond block b) Helium-neon gas c) A ruby rod d) Carbon dioxide gas Ans. c 159. What are three types of lasers? a) Gas, metal vapor, rock b) Pointer, diode, CD c) Diode, inverted, pointer d) Gas, solid state, diode Ans. d 160. What would you use for immediate, real-time communication with a friend? a) Instant messaging b) E-mail c) Usenet d) A mailing list Ans. a 161. ______is used by the CPU to communicate with devices that are contained within the computer, through physical connections such as cable or printed circuits. a) Bus b) Control Bus c) Program d) Stack pointer Ans. b 162. Microprocessors as switching devices are for ______ generation. Ans. Fourth 163. In a computer most processing takes place in_____ Ans. CPU 164. Large scale integration is used in _____ Processor. Ans. Memory
  • 20.
    165. The numberof pins in 8085 microprocessor is _____ Ans. 40 pins 166. Memory location in INTEL 8085 microprocessor has ______ numbers. Ans. 65536 167. The sign Flag sets in 8085 when ______. Ans. 16 bits 168. The five Flip –Flop set in 8085 is called _____. Ans. Flap 169. In 8085 there are _____ General purpose registers. Ans. 6 170. The part of micro-processor which performs number crunching and logical comparisons is called _______ . (a) Arithmetic and Logic Unit (ALU) (b) Register (c) Cache (d) timer Ans. a 171. How can we change the background color of an element? a) background-color b) color c) Both A and B d) None of these Ans. a 172. Which is the correct CSS syntax? a) body: color = black; b) body {color; black} c) {body: color : black;} d) {body : color = black;} Ans. b 173. How can we select an element with a specific ID in CSS? a) # b) . c) ! d) None of these Ans. a 174. How can we select an element with a specific Class in CSS? a) # b) . c) ! d) None of these Ans. b
  • 21.
    175. Can negativevalues be allowed in padding property? a) Yes b) No c) Depends on property d) None of these Ans. b 176. The CSS property used to specify the transparency of an element is? a) opacity b) visibility c) filter d) None of these Ans. a 177. How can we specify the spacing between each letter in a text in CSS? a) alpha-spacing b) letter-spacing c) character-spacing d) None of these Ans. b 178. We can make rounded borders around element using which CSS element? a) border-collapse b) border-round c) border-radius d) None of these Ans. c 179. Which of the following property specifies the look and design of an outline? a) outline-style b) outline c) outline-font d) None of these Ans. a 180. Which of the following are valid CSS position property values? a) static b) relative c) fixed d)All of these Ans. d
  • 22.
    181. What isthe full form of LDAP? A Light Weight Directory Access Provider B Light Weight Directory Access Protocol C Light Weight Directory Access Program D Light Weight Directory Access Protection Ans. b 182. What is called the collective terms of malicious software, such as viruses, worms and trojans? A Spam B Phishing C Malware D Harm Ans. c 183. What is the full form of CIA under information security? A Confidentiality Integrity Availability B Criminal Investigation Agency C Cost Information Agency D Credit Integrity Assement Ans. a 184. What is called a single point of access for several networking services? A Phishing B Web service C Directory service D Worms Ans. c 185. Which activities endanger the sovereignty and integrity of nation? A Cyber Terrorism B Cyber vandalism C Cyber squatting D Carding Ans. a 186. Which crime involves the use of computer networks to create, distribute or access materials tha sexually expoit underage persons? A Assault by Threat B Cyber squatting C Cyber vandalism D Child pornography Ans. d 187. Which method go through all the files or network elements with an intention to detect something unusual? A Probing B Phishing C Infecting D Scanning Ans. d 188. Victims of cyber attack might loose _______. (a) data (b) money (c) both a & b (d) none of them Ans. c 189. Under information security, CIA stands for _______. (a) Criminal Investigation Agency (b) Confidentiality, Integrity, Availability (c) Cost Information Agency (d) Credit Integrity Assessment Ans. b 190. Script files sent mostly through email attachment to attack host computer are called ______. (a) Worms (b) Phishing attacks (c) Trojans (d) Computer Viruses Ans. a
  • 23.
    191. To performcalculation on stored data computer, uses ……… number system. [SBI Clerk 2009] (1) decimal (2) hexadecimal (3) octal (4) binary Ans. 4 192. The number system based on ‘0’ and ‘1’ only, is known as (1) binary system (2) barter system (3) number system (4) hexadecimal system Ans. 1 193. Decimal number system is the group of ............ numbers. (1) 0 or 1 (2) 0 to 9 (3) 0 to 7 (4) 0 to 9 and A to F Ans. B 194. A hexadecimal number is represented by (1) three digits (2) four binary digits (3) four digits (4) All of these Ans. B 195. A hexadigit can be represented by [IBPS Clerk 2012] (1) three binary (consecutive) bits (2) four binary (consecutive) bits (3) eight binary (consecutive) bits (4) sixteen binary (consecutive) bits Ans. 4 196. What type of information system would be recognised by digital circuits? (1) Hexadecimal system (2) Binary system (3) Both ‘1’ and ‘2’ (4) Only roman system Ans. 3 197. The binary equivalent of decimal number 98 is [IBPS Clerk 2012] (1) 1110001 (2) 1110100 (3) 1100010 (4) 1111001 (5) None of these Ans. 3 198. What is the value of the binary number 101? (1) 3 (2) 5 (3) 6 (4) 101 Ans. 2 199. The binary number 10101 is equivalent to decimal number ............. (1) 19 (2) 12 (3) 27 (4) 21 Ans. 4 200. To convert binary number to decimal, multiply the all binary digits by power of (1) 0 (2) 2 (3) 4 (4) 6 Ans. 2 201. Data Manipulation language is used to create_____. Ans. Object 202. Every record of Relation is called ______. Ans. Tuple 203. Architecture of the database can be viewed as ______. Ans. Three levels
  • 24.
    204. MVP architectureis followed in ____ Ans. CMS 205. What does “CIA” stands for in information security? Ans. Confidentiality, integrity and availability 206. What is Privacy? Ans. It ensure that individual has the right to use the information and allow to use that information. 207. A database contains ________ to help management of information. (a) schemes (b) tables (c) queries/ views (d) all of them Ans. d 208. Creation and modification of databases and tables is called______ . (a) update (b) retrieval (c) data definition (d) administration Ans. c 209. Querying and selecting data from a table is called ______ . (a) data update (b) data retrieval (c) data definition (d) database administration Ans. b 210. Defining the users, passwords and roles for users to control a database is called _______. (a) data update (b) data retrieval (c) data definition (d) database administration Ans. d 211. DOS command maximum length is _____ character including command name and related Parameters. Ans. 127 212. MS DOS Version 1.0 Developed in _____. Ans. 1981 213. MS DOS version 2.0 Developed in _______. Ans. 1983 214. DOS 3.0 Developed in ______ Ans. 1984 215. DOS 3.3 Developed in ______. Ans. 1987 216. DOS 5.0 Developed in ______. Ans. 1991
  • 25.
    217. Dos 6.0Developed in _______. Ans. 1993 218. DOS 1.25 Developed in ______. Ans. 1982 219. DOS 7.0 Developed in _______. Ans. 1995 (This version is Part of MS window 95) 220. DOS 7.1 Developed in ________. Ans. 1997 221. DOS OS Provide which type of Interface? Ans. CLI or CUI (Command Line Interface or Character User interface) 222. How many wild card character in DOS? Ans. Dos Provide Two wildcard character * and ? ( * means single character replacement and ? means any number of character) 223. What are internal commands? Ans. Those commands that are loaded automatically in the memory when DOS is loaded into memory during booting Process 224. What is Blocks in computer? Ans. Every peripheral talks to the computer either one character at a time or in group of characters called Blocks. 225.What is the name of hierarchical file system in DOS? A Tree structure B Root structure C Hybrid structure D Directory structure Ans. b 226. DVD was invented and developed in year_____ a) 1985 b) 1995 c) 1975 d) 1998 Ans. b 227. Which of the following does not relate to Input Unit ? [SBI Clerk, 2012] (a) If accepts data from the outside world. (b) It converts data into binary code that is understandable by the computer (c) It converts binary data into the human readable form that is understandable to the users. (d) It sends data in binary form to the computer for further processing (e) None of these Ans. C 228. Which technology used in DVD to store information? a) Optical data storage b) Radio technology c) light wave technology d) microwave technology Ans. a
  • 26.
    229. Which ofthe following is not a type of optical disk? a) DVD b) CD c) WORM d) Winchester Answer: d Explanation: The Winchester disk is a type of hard disk. Others are all optical disks. WORM is nothing but CD-R i.e., CD recordable. Stands for write once read many. 230. DVD Full Form. a) Digital versatile disk b) Digital Video Disc c) Digital video device d) Both A and B Ans. d 231. B2B stands for________. a) Business to Buyer b) Business to Builder c) Business to Business d) Builder to Business Ans. c 232. B2C stands for________. a) Business to Consumer b) Business to Company c) Business to corporation d) Business to buyer Ans. a 233. C2C stands for________. a) Company to company b) consumer to consumer c) corporation to consumer d) company to customer Ans. b 234. C2B stands for________. a) company to buyer b) company to customer c) consumer to business d) company to business Ans. c 235. B2A stands for_________. a) Business to Administration b) Business to Automation c) Buyer to Administrate d) Business to armer Ans. a 236. C2A stands for____________. a) company to administration b) consumer to administration c) company to social d) customer to administration Ans. b 237. Which of the following model is part of E-Governance: a. G2B b. G2C c. B2G d. C2G Ans. d
  • 27.
    238. What isthe full form of E- commerce? a) Engineering Commerce b) Electronic commerce c) Internet Commerce d) Electrical commerce Ans. b 239. Information Technology Act, 2000 is based on which Model Law of E-Commerce adopted by United Nation: a. UNICITIRAL b. UNCITRAL c. UNICITRAL d. UNCITIRAL Ans. b 240. Which one is not a layer of E-Commerce infrastructure: a. Physical Layer b. Product Layer c. Service Layer d. None Ans. d 241. The Abbreviation of MFD? (A) Master File Directory (B) Memory File Directory (C) Main File Directory (D) Master Format Directory Answer: (A) Master File Directory 242. Select the name of the files that appear as entries in the directories. (A) Ordinary files (B) Duplicate files (C) Special files (D) Sub directories Answer: (C) Special files 243. Select the Number of regions of the disk in a UNIX files management system. (A) 1 (B) 4 (C) 3 (D) 2 Answer: (B) 4 Explanation: There are 4 regions in which the disk is divided. The first is for booting, second contains the disk size, third includes the list of definitions and the remaining region contains the free blocks available. 244. The execution of multiple instructions at the same time is called (A) parallel processing(B) processing (C) serial processing (D) multitasking Answer: (A) parallel processing 245. ERK stands for ______. a) English Region Kangris b) Electronic Record Kernel c) Electronic Record keeping d) None of these Ans. C 246. Example of electronic records are _____. a) Email messages b) Word document c) Digital images d) All of these Ans. D 247. What are the types of electronic records? Ans. Examples of electronic records include: emails, websites, Word/Excel documents, digital purchase receipts, databases, text messages, social media postings, and information stored on SharePoint sites and content management systems (Catalyst, Slack, DropBox, etc.)
  • 28.
    248. An ElectronicBanking is also known as _____. a) Credit Banking b) Commercial Banking c) Cyber Banking d) Macro Banking Ans. C 249. QuickBooks is an ______. a) Accounting software package b) Children jungle books c) Official Letters Books d) Fast Reading Books Ans. A 250. Peachtree is an ______. a) Image Editor b) Accounting software c) Graphics Software d) Architecture Designs Ans. B 251. How can you tell the email that you have read from the email that you have not read? a) The unread mail will be on top b) The unread mail will be on botton c) The unread mail will be bold d) The unread mail will be blue Ans. c 252. ______ is the exchange of computer stored messages by telecommunication. a) Download b) E-mail c) Upload d) All of these Ans. b 253. Which of the following is an advantage of an email? a) Desired length b) Ease of communication c) Lower cost d) All of these Ans. d 254. Junk email is also called_______ Ans. Spam 255. Unwanted repetitious messages, such as unsolicited bulk email is known as _______ Ans. Spam 256. SMTP stands for a) Short mail transmission protocol b) Small mail transmission protocol c) Server Mail Transfer Protocol d) Simple Main Transfer Protocol Ans. d
  • 29.
    257. In MSOffice, ______ is the software for managing emails. (a) MS Access (b) MS Publisher (c) MS Outlook (d) MS Onenote Ans. c 258. Transmission and delivery of information containing text, image, video, documents etc. to targeted recepient(s) over the Internet is called _______ . (a) email (b) world wide web (c) e-commerce (d) social media Ans. a 259. E-mail address is made up of ______ a) Single part b) Two parts c) Three parts d) Four parts Ans. b 260. The first part of email address identifies ______. (a) name of individual user (b) name of the email server (c) name of the mobile phone operator (d) name of bank Ans. a 261. The basic principle of floppy disks involve a) magnetic data reading b) magnetic data recording c) magnetic data recording and reading d) None of these Ans. c 262. Specification for a floppy drive is a) TPI b) CPI c) DPI d) FPI Ans. a 263. The magnetic recording technique used for storing data onto the disks (floppy disks) is called a) return to zero b) non-return to zero c) return to zero and Non-return to zero d) none of the mentioned Ans. b 264. In which one of the following year, floppy disk was patented? a) 1905 b) 1977 c) 1967 d) 1932 Ans. c 265. The Double Density Double sided disks on each side are organized with a) 20 tracks b) 30 tracks c) 40 tracks d) 50 tracks Ans. c
  • 30.
    266. Floppy disksdrives were originally designed by a) IBM b) Sony c) Panasonic d) Compaq Ans. b 267. What is top down design? Ans. Top down design breaks down the original set of Program specifications into smaller sections which is much easier to solve. 268. What is Structured Programming? Ans. A program design method that results in an easy to understand program with clear design and straight forward program flow. Before programmers can start to write code they must design the program and a structured program is one that is designed as a set of hierarchical modules or functions, each of which has only one entry point and only one exit point. 269. What is the maximum storage capacity of a DVD for a single-layered? a) 1 GB b) 4.7 GB c) 10 GB d) 8.5 GB Ans. b 270. What is the maximum storage capacity of a DVD for a dual-layered, single-sided disc. a) 1 GB b) 4.7 GB c) 10 GB d) 8.5 GB Ans. d 271. The following box denotes? a) Decision b) Initiation c) Initialization d) I/O Ans. a 272. Any algorithm is a program. a) True b) False Ans. b 273. Another name for 1-D arrays. a) Linear arrays b) Lists c) Horizontal array d) Vertical array Ans. a
  • 31.
    274. A datastructure that follows the FIFO principle. a) Queue b) LL c) Stack d) Union Ans. a 275. When an algorithm is presented in the form of a Programming language it becomes a ______ a) Program b) flowchart c) Pseudo code d) Syntax Ans. a 276.This symbol denotes ______. a) I/O b) Flow c) Terminal d) Decision Ans. c 277. _____ is a procedure or step by step process for solving a program. a) Algorithm b) Flowchart c) Pseudocode d) All of these Ans. d 278. A detailed flowchart is called ______ a) Stack b) Macro c) Micro d) Union Ans. c 279. Which of the following is not an advantage of a flowchart? a) Better communication b) Efficient coding c) Systematic testing d) Improper documentation Ans. d 280. A flowchart that outlines the main segments of a program. a) Queue b) Macro c) Micro d) Union Ans. b 281. What is Cluster? Ans. Group of two or more contiguous sectors is called a cluster.
  • 32.
    282. How manytypes of hard drive a) 1 b) 2 c) 3 d) 4 Ans. b 283. Which hard drive is fast? a) HDD b) SSD Ans. a 284. Computer memory can be referred to as either permanent or temporary. Of the followings, which one is NOT a temporary storage area? a) Virtual memory b) Cache c) Hard drive d) RAM Ans. c 285. Hard disk are organized as a) cylinders b) tracks c) cylinders and tracks d) Master boot record Ans. c 286. Data for the hard disk type is stored in a) Main memory b) Partition table c) CMOS RAM Set up d) Boot Record Ans. c 287. Hard disk can have ______ heads. a) one b) two c) more then two d) only one Ans. c 288. Hard disk drives are considered ______ storage. a) Flash b) Nonvolatile c) Floppy Disk d) None of these Ans. b
  • 33.
    289. Which ofthe following can hold data of at least one GB? a) Hard disk b) CD-ROM c) Floppy Disk d) none of these‟ Ans. a 290. The full form of HDD is a) High Disk Drive b) Hard disk drive c) Hard digital Disk d) High digital drive Ans. b 291. In html _______ tag defines paragraph. a) <p> b) <para> c) <table> d) <section> Ans. a 292. What is Default extension for a HTML document? (a) .htm (b) .html (c) both a & b (d) none of them Ans. c 293. HTML tag begins with______ symbol. (a) < (b) > (c) <! (d) !> Ans. a 294. HTML tag ends with _____symbol. (a) < (b) > (c) <! (d) !> Ans. b 295. HTML comment begins with_____ symbol. (a) < (b) > (c) <! (d) !> Ans. c 296. HTML comment ends with ______symbol. (a) < (b) > (c) <! -- (d) --> Ans. d 297. SGML stands for . (a) Standard Grand Markup Language (b) Synchronized Generalized Markup Language (c) Standard Generalized Markup Language (d) Simple Generalized Markup Language Ans. c 298. DTD stands in markup language for_______. (a) Document Type Definition (b) Data Type Definition (c) Digital Type Definition (d) Design Type Definition Ans. a
  • 34.
    299. DDL standsfor ______ (a) Data Description Library (b) Data Description Language (c) Data Description Liberty (d) Data Description License Ans. a 300. Most of the HTML tags have a corresponding closing tag, which begins with _____symbol. (a) <! - - (b) < / (c) < : (d) <&nbsp; Ans. b 301. VDU is also called_____ Ans. Screen or Monitor 302. ______ is the most common output device for a computer. (a) monitor (b) printer (c) both a & b (d) neither a nor b Ans. c 303. Joystick typically have a button on _____ that is used to select the option pointed by the cursor. a) Bottom b) Left c) Right d) Top Ans. d 304. The joystick is a ___ stick that moves the graphic cursor in the direction the stick is moved. a) Parallel b) Horizontal c) Straight d) Vertical Ans. d 305. A device for converting handwriting impression into coded characters & positional coordinates for input to a computer is a) Touch panel b) Mouse c) Wand d) Writing tablet Ans. d 306. Which of the following groups consists of only input devices? a) Mouse, keyboard, Monitor b) Mouse, keyboard, printer c) Mouse, keyboard, plotter d) Mouse, keyboard, Scanner Ans. d 307. A bar code reader is an example of a) processing device b) storage device c) input device d) output device Ans. c
  • 35.
    308. Keyboard, mouse,scanner, light pen, etc. are classified under ______ unit. (a) input (b) central processing (c) output (d) none of them Ans. a 309. Devices that allow you to put information into the computer. a) Input b) Output c) Type d) Print Ans. a 310. Which of the following is a temporary output? a) Hard copy b) Soft copy c) Duplicate copy d) On paper Ans. b 311. P3P stands for______. Ans. Platform for Privacy Preferences 312. _______ is required for the internet connection. Ans. Modem 313. Microcomputer are ______computers ( most of the time) in a client server system. Ans. client 314. What is the meaning of Digital Divide? Ans. The gulf between those who have ready access to computers and the internet, and those who do not 315. IRC stands for_________. a) internet radio community b) internet radio company c) internet relay chat d) intel relay chart Ans. C 316. ______Domain is the Part of a domain that comes after the dot Ans. Top Level (Ex:- .com, .org, .net, all domains that are identified with a country or geographical location for ex:- .uk, .in etc) 317. _____ are devices used to transmit data over telecommunication lines a) Drives b) Drive bays c) Modems d) Platform Ans. c 318. CCTLD stands for______. Ans. Country code top level domain 319. Naming of address is called as ______Naming system. Ans. Domain 320. Who invent www ? a) bob kahn b) Tim berners lee c) vint cerf d) lady ada lovelace Ans. B
  • 36.
    321. Time sharingbecame possible in _____ generation of computers. [SBI PO 2011] a) First b) Second c) third d) fourth Ans. B 322. Computer is a/an a) battery b) electronic machine c) All of these d) None of these Ans. B 333. Name the first general purpose electronic computer. [IBPS PO 2012] a) ADVAC b) ADSAC c) UNIVAC d) EDVAC Ans. C 324. Which is not the example of special purpose computer? a) Automatic aircraft landing b) word processor c) multimedia computer d) All of the above Ans. B 325._____ is not an E-Commerce application. a) House banking b) Buying stocks c) Conductiong an auction d) Evaluating an employee Ans. D 326. Computer’s basic architecture was developed by a) John Von Neumann b) Charles Babbage c) Blaise Pascal d) Jordan Mure Ans. A 327. In production of IC chip of computer, what is needed in the following? a) Chromium b) Silocon c) Platinum d) Gold Ans. B 328. First supercomputer developed in india is a) PARAM b) Aryabhatt c) Buddha d) RAM Ans. A 329. Computers that are portable and convenient to use for users who travel, are known as a) supercomputers b) minicomputers c) mainframe computers d) laptops Ans. D 330. Speed of first generation computer was in [IBPS Clerk 2012] a) nano-second b) miliseconds c) nano-mili seconds d) micro seconds Ans. B Explanation: The Processing speed of computers in first generation was measured in Milliseconds. And, We might know that Millisecond is very slow than today's processing speed measurements. Because of not having transistors in computers, The speed of computers was not measured in Hz. 331. Which of the following is NOT one of the four major data processing functions of a computer? a) gathering data b) processing data into information c) analyzing the data or information d) storing the data or information Ans. c
  • 37.
    332. Surgeons canperform delicate operations by manipulating device through computers instead of manually. This technology is known as: a) robotics b) computer forensics c) simulation d) forecasting Ans. a 333. In analog computer a) Input is first converted to digital form b) Input is never converted to digital form c) Output is displayed in digital form d) All of above Ans. b 334. In latest generation computers, the instructions are executed a) Parallel only b) Sequentially only c) Both sequentially and Parallel d) All of above Ans. c 335. Modern computer are very reliable but they are not a) Fast b) Powerful c) Infallible d) Cheap Ans. c 336. A computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a) Super computer b) Mini computer c) Micro computer d) Macro computer Ans. a 337. The storage subsystem in a microcomputer consists mainly of ___ or ___ media with varying capacities. a) Memory or video b) Magnetic or Optical c) Optical or Memory d) Video or magnetic Ans. b 338. The personal computer industry was started by a) IBM b) Apple c) Compaq d) HCL Ans. a 339. Which was the most popular first generation computer? a) IBM 1650 b) IBM 360 c) IBM 1130 d) IBM 650 Ans. d 340. One millisecond is a) 10 seconds b) 100 seconds c) 1000 seconds d) 1/1000 seconds Ans. d 341. Which of the following shows the use of computer at home? a) Watching movies b) Treatment of diseases c) None of these Ans. A
  • 38.
    342. ATM standsfor ____ a) Automatic Teller Machine b) Automatic Transaction Machine c) Automatic Treatment machine d) None of these Ans. A 343. ____ refers to conversion of non-digital material to digital form. (A) Digitization (B) Data transfer (C) Transcription (D) None of the given Ans: A 344. A turnkey package includes (A) Training (B) Software (C) Hardware (D) All of these Ans: D 345. A server ____ a service. a) Requests b) Provides c) A or B d) None of these Ans. B 346. Wi-Fi is a short name for ____ a) Wired Fidelity b) Wireless Fidelity c) Wireless Frequency d) None of the above Ans. B 347. Responsibility of implementation of IT/ITeS Policy lies with a) State Technology park Unit b) Ministry of IT at State and Center c) Director (IT) in consultation with DST d) Industrial Commissioner Ans. C 348. In As per IT/ITeS Policy (2016-21), terms BPO refers to a) Business Process Outsourcing b) Business Process Outcomes c) Best Processing Outcomes d) Business Practices and Outcomes Ans. A 349. Match the following terms: a) 1-d, 2-b, 3-a, 4-c b) 1-d, 2-c, 2-b, 4-a c) 1-d, 2-a, 3-b, 4-c d) 1-b, 2-a, 3-d, 4-c Ans. C 350. In India which of the following is not Correct about “DigiLocker” ? a) Signing for Digilocker requires an individual‟s mobile number b) DigiLocker is a platform for issuance and verification of documents & certificates in a digital way, thus eliminating the use of physical documents. c) Organizations registered with DigiLocker can store electronic copies of documents/ certificated directly into citizen‟s lockers. d) Citizens can download e-document but can not upload any document in their accounts. Ans. D 351. Number of primitive data types in Java are? a) 6 b) 7 c) 8 d) 9 Ans. c
  • 39.
    352. What isthe size of float and double in Java? a) 32 and 64 b) 32 and 32 c) 64 and 64 d) 64 and 32 Ans. a 353. Automatic type conversion is possible in which of the possible cases? a) Byte to int b) Int to long c) Long to int d) Short to int Ans. b 354. Find the output of the following code. int Integer = 24; char String = ‘I’; System.out.print(Integer); System.out.print(String); a) Compile error b) Throws exception c) I d) 24 I Ans. d 355. Select the valid statement. a) char[] ch = new char(5) b) char[] ch = new char[5] c) char[] ch = new char()d) char[] ch = new char[] Ans. b 356. When an array is passed to a method, what does the method receive? a) The reference of the array b) A copy of the array c) Length of the array d) Copy of the first element Ans. a 357. Select the valid statement to declare and initialize an array. a) int[] A = {} b) int[] A = {1, 2, 3} c) int[] A = (1, 2, 3) d) int[][] A = {1, 2, 3} Ans. b 358. Arrays in java are- a) Object references b) objects c) Primitive data type d) None Ans. b 359. When is the object created with new keyword? a) At run time b) At compile time c) Depends on the code d) None Ans. a 360. Identify the correct definition of a package. a) A package is a collection of editing tools b) A package is a collection of classes c) A package is a collection of classes and interfaces d) A package is a collection of interfaces Ans. c 361. NaN stands for_________. a) Nano b) NanTech c) Not a number d) New attacted Nematic Ans. c
  • 40.
    362. ++ operatorin Java Script is ____ Operator. a) Unary b) Positive c) Increment d) Addition Ans. a 363. A translator is described as ________ software. a) Application b) System c) Utility d) Open Source Ans. b 364. _______class provide an interface for invoking java script methods and examining java script properties. a) JSobject b) java script file c) jquary d) java wrapper Ans. a 365. When a user views a page containing a java script program, which machine actually executes the script? a) The user‟s machine running offline b) The user‟s machine running a web browser c) The user‟s machine running on a website d) The users cookies used by a website Ans. b 366. Navigator Java script is also called _______side java script. a) client b) Server c) Website d) Live wire Ans. a 367. Live wire java script is also called _________side Java Script. a) client b) Server c) Website d) Live wire Ans. b 368. Storing numbers, dates or other values are ______ used for in java script program. a) String b) Codes c) Variables d) Functions Ans. c 369. ______ side java script statements embedded in a HTML Page can respond to user events such as mouse-clicks, forms input and page navigation. a) client b) Server c) Website d) Live wire Ans. a 370.When a java script object is sent to java, the runtime engine creates a java wrapper of type_______. a) JSobject b) java script file c) jquary d) java wrapper Ans. a 371. Functional keys used to perform _____. Ans. Specific Task 372. To close a selected drop-down list, cancel a command and close a dialog box, key used is a) Esc key b) End key c) Enter key d) Alt key Ans. a 373. Which keys allows user to enter frequently used operations in a single key stroke? a) Function keys b) Cursor control keys c) Trackball d) Control keys Ans. a
  • 41.
    374. What typeof keys are „ctrl‟ and „shift‟? a) adjustment b) function c) modifier d) alphanumeric Ans. c 375. Why is the Caps Lock key referred to as a toggle key? a) Because its function goes back and forth every time it is pressed b) Because it cannot be used for entering numbers c) Because it cannot be used to delete d) Because it cannot be used to insert Ans. a 376. The ____ key and the ____ key can be used in combination with other keys to perform shortcuts and special tasks. a) Control, Alt b) Function toggle c) Delete, Insert d) Caps Lock, Num Lock Ans. a 377. Which key is used in combination with another key to perform a specific task? a) Function b) Control c) Arrow d) Space bar Ans. b 378. The most common input devices include……. a) Monitor and keyboard b) Monitor and mouse c) Mouse and keyboard d) Printer and mouse Ans. c 379. Letters, numbers and symbols found on a keyboard are ……. a) Icon b) Screen c) Keys d) Menu Ans. c 380. To make the number pad act as directional arrows, you press the _____ key. a) num lock b) caps lock c) arrow lock d) alt Ans. a 381. Shortcut key for manage template in LibreOffice Writer____ a) Ctrl + B b) Ctrl + Shift + N c) Ctrl + Shift + O d) None of the above Ans. b 382. Font size can’t be changed in LibreOffice writer. a) True b) False Ans. b
  • 42.
    383. Shortcut keyused for line break in LibreOffice writer is ____ a) Ctrl + M b) Ctrl + P c) Shift + Enter d) Ctrl + O Ans. c 384. Which of the following key is used for align left of the text in LibreOffice? a) Ctrl + M b) Ctrl + P c) Ctrl + L d) Ctrl + ) Ans. c 385. What is the minimum font size in LibreOffice writer? a) 1 b) 2 c) 3 d) 4 Ans. b 386. Minimum zoom percentage in LibreOffice Writer is 20%. a) True b) False Ans. a 387. Bullets and numbering appears in the standard toolbar in LibreOffice writer. a) True b) False Ans. b 388. Eleven menu are found in LibreOffice writer. a) True b) false Ans. a 389. LibreOffice writer template does not include style formatting. a) False b) True Ans. a 390. What is the default file extension of LibreOffice Writer? a) .doc b) .docx c) .odt d) None of the above Ans. c 391. Multitasking and multiuser is feature of _____ Ans. Linux 392. The name “LINUX” is derived from it‟s inventor _____ Ans. Linus Torvalds 393. Linux is Pronounced with a short i, as in ______ Ans. LIH – NUX 394. Linux is multitasking and _____ bit support Ans. 32
  • 43.
    395. Which characteris used to represent parent directory in Linux? A). B).. C)~ D)* Ans. b 396.Which character is used to redirect output in to an existing file in Linux? A > B >> C < D << Ans. b 397.Which one of the following is the directory separator in Linux? A / B C // D Ans. a 398.Which character is used to represent a range of values in Linux? A ( ) B [ ] C { } D <> Ans. b 399.Which character redirects the output of one command to another in Linux? A . dot B | pipe C : colon D ; semicolon Ans. b 400.Which Linux command list the content of all sub directory? A ls ~ B ls * / C ls / D ls ../ Ans. b 401. Cache memory is used as a ___________memory. a) primary b) secondary c) territory d) Scratch Ans. d 402. MSB stands for_____. a) mobile source bit b) most significant bit c) module significant bit d) more social bit Ans. b 403. LSB stands for______. a) local Heetson bit b) local significant bit c) least significant bit d) large significant Ans. c
  • 44.
    404. _____ canbe treated as the waiting room for the computers processor. Ans. RAM 405. _______ store data or information temporarily and pass it on as directed by the control unit. Ans. Register 406. Common type of storage devices are_____ Ans. Optical 407. _____ files contains permanent data and gets updated during the processing of Transactions. Ans. Master 408. ______ helps to protect Floppy disks from data getting accidentally erased. Ans. Write Protect notch 409. _____ memory is having more memory addresses than are physically available. Ans. Virtual 410. A ______ is a location for storing files on your computer. Ans. Directory 411. A collection of related information sorted and dealt with as a unit is a [SBI Clerk, 2009] (a) disk (b) data (c) file (d) floppy (e) None of these Ans. B 412. Reusable optical storage will typically have the acronym——— [SBI Clerk, 2009] (a) CD (b) DVD (c) ROM (d) RW (e) None of these Ans. C 413. The most common type of storage devices are— —— [SBI Clerk, 2009] (a) persistent (b) optical (c) magnetic (d) flash (e) None of these Ans. B 414. During the –– portion of the Information Processing Cycle, the computer acquires data from some source. [SBI Clerk, 2009] (a) storage and output (b) storage (c) input (d) output (e) None of these Ans. C 415. The contents of ____ are lost when the computer turns off. [IBPS PO, 2011] (a) storage (b) input (c) output (d) memory (e) None of these Ans. D 416. A DVD is an example of a(n) [IBPS PO, 2011] (a) hard disk (b) optical disc (c) output device (d) solid-state storage device (e) None of these Ans. B
  • 45.
    417. Which ofthe following are advantages of CDROM as a storage media? [IBPS PO, 2011] (a) CD-ROM is an inexpensive way to store large amount of data and information. (b) CD-ROM disks retrieve data and information more quickly than magnetic disks do. (c) CD-ROMs make less errors than magnetic media. (d) All the above (e) None of these Ans. A 418. Which of the following is billionth of a second? [SBI PO, 2011] (a) Gigabyte (b) Terabyte (c) Nanosecond (d) Microsecond (e) Terasecond Ans. C 419. The time for the actual data transfer after receiving the request for data from secondary storage is referred to as the disk’s *IBPS Clerk,2011] (a) transfer time (b) movement time (c) access time (d) data input time (e) None of these Ans. C 420. The following computer’s memory is characterised by low cost per bit stored [IBPS Clerk, 2011] (a) Primary (b) Secondary (c) Hard Disk (d) All of these Ans. B 421. FPGA means a) Field Programmable Gate Array b) Forward Programmable Gate Array c) Forward Parallel Gate Array d) Field Parallel Gate Array Ans. a 422. Which language could be used for programming an FPGA. a) Verilog b) VHDL c) Both A and B d) Heetson Ans. c 423. What is mean by ALU a) Arithmetic logic upgrade b) Arithmetic logic unsigned c) Arithmetic Local unsigned d) Arithmetic logic unit Ans. d 424. In 8085 microprocessor, the RST6 instruction transfer programme execution to following location a) 0030H b) 0024H c) 0048H d) 0060H Ans. a 425. HLT opcode means a) load data to accumulator b) store result in memory c) load accumulator with contents of register d) end of program Ans. d
  • 46.
    426. What isSIM? a) Select interrupt mask b) Sorting interrupt mask c) Set interrupt mask d) None of these Ans. c 427. A field programmable ROM is called a) MROM b) PROM c) FROM d) FPROM Ans. b 428. The length of bus cycle in 8086/8088 is four clock cycle, T1, T2, T3, T4 and an indeterminate number of wait clock cycles denoted by Tw. The wait states are always inserted between a) T1& T2 b) T2& T3 c) T3& T4 d) T4& T5 Ans. c 429. Which one of the following circuits transmits two messages simultaneously in one direction a) Duplex b) Diplex c) Simplex d) Quadruplex Ans. b 430. The program counter in a 8085 micro-processor is a 16 bit register, because a) It counts 16 bits at a time b) There are 16 address lines c) It facilitates the user storing 16 bit data temporarily d) It has to fetch two 8 bit data at a time Ans. b 431. Microsoft Access provides visual environment for design of _______. (a) tables (b) reports (c) forms (d) all of them Ans. d 432. By default, new table is displayed in ______view. (a) Datasheet View (b) Design View (c) Report View (d) Form View Ans. a 433. _______ is an alternate to datasheet view for design of table in MS Access. (a) Datasheet View (b) Design View (c) Report View (d) Form View Ans. b 434. An ordinary form for data entry in MS Access tables may be created using______ menu. (a) Create>Form (b) Create>Split Form (c) Create>Multiple Items (d) Create>Blank Form Ans. a 435. In MS Access, a form with data records at one half and entry format at the other half may be created using______ menu. (a) Create>Form (b) Create>Split Form (c) Create>Multiple Items (d) Create>Blank Form Ans. b 436. In MS Access, multiple rows of data may be created using______ menu. (a) Create>Form (b) Create>Split Form (c) Create>Multiple Items (d) Create>Blank Form Ans. c
  • 47.
    437. In MSAccess, blank form may be created using______ menu. (a) Create>Form (b) Create>Split Form (c) Create>Multiple Items (d) Create>Blank Form Ans. d 438. In MS Access, form may created through a wizard using______ menu. (a) Create>More Forms>Form Wizard (b) Create>Split Form (c) Create>Multiple Items (d) Create>Blank Form Ans. a 439. In MS Access, data sheet may be created using _______ menu. (a) Create>More Forms>Form Wizard (b) Create>More Forms>Data Sheet (c) Create>More Forms>Modal Dialog (d) Create>Blank Form Ans. b 440. In MS Access, form dialog may be created using_______ menu. (a) Create>More Forms>Form Wizard (b) Create>More Forms>Data Sheet (c) Create>More Forms>Modal Dialog (d) Create>Blank Form Ans. c 441) Explain what is IMAP (Internet Message Access Protocol)? IMAP means Internet Message Access Protocol; it is a standard protocol for using e-mail service from your local server. 442) Explain what is POP3 protocol? POP3 means Post Office Protocol 3 is a protocol that offers a simple way for users to use mailboxes and download messages to their computers. It allows users to download mails from the mail server to the local server and enables you to read the mail even if you are offline. 443) Explain what is SMTP protocol? SMTP or Simple Mail Transfer Protocol allows you to send emails and not to receive them, it act as Mail Transfer Agent (MTA) to deliver your e-mail to the recipient‟s mail server. 444. What is Outlook? Ans. Microsoft Outlook is the name of a software program that combines your e-mail, calendar, meetings/appointments, contacts, address book and tasks. 445. What is Personal Storage Table (PST)? Ans. A Personal Storage Table is an Open Proprietary file format used to store copies of messages, calendar events, and other items within Microsoft software such as Microsoft Exchange Client, Windows Messaging, and Microsoft Outlook. 446. What is OST file? Ans. An OST file (.ost) is an offline folder file in Microsoft Outlook. Offline folders make it possible for the user to work offline and then to synchronize changes with the exchange server the next time they connect.
  • 48.
    447. What isthe difference between an OST and PST file? a) The basic difference between OST and PST is that OST files are used to save data for offline use and are stored in MS Exchange Server. Whereas PST files are personal folder data and storage on client‟s hard disk. 448. Outlook has many tools that can do many thing. Which one of the following tasks is Outlook NOT designed to do? a) send out a newsletter b) balance your checkbox c) arrange an online meeting d) keep track of your contacts Ans. b 449. The CEO of your company just sent mail to all 10,000 of your fellow employees. You want to reply to her and say, “Thanks!”. Which button should you click? a) Reply b) Reply all c) Reply with meeting d) Forward Ans. a 450. Which tool would you use to view the calendars of your entire team at the same time? a) Daily task list b) Share calendar c) Scheduling assistant d) Open calendar Ans. c 451.Which contains miniature representation of slides? A Slides B Handout C Template D Slide master Ans. b 452.Which button is used to add instant animation to the presentation and helps interactive presentation? A Add button B Start button C Insert button D Action button Ans. d 453.Which tool allows user to select different layout for slide? A Apply design B Bullets C New slide D Slide Layout Ans. a 454.Which shortcut key is used to create new presentation in powerpoint? A Ctrl + P B Ctrl + N C Ctrl + M D Ctrl + X Ans. b 455.How many panes are these in backstage view in power point 2010? A 3 B 5 C 7 D 9 Ans. a 456.Which menu is used to apply various effects to the text in a slide? A Animation B Design C Transitions D Slide show Ans. a 457. Which menu is used to apply various visual effects to the slide in power point? A Animation B Design C Slide show D Transitions Ans. d
  • 49.
    458.Which menu isused to select a predefined chart style? A Animation B Design C Slide show D Transitions Ans. b 459.Which template makes specify common design elements in all slides in the presentation? A Fax template B User template C Data template D Master template Ans. d 460.Which shortcut key is used to invoke thesaurus dialog box in Power Point? A Shift+F7 B Ctrl+F7 C Alt+F7 D Ctrl+Alt+F7 Ans. a 461. Bus word take from latin word __________means for all. a) Mini b) Omnibus c) Vehicle d) Heetson Ans. b 462. CMOS is a type of RAM, which is constantly powered by _____. (a) UPS battery (b) CMOS battery (c) AC main (d) AA battery Ans. b 463. In motherboard, BIOS is expanded as _____. (a) Beginner Input Output System (b) Bit Input Output System (c) Basic Input Output System (d) Basic Input Output Syntax Ans. c 464. In motherboard, CNR stands for ______. (a) Communication & Network Riser (b) Contact & Network Riser (c) Communication & Network Ripper (d) Complementary & Networking Riser Ans. a 465. In motherboard, AGP stands for ______. (a) Automated Graphics Port (b) Accelerated Graphics Point (c) Audio Graphics Port (d) Accelerated Graphics Port Ans. d 466. In motherboard, SATA stands for ______. (a) Serial Advanced Technology Attachment (b) Synchronous Advanced Technology Attachment (c) Synaptic Advanced Technology Attachment (d) Systematic Advanced Technology Attachment Ans. a
  • 50.
    467. In motherboard,___ chipset takes care of data transfer to and from the processor. (a) Southbridge (b) Eastbridge (c) Northbridge (d) Westbridge Ans. c 468. In motherboard, _______ chipset takes care of data transfer to and from the secondary storage devices (like hard disk, CD/DVD drive, etc.). (a) Southbridge (b) Eastbridge (c) Northbridge (d) Westbridge Ans. a 469. Missing slot covers on a computer can cause? a) over heat b) power surges c) incomplete path for ESD d) None of these Ans. a 470. Which motherboard form factor use 120 pin connector? a) ATX b) AT c) BABY AT d) All of these Ans. a 471. Computer device which is similar to mouse is a) joystick b) keyboard c) trackball d) barcode reader Ans. c 472. Hand-held device which is used to pick options that are displayed on a computer screen is known as a) keyboard b) mouse c) joystick d) stylus pen Ans. b 473. The device which is used to position the screen cursor is a) Mouse b) Joystick c) Data glove d) Both A and C Ans. a 474. ____ is used for detecting mouse motion. a) Optical sensor b) Rollers on the bottom of mouse c) Both A and B d) Sensor Ans. c 475. Which of the following type of mouse contain a ball on its underside and sensors to detect direction of ball movement? a) Mechanical mouse b) Opto-mechanical mouse c) Optical mouse d) None of these Ans. a 476. Cordless mouse or wireless mouse connects to the computer through a) Infrared light b) Radio wave c) Both A and B d) None of these Ans. c
  • 51.
    477. The _____is a pointing device that is much like an inverted mouse. a) joystick b) Trackball c) USB d) Scanning Device Ans. b 478. Which is an example of pointing device? a) Mouse b) Pointer c) Cursor d) HDMI port Ans. a 479. The ______ helps to move the cursor on screen and point at specific icons. (a) scanner (b) mouse (c) keyboard (d) printer Ans. b 480. Normally, pressing the _______ button of mouse opens a context menu. (a) left (b) right (c) centre (d) bottom Ans. b 481. what is the extension file excel 2004 ? a) .xls b) .excel c) .xcel d) .xcl Ans. A 482. what is the extension file excel 2007 and above ? a) .xls b) .excel c) .xlsx d) .xcl Ans. C 483. Worksheet is also called an array of____. a) column b) cells c) box d) formula Ans. b 484.How Cells are named in MS Excel? A Alphabetically B Numerically C Alphanumerically D Special Character Ans. c 485.What is the maximum limit of rows in MS Excel 2010? A 1084567 B 1048567 C 1048576 D 1084576 Ans. c 486.What is the maximum limit of column in MS Excel 2010? A 16384 B 16438 C 16843 D 16348 Ans. a 487.Which bar lies top of the window in Excel Screen? A Status Bar B Ruler C Title Bar D Scroll Bar Ans. c
  • 52.
    488.How rows arenumbered in MS Excel? A Alphabetically B Numerically C Alphanumerically D Special characters Ans. b 489.How columns are named in MS Excel? A Alphabetically B Numerically C Alphanumerically D Special characters Ans. a 490.Which tab is used to include pivot table, charts, hyperlinks to a spread sheet? A Insert B Page Layout C Data D Review Ans. a 491. Microsoft Office is a set of vital applications Primarily known as______. Ans. Office suit 492. Starting with Microsoft Office 2003, Photo Editor was renamed to: a) Photo Manager b) Picture Manager c) Picture Editor d) Paint Editor Ans. b 493. Is Microsoft Works is part of the Microsoft Office suite? a) Yes b) No Ans. b 494. What was the HTML editor that was part of Microsoft Office until 2003? a) Web Page b) Explorer c) FrontPage d) Dream Weaver Ans. c 495. Office 365 is now the most popular cloud application in the world. But when did it debut? a) 2008 b) 2010 c) 2011 d) 2014 Ans. c 496. Can we edit a Macro programmatically after recording it? a) Yes b) No Ans. a 497. We can start MS Word by typing _____ in the Run Dialog Box. a) winword.exe b) word.exe c) msword.exe d) docx.exe Ans. a 498. Can we assign a keyboard shortcut of our choice to a Macro? a) No b) Yes Ans. b
  • 53.
    499. Which oneis the spreadsheet application that comes with MS Office software group? a) MS Word b) MS excel c) MS PowerPoint d) MS access Ans. b 500. We can apply border to _____ a) Cell b) Paragraph c) Table d) All of these Ans. d 501. Which of the following software replace the MS Paint in Windows 10 a) Paint 3D b) New MS Paint c) Paint 3D d) Universal Paint Ans. c 502. What is the Default Background color in MS Paint? a) Yellow b) Aqua c) Blue d) White Ans. d 503. What is the Default Foreground color in MS Paint ? a) white b) black c) red d) yellow Ans. b 504. Magnifier, Eraser, Fill color tools are available in MS Paint ? a) Toolbox b) Menu bar c) color box d) status bar Ans. a 505. Which key is used to draw straight line in MS Paint ? a) Ctrl b) shift c) Alt d) window Ans. b 506. Which tool is used to spray colors in MS paint ? a) Fill color b) Airbrush c) brush d) Calibri brush Ans. b 507. MS Paint file saved as _______. a) .doc b) .xml c) .bmp d) .html Ans. c 508. Which tool is used to draw a circle in MS paint? a) Ellipse b) draw c) Curve d) Oval Ans. d 509. Which tool is used to write name in MS Paint ? a) Text tool b) Line tool c) Pencil tool d) Brush tool Ans. a 510. Which of the following tool is not available in the Ribbon Bar? a) Clipboard b) Image c) Tool d) View Ans. d
  • 54.
