Thursday, June 4, 2015

COMPUTER QUESTION FOR ALL EXAM

Facebook.com/SohanSinghania143
1. IT stands for–
(A) Information Technology (B) Integrated Technology
(C) Intelligent Technology (D) Interesting Technology (Ans : A)

2. Sending an E-mail is similar to–
(A) picturing an event (B) narrating a story
(C) writing a letter (D) creating a drawing (Ans : C)

3. A keyboard is this kind of device–
(A) black (B) input (C) output  (D) word processing (Ans : B)

4. Arithmetic operations–
(A) involve matching one data item to another to determine if the first item is greater than, equal to or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR, and NOT
(D) include addition, subtraction, multiplication, and division (Ans : D)

5. The rectangular area of the screen that displays a program, data, and/or information is a–
(A) title bar (B) button (C) dialogue box (D) window (Ans : D)

6. ……….is the process of carrying out commands.
(A) Fetching (B) Storing (C) Executing (D) Decoding (Ans : C)

7. Delivery Channel means–
(A) maternity wards (B) handing over the products to the buyers
(C) places where products are made available to the buyers (D) All of these (Ans : C)

8. Which is the part of a computer that one can touch and feel ?
(A) Hardware (B) Software (C) Programs (D) Output (Ans : A)

9. A printer is this kind of device–
(A) input (B) word processing (C) processing (D) output (Ans : D)

10. This can be another word for program–
(A) software (B) disk (C) floppy (D) hardware (Ans : A)

11. Which of the following are computers that can be carried around easily?
(A) Minicomputers (B) Supercomputers (C) PCs (D) Laptop's (Ans : D)

12. The secret code that restricts entry to some programs–
(A) password (B) passport (C) entry-code (D) access-code (Ans : A)

13. A hard copy of a document is–
(A) printed on the printer (B) stored on a floppy (C) stored on a CD
(D) stored in the hard disk (Ans : A)

14. The name that the user gives to a document is referred to as–
(A) document-name (B) filename
(C) name-given (D) document-identity (Ans : B)

15. The person who writes and tests computer programs is called a–
(A) programmer (B) computer scientist (C) software engineer (D) project developer (Ans : A)

16. The information you put into the computer is called–
(A) facts (B) data (C) flies (D) directory (Ans : B)

17. Hardware includes–
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory, and storage (Ans : C)

18. The most common method of entering text and numerical data into a computer system is through the use of a–
(A) keyboard (B) scanner (C) printer (D) plotter (Ans : A)

19. The most important or powerful computer in a typical network–
(A) desktop (B) network client (C) network server (D) network station (Ans : C)

20. The primary purpose of software is to turn data into–
(A) Web sites (B) Information (C) Programs (D) Objects (Ans : B)

21. You can use the tab key to–
(A) move a cursor across the screen (B) indent a paragraph
(C) move the cursor down the screen (D) Only (1) and (B) (Ans : D)

22. A collection of related files is called a–
(A) character (B) field (C) database (D) record (Ans : D)

23. ……….is the process of finding errors in software code.
(A) Compiling (B) Testing (C) Running (D) Debugging (Ans : B)

24. A ……….contains specific rules and words that express the logical steps of an algorithm.
(A) syntax (B) programming structure (C) programming language (D) logic chart (Ans : A)

25. Virtual memory is–
(A) memory on the hard disk that the CPU uses as extended RAM (B) in RAM
(C) only necessary if you do not have any RAM in your computer. (D) a backup device for floppy disks (Ans : A) 



1. Which of the following groups consists of only output devices?
(A) Scanner, Printer, Monitor (B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor (D) Plotter, Printer, Monitor

2. A(n) ……….contains commands that can be selected.
(A) pointer (B) menu (C) icon (D) button

3. A collection of related information sorted and dealt with as a unit is a–
(A) disk (B) data (C) file (D) floppy

4. An error is also known as–
(A) bug (B) debug (C) cursor (D) icon

5. Which part of the computer helps to store information?
(A) Disk drive (B) Keyboard (C) Monitor (D) Printer

6. The process of a computer receiving information from a server on the Internet is known as–
(A) pulling (B) pushing (C) downloading (D) transferring

7. Which of the following refers to the fastest, biggest and most expensive computers?
(A) Personal Computers (B) Supercomputers (C) Laptops (D) Notebooks

8. The role of a ……….generally is to determine a buyer's needs and match it to the correct hardware and software.
(A) computer scientist (B) computer sales representative
(C) computer consultant (D) corporate trainer

9. A series of instructions that tells a computer what to do and how to do it is called a–
(A) program (B) command (C) user response (D) processor

10. ……….is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
(A) A computer program (B) A programming language (C) An assemble (D) Syntax

