Saturday, 20 July 2013

Computer Awareness-27

    1.       Which of the following is NOT a goal of Transaction processing system? 
a.       Capture, process and store transactions
b.      Produce a variety of documents related to Routine business activities
c.       Reduce manual effort associated with Processing business transactions
d.      Produce standard reports used for Management decision making
    2.       ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer 
a.       The platform
b.      Application software
c.       Operating system
d.      The motherboard
    3.       1 GB is equal to 
a.       10000 KB
b.      1073724 KB
c.       1048576 KB 
d.      100000 KB

    4.       URL is a term associated with_______________ 
a.       Computer hardware  
b.      Laser printer
c.       Internet
d.      Fax
    5.       In cyber crimes: 
a.       The computer is a tool
b.      The computer is a target
c.       Both (A) and (B)
d.      Neither (A) nor (B)
    6.       Computer virus is: 
a.       A micro organism
b.      A programme
c.       Electro magnetic waves entering the computer from internet 
d.      A useful computer component
    7.       The multiplication arithmetic operator in MS-Excel is represented by which of the following symbols?
a.       ^
b.      #
c.       *
d.      X
    8.       Which of the following is a popular DOS based spreadsheet package? 
a.       Word
b.      Smart cell
c.       Lotus 1-2-3
d.      Excel
    9.       Which of the following is not part of MS-Office?
a.       Word
b.      Access
c.       Powerpoint
d.      Internet Explorer
    10.   Generally, you access the Recycle Bin through an icon located________________. 
a.       On the desktop
b.      On the hard drive
c.       On the shortcut menu
d.      In the Properties dialog box
    11.   ln a ring topology, the computer in possession of the ______can transmit data 
a.       Packet
b.      Data
c.       Access method
d.      Token
    12.   _____________ are words that a programming language has set aside for its own use.
a.       Reversed Words
b.      Reserved words
c.       Reversed Keys
d.      Reserved keys
    13.   Every computer on the Internet is known as? 
a.       Host
b.      Client
c.       Modem
d.      Server
    14.   Which of the following is a valid type of file system 
a.       FAT16
b.      FAT32
c.       NTFS
d.      All of the above
    15.   Which of the following is possible variety of ROM? 
a.       PROM
b.      EEPROM
c.       EPROM
d.      All of the above
    16.   Algorithms is 
a.       A programming language
b.      step-by-step procedure for calculations
c.       Application code
d.      None of the above
    17.   In Excel, Charts are created using which option? 
a.       Bar Chart
b.      Chart Wizard
c.       Pie Chart
d.      Pivot Table
    18.   Its main purpose is to prohibit unauthorized access to your computer via the Internet.
a.       popup blocker
b.      spyware blocker
c.      spam
d.      Firewall
    19.   The __________ gives specific information about the type of file 
a.       Filename
b.      File path
c.       File extension
d.      File content
    20.   What is the term used to describe the process of program being moved back and forth between main memory and secondary memory? 
a.       Swapping
b.      Dotting
c.       Assembling

d.      Swaying 

No comments: