G.K Computer RRB,RBI,IBPS PO, IBPS Clerk, Bank PO.Exam Preperation entrance|competitive examinations. MCQ's




Question 901 :
PC stands for


  1. Practical Computer
  2. Personal Computer
  3. Private Computer
  4. Personal Contact
  

Question 902 :
______ may be included in other folder while making heirarchical structure folder.


  1. Minifolder
  2. Tiered folder
  3. Sub?folder
  4. Object
  

Question 903 :
Which memory stores large amount of data and the data can not be processed directly by the CPU?


  1. Secondary or Auxiliary Memory
  2. Primary or Main Memory
  3. Both (A) and (B)
  4. None of the Above
  

Question 904 :
Microprocessors can be used t make


  1. Computer
  2. Digital systems
  3. Calculators
  4. All of the above
  

Question 905 :
Specilizd programs that asist users in locating information on the Web are called ....


  1. Information engines
  2. Search engines
  3. Web browsers
  4. Resource locators
  

Question 906 :
A person who uses his/her expertise to gain access to other people's ciomputers to get information illegally or do damage is a


  1. spammer
  2. hacker
  3. instant messanger
  4. All of the above
  

Question 907 :
All the following media have read and write capability except


  1. flash memory cards
  2. CD?ROMs
  3. hard disk drives
  4. floppy disks
  

Question 908 :
Buffering in printers is necessary


  1. as computers are fast in generating data for printing then printer can print it.
  2. as there is not enough memory provided with printers.
  3. to make printers work for more years.
  4. Both 1) and 2)
  

Question 909 :
A process is an instance of a computer _________ that is being executed.


  1. job
  2. program
  3. task
  4. method
  

Question 910 :
Virtual memory is


  1. Memory on the hard disk that the CPU uses as an extended RAM
  2. RAM
  3. Only necessary if you do not have any RAM in your computer
  4. A back up device for floppy disks
  

Question 911 :
Lynx is a type of


  1. search engine
  2. web index
  3. meta?search?engine
  4. web browser
  

Question 912 :
What is the process of copying software programs from secondary storage media to the hard disk called?


  1. Configuration
  2. Download
  3. Storage
  4. Installation
  

Question 913 :
Plotter accuracy is measured in terms of repeatability and


  1. buffer size
  2. resolution
  3. vertical dimension
  4. intelligence
  

Question 914 :
SMTP, FTP and DNS are applications of the _________ layer.


  1. Data link
  2. Network
  3. Transport
  4. Application
  

Question 915 :
Storage that retains its data after the power is turned off is referred to as?


  1. volatile storage
  2. non-volatile storage
  3. sequential storage
  4. direct storage
  

Question 916 :
What is output?


  1. What the processor takes from the user.
  2. What the user gives to the processor.
  3. What the processor gets from the user.
  4. What the processor gives to the user.
  

Question 917 :
Which term is commonly used for copyrighted software given away free by its author?


  1. Freeware
  2. Shareware
  3. Open Source Software
  4. Public Domain Software
  

Question 918 :
A set of instructions telling the computer what to do is called


  1. mentor
  2. instructor
  3. compiler
  4. program
  

Question 919 :
COBOL is used in ____________applications.


  1. commercial
  2. scientific
  3. space
  4. mathematical
  

Question 920 :
When your computer stops working suddenly, it is referred to as a


  1. crash
  2. die
  3. death
  4. penalty
  

Question 921 :
Which of the following is System Software?


  1. Microsoft Word
  2. Microsoft Excel
  3. Adobe Photoshop
  4. Windows 7
  

Question 922 :
What does the SMTP in an SMTP server stand for ?


  1. Simple Mail Transfer Protocol
  2. Serve Message Text Process
  3. Short Messaging Text Process
  4. Short Messaging Transfer Protocol
  

Question 923 :
Network components are connected to the same cable in the .......... topology


  1. star
  2. ring
  3. bus
  4. mesh
  

Question 924 :
What is the function of Recycle Bin ?


  1. Store deleted file
  2. Store temporary file
  3. Store corrupted file
  4. Store Document file
  

Question 925 :
A person who uses his/her expertise to gain access to other people's computers to get information illegally or do damage is a


  1. hacker
  2. analyst
  3. instant messanger
  4. programmer
  

Question 926 :
Which of the following is a type of RAM used specifically for video adapters or 3D accelerators?


  1. DRAM
  2. SRAM
  3. SGRAM
  4. VRAM
  

Question 927 :
Computer programs are written in a high?level programming language? however, the human?readable version of a program is called


  1. cache
  2. instruction set
  3. source code
  4. world size
  

Question 928 :
In world processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is


  1. copy and paste
  2. copy, cut and paste
  3. cut, copy and paste
  4. cut and paste
  

Question 929 :
The primary goal of a computer is to turn data into


  1. ideas
  2. suggestions
  3. information
  4. reports
  

Question 930 :
The ______ tells the computer how to use its components.


  1. utility
  2. network
  3. operating system
  4. application software