11. The name of the computer's brain is–
(A) monitor (B) hardware (C) CPU (D) byte

12. A(n) ………., is a device that electronically processes data, converting it to information.
(A) algorithm (B) computer (C) software (D) program

13. The basic goal of computer process is to convert data into–
(A) files (B) tables (C) information (D) graphs

14. Where is the disk put in a computer?
(A) In the modem (B) In the hard drive
(C) Into the CPU (D) In the disk drive

15. Restarting a computer that is already on is referred to as–
(A) shutdown (B) cold booting (C) warm booting (D) logging off

16. E-mail (electronic mail) is–
(A) an Internet standard that allows users to upload and download flies
(B) a real-time typed conversation that takes place on a computer
(C) an online area in which users conduct written discussions about a particular subject
(D) the transmission of messages and flies via a computer network

17. The output devices make it possible to–
(A) view or print data (B) store data (C) scan data (D) input data

18. A chat is–
(A) an Internet standard that allows users to upload and download flies
(B) a typed conversation that takes place on a computer
(C) an online area in which users conduct written discussions about a particular subject
(D) the transmission of messages and flies via a computer network

19. Which of the following groups consists of only input devices?
(A) Mouse, Keyboard, Monitor (B) Mouse, Keyboard, Printer
(C) Mouse, Keyboard, Plotter (D) Mouse, Keyboard, Scanner

20. What menu is selected to cut, copy, and paste?
(A) File (B) Tools (C) Special (D) Edit

21. To find an individual item in a me immediately, ……….is used.
(A) me allocation table (B) directory (C) sequential access (D) direct access

22. To make a notebook act as a desktop model, the notebook can be connected to a ……….which is connected to a monitor and other devices.
(A) bay (B) docking station (C) port (D) network

23. Storage that retains its data after the power is turned off is referred to as–
(A) volatile storage (B) non-volatile storage
(C) sequential storage (D) direct storage

24. Which of the following is an example of connectivity?
(A) Internet (B) Floppy disk (C) Power cord (D) Data

25. Changing an existing document is called ……….the document.
(A) creating (B) editing (C) modifying (D) adjusting

Check Your Answers:
1. (D), 2. (B), 3. (C), 4. (A), 5. (A), 6. (C), 7. (B), 8. (B), 9. (A), 10. (A),
11. (C), 12. (B), 13. (C), 14. (D), 15. (C), 16. (D), 17. (A), 18. (B),
19. (D), 20. (D), 21. (D), 22. (B), 23. (B), 24. (A), 25. (B) 

Practicing All Computer Basics GK Questions with Answers in online helps you to improve your ability to attend the real time CWE IBPS Tests.

1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as–
(A) software suites (B) integrated software packages
(C) software processing packages (D) personal information managers (Ans : A)

2. A data warehouse is which of the following ?
(A) Can be updated by the end users (B) Contains numerous naming conventions and formats
(C) Organized around important subject areas (D) Contains only current data (Ans : C)

3. ____________ servers store and manages files for network users.
(A) Authentication (B) Main (C) Web (D) File (Ans : D)

4. All of the following are examples of real security and privacy risks Except–
(A) hackers (B) spam (C) viruses (D) identify theft (Ans : B)

5. ____________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data (B) Sales (C) Query (D) (Point-of-sale (POS) (Ans : B)

6. The OSI model is divided into ____________ processes called layers.
(A) five (B) six (C) seven (D) eight (Ans : C)

7. System software is the set of programs that enables your computer's hardware devices and ____________ software to work together.
(A) management (B) processing (C) utility (D) application (Ans : D)

8. ____________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers (B) Embedded computers (C) Robotic computers (D) Mainframes (Ans : B)

9. The following are all computing devices , except–
(A) notebook computers (B) cellular telephones
(C) digital scanners (D) personal digital assistants (Ans : C)

10. in a ring topology , the the computer in possession of the ____________ can trasmit data
(A) packet (B) data (C) access method (D) token (Ans : D)

11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports–
(A) basic input/output system (B) secondary input/output system
(C) peripheral input/output system (D) marginal input/output system (Ans : A)

12. ____________ Viruses are often transmitted by a floppy disk left in the floppy drive.
(A) Trojan horse (B) Boot sector (C) Script (D) Logic bomb (Ans : B)

13. ____________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer.
(A) The platform (B) Application software
(C) Operating system (D) The motherboard (Ans : C)

14. Servers are computers that provide resources to other computers connected to a–
(A) mainframe (B) network (C) supercomputer (D) client (Ans : B)

15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition (B) To confirm that data exists
(C) To analyze data for expected relationships (D) To create a new data warehouse (Ans : A)

16. URL stands for–
(A) Universal Research List (B) Universal Resource List
(C) Uniform Resource Locator (D) Uniform Research Locator (Ans : C)

17. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP (Ans : B)

18. When data changes in multiple lists and all lists are not updated, this causes–
(A) data redundancy (B) information overload
(C) duplicate data (D) data inconsistency (Ans : D)

19. ____________ are words that a programming language has set aside for its own use.
(A) Control worlds (B) Reserved words (C) Control structures (D) Reserved keys (Ans : B)

20. ____________ are lists of commands that appear on the screen.
(A) GUIs (B) Icons (C) Menus (D) Windows (Ans : C)

21. ____________ describe what is database fields.
(A) Structures (B) Field markers (C) Field definition (D) Field names (Ans : D)

22. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router (B) modem (C) node (D) cable (Ans : A)

23. A goal of normalization is to–
(A) minimize the number of relationships (B) minimize the number of entities
(C) minimize the number of tables (D) minimize the number of redundancy (Ans : D)

24. Granting an outside organization access to internet web pages is often implemented using a (n)–
(A) extranet (B) intranet (C) internet (D) hacker (Ans : A)

25. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL (B) Web site address (C) Hyperlink (D) Domain name (Ans : A)

26. The code that relational database management systems use to perform their database task is referred to as–
(A) QBE (B) SQL (C) OLAP (D) Sequel Server (Ans : B)

27. Chip is a common nickname for a(n)–
(A) transistor (B) resistor (C) integrated circuit (D) semiconductor (Ans : C)

28. The purpose of the primary key in a database is to–
(A) unlock the database (B) provide a map of the data
(C) uniquely identify a record (D) establish constraints on database operations. (Ans : B)

29. The internet is–
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) All of these (Ans : D)

30. The design of the network is called the network–
(A) architecture (B) server (C) transmission (D) type (Ans : A)

31. The most frequently used instructions of a computer program are likely to be fetched from–
(A) the hard disk (B) cache memory (C) RAM (D) registers (Ans : B)

32. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary (B) data table (C) data record (D) data field (Ans : A)

33. Personal logs or journal entries posted on the Web are known as–
(A) listservs (B) Webcasts (C) blogs (D) subject directories (Ans : C)

34. A(n) ____________ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface (B) GUI (C) system utility (D) API (Ans : B)

35. Verification of a login name and password is known as–
(A) configuration (B) accessibility (C) authentication (D) logging in (Ans : C)

36. Which of the following is NOT a type of broadband Internet connection?
(A) Cable (B) DSL (C) Dial-up (D) Satellite (Ans : C)

37. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as–
(A) spyware (B) adware (C) spam (D) malware (Ans : D)

38. Making a field ____________ meAns : that it cannot be left blank.
(A) numeric (B) required (C) calculated (D) validated (Ans : B)

39. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses (B) Macro viruses (C) Time bombs (D) Worms (Ans : C)

40. Linux is a (n) ____________ operating system.
(A) open-source (B) Microsoft (C) Windows (D) Mac (Ans : A) 

1. RAM stands for –
(A) Read Access Memory (B) Random Access Memory (C) Random Assigned Memory (D) All of these (E) None of these

2. Data in RAM are 
(A) Volatile in nature (B) Non-volatile in nature (C) Both (A) and (B) (D) All of these (E) None of these

3. BIOS stands for 
(A) Basic Input Output System (B) Basic Instruction Output System
(C) Basic Interface Output System (D) All of these (E) None of these

4. RAM in its commercial forms are available as 
(A) SIMM (B) DIMM (C) Both (A) and (B)
(D) CPSB (E) None of these

5. Which of the following requires refreshing during retaining the data?
(A) DRAM (B) SRAM (C) Virtual Memory
(D) FDD (E) None of these

6. Refresh Rate of monitor is measured in –
(A) Hz (B) Meter (C) Volts
(D) Amp. (E) None of these

7. Which of the following meaning is used between CPU and RAM to speed up the processing power of a CPU?
(A) Virtual Memory (B) DRAM (C) Flash Memory
(D) Cache Memory (E) None of these

8. Which of the following is lowest in memory hierarchy?
(A) Cache memory (B) Secondary memory (C) Registers
(D) RAM (E) None of these

9. Which of the following is an input device?
(A) Keyboard (B) VDU (C) Both (A) and (B)
(D) Dvu (E) None of these

10. CRT stands for –
(A) Character Ray Tube (B) Cathode Ray Tube (C) Colour Ray Tube
(D) All of the above (E) None of these

11. Which of the following is a GUI device –
(A) Keyboard (B) Mouse (C) OMR
(D) All of these (E) None of these

12. LCD stands for –
(A) Liquid Crystal Display (B) Laser Crystal Display (C) Light Crystal Display
(D) All of these (E) None of these

