Saturday 28 September 2013

Computer Awareness-58

      1.     Which cannot assure data accuracy in an application?
a.       Limit and reasonableness test
b.      Echo checking
c.       Control total
d.       None of these
      2.     Maximum storage space is available on
a.       CDs
b.      ROM
c.       Hard disks
d.      Floppies
      3.      Jon Von Neumann developed:
a.       First electronic chip flip flop
b.      Stored-program concept
c.       The first electronic computer
d.      None of these

Computer Awareness-57

     1.       An operating system that is capable of allowing multiple software processes to run at the same time:
a.      Multitasking
b.      Multiprocessing
c.      Real Time 
d.      Multithreading
     2.       Personal logs or journal entries posted on the internet are known as____________
a.       Weblogs
b.      Webcasts
c.       blogs
d.      Chache
     3.       Chip is a common nickname for a(n) ____________
a.       transistor
b.      resistor 
c.       integrated circuit
d.      semiconductor

Computer Awareness-56

1.     When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
a.     programming software
b.     system hardware
c.      applications hardware
d.     applications software
2.     A collection of interrelated files in a computer is a:
a.      file manager
b.     field
c.      record
d.     database
3.     A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
a.      Server
b.     Mainframe
c.      Desktop
d.      Tablet

Computer Awareness-55

         1.     A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
a.     Digital
b.     Analog
c.      Classic
d.     Film
2.      ……makes it possible for shoppers to make purchases using their computers.
a.      E-world
b.     E-commerce
c.      E-spend
d.     E-business

Computer Awareness-54

              1.     All of the following statements concerning files are true EXCEPT:
a.      A file is a collection of related pieces of information stored together for easy reference.
b.     Files can be generated from an application.
c.      Files are stored in RAM.
d.     Files should be organized in folders.
2.     Using Windows Explorer, a plus (+) sign in front of a folder indicates:
a.      an open folder.
b.     the folder contains subfolders.
c.      a text file.
d.     a graphics file.
3.     In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
a.      List
b.     Thumbnails
c.      Details
d.     Icon

Computer Awareness-53

                1.     The blocks of code, included in the operating system,                                                           that software applications interact with are known as:
a.     application programming interfaces (APIs).
b.     complimentary metal-oxide conductors (CMOS).
c.      device drivers.
d.     bootstrap loaders.
2.     MS-DOS is a ____________ operating system.
a.      point-and-click
b.     user-friendly
c.      command-driven
d.     Mac
3.     An interrupt handler is a(n):
a.      location in memory that keeps track of recently generated interrupts.
b.     peripheral device.
c.      utility program.
d.     special numeric code that indicates the priority of a request.

Computer Awareness-52

                1.     A ________ is a person who breaks into computers and computer networks for                    profit, as protest, or sometimes by the motivation of the challenge.
     a.      Software engineer
     b.     Progammer
     c.      Hacker
     d.     Spammar
2.     A(n)_______ is a collection of computers and devices interconnected by communications channels to share information and resources.
     a.      Internet
     b.     Network
     c.      Server
     d.     Blog
3.     The use of technology to enable people to learn anytime and anywhere is called
     a.      e-commerce
     b.     information technology
     c.      e-learning
     d.     online business

Computer Awareness-51

1.     ____Generation computers are very big in size with less memory
a.      Third Generation
b.     Fourth Generation
c.      First Generation
d.     Fifth Generation
2.      EBCDIC stands for?
a.      Extended Binary Cut Decimal Interchange Code
b.     Extended Binary Coded Dedicated Interchange Code
c.      Extended Binary Coded Decimal Inner Code
d.     Extended Binary Coded Decimal Interchange Code
3.     Computer can do every thing except?
a.      Processing
b.     Storing
c.      Analyzing
d.     Own decisions

Computer Awareness-50

1.      ____Is simply consists of one or more attributes that determine other attributes?
a.      Lock
b.     Database
c.      Key
d.     None of the above
2.     Be unique is the characteristic of the ____key?
a.      Primary
b.     Secondary
c.      Foreign
d.     Candidate
3.      A unique key can uniquely identify each ____ in a table?
a.      Field
b.     Row
c.      File
d.     Database

Computer Awareness-49

1.     BIOS is responsible for 
a.     Handling the particulars of input/output operations
b.     Output operations 
c.      Input operations
d.     All of the above 
2.     BIOS is an abbreviation for–
a.     Binary Input/Binary Output
b.     Binary synchronous
c.      Binary digit
d.     All of the above
3.     BISYNC is an abbreviation for–
a.     Binary Input/Binary Output
b.     Binary synchronous
c.      Binary digit
d.     All of the above

Computer Awareness-48

1.     Buffer is device/storage area:
a.     Where data are temporarily stored
b.     Where data is permanently stored
c.      Where data error occurs
d.     All of the above
2.     A network geometric arrangement in which a single connecting line is shared by a number of nodes is called–
a.      Car Topology 
b.     Bus Topology
c.      Truck Topology 
d.     All of the above
3.     An error in a computer program is referred as–
a.     Bug 
b.     Bit
c.      Virus 
d.     All of the above

Computer Awareness-47

1.     Auxiliary storage is
a.      Secondary storage
b.     Primary storage
c.      Processing device
d.     All of the above
2.     Archive is:
a.      Backup storage
b.     Forward operation
c.      Primary storage
d.     All of the above
3.      A branch of computer science that deals with computers that possess reasoning, learning and thinking capabilities that resemble those of human beings is recognized as:
a.      Software engineering
b.     Artificial intelligence
c.      Hardware engineering
d.     All of the above

Computer Awareness-46

1.     To identification particular location in storage area one have a:
a.      Address
b.     Password
c.      Logic
d.     Mouse
2.     A local storage register in the CPU which contains the address of the next instruction to be executed is referred as:
a.      Key register
b.     Address register
c.      Password
d.     All of the above
3.     A sequence of precise and unambiguous instructions for solving a problem in a finite number of operations is referred as:
a.      Address
b.     Algorithm
c.      Advice
d.     All of the above

Computer Awareness-45

1.     _____Is the file format we can use to distribute the document to someone using totally different word processing program from a different software manufacturer, such as word perfect
a.      Word document (.doc)
b.     Rich Text Format (.RTF)
c.      Both (a) and (b)
d.     None of the above
2.      _____Is the Icon to magnify or reduce the display
a.      Print layout
b.     Zoom
c.      View
d.     All of the above
3.      What is text formatting?
a.      Formatting characters and words with in a document
b.     Saving the word document
c.      Both (a) and (b)
d.     None of the above