Wednesday, 17 July 2013

Computer Awareness-17

    1.      Mac Operating System is developed by which company 
a.       Microsoft
b.      Apple
c.       IBM
d.      SONY
    2.      What is the function of Recycle Bin? 
a.        Store temporary file
b.      Store corrupted file
c.       Store Document file
d.      Store deleted file
    3.      .jpeg is an extension of
a.       Word file
b.      Audio file 
c.       Video file
d.      Image file

    4.      ___________is known as unauthorized access to others system. 
a.      Hacking
b.      Decryption
c.       Encryption
d.      Breaking
    5.      What is the symbol for inbox in mail? 
a.       BOX
b.      Circle
c.       Envelope
d.      Simley
    6.      Which of the following is a function of UPS? 
a.       It limits damage caused by fluctuating levels of electricity
b.      It provides battery back up for limited time
c.       It delivers electronic messages via a bus
d.      It conducts a power-on self test or POST
    7.      Which one is the first fully supported 64-bit operating system? 
a.       Windows 98
b.      UNIX
c.       LINUX
d.      Android
    8.      Which is the oldest version of Windows OS Family
a.       Windows ME
b.      Windows 95
c.       Windows 98
d.      Windows NT
    9.      Which protocol is used to received e-mail 
a.       FTP
b.       TCP/IP
c.       SMTP
d.      POP3
   10.  Which protocol is used to send an e-mail 
a.       HTTP
b.      POP3
c.       IP
d.      SMTP
   11.  The code for a Web page is written using _____
a.       A fifth generation language
b.      Win Zip
c.       Peripherals
d.      Hypertext Markup Language
   12.  What is the process of copying software programs from secondary storage media to the hard disk called?
a.       Configuration
b.      Download
c.        Storage
d.      Installation
   13.  Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
a.       Flash
b.      Spiders
c.       Cookies
d.      Applets
   14.  The first computers were programmed using _____
a.       Assembly language
b.      Machine language
c.       Source code
d.      Object code
   15.  Which process checks to ensure the components of the computer and operating are connected properly?
a.       Booting
b.      Processing
c.       Saving
d.      Editing
   16.  In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
a.       Block
b.      Record
c.       Tuple
d.      Table
   17.  How can the user determine what programs are available on a computer?
a.       Checking the hard disk properties
b.      Viewing the installed programs during the booting process
c.       Checking the operating system for a list of installed programs.
d.      Checking the existing files saved on the disk
    18.  When we run a program in HTML coding _____ is used as back-end and ____ works as front-end.
a.       Notepad - Internet-Explorer
b.      Notepad - MSN-messenger
c.       MS-Word - Internet Explorer
d.      Both (1) and (2)
   19.  What is the ultimate purpose of Defragmentation ?
a.       Make the PC faster   
b.      Create More Free Space
c.       Delete temporary files
d.      Reduce Power consumption
   20.  Computers process data into information by working exclusively with :
a.       multimedia   
b.      words
c.       characters  
d.      numbers


No comments: