G.K Computer RRB,RBI,IBPS PO, IBPS Clerk, Bank PO.Exam Preperation entrance|competitive examinations. MCQ's




Question 991 :
Objects on the slide that hold text are called


  1. object holders
  2. text holders
  3. auto layout
  4. place holders
  

Question 992 :
A ________ is a unique name that you give to a file of information.


  1. device letter
  2. folder
  3. filename
  4. filename extension
  

Question 993 :
Non-Impact Printers use ________ technologies


  1. electrostatic and chemical
  2. thermal
  3. inkjet
  4. All of the Above
  

Question 994 :
What is backup?


  1. Adding more components to your network
  2. Protecting data by copying it from the original source to a different destination
  3. Filtering old data from the new data
  4. Accessing data on tape
  

Question 995 :
The _____ of a system includes the programs or instructions.


  1. Hardware
  2. Icon
  3. Information
  4. Software
  

Question 996 :
Electronic Delay Storage Automatic Computer(EDSAC) was invented by _________


  1. Herman Hollerith
  2. JW Mauchy
  3. John Von Neumann
  4. None of the Above
  

Question 997 :
What is output ?


  1. What the processor takes from the user
  2. What the user gives to the processor
  3. What the processor gets from the user
  4. What the processor gives to the user
  

Question 998 :
_______ provides electronic data interchange facility.


  1. ISDN
  2. LAN
  3. VAN
  4. CAN
  

Question 999 :
Which key is used in combination with another key to perform a specific task?


  1. Esc
  2. Control
  3. Arrow
  4. Space bar
  

Question 1000 :
When we run progra in HTML coding, ......... is used as back-end and ........... works as front-end


  1. Notepad, Internet Explorer
  2. Notepad, MSN messenger
  3. MS Word, Internet Explorer
  4. Both 1 and 3
  

Question 1001 :
Graphical terminals are divided into two types


  1. text and dumb
  2. dumb and intelligent
  3. vector mode and raster mode
  4. None of the Above
  

Question 1002 :
Where is the disk put to enable computer to read it?


  1. Disk drive
  2. Memory
  3. CPU
  4. ALU
  

Question 1003 :
The OSI model is divided into how many processes called layers


  1. Five
  2. Six
  3. Seven
  4. Eight
  

Question 1004 :
An example of a telecommunication device is a


  1. Keyboard
  2. mouse
  3. printer
  4. modem
  

Question 1005 :
What is a back up ?


  1. Restoring the information backup
  2. An exact copy of a system's information
  3. The ability to get a system u and runnign in the event of a system crash or failure
  4. All of these
  

Question 1006 :
Virtual memory is


  1. memory on the hard disk that the CPU uses as extended RAM
  2. in RAM
  3. only necessary if you do not have any RAM in your computer
  4. a backup device for floppy disks
  

Question 1007 :
A unit for measuring data trasmission speed is called


  1. cache
  2. broadbank channel
  3. byte
  4. baud
  

Question 1008 :
A group of bits that tell the computer to perform a specific operation is known as_______


  1. Instruction code
  2. Micro-operation
  3. Accumulator
  4. Register
  

Question 1009 :
What menu is selected to cut, copy and paste?


  1. File
  2. Tools
  3. Special
  4. Edit
  

Question 1010 :
Laser printers and Ink-jet printers are an example of _______


  1. Impact
  2. Non Impact
  3. Both (A) and (B)
  4. None of the Above
  

Question 1011 :
What is meant by a dedicated computer ?


  1. Which is used by one person only
  2. Which is assigned one and only one task
  3. Which uses one kind of software
  4. Which is meant for application software
  

Question 1012 :
Which was the first computer to use transisters instead of vacuum tubes?


  1. Intel?650
  2. Burroughs E?101
  3. Datametric?1000
  4. IBM 1401
  

Question 1013 :
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?


  1. Version
  2. Update
  3. Help
  4. Patch
  

Question 1014 :
What happens when a worksheet is not protected?


  1. It cannot be opened.
  2. It cannot be saved.
  3. It cannot be edited.
  4. It can be edited.
  

Question 1015 :
_________ is a computational model based on the structure of biological neural networks?


  1. Artificial Neural Network (ANN)
  2. Biological Network
  3. Both(A) - (B)
  4. None of the Above
  

Question 1016 :
The term ________ refers to data storage systems that make it possible for a computer or electronic device to store and retrieve data


  1. input technology
  2. output technology
  3. storage technology
  4. None of the Above
  

Question 1017 :
All of the following are examples of real security and privacy risks except


  1. Hackers
  2. Spam
  3. Viruses
  4. Identity theft
  

Question 1018 :
The code that relational database management systems use to perform their database task is referred to as?


  1. QBE
  2. SQL
  3. OLAP
  4. Sequel Server
  

Question 1019 :
A ________ shares hardware, software and data among authorised users.


  1. network
  2. protocol
  3. hypertext
  4. transmitter
  

Question 1020 :
IEEE _______ standard is used for wirless LAN.


  1. 802.12
  2. 802.13
  3. 802.15
  4. 802.11