    511. Which menuitem do I use to format my font styles and paragraph settings? a) File b) Home c) Insert d) View Ans. b 512. Why is it best not to use too much WordArt? a) It becomes blurry and difficult b) You can never use too much WordArt c) Too much means it loses its effects & clutters your document d) The faster your computer, the slower the display will update Ans. c 513. When a publisher object is selected, _____ appears around the object a) A red checkered border b) A light blue dashed line c) A line with Multiple handles d) Arrows Ans. c 514. This is one thing you can‟t create with MS Publisher a) Brochure b) Greeting Cards c) Spreadsheet d) Flyer Ans. c 515. Is it possible to create a trifold brochure using MS Word? a) Yes b) No Ans. a 516. How could you send out a colorful message about an upcoming company picnic? a) create a flyer in Publisher b) create flyer in PowerPoint c) create a trl fold brochure in Publisher d) create a flyer in Excel Ans. a 517. You want an image to go behind the text on your brochure, which command do you use? a) Align b) Bring forward c) Send backward d) Rotate Ans. c 518. Does Publisher and Word have similar navigation ribbons? a) Yes b) No Ans. a 519. MS Publisher has many procreated documents that you can edit. These are called… a) edits b) templates c) slides d) images Ans. b 520. Using white text on a black background is considered _______ a) Alignment b) Proximity c) Contrast d) Black and white Ans. c
  • 55.
    521. Which commandis used to store the active document permanently? A Save B Send C Prepare D Save as Ans. a 522. Which shortcut key is used to high light the entire word document? A ctrl + A B ctrl + O C ctrl + S D ctrl + E Ans. a 523. The print resolution (quality) and colour preferences may be set using ______option available in print dialog. (a) collate (b) scale (c) printer properties>Finishing->Print on both sides (d) Properties>Paper/Quality Ans. d 524.What is the purpose of quick access toolbar? A To hold advance function B To hold special function C To hold basic function D To hold familiar and repeated function Ans. d 525. Which bar contains the current position of the cursor in MS Word? A layout B title bar C status bar D horizontal ruler Ans. c 526. Where does the close button appear in MS Word? A top left corner of the window B bottom left corner of the window C top right corner of the window D bottom right corner of the window Ans. c 527.Which one of the following is text styling feature of MS Word? A word fill B word art C word colour D word font Ans. b 528.Which option is used to view an exiting word document? A new B open C publish D prepare Ans. b 529.Which document view given an appearance as in web browser? A Draft view B Outline view C Web layout view D Full screen reading Ans. c 530.How many groups are there in Home Menu? A 4 B 5 C 6 D 7 Ans. b
  • 56.
    531. What isthe minimum and maximum value in Octal Number System? a) 1 to 8 b) 0 to 7 c) 2 to 9 d) None of the above Ans. b Values in Different Number System Binary 2 (0,1) Octal 8 (0,1,2,3,4,5,6,7) Decimal 10 (0,1,2,3,4,5,6,7,8,9) Hexadecimal 16 (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F) 532. What number system is not understood by C language compiler directly? a) Decimal b) Octal c) Binary d) Hex Decimal Ans. c Explanation: Yes, C language can not understand Binary language directly. Because C language is a High level language 533. Numbers are stored and transmitted inside a computer in which format? a) binary form b) ASCII code form c) decimal form d) alphanumeric form Ans. a 534. The value of radix in binary number system is ___ a) 2 b) 8 c) 10 d) 1 Ans. a Explanation: In a binary number system, the value of base or radix is 2. The binary system uses only two digits for the representation of numbers. 535. A computer language that is written in binary codes only is _____ a) machine language b) C c) C# d) Pascal Ans. a Explanation: Machine Language is written in binary codes only. It can be easily understood by the computer and is very difficult for us to understand. A machine language, unlike other languages, requires no translators or interpreters.
  • 57.
    536. Which amongthe following is port number of TELNET server? a) 21 b) 23 c) 25 d) 20 Ans. b 537. In which layer a proxy firewall filters data a) Network layer b) Transport layer c) Application layer d) Data Link Layer Ans. c 538. A5 Algorithm is used in GSM for a) Encryption b) Generation of Cipher key c) Authentication d) Integrity Ans. a 539. Which signal received by an 8086 processor indicates that an external device had requested the use of System bus? a) HOLD b) INTR c) TEST d) Ready Ans. a 540. Who developed DVD? a) Sony b) Philips c) Toshiba d) All of these 541. What is Availability? Ans. it ensure that system work promptly and service is not denied to authorized users. 542. PAN stands for _________ a) Personal area network b) Prompt area network c) Private area network d) Pear area network Ans. A 543. LAN stands for_______ a) Local Area network b) Line area network c) live area network d) Long area network Ans. A 544. CAN stands for _______ a) Campus area network b) College area network c) Center area network d) Close area network Ans. A 545. WAN stands for _______ a) wide area network b) wireless area network c) wast area network d) work area network Ans. A
  • 58.
    546. GAN standsfor__________ a) Global area network b) Ground area network c) Gold area network d) Globe access network Ans. A 547. ISP stands for_______. a) Internet service provider b) Indian special police c) International service provider d) Inspiration Ans. A 548. IPS stands for _______. a) IN plane switching b) Instructions Per second c) Indian police service d) Both a and b Ans. D 549. NTP stands for _______. a) Network time protocol b) New terminal Point c) Network time policy d) Network term policy Ans. A 550. SMS stands for________. a) Short message service b) Small message service c) special message service d) short module set Ans. A 551. Which one of the following is the correct way to open a notepad application? a) Click on office button > windows accessories > All apps > Notepad b) Start > Notepad > All apps > windows accessories c) Click on Windows button > All apps > Windows accessories > Notepad d) None of these Ans. c 552. Which one of the following should be clicked to save the existing Notepad window? a) Edit b) save c) Format d) None of these Ans. b 553. Which menu in Notepad has only two options, word wrap and font? a) Format b) Insert c) Title d) Edit Ans. a 554. What should be clicked to open a previous saved file while working with Notepad application? a) Open b) New c) Exit d) Save as Ans. a 555. which is shortcut key is used to open saved file in Notepad? a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + C Ans. a 556. Which shortcut key is used to open a new file in Notepad? a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + C Ans. b
  • 59.
    557. Which shortcutkey is used to save the file in Notepad? a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + C Ans. c 558. Which shortcut key is used to print the document in notepad? a) Ctrl + O b) Ctrl + N c) Ctrl + S d) Ctrl + p Ans. d 559. In Notepad if page orientation in Horizontal then they are in ______ a) Landscape b) Portrait c) Both d) None of these Ans. a 560. In Notepad if page orientation in Vertical then they are in ______ a) Landscape b) Portrait c) Both d) None of these Ans. b 561. GIMP permits manipulation at ______ levels. (a) image (b) layer (c) color space (d) all of them Ans. d 562. Simple painting can be done using ______ tools in GIMP. (a) brush/ airbrush (b) eraser (c) ink (d) all of them Ans. d 563. Layers may be aligned using ______ tool in GIMP. (a) crop tool (b) alignment tool (c) rotate tool (d) scale tool Ans. b 564. OpenOffice.org drawing file has extension of ______. (a) .odt (b) .ods (c) .odg (d) .odp Ans. c 565. OpenOffice.org presentation file has extension of ______. (a) .odt (b) .ods (c) .odg (d) .odp Ans. d 566. Pencil drawing can be done using ______ tool in GIMP. (a) text (b) bucket fill (c) blend (d) pencil Ans. d 567. Colour difference between adjacent portions can be healed through proper gradient using ____ tool in GIMP. (a) text (b) bucket fill (c) blend (d) pencil Ans. c
  • 60.
    568. In OpenOffice.org,spreadsheet can be prepared using _______ application. (a) writer (b) calc (c) draw (d) impress Ans. b 569. Filling can be done using _______ tool in GIMP. (a) text (b) bucket fill (c) blend (d) pencil Ans. b 570. In OpenOffice.org, drawing can be prepared using ______application. (a) writer (b) calc (c) draw (d) impress Ans. c 571. What is a Copyright law? a) Generally defines the own creator of a source code. b) Generally defines a creator of an expression of an idea own that expression c) Distribution strategy or development strategy d) Many programmers working on same project Ans. b 572. OSI stands for_____ a) Open source index b) Open source image c) Open source initiative d) Open source Instant Ans. c 573. The users must agree to the _____ terms and agreements when they use an open source software. a) System b) License c) Community d) Programmer Ans. b 574. Which of the following is not a downside of OSS? a) Lack of personalized support b) Restricted choice c) No warranty d) Multiple choices Ans. d 575. An example of a web design OSS. a) Nvu b) KOffice c) AbiWorld d) Open Office Ans. a 576. An image editor similar to Adobe Photoshop. a) Nvu b) Open Office c) Bluefish d) GIMPshop Ans. d
  • 61.
    577. An OSSfor communication purpose. a) Virtue Mart b) Drupal c) Pidgin d) ZenCart Ans. c 578. A guideline for the OSS licenses other than the GPL. a) OSI b) OSD c) OSE d) OSL Ans. b 579. GPL of GNU says that every copy of a program governed by GPL license, even if modified, must be subject to GPL again. a) True b) False Ans. a 580. Richard Stallman from MIT, established a special license, the ____ license. a) GNU b) Free c) Package d) Commercial Ans. a 581. DOS stands for_________. a) Disk operating system b) Drive operating system c) Disk operation socket d) disk open supply Ans. A 582. In a single unit of computer we can use more than _______OS But at a time we may run only one OS. Ans. 1 583. GUI stands for_________. a) Graphical user interface b) Graphics uniq icon c) group user interface d) game user interface Ans. A 584. UNIX stands for __________. a) union interface Xerox b) user normal interface c) user normal interface d) Unicode information computing system, source Ans. D 585. Unix operating system developed in year_____. a) 1969 b) 1981 c) 1984 d) 1954 Ans. A 586. Ken Thompson and Dennis Ritchie developed an operating system name______ a) MAC b) window c) UNIX d) Linux Ans. C 587. ________ is an open source software. a) UNIX b) LINUX c) Window d) MAC Ans. B 588. The first linux kernel was released in ________. a) 1991 b) 1992 c) 1999 d) 1984 Ans. A
  • 62.
    589. The computerand software system that control the machine is called _______ Ans. Embedded System 590. MAC operating system was developed by ________. a) Steve jobs b) Abhinandan c) sunder pichai d) Dennis Richie Ans. A 591. The standard used in serial ports to facilitate communication is a) RS-246 b) RS-HEETSON c) RS-232-C d) RST 3 Ans. c 592. Transformation between the parallel and serial ports is done with the help of a) Flip flops b) logic circuits c) Shift registers d) peripherals Ans. c 593. Components used to increase the flexibility of the serial ports is a) wire used for port is changed b) ports are made to allow different clock signals for input and output c) the drives are modified d) connects the new cables Ans. b 594. Physical ports are usually referred to as _______ a) jacks b) cables c) interfaces d) hardware plugs Ans. c Explanation: Physical ports are connections that connect two systems for their interaction. LAN, PS2 and DVI are example of physical ports 595. _______ are logical numbers assigned for logical connections. a) Logical ports b) Physical ports c) Networking cables d) IP address Ans. a Explanation: Logical ports are end-point to a logical connection. The numbers are pre-assigned by IANA (Internet Assigned Numbers Authority) which ranges from 0-65536. 596. Number of logical ports ranges from ___ to _____ a) 0, 255 b) 1, 65535 c) 1, 65536 d) 0, 65536 Ans. d 597. Elimination –Yield Non-Preemptive Multiple Access Mechanism (EY-NPMA) is associated with which of the following technologies? a) LAN b) HIPERLAN c) ATM d) TOKEN Ring Ans. b
  • 63.
    598. Which modulationmechanism is used in Bluetooth technology to transform bits to a signal? a) ASK b) PSK c) OPSK d) GFS Ans. d 599. SEAL (Simple and Efficient Adaptation Layer) is associated with which AAL sub layer of ATM technology? a) AAL1 b) AAL2 c) AAL3/4 d) AAL5 Ans. d 600. What is the Weight of standard size DVD? a) 16 grams (0.56 oz) b) 25 grams (2 oz) c) 30 grams (3 oz) d) 32 grams (0.95 oz) Ans. a 601. Which of the following contains specific rules and words that express the logical steps of an algorithm? [IBPS Clerk 2014] (1) Programming language (2) Syntax (3) Programming structure (4) Logical chart (5) Flow chart Ans. 3 602. A factor in the selection of source language is (1) programmer skill (2) language availability (3) program compatibility with other software (4) All of the above Ans. 3 603. Machine language [SBI PO 2013] (1) is the language in which programs were first written (2) istheonlylanguageunderstoodbythecomputer (3) differs from one type of computer to another (4) All of the above (5) None of the above Ans. 4 604. Each model of a computer has a unique (1) assembly of a computer (2) machine language (3) high level language (4) All of the above Ans. 2 605. The language which can be relocated easily is (1) Machine language (2) Assembly language (3) Low level language (4) Middle level language Ans. 2 606. Which language is CPU dependent ? (1) C (2) Assembly (3) Java (4) All except Java Ans. 2
  • 64.
    607. ....... servesas the bridge between raw hardware and programming layer of a computer system. (1) Medium level language (2) Low level language (3) High level language (4) Both ‘1’ and ‘2’ Ans. 1 608. Computer language used for calculation is (1) LOGO (2) FORTRAN (3) BASIC (4) C + + Ans. 2 609. Which of the following computer language is a mathematically oriented language used for scientific problems? (1) Fortran (2) Cobol (3) Lisp (4) Prolog Ans. 1 610. Main application area of ALGOL is (1) General (2) Scientific (3) Engineering (4) Commercial Ans. 2 611. Which type of programming does Python support? a) Object-oriented programming b) structure programming c) functional programming d) all of the mentioned Ans. d 612. Is Python case sensitive when dealing with identifiers? a) no b) yes c) Machine dependent d) None of the mentioned Ans. b 613. All keywords in Python are in ________ a) Capitalized b) lower case c) UPPER CASE d) None of the mentioned Ans. d 614. What will be the value of the following Python expression? 4 + 3 % 5 a) 7 b) 2 c) 4 d) 1 Ans. a Explanation: The order of precedence is: %, +. Hence the expression above, on simplification results in 4 + 3 = 7. Hence the result is 7 615. Which of the following is used to define a block of code in Python language? a) Indentation b) Key c) Brackets d) All of the mentioned Ans. a
  • 65.
    616. What willbe the output of the following Python code? i = 1 while True: if i%3 == 0: break print(i) i + = 1 a) 1 2 3 b) error c) 1 2 d) None of these Ans. b Explanation: SyntaxError, there shouldn‟t be a space between + and = in += 617. Python supports the creation of anonymous functions at runtime, using a construct called ____ a) pi b) anonymous c) lambda d) none of the mentioned Ans. c 618. What is the order of precedence in python? a) Exponential, Parentheses, Multiplication, Division, Addition, Subtraction b) Exponential, Parentheses, Division, Multiplication, Addition, Subtraction c) Parentheses, Exponential, Multiplication, Division, Subtraction, Addition d) Parentheses, Exponential, Multiplication, Division, Addition, Subtraction Ans. d 619. What will be the output of the following Python code snipped if x=1 ? X<<2 a) 4 b) 2 c) 1 d) 8 Ans. a Explanation: The binary form of 1 is 0001. The expression x<<2 implies we are performing bitwise left shift on x. This shift yields the value: 0100, which is the binary form of the number 4. 620. Which of the following is true for variable names in Python? a) underscore and ampersand are the only two special characters allowed b) unlimited length c) all private members must have leading and trailing underscores d) none of the mentioned Ans. b
  • 66.
    621. Which ofthe following is used in Readt.js to increase performance? a) Virtual DOM b) Original DOM c) Both A and B d) None of the above Ans. A 622. What is ReadtJS? a) Server-side framework b) user interface framework c) both a and b d) none of the above Ans. B 623. Identify the one which is used to pass data to components from outside a) Render with arguments b) setState c) PropTypes d) props Ans. D 624. Who created React.Js? a) Jordan Mike b) Jordan Walke c) Tim Lee d) Jordan Lee Ans. B 625. In Which language is React.js written? a) Python b) JavaScript c) Java d) PHP Ans. B 626. What is Babel? a) JavaScript compiler b) JavaScript interpreter c) JavaScript transpiler d) None of these Ans. A 627. Identify the command used to create a react app. a) npm install create-react-app b) npm install –g create-react-app c) install –g create-react-app d) none of the above Ans. B 628. Which of the following port is the default where webpack-dev-server runs? a) 3000 b) 3306 c) 3030 d) 8080 Ans. D 629. How many elements can a valid react component return? a) 1 b) 2 c) 3 d) 4 Ans. A 630. A state in React.js is also known as? a) The internal storage of the component b) External storage of the component c) Permanent storage d) All of the above Ans. A
  • 67.
    631. We getlist of sites after typing a word in search bar called _______. a) Key Phrase b) Single Word c) Heetson d) Sonu Ans. a 632. The search results are generally presented in a line of results often referred to as _______ a) Category List b) Tag list c) search Engine Results Pages d) Search Engine Pages Ans. c 633. Search Engines maintain heavy database of keywords and urls ! a) True b) False Ans. a 634. Web search engines stores information about many web pages by a ______. a) Web indexer b) Web Crawler c) Web Organizer d) Web Router Ans. b 635. Web Crawler is also called as ______. a) Link Directory b) Web Spider c) web Manager d) Search Optimizer Ans. b 636. Search engine optimization is the process of _______ of a website or a web page in a search engine‟s search results. a) Affecting the visibility b) None of these c) Generating Cached files d) Getting Meta Tags Ans. a 637. SEO is all about optimizing a web site for search engines. a) True b) False Ans. a 638. SEO is to improve the volume and ______ to a web site from search engines. a) Look and feel b) Advertisement c) Quality of traffic d) None of these Ans. c 639. SEO can be called as art of ranking in the search engines. a) True b) False Ans. a 640. A keyword search engines: a) allows all users to change its content b) returns a list of sites that have been reviewed by humans c) returns a list of sites based on the search terms you enter d) searches a variety of other search engines Ans. c
  • 68.
    641. Word processing,spreadsheet, and photo-editing are examples of: a) application software b) system software c) operating software d) platform software Ans. a 642. _____ is a set of computer programs used on a computer to help perform tasks. a) An instruction b) Software c) Memory d) A Processor Ans. b 643. System software is the set of programs that enables your computer’s hardware devices and ___ software to work together. a) management b) processing c) utility d) application ans. d 644. The two broad categories of software are: a) Word processing and spreadsheet b) Transaction and application c) Windows and Mac OS. d) System and Application Ans. d 645. Personnel who design, program, operate and maintain computer equipment refers to a) Console-operator b) Programmer c) Peopleware d) System Analyst Ans. b 646. A computer program that convert an entire program into machine language is called a/an a) Interpreter b) Simulator c) Compiler d) Commander Ans. c 647. A computer program the translates one program instructions at a time into machine language is called a) Interpreter b) CPU c) Compiler d) Simulator Ans. a 648. Program designed to perform specific tasks is known as a) System software b) application software c) utility program d) operating system Ans. b 649. Each model of a computer has a unique a) Assembly language b) Machine language c) High level language d) All of the above Ans. b 650. The language that the computer can understand and execute is called a) Machine language b) Application software c) System program d) All of the above Ans. a
  • 69.
    651. Company restoreoption is available in ________. a) Company reset b) New company c) company information d) Edit company Ans. c 652. To change current Date from Gateway of tally press the key ____. a) F1 b) F2 c) F3 d) F4 Ans. b 653. Tally supports ________ system of accounting. (a) single entry (b) double entry (c) no entry (d) null entry Ans. b 654. Tally can maintain ________ for stock keeping, so that fresh inventory may arrive before the old stock is exhausted. (a) reorder level (b) profit (c) loss (d) cash Ans. a 655. Balance sheet is produced ________when accounts are maintained in Tally. (a) manually (b) automatically (c) remotely (d) randomly Ans. b 656. The statement of account debits, credits, assets and liabilities is called______. (a) stock & inventory report (b) profit & loss account (c) balance sheet (d) cash balance Ans. c 657. Pressing _______button in the Gateway of Tally opens company info in Tally. (a) Alt+F3 (b) F11 (c) F5 (d) F6 Ans. a 658. Pressing______ key opens accounting features. (a) Alt+F3 (b) F11 (c) F5 (d) F6 Ans. b 659. Payroll, budgeting and scenario management may be enabled through ______menu in Tally. (a) Accounting Features (b) Inventory Features (c) Statutory and Taxation (d) none of them Ans. a 660. Account Groups, Ledgers, Budget and scenario are available under ______ in Tally. (a) Payroll Info (b) Inventory Info (c) Accounts Info (d) none of them Ans. c 661. In which decade was the American Institute of Electrical Engineers (AIEE) founded? a) 1850s b) 1880s c) 1930s d) 1950s Ans. b 662. In Which decade with the first transatlantic radio broadcast occur? a) 1850s b) 1880s c) 1930s d) 1900s Ans. d 663. ‘.MOV’ extension refers usually to what kind of file? a) Image file b) Animation/movie file c) Audio file d) MS office document Ans. b
  • 70.
    664. In whichdecade was the SPICE simulator introduced? a) 1950s b) 1960s c) 1972s d) 1980s Ans. c 665. Most modern TV’s draw power even if turned off. The power is used in does what function? a) Sound b) Remote Control c) Color balance d) High voltage Ans. b 666. Which is a type of Electrically-Erasable Programmable Read-Only Memory? a) Flash b) Flange c) Fury d) FRAM Ans. a 667. The purpose of Choke in Tube light is ? a) To decrease the current b) To increase the current c) To decrease the voltage momentarily d) To increase the voltage momentarily Ans. d 668. ‘.MPG’ extension refers usually to what kind of file? a) Word Perfect Document file b) MS Office document c) Animation/movie file d) Image file Ans. c 669. Who is largely responsible for breaking the German Enigma codes, created a test that provided a foundation for artificial intelligence? a) Anan Turing b) Jeff Bezos c) George Boole d) Charles Babbage Ans. a 670. Made from a variety of materials, such as carbon, which inhibits the flow of current ..? a) Choke b) Inductor c) Resistor d) Capacitor Ans. c 671. What is the interface between the user and operating system in UNIX. Ans. Shell 672. One can write Programs using shell which is known as _______. Ans. Shell Scripts 673. Bourne Shell indicated by ______ Prompt. Ans. $ 674. C shell indicated by ______ Prompt. Ans. % 675. Super user indicated by ________Prompt. Ans. #
  • 71.
    676. UNIX wasone of the first operating systems to support _______. (a) multi-tasking (b) Internet (c) email (d) all of them Ans. d 677. UNIX was developed in the year _______. (a) 1970 (b) 1984 (c) 1985 (d) 1993 Ans. a 678. POSIX stands for _______. (a) Power Operating System Interface (b) Portable Operating System Interface (c) Portable Operating System Internet (d) Portable Overall System Interface Ans. b 679. Early versions of UNIX supported a graphical user environment called _____. (a) KDE (b) CDE (c) GNOME (d) none of them Ans. c 680. CDE stood for _____ . (a) Common Desktop Environment (b) Command Desktop Environment (c) Common Desktop Entry (d) Common Directory Environment Ans. a 681. The programming environment which permits coding, compilation, running and debugging from a single window is called (a) Integrated Development Environment (IDE) (b) Editor (c) Highlighter (d) Compiler Ans. a 682. The IDE of VBA supports since it permits drag and drop approach for design of user interface. (a) Procedural Approach (b) reverse approach (c) Rapid Application Development (RAD) (d) postfix approach Ans. c 683. VBA permits of data from spreadsheets. (a) reading (b) writing (c) both reading and writing (d) neither reading nor writing Ans. c 684. VBA supports ready made user interface components like . (a) User Form, Command Button (b) Label, Text Box, Combo Box, List Box (c) Tab Strip, Option Button, Toggle Button (d) all of them Ans. d 685. VBA supports through class module. (a) Object Oriented Programming System (OOPS) (b) Procedural programming (c) Functional programming (d) property based model Ans. a
  • 72.
    686. VBA canbe used to automate carried out through MS Excel. (a) data processing (b) graphing (c) accessing cell values (d) all of them Ans. d 687. VBA code is compiled into an intermediate code called code. (a) P-Code (b) Micro Soft Intermediate Code (MSIL) (c) Java Virtual Machine (JVM) code (d) Android Virtual Device (AVD) code Ans. a 688. MS Excel creates to execute VBA code. (a) real time computer (b) mobile computer (c) tablet computer (d) virual machine Ans. d 689. ____is the shortcut to open VBA IDE from MS Excel. (a) Alt+F11 (b) Alt+F8 (c) Ctrl+ Break (d) Ctrl+ G Ans. a 690._______ is the shortcut to open immediate window in VBA IDE. (a) Alt+F11 (b) Alt+F8 (c) Ctrl+ Break (d) Ctrl+ G Ans. d 691. There are _________ types of computer virus. a) 5 b) 7 c) 10 d) 12 Answer: c Explanation: There are a total of 10 types of virus. These are categorized based on their working and characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus, Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro Virus, Rootkit virus. 692. A computer ________ is a malicious code which self-replicates by copying itself to other programs. a) program b) virus c) application d) worm Ans. b 693. In which year Apple II virus came into existence? a) 1979 b) 1980 c) 1981 d) 1982 Answer: c Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into existence. It was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk. 694. The virus hides itself from getting detected by ______ different ways. a) 2 b) 3 c) 4 d) 5 Answer: b
  • 73.
    695. _______________ infectsthe master boot record and it is challenging and a complex task to remove this virus. a) Boot Sector Virus b) Polymorphic c) Multipartite d) Trojans Answer: a Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task to remove such virus. Mostly such virus spreads through removable devices. 696. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects. a) Boot Sector Virus b) Direct Action Virus c) Polymorphic Virus d) Multipartite Virus Answer: b Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such type of virus stays involved to the specific type of files which it infects. 697. ______________ infects the executables as well as the boot sectors. a) Non-resident virus b) Boot Sector Virus c) Polymorphic Virus d) Multipartite Virus Answer: d Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the computer or get into any system through multiple mediums and are hard to remove. 698. ______________ are difficult to identify as they keep on changing their type and signature. a) Non-resident virus b) Boot Sector Virus c) Polymorphic Virus d) Multipartite Virus Answer: c Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and signature. They’re not easily detectable by traditional antivirus. It usually changes the signature pattern whenever it replicates itself. 699. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus? a) Research purpose b) Pranks c) Identity theft d) Protection Answer: d Explanation: Computer virus is not created for protection. Virus writers may have other reasons like for research purpose, pranks, vandalism, financial gain, identity theft, and some other malicious purposes. 700. The virus that spread in application software is called as 1. Boot virus 2. Macro virus 3. File virus 4. Anti virus Ans. b
  • 74.
    701. Documents inMicrosoft One Drive can be edited using _____. (a) online version of Microsoft office tools using browser (b) installed version of Microsoft office tools (c) both a & b (d) none of them Ans. c 702. Which document view given an appearance as in web browser? A Draft view B Outline view C Web layout view D Full screen reading Ans. c 703. What is the full form of BOM? A Browser Object Method B Browser Object Model C Browser Oriented Method D Browser Oriented Model Ans. b 704. What is the purpose of Alt + W key in Tally? A Change the financial period B Invoke Tally Reference Manual C Open default web browser D Exist Tally without confirmation Ans. c 705. What‟s a web browser ? a) A kind of spider b) A computer that store www files c) A person who likes to look at websites d) A software program that allows you to access sites on the world wide web Ans. d 706. A _____ is a document commonly written and is accessible through the internet or other network using a browser? a) Accounts b) Data c) Web page d) Search engine Ans. c 707. Which of the following is used to read HTML code and to render Webpage? a) Web Server b) Web Browser c) Web Matrix d) Web Heetson Ans. b 708. First Web Browser was created in _______. a) 1991 b) 1992 c) 1993 d) 1990 Ans. d 709. First web browser was created by _______. a) Tim Berners lee b) Mozilla Foundation c) Marc Andreessen d) Jacobs Ans. a 710. A free open source software version of Netscape was the developed called ______. a) Opera Mini b) IE c) Google Chrome d) Mozilla Ans. d
  • 75.
    711. Website isa collection of a) HTML documents b) Graphic files c) Audio and video files d) All of these Ans. d 712. A _____ is the simplest form of website, in which the site‟s content is delivered without the use of server side processing. a) Dynamic Website b) E-Commerce Website c) Static website d) Social Networking Website Ans. c 713. WordPress can be called as ______. a) Content Manager of Website b) Static Website c) Dynamic Website d) E-Commerce Website Ans. a 714. Which of the following website type is used to create beautiful animation? a) Dynamic b) E-Commerce c) Static d) Flash Ans. d 715. Flash is proprietary software developed by ______. a) Yahoo b) Macromedia c) Google d) Sencha Ans. b 716. Website used to sell and buy something are categorized under _____. a) Search engine b) Social Networking c) E-Commerce Website d) Entertainment Sites Ans. c 717. Which of the following is example of micro blogging? a) Facebook b) Twitter c) Orkut d) Google+ Ans. b 718. Which of the following is not used as blogging platform? a) WordPress b) TypePad c) Pinterest d) Blogger Ans. c 719. ______ programs are automatically loaded and operates as a part of browser. a) Add-ons b) Utilities c) Widgets d) Plug-ins Ans. d 720. Which of the following language is used to write animation and games in browser? a) HTML b) C Programming c) Java d) None of these Ans. c
  • 76.
    721. A wirelessnetwork uses ___ waves to transmit signals. a) mechanical b) radio c) sound d) None of these Ans. b 722. What device sends and receives radio signals in a wireless network? a) modem b) digital translator c) router d) All of these Ans. c 723. ______ of the following networking standards, which is not used in Wi-Fi data transmisstions? a) 802.11g b) 802.11q c) 802.11b d) None of these Ans. b 724. Which networking standard is the slowest and least expensive? a) 802.11a b) 802.11b c) 802.11n d) All of these Ans. b 725. Which networking standard was the first to use orthogonal frequency division multiplexing (OFDM) as a coding technique? a) 802.11g b) 802.11a c) 802.11n d) None of these Ans. b 726. Which short range wireless standard is used for Wireless Personal Area Networks (WPANs)? a) 802.16 b) 802.15 c) 802.13 d) None of these Ans. b 727. You can change the settings on your wireless router through a Web interface. One option you can change is channel. What channel do routers use by default? a) 2 b) 7 c) 6 d) None of these Ans. c 728. Which Operates in the 2.4GHz Industrial, Scientific and Measurement (ISM) band (2.4 GHz to 2.4835 GHz) and provides signaling rates of up to 11 Mbit/sec. a) 802.11a b) 802.11b c) 802.11e d) 802.11g Ans. b 729. Which Wi-Fi security is impossible to crack? a) WEP b) WPA c) MAC Filtering d) None of these Ans. d 730. What should you do to keep unauthorized users from changing your home router settings? a) Change the firewall settings on your computer b) Change the default administrator password and SSID c) Change the MAC address of the router d) Nothing, only the administrator can change router settings Ans. b
  • 77.
