G.K Computer (Govt.Exam Preperation) MCQ's




Question 1261 :
The ______ tells the computer how to use its components?


  1. utility
  2. network
  3. operating system
  4. application program
  

Question 1262 :
Process is


  1. a program in high?level language kep on hard disk
  2. contents of main memory
  3. a program in execution
  4. a job in secondary memory
  

Question 1263 :
An example of a processings device would be


  1. a magnetic ink reader
  2. a tablet PC
  3. Special function cards
  4. scanners
  

Question 1264 :
Which hole is used to mark the location of the first sector in a soft?sectored disk?


  1. Address
  2. Location
  3. Label
  4. Index
  

Question 1265 :
A proxy server is used for which of the following?


  1. To provide security against unauthorised users
  2. To process client requests for web pages.
  3. To process client requests for database access
  4. To provide TCP/IP
  

Question 1266 :
Which of the following statements is FALSE concenring file names ?


  1. Files may share the same name or the same extension but not both
  2. Every file in the same foldr must have a unique, name
  3. File extension is another name for file type
  4. The file extension comes before the dot (.) followed by the file name
  

Question 1267 :
What is the term for unsolicited e-mail?


  1. News group
  2. Use net
  3. Backbone
  4. Spam
  

Question 1268 :
If you need to duplicate the entire disk, which command will you use ?


  1. Copy
  2. Diskcopy
  3. Chkdsk
  4. Format
  

Question 1269 :
EDSAC stands for________


  1. Electronic Delay Storage Automatic Computer
  2. Electronic Discrete Storage Automatic Computer
  3. Electronic Delay Serial Automatic Computer
  4. Electronic Discrete Storage Automatic Computer
  

Question 1270 :
Which of the following is true?


  1. A byte is a single digit in a binary number.
  2. A bit represents a group of digital numbers.
  3. Eight?digit binary number is called a byte.
  4. Eight?digit binary number is called a bit.
  

Question 1271 :
A collection of unprocessed items is


  1. information
  2. data
  3. memory
  4. reports
  

Question 1272 :
A _____ contains commands that can be selected.


  1. pointer
  2. menu
  3. icon
  4. button
  

Question 1273 :
Errors in computer programs are referred to as


  1. bugs
  2. mistakes
  3. item overlooked
  4. blunders
  

Question 1274 :
A telephone number, a birth date, and a customer name are all examples of


  1. a record
  2. a query
  3. a file
  4. a database
  

Question 1275 :
Which addressing mode is most suitable to change the normal sequence of execution of instructions?


  1. Immediate
  2. Indirect
  3. Relative
  4. None of the Above
  

Question 1276 :
________ is used in academic testing.


  1. MICR
  2. POS
  3. OCR
  4. OMR
  

Question 1277 :
These are specialised programs that assist users in locating information on the Web.


  1. Search Engine
  2. Resource Locator
  3. Information Management System
  4. DBMS
  

Question 1278 :
Which of the following could be digital input devices for computers?


  1. Digital camcoder
  2. Microphone
  3. Scanner
  4. All the above
  

Question 1279 :
Which of the following statements best describes the batch method of input?


  1. Data is processed as soon as it is input.
  2. Data is input at the time it is collected.
  3. Data is collected in the form of source documents, placed into groups, and then input to the computer.
  4. Source documents are not used.
  

Question 1280 :
A _______contains buttons and menus that provide quick access to commonly used commands.


  1. toolbar
  2. status bar
  3. window
  4. find
  

Question 1281 :
Now a days Vishing has become a criminal practice of using social engineering over which of the following ?


  1. Social networking sites
  2. Mobile Phones
  3. E-mail
  4. Cyber cafes
  

Question 1282 :
To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.


  1. Insert
  2. Format
  3. Tools
  4. Table
  

Question 1283 :
This type of hardware consists of devices that translate data into a form the computer can process


  1. application
  2. input
  3. system
  4. All the above
  

Question 1284 :
Which of the following is non-emissive display?


  1. LED
  2. LCD
  3. Both (A) and (B)
  4. None of the Above
  

Question 1285 :
Which is a general term for all forms of solid state memory that do not need to have their memory contents periodically refreshed


  1. Volatile memory
  2. Non Volatile memory
  3. Both (A) and (B)
  4. None of the Above
  

Question 1286 :
What does storage unit provide?


  1. Place for typing data
  2. Storage for information and instruction
  3. Place for printing information
  4. All the above
  

Question 1287 :
An assembly language is a division of


  1. Middle level language
  2. High level language
  3. Low level language
  4. Machine language
  

Question 1288 :
What is backup?


  1. Adding more components to your network
  2. Protecting data by copying it from the original source to a different destination
  3. Filtering old data from the new data
  4. Accessing data on tape
  

Question 1289 :
Rules of a programming language are called


  1. procedures
  2. calls
  3. methods
  4. syntax
  

Question 1290 :
One advantage of dial-up-internet access is ___


  1. It utilises broadband technology
  2. It utilizes existing telephone service
  3. It uses a router for security
  4. Modem speeds are very fast