Saturday 28 September 2013

Computer Awareness-57

     1.       An operating system that is capable of allowing multiple software processes to run at the same time:
a.      Multitasking
b.      Multiprocessing
c.      Real Time 
d.      Multithreading
     2.       Personal logs or journal entries posted on the internet are known as____________
a.       Weblogs
b.      Webcasts
c.       blogs
d.      Chache
     3.       Chip is a common nickname for a(n) ____________
a.       transistor
b.      resistor 
c.       integrated circuit
d.      semiconductor

     4.       The ability of a computer to execute multiple programs by using multiple processors simultaneously is known as_______________ 
a.       Multitasking
b.      Multiprocessing
c.      Multiprogramming
d.      Multithreading
     5.       An e-mail account includes a storage area, often called a(n) 
a.      Attachment
b.      Hyperlink
c.      Mailbox
d.      Dropbox
     6.       Which of the following is the default extension of notepad file?
a.       .html
b.      .doc
c.       .txt
d.      .ntp
     7.       The Institution set up by the Government of India to provide computer based information services to government departments  
a.      C-DIT
b.      DOEACC
c.      CDAC
d.      NIC
      8.       The base of octal number is: 
a.      2
b.      8
c.      10
d.      16
      9.       Information Communication Technology (ICT) involves primarily 
a.      Enrichment of existing knowledge
b.      Installation of equipments 
c.      Storage and communication of information
d.     Use of technology for teaching
     10. Disadvantage of distributed database is.
a.       Unreliability
b.      Easy implementation
c.       Insecurity
d.      High communication cost
     11. Which of the following transmission techniques let computer to alternatively send and receive data?
a.       Simplex
b.      Half duplex
c.       Full duplex
d.      Multiplexing
     12. What is NOT a feature of networking?
a.       Reliability
b.      Greater storage space
c.       Connectivity
d.      All are features of networking
      13.  Taking back-up of a file against crash is a
a.       Preventive measure
b.      Curative measure
c.       Decisive measure
d.      None of these
      14.  A memory that is referred by its contents instead of physical address is called___________
a.       Associative memory
b.      Content addressable storage
c.       Both a and b.
d.      None of these
      15.  Most dangerous risk in leaking of information is :
a.       ready access to online terminals
b.      Online processing of data
c.       Ignorance about the existence of risk
d.      All of these
     16.  A camera is an
a.        Input device
b.      Can be either input or output
c.       Processing machine
d.      Output device
     17. Using anti-virus software is
a.       Preventive measure
b.      Detective measure
c.       Corrective measure
d.      All the above
     18. An online transaction is
a.       One that is done in real time
b.      Transaction done via internet
c.       One that is done via telephone
d.      None of these
     19. A clerk in a bank has to access data in customer account. Logical access control for these users would be.
a.       Use of individual passwords
b.      Use of a Accounts Receivable Section password
c.       Use of individual passwords plus separate access passwords for customer data and product data
d.      Can’t say
     20. To stop unauthorized access to the computer system we should
a.       Have a trustworthy system administrator
b.      Have a good passwords policy
c.       Have a sound encryption policy
d.      All of the above   

No comments: