Computer Awareness |
Dear Readers,
Welcome to Mentor for Bank Exams. Here I am sharing the Computer Awareness MCQ’s
Practice set – 3 with 50 MCQ’s. A link for downloading the PDF is provided at the
end of the post. Do visit for more MCQ’s like this. Kindly make use of this!!!
1. _______ means to enlarge a window to its maximum area so
that it will fill entire desktop.
1) Maximize
2) Zoom
3) Enlarge
4) Extend
2. This is the process of getting access to the computer.
1) Sign in
2) Log in
3) Log off
4) enter
3. The full step wise process of closing a computer is called
1) Shutting
2) Closing
3) Log off
4) Shut
down
4. A connection form one HTML document to another HTML
document is called.
1) Hyper
link
2) Connecting link
3) Icon
4) All of these
5. Capability of computer to perform more than one tasks at
the same times is
1) Batch processing
2) Real time processing
3)
Multitasking
4) Scheduled processing
6. It is the smallest dot that can be uniquely drawn on a
computer screen. This is _____
1) Boxel
2) Computer dot
3) Cursor
4) Pixel
7. A picture map or graphics or image that can be used in a
document is known as.
1) Clip
2) Object
3) Clip board
4) Drag drop
8. Display bar that list all the open folders and active
application is _________
1) Menu bar
2) Toolbar
3) Taskbar
4) Window list
9. A large space common in most of the windows which is for
users’ work with that application is _________
1) Application view
2) Work
area
3) Project view
4) Toolbar
10. A photograph, image or any other visual file which is
displayed a the back ground of the windows main icon screen is called as ______
1) Wall
paper
2) Screen saver
3) Window theme
4) Active desktop
11. All window settings are stored in this file
1) Window.INI
2) Goups.INI
3) Win.IMI
4) Tem.INI
12. CPU can directly understand this language
1) C
2) C++
3) Assembly
4) Java
13. What is the expanded for of CPU?
1) Central Power Unit
2) Cooer Processing Unit
3) Central
Processing Unit
4) Core Point Unit
14. A normal compiler takes source code as input and produces
this as output ________
1) Assembly code
2) Object code
3) Machine
code
4) All of the these
15. Languages which can easily interact with the hardware are
called.
1) High Level Language
2) Low
Level Language
3) Middle Level Language
4) They are not normally used computer lines
16. To detect, locate and remove errors in program and/or
malfunctions in equipment is -_________
1) Compile
2) Debug
3) Interpret
4) DSS
17. A program written in high-level language is a
1) Complied Program
2) Source
Program
3) Objective Program
4) All of the above
18. Which of the following is the most powerful type of
computer
1) Super
computer
2) Micro computer
3) Main frame computer
4) Mini computer
19. Compliers are
1) Both OS
and Hardware dependent
2) Only OS dependent
3) Only Hardware dependent
4) Cannot be generalized for all compilers.
20. Which among the following is/are interpreted language
1) C
2) Visual basic
3) Java
4) Both 2
and 3
21. Hardware that are easily attached to computer and can be
played instantly are called as
1) Multimedia
2) Plug and
play
3) Digital
4) Point to point
22. Format for musical data communication between two devices
such s computer and synthesizer, is called
1) HTML
2) MP3
3) MPEG
4) MIDI
23. Which of the following is not a web browser?
1) Opera
2) Netscape
3)
Microsoft outlook
4) Internet explorer
24. It is a secrets word which is used to prevent access for
system or network. It is called _______
1) Loin
2) Password
3) Account No.
4) Net ID
25. All the deleted items are stored in this place until they
are permanently deleted. This place is
1) mailbox
2) temporary folders
3) virtual hard drive
4) recycle
bin
26. all the following are examples in input devices except a
1) scanner
2) mouse
3) keyboard
4) printer
27. all of the following are example of output devices EXCEPT
a
1) scanner
2) speaker
3) CD
4) Printer
28. The CPU and memory are located on the
1) Expansion board
2)
Motherboard
3) Storage device
4) None of these
29. Output device ________ is a set of computer program used
in a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) A processor
30. A __________ is approximately a million bytes.
1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte
31. In the URL. http ://www.prenhall.com, the portion labelled
http is the
1) Host
2) Domain name
3) Protocol
4) Top-level domain
32. In a database, a field is a
1) Label
2) Table of information
3) Group of
related records
4) Category of information
33. The number of pixels displayed on a screen is known as the
screen
1)
Resolution
2) Colour depth
3) Refresh rate
4) Viewing size
34. A repair for a known software bug, usually available at no
charge on the internet, is called a(n)—
1) Version
2) Patch
3) Tutorial
4) FAQ
35. The time it takes a device to locate data and instructions
and make them available to CPU is known as ___
1) Clock speed
2) A processing cycle
3) CPU speed access time
4) Access
time
36. Which of the following is the correct order of the four
major function of a computer?
1) Process, output, input, storage
2) Input, output, proves, storage
3) Process, storage, input, output
4) Input,
process, output, storage
37. A byte can hold one _________ of data.
1) Bit
2) Binary digit
3)
Character
4) Kilobyte
38. The O/S is the most common type of ________ software.
1) Communication
2) Application
3) System
4) Word-processing software
39. _______ are specially designed computers that perform
complex calculation extremely rapidly.
1) Servers
2)
Supercomputers
3) Laptops
4) Mainframes
40. The two broad categories of software are:
1) Word processing and spreadsheet
2) Transaction and application
3) Windows and Mac OS.
4) System
an application
41. ______ is the result produced by a computer.
1) Data
2) Memory
3) Output
4) Input
42. The human-readable version of a program is called
_________
1) Source code
2) Program code
3) Human code
4) System
code
43. A _______ is approximately a thousand bytes.
1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte
44. The dies kop contains small graphic called
1) Windows
2) Logos
3) Icons
4) Pictures
45. Which key is used in combination with another key to
perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
46. With is NOT a good web security strategy?
1) Restrict access to the web server; keep a minimum
number of ports open
2) Limit the users who can load software, edit or add
files.
3) Add demon programs, so users can test system
without accessing perdition data.
4) Remove
unnecessary compliers and interpreters.
47. _______ Tags when placed on an animal, can be used to
record and track in a database all of the animals movements.
1) POS
2) RFID
3) PPS
4) GPS
48. Smaller and less expensive PC-based servers are replacing
_______ in many businesses.
1) Supercomputers
2) Clients
3) Laptops
4)
Mainframes
49. The binary system language consists of _______ digit(s).
1) 8
2) 2
3) 1,000
4) 1
50. All of the following are basic principles of networks,
except
1) Each computer must have a network card
2) There
must be communication media connecting the network and hardware devices
3) There must be at least one connecting device
4) Each computer must have software
that supports the movement of information.
Thank you,
Keep Visiting,