13. Such types of printers, in which the printing head contacts with the paper in printing process, are called as –
(A) Impact Printer (B) Non-Impact Printer (C) Laser Printer
(D) All of these (E) None of these

14. Which of the following is a type of optical media?
(A) FDD (B) HDD (C) CD
(D) Magnetic Tape (E) None of these

15. DVD stands for –
(A) Digital Video Disk (B) Digital Versatile Disk (C) Both (A) and (B)
(D) All of these (E) None of these

16. Which of the following is an input device?
(A) VDU (B) Printer (C) Plotter
(D) MICR (E) None of these

17. Identify the odd one –
(A) Storage tape memory (B) Magnetic disc memory (C) Optical disc memory
(D) Read only memory (E) None of these

18. Nibble describes a bits combination of –
(A) 5 bits (B) 6 bits (C) 7 bits
(D) 4 bits (E) None of these

19. A Byte constitutes of –
(A) 9 bits (B) 8 bits (C) 7 bits
(D) 4 bits (E) None of these

20. Memory in a PC is addressable through –
(A) Bits (B) Byte (C) Nibble
(D) All of these (E) None of these

21. One Kilo Byte represents –
(A) 1024 bytes (B) 1000 bytes (C) 100 bytes
(D) 1064 bytes (E) None of these

22. Basic building block for a digital circuit is –
(A) Word (B) Logic Gate (C) Processor
(D) BUS (E) None of these

23. Which of the following is a logic gate?
(A) AND (B) OR (C) CPU
(D) Both (A) and (B) (E) None of these

24. The base of binary number is –
(A) 2 (B) 16 (C) 8
(D) 10 (E) None of these

25. ASCII stands for :
(A) American Standard Code for Institute Interchange
(B) American Standard Code for Information Interchange
(C) American Standard Code for Information Institute
(D) All of these
(E) None of these

Answers :1. (B) 2. (A) 3. (A) 4. (C) 5. (A) 6. (A) 7. (D) 8. (B) 9. (A) 10. (B)
11. (B) 12. (A) 13. (A) 14. (C) 15. (B) 16. (D) 17. (D) 18. (D) 19. (B) 20. (B)
21. (A) 22. (B) 23. (D) 24. (A) 25. (B)

Computer Awareness for IBPS Clerk Exam 2013

1. Auxiliary storage is—
(A) Secondary storage (B) Primary storage
(C) Processing device (D) None of these
Ans : (A)

2. Archive is?
(A) Backup storage (B) Forward operation
(C) Primary storage (D) None of these
Ans : (A)

3. A branch of computer science that deals with computers that possess reasoning, learning and thinking capabilities that resemble those of human beings is recognized as?
(A) Software engineering (B) Artificial intelligence
(C) Hardware engineering (D) None of these
Ans : (B)

4. ASCII is—
(A) A standard coding system for computers (B) Hardware device
(C) Software (D) None of these
Ans : (A)

5. Following is true for Bandwidth?
(A) The wider the bandwidth of a communications system the more data it can transmit in a given period of time.
(B) The narrow the bandwidth of a communications system the more data it can transmit in a given period of time.
(C) The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
(D) None is true
Ans : (A)

6. An operation in which data is moved to a different location is referred as—
(A) Block move (B) Street move
(C) Delete (D) None of these
Ans : (A)

7. The following is responsible for number of logical records in a physical record—
(A) Blocking factor (B) Block
(C) Boolean algebra (D) None of these
Ans : (A)

8. Boolean variable assumes—
(A) Values that are true only (B) Values that are false only
(C) Values that are either true or false (D) None of these
Ans : (C)

9. Bubble Memory is—
(A) nonvolatile (B) volatile
(C) permanent (D) None of these
Ans : (A)

10. In Nonvolatile memory device—
(A) Data contained in them is not lost when the power turned off
(B) Data contained in them is lost when the power turned off.
(C) data contained in them is permanent and not be rewrite
(D) None of these
Ans : (A)

11. A fixed number of adjacent bits that represent a particular character or symbol are referred as—
(A) Byte (B) Octal
(C) Bubble (D) None of these
Ans : (A)

12. Cache memory is a—
(A) Small buffer storage (B) Permanent storage
(C) Main memory (D) None of these
Ans : (A)

13. The total number of digits (symbols) available to represent numbers in a positional number system is referred as—
(A) Number system (B) Base
(C) Power (D) None of these
Ans : (B)

14. Cache memory is—
(A) Smaller and faster than main storage
(B) Bigger and slower then main storage
(C) Smaller but slower than main memory
(D) Bigger and faster than main memory
Ans : (A)

