Computer Awareness Questions Answers Govt Competitive Exams MCQ's




Question 841 :
_____is the process of finding errors in software code.


  1. Compiling
  2. Testing
  3. Running
  4. Debugging
  

Question 842 :
The primary job of an operating system is to manage


  1. commands
  2. users
  3. programmes
  4. resources
  

Question 843 :
Which of the following will not cut information?


  1. Pressing Ctrl + C
  2. Selecting Edit > Cut. from the menu
  3. Clicking the cut button ont he standard
  4. Pressing Ctrl + X
  

Question 844 :
_____ servers store and manages files for network users.


  1. Authentication
  2. Main
  3. Web
  4. File
  

Question 845 :
The most frequently used instru-ctions of a computer program are likely to be fetched from?


  1. the hard disk
  2. cache memory
  3. RAM
  4. registers
  

Question 846 :
A person who uses his/her expertise to gain access to other people's computers to get information illegally or do damage is a


  1. hacker
  2. analyst
  3. instant messanger
  4. programmer
  

Question 847 :
________ are type of inexpensive digital camera that remains tethered to a computer and are used for videoconferencing, video chatting, and live Web broadcast.


  1. Webcams
  2. Webpics
  3. Browsercams
  4. Browserpics
  

Question 848 :
OCR is used for the preparation of _________


  1. electricity bills
  2. telephone bills
  3. insurance premium
  4. All of the Above
  

Question 849 :
A normal CD-ROM usually can store up to ..........


  1. 680 KB
  2. 680 Bytes
  3. 680 MB
  4. 680 GB
  

Question 850 :
The first step in the transaction processing cycle is ________.


  1. database operations
  2. audit
  3. data entry
  4. user inquiry
  

Question 851 :
The retrieval of information from the computer is defined as


  1. Data processing
  2. Input
  3. Output
  4. All of the above
  

Question 852 :
Which term identifies a specific computer on the web and the main page of the entire site?


  1. URL
  2. Web site address
  3. Hyperlink
  4. Domain name
  

Question 853 :
Which algorithm is used in layered Feed forward Neural Network?


  1. Back propagation algorithm
  2. Binary Search
  3. Both(A) - (B)
  4. None of the Above
  

Question 854 :
Where is the disk put to enable computer to read it?


  1. Disk drive
  2. Memory
  3. CPU
  4. ALU
  

Question 855 :
An assembly language is a division of


  1. Middle level language
  2. High level language
  3. Low level language
  4. Machine language
  

Question 856 :
The _____ of a system includes the programs or instructions.


  1. Hardware
  2. Icon
  3. Information
  4. Software
  

Question 857 :
In world processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is


  1. copy and paste
  2. copy, cut and paste
  3. cut, copy and paste
  4. cut and paste
  

Question 858 :
A _______ is approximately one billion bytes.


  1. kilobytes
  2. bit
  3. gigabyte
  4. megabyte
  

Question 859 :
The device which is used to connect the computer to the network media is called


  1. cable
  2. hub
  3. switch
  4. NIC
  

Question 860 :
A language based on graphics for use in education is called


  1. PROLOG
  2. LOGO
  3. COBOL
  4. BASIC
  

Question 861 :
IP address consists of how many bits?


  1. 16 bits
  2. 8 bits
  3. 30 bits
  4. 32 bits
  

Question 862 :
Which of the following refers to the fastest, biggest and most expensive computers?


  1. Personal Computers
  2. Supercomputers
  3. Laptops
  4. Notebooks
  

Question 863 :
Programs such as Mozila Firefox that serve as navigablewindows into the Web are called ..........


  1. Hypertext
  2. Networks
  3. Internet
  4. Web browsers
  

Question 864 :
The .............. becomes different shapes depending on the task you are performing


  1. Active tab
  2. Insertion point
  3. Mouse pointer
  4. Ribbon
  

Question 865 :
Which input device is used to read information on a credit card?


  1. Graphic Tablet
  2. Numeric Keyboard
  3. Bar Code reader
  4. Magnetic Stripe reader
  

Question 866 :
_________ are distinct items that don't have much meaning to you in a given countext.


  1. Fields
  2. Data
  3. Queries
  4. Properties
  

Question 867 :
Two or more computers connected to each other of sharing information form a _____


  1. Network
  2. Router
  3. Server
  4. Tunnel
  

Question 868 :
Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as


  1. Spam
  2. Trash
  3. Calibri
  4. Courier
  

Question 869 :
Modem speeds are measured in


  1. BPS
  2. KBPS
  3. MBPS
  4. MIPS
  

Question 870 :
Plotter accuracy is measured in terms of repeatability and


  1. buffer size
  2. resolution
  3. vertical dimension
  4. intelligence