Tuesday 17 July 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops



8. What is the storage area for e-mail messages called ?
(A) A folder
(B) A mailbox
(C) A directory
(D) The hard disk
Answer: A mailbox

9. One advantage of dial-up Internet access is
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) it utilises existing telephone service
Answer: it utilises existing telephone service

10. What is the process of copying software programs from secondary storage media to the hard disk called ?
(A) configuration
(B) download
(C) storage
(D) installation
Answer: installation

11. Which process checks to ensure that the components of the computer are operating and connected properly ?
(A) Booting
(B) Processing
(C) Saving
(D) Editing
Answer: Booting

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
(A) Modem
(B) Software
(C) Scanner
(D) Keyboard
Answer: Scanner

13. An error in a computer program………………
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
Answer: Bug

14. Access-control based on a person's fingerprints is .an example of………………
(A) biometric identification
(B) characteristic identification
(C) characteristic security
(D) fingerprint security
Answer: biometric identification

15. The patterns of printed lines on most products are called………………
(A) prices
(B) striping
(C) scanners
(D) barcodes
Answer: barcodes

16. Most mail programs automatically complete the following two parts in an e-mail ………………
(A) From: and Body :
(B) From: and Date :
(C) From: and To :
(D) From: and Subject :
Answer: From: and Date :

17. The computer's capability of distinguishing spoken words is called ………………
(A) voice analysis
(B) speech acknowledgement
(C) voice recognition
(D) speech interpretation
Answer: voice recognition

18. Which of the following is an advantage of mounting an application on the Web ?
(A) The possibility of 24-houraccess for users
(B) Creating a system that can extend globally
(C) Standardising the design of the interface
(D) All of these
Answer: All of these

19. The first page of a Website is called the ………………
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark
Answer: Homepage

20. ERP is an acronym for ………………
(A) Enterprise Retirement Planning
(B) Enterprise Relationship Planning
(C) Enterprise Resource' Planning
(D) Enterprise Reorder Planning
Answer: Enterprise Resource Planning

21. The software that allows users to surf the Internet is called a/an ………………
(A) Search Engine
(B) Internet Service Provider (ISP)
(C) Multimedia Application
(D) Browser
Answer: Browser

22. The issues that deal with the collection and use of data about individuals is ………………
(A) access
(B) publicity
(C) accuracy
(D) privacy
Answer: privacy

23. A term related to sending data to a satellite is ………………
(A) downlink
(B) modulate
(C) demodulate
(D) uplink
Answer: uplink

24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
(A) hypermedia
(B) hypertext
(C) HTML
(D) URL
Answer: hypertext

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) Internet
(D) metaphysical
Answer: data

No comments:

Post a Comment