15. Cache memory—
(A) Is a Static RAM
(B) Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
(C) Both A and B true
(D) Both A and B false
Ans : (C)

16. A sequential electronic circuit which can be placed in one out of two stable states where each state may be used to represent a binary digit is stated as—
(A) Integrated circuit (B) Firmware
(C) Flip-flop (D) None of these
Ans : (C)

17. A sequence of instruction (software) that is substituted for hardware and stored in readonly memory (ROM) is called—
(A) Integrated circuit (B) Firmware
(C) Flip-flop (D) None of these
Ans : (B)

18. Anonymous FTP is the—
(A) Internet file transfer protocol (B) Protocol that requires password
(C) None access files (D) None of these
Ans : (A)

19. EFF sites allows anonymous FTP that—
(A) Do not require a password or access (B) Requires password or access
(C) Is a none access file (D) None of these
Ans : (A)

20. ANSI is—
(A) American National Standards Institute
(B) A USA based national organization that establishes uniform standards in several fields of computers.
(C) A and B both true
(D) None is true
Ans : (C)


Questions on Computer Awareness have most Bank Recruitment exams. To help you prepare better for the Bank exams we present to you the revision notes on Computer Awareness.

1. The earlier computers, which were massive in size, were based on vacuum tubes.
2. Early computing machines, like the ENIAC, were actually meant to assist the armed forces.
3. The printers in pre-1950s were punch cards.
4. An improvement on the ENIAC, which pioneered 'stored program', was made possible with the help of the mathematician John von Neumann.
5. Before the 1950s, computers were mostly owned by universities and research labs.
6. The B-programming language was developed by Ken Thompson.
7. Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.8. The 1st commercially produced and sold computer (1951) was UNIVAC.
9. IBM was provided software for PCs by Microsoft.
10. Time-sharing, teletyping, were associated with mainframe computers.
11. The transformation from heavy computers to PCs was made possible using microprocessors.
12. The first microprocessor was developed in 1971 by Intel.
13. The term 'micro' (extremely small) denotes 10-6m.
14. The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.15. A pentium 4 (P-4) employs roughly 40 million transistors.
16. Mark-1, Apple-1, and collossus were initial desktop computers.17. Binary digits are briefed as bit.
18. A collection of bits is called byte.
19. C++, is a computer language.
20. The process of eliminating programming faults is called debugging.
21. Starting up on operating system is called booting.
22. A program used to browse the web is called browser.
23. An error in software designing which can even cause a computer to crash is called bug.
24. Click and double-click are achieved using the mouse.
25. Java, C, ForTran, Pascal and BASIC are computer programming languages.26. The device which sends computer data using a phone line is called MODEM.
27. 'Worm' and 'virus' are actually programs.
28. A 'file' is a unit of information.
29. A megabyte has 106(million) bytes.
30. A small, single-site network is called LAN.
31. A processor that collects several data and sends them over a single line is called bridge.
32. 'Nano' stands for one billionth part.
33. The number of bit patterns using an n-bit code is 2n.
34. The part of a computer that works with the data/programs is called CPU.
35. To convert a binary number to a decimal, we have to express it in power of 2.
36. www stands for world wide web.
37. Mathematics employed in computers is called Boolean algebra.
38. A collection of 8 bits is called byte.
39. The first home computer (1977), which was sold in millions of units was Apple II.
40. 'PARAM' is a supercomputer.
41. A website containing periodic posts is called blog.
42. While cutting and pasting, the cutitem is temporarily stored in the clipboard.
43. http stands for hyper text transfer protocol.
44. The unwanted or non-requested emails are called "spam".
45. A computer framed to give various network services is called server.
Computer GK for Bank P.O. and Clerk Exams

1. All of the following are examples of real security and privacy risks EXCEPT:
(A) hackers. (B) spam. (C) viruses. (D) identity theft.
Ans : B

2. A process known as ____________ is used by large retailers to study trends.
(A) data mining (B) data selection (C) POS (D) data conversion
Ans : A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data (B) Point-of-sale (POS) (C) Sales (D) Query
Ans : B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(A) PSS (B) POS (C) inventory (D) data mining
Ans : A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(A) robotics. (B) simulation. (C) computer forensics. (D) animation.
Ans : C

6. Which of the following is NOT one of the four major data processing functions of a computer?
(A) gathering data (B) processing data into information
(C) analyzing the data or information (D) storing the data or information
Ans : C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
(A) POS (B) RFID (C) PPS (D) GPS
Ans : B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
(A) robotics. (B) computer forensics. (C) simulation. (D) forecasting.
Ans : A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary. (B) open. (C) experimental. (D) in the public domain.
Ans : A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A) Nanoscience (B) Microelectrodes (C) Computer forensics (D) Artificial intelligence
Ans : A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nanoscience (B) Nanotechnology (C) Simulation (D) Artificial intelligence (AI)
Ans : D

12. ____________ is data that has been organized or presented in a meaningful fashion.
(A) A process (B) Software (C) Storage (D) Information
Ans : D

13. The name for the way that computers manipulate data into information is called:
(A) programming. (B) processing. (C) storing. (D) organizing.
Ans : B

14. Computers gather data, which means that they allow users to ____________ data.
(A) present (B) input (C) output (D) store
Ans : B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
(A) data. (B) output. (C) input. (D) the process.
Ans : B

16. Computers use the ____________ language to process data.
(A) processing (B) kilobyte (C) binary (D) representational
Ans : C

17. Computers process data into information by working exclusively with:
(A) multimedia. (B) words. (C) characters. (D) numbers.
Ans : D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
(A) eight bytes. (B) eight kilobytes. (C) eight characters. (D) eight bits.
Ans : D

19. The term bit is short for:
(A) megabyte. (B) binary language. (C) binary digit. (D) binary number.
Ans : C

20. A string of eight 0s and 1s is called a:
(A) megabyte. (B) byte. (C) kilobyte. (D) gigabyte.
Ans : B

21. A ____________ is approximately one billion bytes.
(A) kilobyte (B) bit (C) gigabyte (D) megabyte
Ans : C

22. A ____________ is approximately a million bytes.
(A) gigabyte (B) kilobyte (C) megabyte (D) terabyte
Ans : C

23. ____________ is any part of the computer that you can physically touch.
(A) Hardware (B) A device (C) A peripheral (D) An application
Ans : A

24. The components that process data are located in the:
(A) input devices. (B) output devices. (C) system unit. (D) storage component.
Ans : C

25. All of the following are examples of input devices EXCEPT a:
(A) scanner. (B) mouse. (C) keyboar(D) (D) printer.
Ans : D

26. Which of the following is an example of an input device?
(A) scanner (B) speaker (C) CD (D) printer
Ans : A

27. All of the following are examples of storage devices EXCEPT:
(A) hard disk drives. (B) printers. (C) floppy disk drives. (D) CD drives.
Ans : B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
(A) motherboard (B) memory (C) RAM (D) central processing unit (CPU)
Ans : D

29. The CPU and memory are located on the:
(A) expansion boar(D) (B) motherboard. (C) storage device. (D) output device.
Ans : B

30. Word processing, spreadsheet, and photo-editing are examples of:
(A) application software. (B) system software. (C) operating system software. (D) platform software.
Ans : A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
(A) An instruction (B) Software (C) Memory (D) A processor
Ans : B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
(A) management (B) processing (C) utility (D) application
Ans : D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
(A) platforms. (B) applications. (C) programs. (D) storage devices.
Ans : A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
(A) languages (B) methods (C) CPUs (D) storage devices
Ans : C

35. Servers are computers that provide resources to other computers connected to a:
(A) network. (B) mainframe. (C) supercomputer. (D) client.
Ans : A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
(A) supercomputers (B) clients (C) laptops (D) mainframes
Ans : D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
(A) Servers (B) Supercomputers (C) Laptops (D) Mainframes
Ans : B

38. DSL is an example of a(n) ____________ connection.
(A) network (B) wireless (C) slow (D) broadband
Ans : D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
(A) digital divide. (B) Internet divide. (C) Web divide. (D) broadband divide.
Ans : A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
(A) Nanotechnology (B) Micro-technology (C) Computer forensics (D) Artificial intelligence
Ans : A

41. Which of the following is the correct order of the four major functions of a computer?
(A) Process à Output à Input à Storage (B) Input à Outputà Process à Storage
(C) Process à Storage à Input à Output (D) Input à Process à Output à Storage
Ans : D

42. ____________ bits equal one byte.
(A) Eight (B) Two (C) One thousand (D) One million
Ans : A

43. The binary language consists of ____________ digit(s).
(A) 8 (B) 2 (C) 1,000 (D) 1
Ans : B

44. A byte can hold one ____________ of data.
(A) bit (B) binary digit (C) character (D) kilobyte
Ans : C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
(A) The platform (B) The operating system (C) Application software (D) The motherboard
Ans : B

46. The operating system is the most common type of ____________ software.
(A) communication (B) application (C) system (D) word-processing software
Ans : C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
(A) Servers (B) Embedded computers (C) Robotic computers (D) Mainframes
Ans : B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
(A) instructions. (B) the operating system. (C) application software. (D) the system unit.
Ans : A

49. The two broad categories of software are:
(A) word processing and spreadsheet. (B) transaction and application.
(C) Windows and Mac OS. (D) system and application.
Ans : D

