Computer Awareness Questions Answers Govt Competitive Exams MCQ's




Question 91 :
What does storage unit provide?


  1. Place for typing data
  2. Storage for information and instruction
  3. Place for printing information
  4. All the above
  

Question 92 :
What is a firmware?


  1. A program started in RAM.
  2. A program started in a file.
  3. A program started in boot sector.
  4. A program started in ROM.
  

Question 93 :
What may happen if a worksheet is not protected?


  1. It cannot be opened.
  2. It cannot be saved.
  3. It cannot be edited.
  4. It can be edited.
  

Question 94 :
_________ is the time from the start of one storage device access to the time when the next access can be started


  1. Mode
  2. Access time
  3. capacity
  4. None of the Above
  

Question 95 :
How are data organized in a spreadsheet?


  1. Rows and Columns
  2. Boxes
  3. Tables
  4. None of the above
  

Question 96 :
Which of the following is non-emissive display?


  1. LED
  2. LCD
  3. Both (A) and (B)
  4. None of the Above
  

Question 97 :
Which of the following is true?


  1. A byte is a single digit in a binary number.
  2. A bit represents a group of digital numbers.
  3. Eight?digit binary number is called a byte.
  4. Eight?digit binary number is called a bit.
  

Question 98 :
Now a days Vishing has become a criminal practice of using social engineering over which of the following ?


  1. Social networking sites
  2. Mobile Phones
  3. E-mail
  4. Cyber cafes
  

Question 99 :
Which is a general term for all forms of solid state memory that do not need to have their memory contents periodically refreshed


  1. Volatile memory
  2. Non Volatile memory
  3. Both (A) and (B)
  4. None of the Above
  

Question 100 :
Which of the following is fourth generation computer?


  1. INTEL 4004
  2. IBM 360
  3. IBM 1401
  4. None of the Above
  

Question 101 :
Under virtual storage ________


  1. Two or more programs are stored in primary storage
  2. Only active pages of a program in primary storage
  3. Inter-program, interference may occur
  4. None of the Above
  

Question 102 :
_______ are used to identify a user who returns to a website.


  1. Cookies
  2. Plug?in
  3. Scripts
  4. ASPS
  

Question 103 :
What does a light pen contain?


  1. lead
  2. ink
  3. light sensing elements
  4. None of the Above
  

Question 104 :
This type of hardware consists of devices that translate data into a form the computer can process


  1. application
  2. input
  3. system
  4. All the above
  

Question 105 :
Which of the following was the first computer to use transisters instead of vacuum tubes?


  1. Intel?650
  2. Burroughs E?101
  3. Datametric?1000
  4. IBM 1401
  

Question 106 :
To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.


  1. Insert
  2. Format
  3. Tools
  4. Table
  

Question 107 :
The part of the computer that coordinates all its functions is called its


  1. ROM program
  2. system board
  3. Arithmetic Logic Unit
  4. Control Unit
  

Question 108 :
The home page of a website is


  1. the largest page
  2. the last page
  3. the first page
  4. the most colourful page
  

Question 109 :
A telephone number, a birth date, and a customer name are all examples of


  1. a record
  2. a query
  3. a file
  4. a database
  

Question 110 :
A _________ is approximately one billion bytes.


  1. kilobyte
  2. bit
  3. gigabyte
  4. megabyte
  

Question 111 :
Which type of resource does have greater probability to become shared resource in a computer network?


  1. Printers
  2. Speakers
  3. Floppy disk drivers
  4. Keyboards
  

Question 112 :
When the margins on both the sides are straight and equal, then there is ________in the document.


  1. full justification
  2. full alignment
  3. left justification
  4. right justification
  

Question 113 :
If you receive and e?mail from someone you don't know, what should you do?


  1. Forward it to the Police immediately
  2. Delete it without opening it
  3. Open it and respond to him/her
  4. Reply and seek their identity
  

Question 114 :
The most important or powerful computer in a typical network is _____


  1. Desktop
  2. Network client
  3. Network server
  4. Network station
  

Question 115 :
EDSAC stands for________


  1. Electronic Delay Storage Automatic Computer
  2. Electronic Discrete Storage Automatic Computer
  3. Electronic Delay Serial Automatic Computer
  4. Electronic Discrete Storage Automatic Computer
  

Question 116 :
__________ means sharing a program with someone who is not authorized by the license agreement to use it


  1. Softloading
  2. Hard Disk loading
  3. Internet Downloading
  4. Renting
  

Question 117 :
A proxy server is used for which of the following?


  1. To provide security against unauthorised users
  2. To process client requests for web pages.
  3. To process client requests for database access
  4. To provide TCP/IP
  

Question 118 :
A computer program that translates one program instructions at a time into machine language is called a / an


  1. Interpreter
  2. CPU
  3. Compiler
  4. Simulator
  

Question 119 :
_________ is an artificial neural network with multiple hidden layers between the input and output layers?


  1. Deep neural network
  2. Shallow neural network
  3. Both(A) - (B)
  4. None of the Above
  

Question 120 :
The ______ key will launch the Start button.


  1. Esc
  2. Shift
  3. Windows
  4. Tab