    731. How manytypes of alignment available in word pad? a) 1 b) 2 c) 3 d) 4 Ans. d 732. What is the Default file extension of Wordpad? a) .rtf b) .pdf c) .docx d) .pptx Ans. a 733. In Wordpad .rtf stands for ____ a) Rich text file b) rich text format c) Real text file d) None of these Ans. b 734. In wordpad Home and view is called ? a) Group b) Tab c) Alignment d) None of these Ans. b 735. If you copy and cut the text in Word pad they temporary stored in ____ a) Clipboard b) Format Painter c) Hard Disk d) Footer Ans. a 736. What is Maximum Zoom size in Wordpad? a) 500 b) 400 c) 300 d) 200 Ans. a 737. What is Minimum Zoom size in Wordpad ? a) 10 b) 5 c) 34 d) 100 Ans. a 738. What is the shortcut key for special paste in wordpad? a) Alt + Ctrl + V b) Ctrl + V c) Ctrl + Shift + V d) All of these Ans. a 739. If you want to use another program inside the wordpad then which option will be use? a) Insert Object b) Font c) Paragraph d) Replace Ans. a 740. How many number of Text Highlight color is present. a) 10 b) 15 c) 20 d) 25 Ans. b 741. CMS stands for ____. a) Content Management System b) Creator Management System c) Content Manager Source d) None of these Ans. A 742. Which of these is a feature of WordPress? a) User Management b) Provides tools for Search Engine Optimisation c) Contains multiple themes to style our websited) All of these Ans. D
  • 78.
    743. Which ofthese is an advantage of WordPress? a) PHP requirement b) SEO tools make on-site SEO easier c) Frequent updates require multiple backup copies. d) All of these Ans. B 744. Which WordPress type can be installed on a user’s computer? a) WordPress.com b) WordPress.org c) Both d) None of these Ans. B 745. Which database is required by WordPress? a) MySQL b) MongoDB c) RDB d) None of these Ans. A 746. The Quick draft section in WordPress is used for_____. a) Creating mini-posts with titles and small details b) Editing posts c) Creating pages d) All of these Ans. A 747. Which of these is displayed using the WordPress news widget? a) Software version b) Software updates c) Alerts d) All of these Ans. D 748. Which of these is not seen on the WordPress dashboard? a) Site traffic b) Menu options c) Welcome text d) All of these Ans. A 749. Which of these are general settings of WordPress? a) Site title b) Data format c) Time format d) All of these Ans. D 750. What task does search engine visibility performs in WordPress? a) Removes site visibility on Google b) Discourage search engine from indexing the site c) Both d) None of these Ans. A 751.An operating system version designed for use with a media center PC is Microsoft Window XP Ans. Media center edition 752. Which one is the default „word Processor‟ for Microsoft Windows? a) MS Word b) MS Paint c) Word Pad d) Notepad Ans. c 753.Which mode loads minimal set of drivers when starting Windows? Ans. Safe Mode 754. Which operating system doesn‟t support networking between computers? a) Windows 3.1 b) Windows 95 c) Windows 2000 d) Windows NT Ans. a
  • 79.
    755. Which keycombination is used to minimize all open windows and displays in the screen? Ans. Windows key + D 756. How many users can access a share folder simultaneously from a Windows XP machine? a) 8 b) 9 c) 10 d) Unlimited Ans. c 757. Which of the following windows do not have start button a) Windows Vista b) Windows 7 c) Windows 8 d) Windows 95 Ans. c 758. Which of the following Operating systems is better for implementing a Client Server network a) MS DOS b) Windows 95 c) Windows 98 d) Windows 2000 Ans. d 759. Which one is the latest release of Windows Client Operating system? a) Windows XP b) Windows 7 c) Windows 8 d) Windows 10 Ans. d 760. Which function key needs to be press during reboot to enter in Safe Mode of a Windows machine? Ans. F8 761. Microsoft 10 was launched in the year _____. [DRDO GTRE 2017] a) 2013 b) 2014 c) 2016 d) 2015 Ans. d 762. Which of the following is true for testing and debugging? [DRDO CVRDE 2017] a) Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the program. b) Testing and debugging indicate the same thing. c) Testing detects the syntax errors in the program while debugging corrects those errors in the program. d) All of the above Ans. a 763. Computer systems that store instructions and data without any differences and data from the same memory unit are based on _____ structure. [DRDO CVRDE 2017] a) Harvard b) Babbage c) Knuth d) Von-Neumann Ans. d 764. In the screen is maximized, then the maximize button will be temporarily replaced by the _____ button. [DRDO GTRE 2017] a) Close b) Open c) Re-store d) Minimize Ans. c
  • 80.
    765. Which ofthe following is not a ‘over write’ virus ? [RRB Ranchi Asst. Loco Pilot] a) Trj. Reboot b) Meve c) Way d) Trivial.88.D Ans. b 766. Which of the following are machine level languages? [ISRO Satelite Centre Bengaluru] a) C++ b) Java c) Python d) None of these Ans. d 767. Program Counter (PC) register stores the- a) Address of the first memory block b) Address of the last memory block c) Address of the next instruction to be executed d) Size of the primary memory Ans. c 768. Which of the following function(s) is/are provided by operating system? [RRB Ranchi Asst. Loco Pilot] a) Process management b) Security Management c) File management d) All of these Ans. d 769. ____ was the first computer language developed for electronic computer in 1949? [RRB Ajmer Asst. Loco Pilot] a) Short code b) FORTRAN c) COBOL d) Pascal Ans. a 770. How many layers are there in TCP/IP Model? [Indian Ordnance Factory] a) 2 b) 4 c) 5 d) 7 Ans. b 771. Program that duplicate the functionality of one system on another system is known as [RRB Chandigarh Asst. Loco Pilot] a) Emulators b) Simulators c) Evaluators d) PCB Ans. a 772. Which of the following is an application protocol? [RRB Ahamadabad Asst. Loco Pilot] a) HTTP b) TCP c) IP d) UDP Ans. a
  • 81.
    773. Which amongthem is not an example of mobile operating system? [RRB Chandigarh Asst. Loco Pilot] a) Android b) Bada c) Fedora d) Symbian Ans. c 774. Which of the following is included in Paragraph Formatting in a word processor? [RRB Ahmadabad Asst. Loco Pilot] a) Subscript b) Font c) Underline colour d) Line spacing Ans. d 775. To declare the version of XML, the correct syntax is: a) ? xml version =’1.0’/ b) ? xml version =”1.0”/ c) * xml version =’1.0’/ d) /xml version = ‘1.0’/ Ans. b 776. On which of the following storage media, storage of information is organized as a single continuous spiral groove? a) RAM b) Floppy disk c) Hard disk d) CD-ROM Ans. d 777. The addressing mode used in an instruction of the from ADD X,Y is: a) Absolute b) Indirect c) Immediate d) Index Ans. d 778. What is garbage collection in the context of java? a) The operating system periodically deletes all of the Java files available on the system. b) When all references to an object are gone, and then the memory use by the object is automatically reclaimed. c) Any java package imported in a program and not being used is automatically deleted. d) The java virtual machine (JVM) checks the output of any java program and delete anything that does not make sense at all Ans. b 779. Which of the following represents the life-cycle of software development? a) Analysis – design – coding – testing- operation and maintenance b) Analysis – Design – Coding – Operation and maintenance – testing c) Design – Analysis – Coding – testing – operation and maintenance d) Design – analysis – coding – operation and maintenance – testing Ans. a
  • 82.
    780. In arelational database model, cardinality of a relation means a) The number of tuples b) The number of tables c) The number of attributes d) The number of constraints Ans. a 781. The 10 base 5 cabling is also known as _____. a) Thick Ethernet b) Gigabit Ethernet c) Thin Ethernet d) Fast Ethernet Ans. a 782. What is the length of an IP address in bytes (pre-IPv6)? a) 1 b) 4 c) 2 d) 8 Ans. b 783. Program Counter contents indicate: a) The time elapsed since execution begins b) The count of programs being executed after switching the power ON. c) The address where next instruction is stored d) The time needed to execute a program Ans. c 784. Which of the following is the most appropriate format for graphics that are to be embedded within an internet document? a) BMP b) GIF c) TIFF d) HTML Ans. b 785. In relational databases, the natural join of two tables is: a) Combination of Union and filtered Cartesian product. b) Combination of projection and filtered Cartesian product c) Combination of selection and filtered Cartesian product d) Cartesian product always. Ans. b 786. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ______ and ______. a) 1000 bauds/ sec, 500 bps b) 2000 bauds/sec, 1000 bps c) 4000 bauds/sec, 1000 bps d) 1000 bauds/sec, 4000 bps Ans. d 787. Which of the following data structures is most suitable for evaluating postfix expressions? a) Stacks b) Queue c) Linked list d) Tree Ans. a
  • 83.
    788. The numberof bits required to represent decimal number 4096 in binary form is _____. a) 10 b) 13 c) 12 d) 16 Ans. b 789. In the context of visual basic, multiple controls of the same type can be grouped into an array, in the same manner as a collection of data items. Such a grouping is known as: a) Primary array b) An integer array c) Secondary array d) Control array Ans. d 790. Conceptual level, internal level and external level are three components of the three-level RDBMS architecture. Which of the following is not of the conceptual level? a) Entities, attributes, relationships b) Semantic information c) Constraints d) Storage dependent details Ans. d 791. Consider two database relations R and S having 3 tuples in R and 2 tuples in S. What is the maximum number of tuples that could appear in the natural join of R and S? a) 2 b) 5 c) 3 d) 6 Ans. d 792. When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML Page contains? a) All ASP.NET code b) As much ASP.NET code as is in the ASP.NET file c) all HTML code d) A mix of ASP.NET and HTML code Ans. c 793. What result set is returned from the following SQL query? Select customer_name, telephone from customers where city in (‘Jaipur’,’Delhi’,’Agra’) a) The customer_name and telephone of all customers b) The customer_name and telephone of all customers living in Jaipur, Delhi and Agra c) The customer_name and telephone of all customer Living in either Jaipur, Delhi or Agra d) The customer _name and telephone of all customers who are not living in Jaipur, Delhi or Agra Ans. c 794. Semaphores are used to solve the problem of ______. a) Race Condition b) The belady’s problem c) Process synchronization d) mutual exclusion Ans. d 795. A condition that is caused by run-time error in a computer program is known as: a) Syntax error b) Fault c) Semantic error d) Exception Ans. d
  • 84.
    796. A registerin the microprocessor that keeps track of the answer or result of any arithmetic or logic operation is the _. a) Stack pointer b) Instruction pointer c) Program counter d) Accumulator Ans. d 797. Which of the following is true to define a variable for ASP? a) DIM b) Sets c) $ d) Var Ans. a 798. ______ is an intermediate storage are used for data processing during the extract, transform and load process of data warehousing. a) Buffer b) Virtual memory c) Staging area d) inter-storage area Ans. c 799. Which of the following Java statements declare and allocate a 2 dimensional array of integers with four rows and five columns? a) int array [4][5]; b) int array [][]==new int [4][5]; c) int array [5][4]; d) int array [][]=new int [5][4] Ans. b 800. In ____ all the logic are implemented using registors and transistors. Ans. Resistor and Transistor logic 801. _____ logic family implements the logic gates using MOSFET devices Ans. MOS logic 802. For which logic gate, the output is “true” if either, but not both, of the inputs are “true”. Ans. XOR 803. The ____ latch is hazard free. Ans. Earle Latch 804. The flag size of an HDLC frame is ______. Ans. 8 bits 805. Contents of one disk to another disk can be done using the command ____ Ans. DISK COPY 806. The assembler takes as its source code in _____ language program. Ans. Assembly 807. In computer graphics, digital differential analyzer is used for ______ of lines, triangles and polygons. Ans. Rasterization
  • 85.
    808. The languagethat doesn’t use user defined functions, pointers and used defined types is ______ Ans. COBOL 809. ______ is a channel access method used by various radio communication technologies. Ans. CDMA 810. _____ acts as a multiple input and single output switch. Ans. Multiplexer 811. The small extremely fast, RAM’s are called as _______ Ans. Cache 812. The decoded instruction is stored in ______ Ans. Instruction Register 813. The instruction, Add#45, R1 does ______ Ans. Adds 45 to the value of R1 and stores it in R1 814. To make an algorithm in to a program which system can be used that defined by Turing Machine? Ans. binary 815. Which instinct determines the basic learning problem? Ans. Feedback 816. What will be the outcome if the true function is contained by hypothesis? Ans. Unrealizable 817. Decision tree technique culminates its decision with _____ Ans. Sequence of tests 818. In a graphic system the number of pixels in a buffer is called ______ Ans. Resolution 819. Electrical Energy can be converted into light using _____ device? Ans. Emitters 820. Which body transformation will make the objects to move without deformation? Ans. Translation 821. Cyclomatic complexity can also be called as ____ Ans. White box testing 822. ______ interface transfer data to and from the memory through memory bus. Ans. Direct Memory Access 823. Most common register, used to store data taken out from the memory is _____. Ans. Accumulator
  • 86.
    824. Unplanned interruptswhich are produced during execution of program is called _____ Ans. Exception 825. ____ algorithm determines whether there is a path between any two nodes in the graph. Ans. Warshall 826. The unformatted I/O command for reading a tape in FORTRAN is ______ Ans. READTAPE 827. How many units in a single bus structure communicate at a time? Ans. Two 828. An _____ is a collection of operators and operands that represent a specific value. Ans. Expression 829. A Grammar which produces more than one parse tree for a sentence is called _____. Ans. Ambiguous 830. The computer language generally translated to pseudo-code is _____ Ans. Assembly 831. Type 0 Grammar is known as _____ grammar. Ans. Context free 832. The tuple ‘Q’ in Turing machine refers to ____ Ans. States 833. In C++, the ______ cannot be passed to a function. Ans. Structure 834. The _____ will scan partition table located within sector, for an active partition. Ans. Master Boot Record 835. _______ is a file system used to help user to hide different file system complexities. Ans. Virtual File system 836. We can look up a directory object by supplying its name to the _______ service. Ans. Directory 837. _____ is a description of sequences of events taken together, lead to a system doing something useful. Ans. Usecase diagram 838. A ______ model is an abstract model that describes how data is represented and used. Ans. Data model 839. A _____ typically simulates few aspects and may be completely different from final product. Ans. Prototype
  • 87.