50. The metal or plastic case that holds all the physical parts of the computer is the:
(A) system unit. (B) CPU. (C) mainframe. (D) platform.
Ans : A

Hotel Management Entrance Exam., 2013
(Held on 28-4-2013)
Computer Awareness : Solved Paper

1. A constructor is called whenever–
(A) an object is created (B) an object is used
(C) a class is declared (D) a class is used
Ans : (A)

2. In object oriented design of software, which of the following is not true?
(A) Objects inherit the properties of the class
(B) Classes are defined based on the attributes of objects
(C) An object can belong to two classes
(D) Classes are always different
Ans : (C)

3. The maximum number of dimension any array can have in clanguage is–
(A) 3 (B) 4
(C) 5 (D) compiler dependent
Ans : (D)

4. Data structure suitable for the application is discussed in–
(A) Data design (B) Architectural design
(C) Procedural design (D) Interface design
Ans : (A)

5. The following program fragment–
Int a = 5, b = 6;
Print f ("%d", a = =b);
Prints
(A) Outputs an error message (B) Prints 0
(C) Prints 1 (D) None of the above
Ans : (A)

6. Which of the following bus types are used by Apple Macintosh Computer?
(A) ISA (B) NuBus
(C) EISA (D) MCA
Ans : (A)

7. What is the difference in the degree measures of the angles in degrees formed by the hour hand and the minute hand of a clock at 12 : 35 and 12 : 36 ?
(A) 1(B) 5
(C) 5.5 (D) 6
Ans : (C)

8. The extent to which the software can continue to operate correctly despite the introduction of invalid input is called–
(A) Reliability (B) Robustness
(C) Fault tolerance (D) Portability
Ans : (B)

9. What is the maximum transfer speed of the wireless 802.11 a standard?
(A) 100 Mbps (B) 54 Mbps
(C) 24 Mbps (D) 10 Mbps
Ans : (B)

10. How many bits are in a mega-bit?
(A) 1000000 (B) 1024
(C) 256 (D) 8
Ans : (A)

11. Which of the below commands displays the time on most Linux and Unix computers?
(A) Time (B) Date
(C) Timex (D) Now
Ans : (B)

12. Which of the following is not considered a super user?
(A) Admin (B) Agent
(C) Op (D) Root
Ans : (B)

13. Design phase includes–
(A) Data, architectural and procedural designs only
(B) Architectural, procedural and interface designs only
(C) Data, architectural and interface design only
(D) Data, architectural, interface and procedural designs
Ans : (A)

14. Which year was Microsoft Windows XP released?
(A) 2000 (B) 2001
(C) 2002 (D) 2003
Ans : (B)

15. The railway reservation system currently operational in India can be classified as a–
(A) Batch processing system (B) Real time system
(C) Online system (D) Expert system
Ans : (C)

16. In C language x – = y + 1 means–
(A) x = x – y + 1 (B) x = – x – y – 1
(C) x = – x + y + 1 (D) x = x – y –1
Ans : (D)

17. The topology with highest reliability is–
(A) Bus topology (B) Star topology
(C) Ring topology (D) Mesh topology
Ans : (D)

18. The method of communication in which transmission takes place in both directions, but only in one direction at a time is called–
(A) Simplex (B) Four wire circuit
(C) Full duplex (D) Half duplex
Ans : (C)

19. Judy is now twice as old as Adam, but 6 years ago, she was 5 times as old as he was. How old is Judy now?
(A) 10 (B) 16
(C) 20 (D) 24
Ans : (B)

20. The following loop–
for (i = 1, j = 10; i < 6; ++ i, – – j)
print f("% d %d", i, j);
prints
(A) 1 10 2 9 3 8 4 7 5 6
(B) 1 2 3 4 5 10 9 8 7 6
(C) 1 1 1 1 1 9 9 9 9 9
(D) None of the above
Ans : (D)

21. The cost for storing a bit is minimum in–
(A) cache (B) register
(C) RAM (D) magnetic tape
Ans : (D)

22. In C language–
Print f ("ab", "cd", "ef");
Prints
(A) ab (B) abcdef
(C) abcdef, followed by garbage (D) None of the above
Ans : (B)

23. If 7x + 3y = 17 and 3x + 7y = 19, what is the average of x and y ?
(A) 31/30 (B) 3.6
(C) 1.8 (D) 36
Ans : (C)

24. C++ was originally developed by–
(A) Clocksin and Mellish (B) Donal E. Knuth
(C) Sir Richard Hadlee (D) Bjarne Stroustrup
Ans : (D)

25. An important aspect in coding is–
(A) Readability
(B) Productivity
(C) To use as small memory space as possible
(D) Brevity
Ans : (A)

