Wednesday 17 July 2013

Computer Awareness-20

    1.     ........... is a method in which multiple communication devices are connected to one another efficiently
a.      Switching   
b.     Redundancy
c.      Capacity   
d.     Detecting
    2.     One computer that is nto considered a portable computer is .......
a.      Mini computer   
b.     A Laptop
c.      Micro computer   
d.     All of the above
    3.     The sharing of a medium and its path by 2 or more devices is called ..........
a.      Modulation   
b.     Encoding
c.      Line discipline   
d.     Multiplexing

    4.     Device drivers are :
a.      time power cords for external storage devices
b.     experts who know to maximize the performance of device
c.      small, special purpose programs
d.     the innermost part of the operating system
    5.     Array is ............
a.      linear data structure
b.     non-linear data structure
c.      complex data structure
d.     simple data structure
    6.     A stored link to a webpage, in order to have a quick and easy access to it later, it called:
a.      Bookmark  
b.     WP-link
c.      Favorite   
d.     Both 1 and 3
    7.     Which input device cannot be used to work in MS Office ?
a.      Sanner  
b.     Mouse
c.      Keyboard   
d.     Joy stick
    8.     ................ is an animated character that gives help in MS Office?
a.      Office worker   
b.     Comic assistant
c.      Office assistant   
d.     All of the above
    9.     Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as?
a.      software suites
b.     integrated software
c.      software processing
d.     personal information
    10. A data warehouse is which of the following?
a.      Can be updated by the users
b.     Contains numerous conventions and formats
c.      Organized around subject areas
d.     Contains only current data
    11.  _____ servers store and manages files for network users.
a.      Authentication
b.     Main
c.      Web
d.     File
    12. All of the following are examples of real security and privacy risks except?
a.      Hackers
b.     Spam
c.      Viruses
d.     identify theft
    13. Loading Operating System onto RAM is called?
a.      Printing
b.     Saving
c.      Booting
d.     Staring
    14. In MICR, C stands for?
a.      Code
b.     Colour
c.      Computer
d.     Character
    15. System software is the set of programs that enables your computer's hardware devices and ____ software to work together?
a.      Management
b.     Processing
c.      Utility
d.     Application
    16.  _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
a.      Servers
b.     Embedded computers
c.      Robotic computers
d.     Mainframes
    17. The following are all computing devices, except?
a.      notebook computers
b.     cellular telephones
c.       digital scanners
d.     personal digital assistants
    18. In a ring topology, the computer in possession of the _____ can transmit data?
a.       Packet
b.      Data
c.       access method
d.     Token
    19. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______
a.      basic input/output
b.     secondary system
c.      peripheral system
d.     marginal system
    20. The bar at the top of a window that bears the name of the window is known as?
a.      control panel
b.     task bar
c.      menu bar
d.     title bar

No comments: