Computer Awareness MCQ's Practice Set - 3

Mentor for Bank Exams
Computer Awareness
Dear Readers,
Welcome to Mentor for Bank Exams. Here I am sharing the Computer Awareness MCQ’s Practice set – 3 with 50 MCQ’s. A link for downloading the PDF is provided at the end of the post. Do visit for more MCQ’s like this. Kindly make use of this!!!
1. _______ means to enlarge a window to its maximum area so that it will fill entire desktop.
1) Maximize
2) Zoom
3) Enlarge
4) Extend
2. This is the process of getting access to the computer.
1) Sign in
2) Log in
3) Log off
4) enter
3. The full step wise process of closing a computer is called
1) Shutting
2) Closing
3) Log off
4) Shut down
4. A connection form one HTML document to another HTML document is called.
1) Hyper link
2) Connecting link
3) Icon
4) All of these
5. Capability of computer to perform more than one tasks at the same times is
1) Batch processing
2) Real time processing
3) Multitasking
4) Scheduled processing
6. It is the smallest dot that can be uniquely drawn on a computer screen. This is _____
1) Boxel
2) Computer dot
3) Cursor
4) Pixel
7. A picture map or graphics or image that can be used in a document is known as.
1) Clip
2) Object
3) Clip board
4) Drag drop
8. Display bar that list all the open folders and active application is _________
1) Menu bar
2) Toolbar
3) Taskbar
4) Window list
9. A large space common in most of the windows which is for users’ work with that application is _________
1) Application view
2) Work area
3) Project view
4) Toolbar
10. A photograph, image or any other visual file which is displayed a the back ground of the windows main icon screen is called as ______
1) Wall paper
2) Screen saver
3) Window theme
4) Active desktop
11. All window settings are stored in this file
1) Window.INI
2) Goups.INI
3) Win.IMI
4) Tem.INI
12. CPU can directly understand this language
1) C
2) C++
3) Assembly
4) Java
13. What is the expanded for of CPU?
1) Central Power Unit
2) Cooer Processing Unit
3) Central Processing Unit
4) Core Point Unit
14. A normal compiler takes source code as input and produces this as output ________
1) Assembly code
2) Object code
3) Machine code
4) All of the these
15. Languages which can easily interact with the hardware are called.
1) High Level Language
2) Low Level Language
3) Middle Level Language
4) They are not normally used computer lines
16. To detect, locate and remove errors in program and/or malfunctions in equipment is -_________
1) Compile
2) Debug
3) Interpret
4) DSS
17. A program written in high-level language is a
1) Complied Program
2) Source Program
3) Objective Program
4) All of the above
18. Which of the following is the most powerful type of computer
1) Super computer
2) Micro computer
3) Main frame computer
4) Mini computer
19. Compliers are
1) Both OS and Hardware dependent
2) Only OS dependent
3) Only Hardware dependent
4) Cannot be generalized for all compilers.
20. Which among the following is/are interpreted language
1) C
2) Visual basic
3) Java
4) Both 2 and 3
21. Hardware that are easily attached to computer and can be played instantly are called as
1) Multimedia
2) Plug and play
3) Digital
4) Point to point
22. Format for musical data communication between two devices such s computer and synthesizer, is called
1) HTML
2) MP3
3) MPEG
4) MIDI
23. Which of the following is not a web browser?
1) Opera
2) Netscape
3) Microsoft outlook
4) Internet explorer
24. It is a secrets word which is used to prevent access for system or network. It is called _______
1) Loin
2) Password
3) Account No.
4) Net ID
25. All the deleted items are stored in this place until they are permanently deleted. This place is
1) mailbox
2) temporary folders
3) virtual hard drive
4) recycle bin
26. all the following are examples in input devices except a
1) scanner
2) mouse
3) keyboard
4) printer
27. all of the following are example of output devices EXCEPT a
1) scanner
2) speaker
3) CD
4) Printer
28. The CPU and memory are located on the
1) Expansion board
2) Motherboard
3) Storage device
4) None of these
29. Output device ________ is a set of computer program used in a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) A processor
30. A __________ is approximately a million bytes.
1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte
31. In the URL. http ://www.prenhall.com, the portion labelled http is the
1) Host
2) Domain name
3) Protocol
4) Top-level domain
32. In a database, a field is a
1) Label
2) Table of information
3) Group of related records
4) Category of information
33. The number of pixels displayed on a screen is known as the screen
1) Resolution
2) Colour depth
3) Refresh rate
4) Viewing size
34. A repair for a known software bug, usually available at no charge on the internet, is called a(n)—
1) Version
2) Patch
3) Tutorial
4) FAQ
35. The time it takes a device to locate data and instructions and make them available to CPU is known as ___
1) Clock speed
2) A processing cycle
3) CPU speed access time
4) Access time
36. Which of the following is the correct order of the four major function of a computer?
1) Process, output, input, storage
2) Input, output, proves, storage
3) Process, storage, input, output
4) Input, process, output, storage
37. A byte can hold one _________ of data.
1) Bit
2) Binary digit
3) Character
4) Kilobyte
38. The O/S is the most common type of ________ software.
1) Communication
2) Application
3) System
4) Word-processing software
39. _______ are specially designed computers that perform complex calculation extremely rapidly.
1) Servers
2) Supercomputers
3) Laptops
4) Mainframes
40. The two broad categories of software are:
1) Word processing and spreadsheet
2) Transaction and application
3) Windows and Mac OS.
4) System an application
41. ______ is the result produced by a computer.
1) Data
2) Memory
3) Output
4) Input
42. The human-readable version of a program is called _________
1) Source code
2) Program code
3) Human code
4) System code
43. A _______ is approximately a thousand bytes.
1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte
44. The dies kop contains small graphic called
1) Windows
2) Logos
3) Icons
4) Pictures
45. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
46. With is NOT a good web security strategy?
1) Restrict access to the web server; keep a minimum number of ports open
2) Limit the users who can load software, edit or add files.
3) Add demon programs, so users can test system without accessing perdition data.
4) Remove unnecessary compliers and interpreters.
47. _______ Tags when placed on an animal, can be used to record and track in a database all of the animals movements.
1) POS
2) RFID
3) PPS
4) GPS
48. Smaller and less expensive PC-based servers are replacing _______ in many businesses.
1) Supercomputers
2) Clients
3) Laptops
4) Mainframes
49. The binary system language consists of _______ digit(s).
1) 8
2) 2
3) 1,000
4) 1
50. All of the following are basic principles of networks, except
1) Each computer must have a network card
2) There must be communication media connecting the network and hardware devices
3) There must be at least one connecting device
4) Each computer must have software that supports the movement of information.


Thank you,
Keep Visiting,
Like my Facebook page for getting the updates.