26. The term MIPS refers to–
(A) Millions of instructions per second
(B) Multiple instruction per second
(C) Megabytes of instructions per second
(D) Million input processor set
Ans : (A)

27. The following loop–
For putchar (‘ c’): putchar (‘a’);
putchar (‘r); putchar (‘t’);
Outputs–
(A) a syntax error (B) cartrt
(C) catrat (D) catratratratrat ……
Ans : (A)

28. Which of the following is a desirable property of a module?
(A) Independency (B) Low cohesiveness
(C) High coupling (D) Multi functional
Ans : (A)

29. cfront–
(A) Is the front end of C compiler
(B) Is the pre-processor of a C compiler
(C) Translates a C++ code to its equivalent C code
(D) None of the above
Ans : (C)

30. A jar contains 10 red marbles and 30 green ones. How many red marbles must be added to the jar so that 60% of the marbles will be red?
(A) 25 (B) 30
(C) 35 (D) 40
Ans : (C)

31. Baud means–
(A) the number of bits transmitted per unit time
(B) the number of bytes transmitted per unit time
(C) the rate at which signal changes
(D) None of the above
Ans : (C)

32. Which of the below is not a type of printer?
(A) Bubble Jet printer (B) LED printer
(C) Thermal printer (D) Microwave printer
Ans : (D)

33. At a High School each student studies exactly one foreign language. Three-fifths of the students take Spanish and one- fourth of the remaining students take German. If all of the others French, what percentage of the student take French?
(A) 10 (B) 15
(C) 20 (D) 30
Ans : (D)

34. Which of the below people is credited for developing the World Wide Web?
(A) Alan Kay (B) Tim Bemers-Lee
(C) Jack Kilby (D) Robert Noyee
Ans : (B)

35. Integer division results in–
(A) Truncation (B) Rounding
(C) Overflow (D) None of the above
Ans : (A)

Directions–(Q. 36 to 39) As part of their sports physicals, seven collegiate athletes-F, G, H, I, J, K and L are being weighed. In announcing the results of the physical exams, the coach has given the following information–
None of the athletes has exactly the same weight as another athlete,
K is heavier than L, but lighter than H.
I is heavier than J.
Both F and G are heavier than H.

36. If H is heavier than I, which of the following cannot be true ?
(A) I’s weight is equal to the average of weights of F and G
(B) I’s weight is equal to the average of weights of K and L
(C) J’s weight is equal to the average of weights of K and L
(D) J is the second lightest
Ans : (A)

37. Each of the following could be true except–
(A) F is heaviest (B) G is heaviest
(C) I is heaviest (D) More than three athletes are lighter than K
Ans : (D)

38. Which of the following, if true, would be sufficient to determine which athlete is the lightest?
(A) I is the heaviest (B) I is lighter than K
(C) K is heavier than J (D) J is heavier than K
Ans : (D)

39. If J is heavier than F, how many different rankings by weight of the athletes are possible?
(A) 1 (B) 2
(C) 4 (D) 6
Ans : (C)

40. On a certain project, the only grades awarded were 75 and 100. If 85 students completed the project and the average of their grades was 85, how many earned 100 ?
(A) 34 (B) 40
(C) 45 (D) 51
Ans : (A)

41. In a group of 100 students, more students are on the fencing team than are members of the French club. If 70 are in the club and 20 are neither on the team nor in the club, what is the minimum number of students who could be both on the team and in the club?
(A) 10 (B) 49
(C) 60 (D) 61
Ans : (D)

42. If it is now June, what month will it be 400 months from now?
(A) January (B) April
(C) June (D) October
Ans : (D)

43. As a fund-raiser, the school band was selling two types of candy : lollipops for 40 cents each and chocolate bars for 75 cents each. They sold 150 candies and raised 74 dollars (1 dollar = 100 cents). How many lollipops did they sell ?
(A) 75 (B) 90
(C) 96 (D) 110
Ans : (D)

44. AI’s GPA is higher than Bob’s. Carol’s GP A is lower than Bob’s but it is higher than Dan’s. If the preceding statements are true, which of the following statements would have to be true in order to conclude that Ellen has a higher GP A than carol ?
(A) Ellen’s GP A is higher than Dan’s
(B) Bob’s GP A is lower than Ellen’s
(C) Ellen’s GPA is equal to the average of GP As of AI’s and Dan’s
(D) AI’s GP A is higher than Ellen’s
Ans : (B)

45. Howard has three times as much money as Ronald. If Howard gives Ronald $ 50, Ronald will then have three times as much money as Howard. How much money do the two of them have together?
(A) $ 75 (B) $ 100
(C) $ 125 (D) $ 150
Ans : (B)

No comments:

Post a Comment

SohanGNews