G.K Computer (Govt.Exam Preperation) MCQ's




Question 331 :
A blinking symbol on the screen that shows where the next character will appear is a/an


  1. delete key
  2. arrow key
  3. cursor
  4. return key
  

Question 332 :
It is easier to change the name of file using ________ process.


  1. transforming
  2. christening
  3. renaming
  4. retagging
  

Question 333 :
The ______ may also be called the screen or monitor


  1. Scanner
  2. Display
  3. Hard Disk
  4. None of the Above
  

Question 334 :
To move to the beginning of a line of text, press the _____ key.


  1. Home
  2. A
  3. Page-up
  4. Enter
  

Question 335 :
Technique to implement virtual memory where memory is divided into units of fixed size memory is _________


  1. Paging
  2. De-fragments
  3. Segmentation
  4. None of the above
  

Question 336 :
Which of the following is NOT a JSP implicit object?


  1. Out
  2. In
  3. Response
  4. Page
  

Question 337 :
A primary key can also be called a


  1. super key
  2. candidate key
  3. alternate key
  4. secondary key
  

Question 338 :
Fax machines and imaging systems are examples of


  1. bar?code readers
  2. output devices
  3. scanning devices
  4. pen?based systems
  

Question 339 :
What is the number of maximum columns that can be inserted in a Word (2003) document?


  1. 35
  2. 42
  3. 45
  4. 55
  

Question 340 :
Which of the following is NOT a type of broad band internet connection ?


  1. Cable
  2. DSL
  3. Dial-up
  4. Satellite
  

Question 341 :
Which of the following is/are example(s) of Image Editors?


  1. Adobe photoshop
  2. Adobe Illustrator
  3. CorelDraw
  4. All of the above
  

Question 342 :
The abbreviation ISP usually means


  1. International Spy Project
  2. Indian Social Planning
  3. Initial Service Provider
  4. Internet Service Provider
  

Question 343 :
All of the following are examples of real security and privacy risks except?


  1. hackers
  2. spam
  3. viruses
  4. identify theft
  

Question 344 :
Modern computers represents characters and numbers internally using one of the following number systems?


  1. Penta
  2. Octal
  3. Hexa
  4. Binary
  

Question 345 :
A bus that connects a computer to Peripheral devices is called _______


  1. System Bus
  2. Memory Bus
  3. Front-Side Bus
  4. External Bus
  

Question 346 :
Programming language built into user programs such as Word and Excel are known as ......


  1. 4GLs
  2. Macro languages
  3. object-oriented languages
  4. visual programming languages
  

Question 347 :
What is the name of the protocol used to eliminate loops?


  1. ISL
  2. Switching
  3. Frame tagging
  4. Spanning Tree Protocol
  

Question 348 :
Which device can not be shared in network ?


  1. Floppy
  2. Keyword
  3. Computer
  4. Printer
  

Question 349 :
Which of the can't spread virus


  1. An e-mail with attachment
  2. A plain text mail
  3. Downloading files over the web
  4. None of the above
  

Question 350 :
IEEE _______ standard is used for wirless LAN.


  1. 802.12
  2. 802.13
  3. 802.15
  4. 802.11
  

Question 351 :
___________ is a software used to compose, format, edit, and print electronic documents


  1. Spreadsheets
  2. Word Processor
  3. Image Editors
  4. None of the above
  

Question 352 :
Which key is used in combination with another key to perform a specific task?


  1. Home
  2. Arrow
  3. Space bar
  4. Ctrl
  

Question 353 :
Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____


  1. Flash
  2. Spiders
  3. Cookies
  4. Applets
  

Question 354 :
Which is not an integral part of computer?


  1. CPU
  2. Monitor
  3. Mouse
  4. UPS
  

Question 355 :
Software can be categorized as ________


  1. Firmware and Hardware
  2. System software and Firmware
  3. Application software and Hardware
  4. System software and Application Software
  

Question 356 :
Machine code is a


  1. high?level language
  2. software language
  3. low?level language
  4. middle?level language
  

Question 357 :
Radial Basis Function (RBF) networks have _____ layers


  1. One
  2. Four
  3. Two
  4. Three
  

Question 358 :
Third Generation computers were based on _______


  1. IC
  2. Vacuum tube
  3. transistor
  4. None of the Above
  

Question 359 :
We can enter and edit text efficiently using


  1. spreadsheet
  2. typewriter
  3. Word Processing Program
  4. Desktop Publishing Program
  

Question 360 :
The wheel located between the two standard buttons on a mouse is used to ________


  1. click in Web pages.
  2. scroll.
  3. click and select items.
  4. jump to different Web pages