    840. The _____layer provides link between two directly connected nodes. Ans. Data Link layer 841. Data items that cannot be divided are called as _____. Ans. Elementary items 842. In MIMD, each processor is connected to its _____ immediate neighbors. Ans. Four 843. A _____ is a general reusable solution to a commonly occurring problem in Software design. Ans. Design Pattern 844. _____ is the allocation of a Computer’s processor power to specific tasks. Ans. Scheduling 845. In, a physical contact is required to be established with the actuator of it, to make/break a connection. a) proximity switch b) limit switch c) relay switch d) all the above Ans. b 846. -(i) CDMA uses spread spectrum technology (ii) GSM Stands for Global System for Mobile (iii) GSM uses TDMA A:- (i) and (ii) are correct B:- (i) and (iii) are correct C:- (ii) and (iii) are correct D:- (i),(ii) and (iii) are correct Ans. d 847. Why is a trailer often added to the end of a frame in the data link layer? a) Flow control b) Error Control c) Addressing d) Access control Ans. B 848. How many bytes are used in an Ethernet physical address? a) 6 b) 4 c) 2 d) 8 Ans. a 849. DVD refers to [SSC MTS 2013] a) Digital video developer b) Digital video device c) Digital video disc d) None of the above Ans. c
  • 88.
    850. The stepsand tasks needed to process data, such as responses to questions or clicking an icon, are called a) instructions b) the operating system c) application software d) the system unit Ans. a 851. A linker program a) places the program in the memory for the purpose of execution b) relocates the program to execute from the specific memory area allocated to it c) links the program with other programs needed for its execution d) interfaces the program with the entities generation its input data Ans. c 852. Which of the following system software resides in main memory always? [IBPS Clerk 2011] a) Text editor b) Assembler c) Linker d) Loader Ans. d 853. Coral Ventura, Illustrator are the examples of a) Word processing b) Graphic c) Multimedia d) DTP Ans. d 854. DirectX is a [RBI Grade B 2013] a) computer part b) a user interface c) operating system d) software that drives graphic software Ans. d 855. Which type of software is used in organisations to keep track of products in stocks? a) Enterprise Resource Planning (ERP) software b) Payroll Software c) Human resource planning software d) Accounting software e) Inventory management software Ans. e 856. Text editor is a/an [RBI Grade B 2013] a) application software b) system software c) utility software d) all purpose software Ans. c
  • 89.
    857. The primarypurpose of the Windows operating system is a) to make the most efficient use of the computer hardware b) to allow people to use the computer c) to keep systems programmer’s employed d) to make computers easier to use Ans. d 858. Every computer has a(n) ____ many also have _____ [RBI Grade B 2014] a) Operating system, a client system b) operating system, instruction sets c) application programs, an operating system d) operating system, application programs Ans. d 859. When a file contains instructions that can be carried out by the computer, it is often called a(n) ____ file. a) data b) information c) executable d) application Ans. c 860. Grouping and processing all of a firm’s transactions at one time, is called [IBPS Clerk 2011] a) a database management b) a real time system c) batch processing d) on-time system Ans. c 861. ____ is a feature for scheduling and multi-programming to provide an economical interactive system of two or more users. [IBPS Clerk 2012] a) Time sharing b) Multisharing c) Time tracing d) Multiprocessing Ans. a 862. The first graphical user interface was designed by a) Apple Inc. b) Microsoft c) Xerox Corporation d) None of these Ans. c 863. In 1973, Xerox PARC developed the Alto personal computer. It had a bitmapped screen, and was the first computer to demonstrate the desktop metaphor and graphical user interface (GUI). Restart of computer is called _____ when computer is already ON. a) cold booting b) warm booting c) shut down d) logging off Ans. b
  • 90.
    864. Which ofthe following is the latest version of MS Windows? a) Windows 7 b) Windows 8 c) Windows 14 d) Windows 8.2 Ans. b Explanation: Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on August 1, 2012 and Windows 10 was launched in 2015. 865. The purpose of DISKCOPY command is to [RBI Grade B 2014] a) format the disk if it is not formatted before a write operation is initiated on it b) overwrite the existing contents of the destination disk as it copies the new information to it c) make an exact copy of a floppy disk d) all of the above Ans. d 866. In DOS, the DIR command is used to [SSC CGL 2013] a) display content of a file b) delete file c) display list of files and sub-directories d) copy files Ans. c 867. A factor in the selection of source language is a) programmer skill b) language availability c) program compatibility with other software d) all of the above Ans. c 868. Language which can easily interact with the hardware are called a) High level languages b) Low level language c) Middle level language d) All of the above Ans. b 869. ____ Serves as the bridge between raw hardware and programming layer of a computer system. a) Medium level language b) Low level language c) High level language d) Both 1 and 2 Ans. a Explanation: Medium-level language (MLL) is a computer programming language that interacts with the abstraction layer of a computer system. Medium-level language serves as the bridge between the raw hardware and programming layer of a computer system. 870. Which of the following is a machine independent program? a) High level language b) Low level language c) Assembly language d) Machine language Ans. a
  • 91.
    871. Main applicationarea of ALGOL is a) General b) Scientific c) Engineering d) Commercial Ans. b Explanation: ALGOL is short for algorithmic language. It is a family of portable programming languages for scientific computations that had a strong influence on other languages. 872. LISP is designed for a) Artificial intelligence b) GUI c) CUI d) Optical fibre Ans. a Explanation: Lisp is a family of programming languages with fully parenthesized prefix notation. Originally specified in 1958, Lisp is the second-oldest high-level programming language still in common use. Only Fortran is older, by one year. Lisp's ability to compute with symbolic expressions rather than numbers makes it convenient for artificial intelligence (AI) applications. While it isn't as popular as C, Python or Perl, Lisp is still used for AI programming as well as several other functions. 873. Which of the following is not characteristic of COBOL? a) It is a very standardised language b) It is a very efficient in terms of coding and execution c) It had limited facilities for mathematical notation d) It is very readable language Ans. b Explanation: COBOL (Common Business Oriented Language) is an easy-to-learn language that can be compiled and executed on a variety of computers. It supports a wide syntax vocabulary and features an uncluttered coding style. Business-oriented capabilities. COBOL's advanced file handling capabilities enable it to handle huge volumes of data. 874. Which of the following is not a computer language? [SBI PO 2014] a) BASIC b) COBOL c) LOTUS d) FORTRAN Ans. c Explanation: Lotus 1-2-3 is a discontinued spreadsheet program from Lotus Software. It was the first killer application of the IBM PC, was hugely popular in the 1980s. 875. Translator program used in assembly language is called [SBI Clerk 2012] a) Compiler b) Interpreter c) Translation d) Assembler Ans. d
  • 92.
    876. Windows XPreleased in a) 2000 b) 1998 c) 1999 d) 2001 Ans. d 877. In the split window mode, one title bar looks darker than the other, because [RBI Grade B 2012] a) Darker title bar shows window not in use b) Darker title bar shows active window c) Darker title bar shows unavailable window d) Both ‘1’ and ‘2’ Ans. b 878. Which of the following refers to the rectangular area for displaying information and running programs? [SBI PO 2013] a) Desktop b) Dialog box c) Menu d) Window Ans. d 879. Which of the following are lists of commands that appear on the screen? [IBPS Clerk 2015] a) GUIs b) Icons c) Menus d) Windows Ans. c 880.The extension of paint file is/are a) .png b) .jpg c) .bmp d) All of these Ans. d 881. When embedding object into document, one of the following occurs [RBI Grade B 2014] a) embedded object becomes a part of the document b) embedded object remains outside object to the document, but loaded with document c) Both becomes a zip file d) Both ‘1’ and ‘2’ Ans. b 882. A ___ is an additional set of commands that the computer displays after you make a selection from main menu. [SBI Clerk 2009] a) dialog box b) sub menu c) menu selection d) All of these Ans. b
  • 93.
    883. In orderto choose the font for a sentence in a word document [IBPS Clerk 2011] a) select font in the format menu b) select font in the Edit menu c) select font in the tools menu d) select font in the view menu Ans. a 884. Which of the following is not a font style? a) Bold b) Italic c) Regular d) Superscript Ans. d 885. Auto-text can be used to insert ____ in document. [RBI Grade B 2014] a) Text b) Graphics c) Either 1 or 2 d) Both ‘1’ and ‘2’ Ans. d 886. In Word, you can force a page break [IBPS PO 2011] a) by positioning your cursor at the appropriate place and pressing the F1 key b) by positioning your cursor at the appropriate place and pressing the Ctrl + Enter c) by using the insert/section break d) by changing the font size of your document Ans. c 887. Where you can find the horizontal split bar on MS-Word screen? a) On the left of horizontal scroll bar b) On the right of horizontal scroll bar c) On the top of the vertical scroll bar d) On the bottom of vertical scroll bar Ans. c 888. Which of the following is not available on the ruler of MS-Word screen? a) Left indent b) Right indent c) Centre indent d) All of these Ans. c 889. You specify the save details of your file in the [RBI Grade B 2013] a) “Save as a file” dialog box b) “Save the file as” dialog c) “File save” dialog box d) Any of ‘1’ and ‘2’ Ans. a 890. Magnifier button is available on [RBI Grade B 2014] a) Print Preview toolbar b) Standard toolbar c) Formatting toolbar d) Both ‘A’ and ‘B’ Ans. a
  • 94.
    891. Which commandis used to calculate total characters in a cell? [RBI Grade B 2014] a) Len b) Length c) Mid d) Sid Ans. a Explanation: LEN returns the number of characters in a text string. LENB returns the number of bytes used to represent the characters in a text string. 892. The function TODAY( ) in Excel, enters the current [RBI Grade B 2014] a) System time in a cell b) System date and time in a cell c) System date only d) Time at which the current file was opened Ans. d 893. =Sum(B1:B10) is an example of a a) function b) formula c) cell address d) value Ans. b 894. In Excel, an active cell can be represented by a) 4A b) A4 c) A$4 d) $A$4 Ans. b 895. Cell address $A4 in a formula means it is a a) mixed cell reference b) absolute cell reference c) relative cell reference d) All of the above Ans. a Explanation: A mixed cell reference is either an absolute column and relative row or absolute row and relative column. When you add the $ before the column letter you create an absolute column or before the row number you create an absolute row. For example, $A1 is absolute for column A and relative for row 1, and A$1 is absolute for row 1 and relative for column A. If you copy or fill the formula across rows or down columns, the relative references adjust, and the absolute ones don’t adjust. 896. In a worksheet in MS-Excel, what is short-cut key to hide entire row? [SBI PO 2014] a) Ctrl + 2 b) Ctrl + 9 c) Ctrl + N d) Ctrl – Ans. b
  • 95.
    897. To selectentire row, which shortcut is used? [SBI PO 2014] a) Shift + Space b) Ctrl + Space c) Alt + Space d) None of these Ans. a 898. Which of the following bypasses the print dialog box when printing individual slides or an entire presentation? a) File, Print preview b) Print button c) File, Print d) Ctrl + P Ans. d 899. How many types of relationships are there in MS-Access? a) 3 b) 4 c) 5 d) 6 Ans. a 900. What is the default size of the data type in MS-Access? [SBI Clerk 2010] a) 50 b) 60 c) 70 d) 80 Ans. a 901. We can’t make query by Insert menu? *RBI Grade B 2013+ a) True b) False c) Cannot say d) Sometimes Ans. a 902. The cardinality property of a relation, refers to the a) number of database b) number of columns c) number of rows d) number of tables Ans. c Tip: cardinality of a relationship is the number of tuples (rows) in a relationship. 903. What is the overall term for creating, editing, formatting, storing, retrieving a text document? [IBPS PO 2012] a) Word processing b) Spreadsheet design c) Web design d) Database management Ans. d 904. In which, the database can be restored up to the last consistent state after the system failure? a) Backup b) Recovery c) Redundancy d) Security Ans. b 905. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as [IBPS Clerk 2012] a) E-R model b) Database c) Data Model d) DBMS Ans. c
  • 96.
    906. ____ meansthat the data contained in a database is accurate and reliable. a) Data redundancy b) Data integrity c) Date reliability d) Data consistency Ans. b 907. Which of the following contains data descriptions and defines the name, data type and length of each field in the database? a) Data dictionary b) Data table c) Data record d) Data field Ans. a 908. Which database language is used to access data in existing database? a) DDL b) DML c) DCL d) None of these Ans. b Tip: Data Manipulation Language (DML) is a set of special commands that allows us to access and manipulate data stored in existing schema objects 909. An E-R diagram is a graphic method of presenting [IBPS Clerk 2011] a) Primary keys and their relationships b) Primary keys and their relationships to instances c) entity classes and their relationships d) entity classes and their relationships to primary keys Ans. c 910. In an E-R diagram, an entity set is are represented by a) rectangle b) square c) ellipse d) triangle Ans. a 911. In E-R diagram, relationship type is represented by [IBPS Clerk 2012] a) ellipse b) dashed ellipse c) rectangle d) diamond Ans. d 912. _____ is the transmission of data between two or more computers over communication links. a) Communication b) Networking c) Data communication d) Data networking Ans. c 913. Communication channel having _____ types. a) 1 b) 2 c) 3 d) 4 Ans. c (simplex, half-duplex, and full-duplex)
  • 97.
    914. Which ofthe following is the fastest communication channel? a) Radio wave b) Microwave c) Optical fibre d) All are operating at nearly the same propagation speed Ans. b Explanation: A microwave is the fastest communication channel whereas optical fiber is a way of transferring data not a way of communication. Microwave is a line-of-sight wireless communication technology that uses high frequency beams of radio waves to provide high speed wireless connections that can send and receive voice, video, and data information. 915. What do we call a network whose elements may be separated by some distance? It usually involves two or more network and dedicated high speed telephone lines. [SBI Clerk 2015] a) LAN b) WAN c) URL d) Server Ans. a 916. Ethernet, token ring and token bus are types of [SBI Associates 2012] a) WAN b) LAN c) Communication channels d) Physical media Ans. b 917. _____ allows LAN users to share computer programs and data. a) Communication server b) Print server c) File server d) All of the above Ans. c Tip: A file server is a computer containing files available to all users connected to a local-area network (LAN). In some LANs, a microcomputer is designated as the file server, while in others it is a computer with a large disk drive and specialized software. 918. Which of the following items is not used in Local Area Network (LANs)? [SSC CGL 2012] a) Interface card b) Cable c) Computer d) Modem Ans. d 919. P2P is a _____ application architecture. [IBPS Clerk 2012] a) client/server b) distributed c) centralised d) 1-tier Ans. a Explanation: In a peer-to-peer (P2P) network, each computer acts as both a server and a client—supplying and receiving files—with bandwidth and processing distributed among all members of the network. Such a decentralized network uses resources more efficiently than a traditional network and is less vulnerable to systemic failure. 920. In OSI network architecture, the routing is performed by [IBPS Clerk 2012] a) Network layer b) Data link layer c) Transport layer d) Session layer Ans. a
  • 98.
    921. How manybits are there in the Ethernet address? [SBI Clerk 2011] a) 64 bits b) 48 bits c) 32 bits d) 16 bits Ans. b Explanation: The Ethernet address is 48 bits long and normally displayed as 12 hexadecimal digits. The MAC address is often referred to as the Ethernet Address on an Ethernet network. 922. An IP address is ____ bit address [SSC CGL 2017] a) 8 bit b) 16 bit c) 32 bit d) 64 bit Ans. c Explanation: An IPv4 address is 32 bits. An IP Address is shown as 4 decimal numbers representing 4 bytes: d.d.d.d where d = decimal number (0 - 255). High order bits are the network identifier and lower order bits are the host identifier. 923. The ____ service allows a group of Internet users to exchange their views on some common topic. a) nicnet b) milnet c) telnet d) usenet Ans. d Explanation: Usenet is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was established in 1980. 924. The ____ uses an addressing schema known as URL indicate the location of files on the web. [SSC CGL 2017] a) Java Script b) World Wide Web c) SQL d) String Ans. b 925. Which of the following is most commonly used to identify returns visitors to a website? a) logged-in visitors b) digital certificates c) electronic time stamping d) cookies Ans. d 926. Cracked software are another source of a) E-mail attack b) Virus attack c) Trojan horse d) All of these Ans. b 927. A computer virus is a) deliberately created b) created accidently c) produced as result of some program error d) All of the above Ans. a
  • 99.
    928. The firstPC virus was developed in a) 1980 b) 1984 c) 1986 d) 1988 Ans. c Explanation: Brain is the industry standard name for a computer virus that was released in its first form on 19 January 1986, and is considered to be the first computer virus for the IBM Personal Computer and compatibles. 929. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk 2014] a) Cyber Terrorist b) Black-hat-Hacker c) Cyber Cracker d) Hacktivist Ans. c Tip: computer cracker as "an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system." 930. A firewall operated by [SBI Clerk 2010] a) The pre-purchase phase b) isolating intranet from extranet c) screening packets to/from the network and provide controllable filtering of network traffic d) All of the above Ans. c 931. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself? *SBI PO 2011+ a) Trojan Horse b) Logic bomb c) Cracker d) Firewall Ans. b Explanation: A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files, should they ever be terminated from the company. 932. What will you insert, when you need to see all the information from two tables on one form? a) A page break b) A subform c) A linked command button d) All of the above Ans. b Explanation: A subform is a form within a form. It is generally used whenever you want to display data from multiple tables where there is a one-to-many relationship. For example, you would use a subform if you wanted to display an order with the order details. 933. To select several cells or ranges that are not touching each other, what would you do while selecting? a) Hold down the Ctrl key b) Hold down the Shift key c) Hold down the Alt key d) Hold down Ctrl + Shift key Ans. a
  • 100.
    934. In computerscience, by information we mean a) any output coming out from computer b) processed data put in an intelligent form c) a report printed by the computer d) plural of data Ans. b 935. A software used to convert convert source program instructions to object instruction is known as a) compiler b) assembler c) Interpreter d) Language processor Ans. d Explanation: The language processor is a special translator system that is used for turning a program written in a high language into a machine code. 936. There are 3 types of language processors: 1. Assembler 2. Interpreter 3. Compiler The physical arrangement of elements on a page is referred to as a document’s a) feature b) format c) pagination d) grid Ans. b 937. Computer systems are comprised of a) hardware, programs, information, people and network b) hardware, software, procedures, networks and people c) hardware, programs, information, people and procedures d) hardware, programs, processors, procedures, networks and people Ans. c 938. Press _____ to move the insertion point to the address box or to highlight the URL in the address. a) Alt + D b) Alt + A c) Shift + Tab d) Tab + Ctrl Ans. a 939. In analog computer, a) input is first converted to digital form b) input is never converted to digital form c) output is displayed in digital form d) All of the above Ans. b 940. The ____ file format is a method of encoding pictures on a computer. a) HTML b) JPEG c) FTP d) URL Ans. b 941. All the characters, that a device can use are called its a) skill set b) character alphabet c) characters codes d) character set Ans. d
  • 101.
    942. Internet requires a)an international agreement to connect computers b) a local area network c) a commonly agreed set of rules to communicate between computers d) a world wide web Ans. c 943. Which of the following is billionth of a second? a) Gigabyte b) Terabyte c) Nanosecond d) Microsecond Ans. c Explanation: A nanosecond (ns) is a unit of time in the International System of Units (SI) equal to one billionth of a second, that is, 1⁄1 000 000 000 of a second, or 10−9 seconds. 944. In an ER diagram, attributes are represented by a) rectangle b) square c) ellipse d) triangle Ans. c Explanation: Attributes are included to include details of the various entities that are highlighted in a conceptual ER diagram. Attributes are characteristics of an entity, a many-to-many relationship, or a one-to-one relationship. 945. Which is a shortcut key to insert a new worksheet in MS-Excel? a) Ctrl + W b) Ctrl + n c) Ctrl + 1w d) Shirt + F11 Ans. d Tip: Shift+F11 inserts a new worksheet. Alt+F11 opens the Microsoft Visual Basic For Applications Editor, in which you can create a macro by using Visual Basic for Applications (VBA). F12 Displays the Save As dialog box 946. Which of the following machines is called a smart machine? [Cyber Olympiad 2014] a) Mobile phones b) Television c) Computer d) Microwaves Ans. c 947. Which of the following jumbled words can complete the sentence given below? Computer is a _____ machine. a) Digir b) Budm c) Lows d) Marts Ans. d Tip: This is an character arranging question from reasoning. After arrange the word “Marts” we make “Smart”. 948. What is common between Man and Computer? a) Both can get tired b) Both can draw and calculate c) Both can take decisions d) Both can show emotions Ans. b
  • 102.
    949. Serial printersare slower than- a) Dot matrix b) Laser c) Inkjet d) All of these Ans. d 950. Helical-scan cartridge are type of magnetic tape that uses the same technology as – a) VCR tapes b) Audio tapes c) Data tape d) None of these Ans. a Tip: A type of magnetic tape that uses the same technology as VCR tapes. The term helical scan usually refers to 8mm tapes, although 4mm tapes (called DAT tapes) 951. It consists of low-level programs that interact with the computer at a very basic level- a) System software b) Utility software c) Application software d) None of these Ans. a 952. It is a program that performs a very specific task, usually related to managing system resources. Operating systems contain a number of them for managing disk drives, printers, and other devices – a) System software b) Utility software c) Application software d) None of these Ans. b 953. In Assembly language – a) Mnemonics are used to code operations b) Alphanumeric symbols are used for addresses c) Language lies between high-level language and machine language d) All the above Ans. d 954. The latest PC keyboards use a circuit that sense the movement by the change in its capacitance. These keyboards are referred as – a) Capacitance keyboards b) Mechanical keyboards c) Qwerty keyboards d) Dvorak keyboards Ans. a 955. The alternative name for application software is – a) Utility software b) Practical software c) End-user software d) Practical software Ans. c
  • 103.
    956. Program promisedby publisher but never released – a) Vaporware b) Shareware c) Software d) Mindware Ans. a Tip: software or hardware that has been advertised but is not yet available to buy, either because it is only a concept or because it is still being written or designed. 957. Computer derives its name from the word _____ which means calculation. [Bank Clerk 2008] a) Computare b) Calcite c) Calculator d) Both (A) and (B) Ans. a Tip: The word 'compute' comes from the Latin word computare, meaning "arithmetic, accounting, reckoning". 958. Computer gathers data, which means that they allow users to ____ data. [Bank Clerk 2010] a) present b) input c) output d) store Ans. b 959. The word ‘Abacus’ was derived from the greek word _____, which means a table or a board covered with dust. a) Abax b) Addition c) Abqua d) Substraction Ans. a 960. Antikythera mechanism was mainly used to perform a) addition b) multiplication and division c) astronomical calculation d) logarithm Ans. c Tip: The Antikythera mechanism is an Ancient Greek hand-powered orrery, described as the oldest example of an analogue computer used to predict astronomical positions and eclipses decades in advance. 961. Rabdologia was the technology used for calculation purpose introduced in a) 1917 b) 1901 c) 1617 d) 1801 Ans. c (Rabdology Book written by John Napier) 962. Napier’s bones performs a) addition and subtraction b) multiplication and division c) only addition d) Both (A) and (B) Ans. b 963. Pascaline is also known as [BOB Assistant 2009] a) mechanical machine b) adding machine c) division machine d) difference machine Ans. b
  • 104.
    964. _____ wasthe first digital mechanical calculator, which was designed to perform addition, subtraction, multiplication and division. It can also extract square root by a series of repeated addition. a) Punch card system b) Pascaline c) Stepped reckoner d) ABC Computer Ans. c Tip: The stepped reckoner or Leibniz calculator was a mechanical calculator invented by the German mathematician Gottfried Wilhelm Leibniz around 1672 and completed in 1694. The name comes from the translation of the German term for its operating mechanism, Staffelwalze, meaning "stepped drum". 965. The first mass-produced mechanical calculating device was a) Pascaline b) Arithmometer c) Punch card d) Mark-1 Ans. b Tip: The arithmometer, invented by Charles Xavier Thomas de Colmar in 1820, was the first commercially successful calculating machine capable of performing addition, subtraction, multiplication and division. 966. What do you mean by Jacquard loom? [SBI PO 2011] a) A bird found in Japan b) A weaving machine used punched cards c) The first computer controlled loom d) A machine for writing match tables Ans. b 967. The first electro-mechanical computer MARK-1 invented by a) John W Mauchly b) Atanasoff-Berry c) Howard Aiken d) Clifford Berry Ans. c Explanation: The Harvard Mark I, or IBM Automatic Sequence Controlled Calculator, was a general-purpose electromechanical computer used in the war effort during the last part of World War II. One of the first programs to run on the Mark I was initiated on 29 March 1944 by John von Neumann. 968. Which of the following computer system introduced the idea of binary calculation? a) ABC computer b) Colossus c) ENIAC d) EDSAC Ans. a Tip: The Atanasoff–Berry computer was the first automatic electronic digital computer in 1937. 969. The first electronic digital computer contained? [SBI PO 2008] a) Electronic valves b) Vaccum tubes c) Transistors d) Semiconductor memory Ans. a 970. In second generation, which type of memory was used to store data? [IBPS RRB 2011] a) Paper tapes b) Magnetic drum c) Magnetic core d) Magnetic tape Ans. c
  • 105.
    971. In whichgeneration did multi-programming start? [SBI Clerk 2010] a) First generation b) Second generation c) Third generation d) Fourth generation Ans. c 972. Oracle was introduced in a) first generation b) second generation c) third generation d) fourth generation Ans. d 973. A micro computer can be defined as a) a small, low-cost digital computer b) which consists of a microprocessor c) a storage unit and input/output channel d) all of the above Ans. d 974. Which of the following is the smallest computer? [SBI Clerk 2011] a) Notebook b) Laptop c) Desktop d) Workstation Ans. a 975. Which was the world’s first mini computer? a) PDP-I b) PDP-II c) IBM System/36 d) VAX 11/780 Ans. a Tip: The PDP-1 (Programmed data processor-1) is the first computer in Digital Equipment Corporation's PDP series and was first produced in 1959. It is famous for being the computer most important in the creation of hacker culture at Massachusetts Institute of Technology, BBN and elsewhere. 976. Which organisation developed a SAGA-220 super computer in 2011? a) C-DAC b) FCC c) ISRO d) BARC Ans. c Tip: SAGA-220 (Supercomputer for Aerospace with GPU Architecture-220 teraflops) is a supercomputer built by the Indian Space Research Organisation (ISRO). 977. What is an embedded system? [IOB PO 2011] a) A program that comes wrapped in a box b) A program that is permanently part of a computer c) A computer that is part of a large computer d) A computer and software system that controls a machine or appliance Ans. d 978. Which characteristic of computer distinguishes it from electronic calculators? [Allahabad Bank PO 2011] a) Accuracy b) Storage c) Versatility d) Automatic Ans. b Tip: Computer can store data but calculator does not. 979. Which of the following does not describe one or more characteristic(s) of a computer? a) Electronic b) External storage c) Stored program d) Program modification at execution Ans. d
  • 106.
    980. The properdefinition of a modern digital computer is [SBI PO 2010] a) an electronic automated machine that can solve problem involving words and numbers b) a more sophistic and modified electronic pocket calculator c) any machine that can perform mathematical operations d) a machine that works on binary code Ans. d 981. Computer system are comprised of a) hardware, programs, information, people and networks b) hardware, software, procedure, network and people c) hardware, programs, information, people and procedure d) hardware, programs, processors, procedures, networks and people Ans. c 982. Which of the following program is not a utility? [DRDO GTRE 2017] a) Editor b) Debugger c) Spooler d) None of these Ans. c Explanation: The Spooler is a special process that manages access to printers by multiple users. For most users, the function of the Spooler is transparent. They generate a job for a printer and go to the printer to pick up the output. The Spooler permits users to continue working without waiting for a print job to finish printing. Utility Program: A program that performs a specific task related to the management of computer functions, resources, or files, as password protection, memory management, virus protection, and file compression. 983. A Common LED is made up of – [DRDO 2008] a) Intrinsic Semiconductor b) Direct Semiconductor c) Degenerate semiconductor d) Indirect Semiconductor Ans. b 984. GSM system uses TDMA with – [DRDO 2008] a) 32 users per channel b) 16 users per channel c) 8 users per channel d) 4 users per channel Ans. c 985. In the register indirect addressing mode of 8085 microprocessor, data is stored – [DRDO 2008] a) At the address contained in the register pair b) In the register pair c) In the accumulator d) In a fixed location of the memory Ans. a 986. What is the keyboard shortcut for opening a new tab in the Google chrome web browser for windows? [DRDO CVRDE 2017] a) Alt + N b) Ctrl + T c) Alt + Ctrl + T d) Alt + T Ans. b 987. For which one of the following ultraviolet light is used to erase the stored contents? [DRDO 2008] a) PROM b) EPROM c) EEPROM d) PLA Ans. b
  • 107.
    988. In 8085microprocessor, the accumulator is a – [DRDO 2008] a) 4 bit register b) 8 bit register c) 16 bit register d) 32 bit register Ans. b 989. Which of the following memory has highest access speed? [DRDO CVRDE 2017] a) Hard Disk b) RAM c) ROM d) Cache Memory Ans. d 990. The multiple access communication scheme in which each user is allocated the full available channel spectrum for a specific duration of time is known as – [DRDO 2008] a) CDMA b) FDMA c) TDMA d) MC-CDMA Ans. a 991. Thermal printer uses _____ coated paper, which turns black when heat is applied. [DRDO CVRDE 2017] a) Chromium b) Bisphenol-A c) Nickel d) Toner powder Ans. b 992. Natural language understanding is used in: [DRDO CURDE 2017] a) natural language interfaces b) natural language front ends c) text understanding systems d) all of the above Ans. d 993. The device used in the third generation computers is _____ (DRDO GTRE 2017) a) Vacuum tubes b) Transistors c) Integrated Circuit d) VLSI Ans. c 994. Which of the following GUI component user should choose one or more options from one set allow? [DRDO CVRDE 2017] a) Radio Button b) Dropdown list c) Check box d) Text Box Ans. c 995. Which of the following/statement are correct? (DRDO, CVRDE 2017) (i) Access to primary memory is more than the access time of secondary memory. (ii) For the same storage capacity, DRAM is cheaper than SRAM. a) only (i) b) Both (i) and (ii) c) Only (ii) d) Both are wrong Ans. c 996. Which of the following is an example of High speed microprocessor? (DRDO GTRE 2017) a) Pentium b) C.D. Rom c) Keyboard d) Printer Ans. a 997. _____ gave stored program concept in which program and data to be processed are stored in the same memory. [DRDO CVRDE 2017] a) John Von Neumann b) Alan Turing c) Charles Babbage d) Bill Gates Ans. a
  • 108.
    998. In adesktop computer the board containing micro-processor, RAM and other components is called ______ board. (DRDO GTRE 2017) a) Graphics b) Motherboard c) White d) Black Ans. b 999. Program counter (PC) register is an integral part of: [DRDO CVRDE 2017] a) Hard Disk b) RAM c) Cache memory d) CPU Ans. d 1000. The set of wires, connecting the microprocessor and the main memory, through which the data flows is called: [DRDO GTRE 2017] a) Memory b) Data wire c) Database d) Databus Ans. d Computer Best MCQ E-Book for all Competitive Exams [9000+ Exam Question in English] Rs.25/- Computer Best MCQ E-Book for all Competitive Exams (2400+ Exam Question in Hindi) Rs.19/- HEETSON Telegram https://t.me/Heetson_Official WhatsApp Channel /heetsoniti /heetsoniti WhatsApp: 8901025610