Computer SSC CGL Tier 2 Exam PDF

Summary

Sample questions for a Computer exam, covering areas such as software types, computer components, and computer networks.

Full Transcript

Computer SSC CGL Tier 2 Exam 1. Word processing, spreadsheet, and photo-editing are 8. Softcopy is the intangible output, so then what is examples of which type of software? hardcopy? (a) Application software...

Computer SSC CGL Tier 2 Exam 1. Word processing, spreadsheet, and photo-editing are 8. Softcopy is the intangible output, so then what is examples of which type of software? hardcopy? (a) Application software (a) The physical parts of the computer (b) System software (b) The printed parts of the computer (c) Operating system software (c) The printed output (d) Platform software (d) The physical output devices (e) None of these (e) None of the above 2. Which are specially designed computer chips that 9. One nibble is equal to how many bits? reside inside other devices, such as your car or your (a) 4 electronic thermostat? (b) 8 (c) 2 (a) Servers (d) 16 (b) Embedded computers (e) None of these (c) Robotic computers (d) Mainframes 10. What is a Firewall in Computer Network? (e) None of these (a) The physical boundary of Network (b) An operating System of Computer Network 3. If you wished to limit what you would see on an Excel (c) A system designed to prevent unauthorized access worksheet, what data function would you use? (d) A web browsing Software (a) Sort (e) None of these (b) Filter (c) Conditional format 11. What is the main function of the ALU? (d) Data analysis (a) Store data and information for future use (b) Monitor all computer activities (e) None of these (c) Perform arithmetic and logical operations 4. Which of the following number system has base-16? (d) Control computer output, such as printing (a) Unary number system (e) None of the above (b) Binary number system 12. Which one of the following is internet Standard (c) Octal number system Protocol? (d) Hexadecimal Number System (a) TML (e) None of the above (b) COBOL 5. What is the full form of SMPS? (c) JAVA (a) Secure Make Potential Supply (d) C++ (b) Standard Made Power Supply (e) TCP/IP (c) Switched-Mode Power Supply 13. Bridge work at which layer of OSI Model? (d) Simplex Mode Power Supply (a) Network layer (e) None of these (b) Data link layer (c) Physical layer 6. Which of the following Program are often delivered to (d) Application layer a PC through an email attachment and are often (e) Transport layer designed to do harm? (a) Spam 14. A _________ is used to direct and dispatch data packets (b) Portals between different networks. (c) Viruses (a) Connection (d) Ransomware (b) Bridge (e) None of these (c) Gateway (d) Hub 7. Which type of memory holds only that program and (e) Router data that CPU is presently processing? 15. Who is the creator of PASCAL language? (a) ASCII (a) Dennis Ritchie (b) CMOS (b) Brendan Eich (c) RAM (c) James Gosling (d) ROM (d) Niklaus Wirth (e) None of these (e) None of these 2 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 16. Which of the following is the shortcut key for hides the 24. What is the base of hexadecimal number system? selected rows? (a) 2 (a) Ctrl+D (b) 8 (b) Ctrl+H (c) 16 (c) Ctrl+9 (d) 10 (d) Ctrl+10 (e) None of these (e) None of these 25. What is the full form of SIM? 17. What does the.org domain represents? (a) Subscriber Idol Mechanism (a) Organization domain (b) Semi Idol Module (b) Network domain (c) Substitute Identity Module (d) Subscriber Identity Module (c) Government domain (e) None of these (d) Education domain (e) None of these 26. Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private 18. Which of the following is a Web browser? computer systems are commonly referred to as: (a) Paint (a) Adware (b) PowerPoint (b) Malware (c) Edge (c) Computer viruses (d) Word (d) Spyware (e) All are Web browsers (e) None of these 19. Whihc of the following is used in Second-generation of 27. A repair for a known software bug, usually available at computers? no charge on the internet, is called a(n) ________. (a) Vacuum tube based (a) Version (b) Integrated circuit based (b) Patch (c) VLSI (c) Tutorial (d) Transistor (d) FAQ (e) None of these (e) None of these 20. Integrated Circuit (IC) chips used in computers are 27. A _________ typically connects personal computers made with ____. within a very limited geographical area, usually within (a) Silicon a single building. (b) Copper (a) LAN (c) Aluminium (b) FAN (c) TAN (d) Gold (d) WAN (e) None of these (e) VPN 21. If you wished to limit what you would see on an Excel 28. Which of the following memories not needs refresh? worksheet, what data function would you use? (a) SRAM (a) Data analysis (b) DRAM (b) Sort (c) ROM (c) Filter (d) All of above (d) Conditional format (e) None of these (e) None of these 22. Which of the memories has the shortest access time? (a) Cache memory (b) Magnetic bubble memory (c) Magnetic core memory (d) RAM (e) None of these 23. While browsing the internet, which of the following key is used for full screen view? (a) F3 (b) F5 (c) F11 (d) F9 (e) F1 3 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 29. What database key uniquely identifies a record within 36. What type of resource is most likely to be a shared a table? common resource in a computer network? (a) Primary key (a)Keyboards (b) Foreign key (b) Speakers (c) Secondary key (c) Floppy disk drives (d) Relational key (d) Printers (e) None of these (e) None of these 30. A_________ is a built in mathematical formula included in 37. The most widely used type of database management excel. system is the: (a) Function (a) Flat database (b) Cell (b) Network database (c) Formula (c) Relational database (d)Range (d) Hierarchical database (e) None of these (e) None of the above 31. Which of the following Excel features allows you to 38. Managers use sophisticated tool to combat select/highlight all cells that are formulas? cyberslacking, especially involving the internet. Such (a) Find tools include ____ (b) Replace (a) Web filters (c) Go To (b) Surveillance Software (d) Go To Special (c) Proxy Server (e) None of these (d) Packet sniffer (e) All of the above 32. What is the maximum Zoom Percent allowed in Microsoft PowerPoint 2007? 39. The altering of data so that it is not usable unless the (a) 100% changes are undone is _______. (b) 200% (a) Biometrics (c) 300% (b) Compression (d) 400% (c) Encryption (e) None of these (d) Ergonomics (e) Spamming 33. In MS Word 2010 the feature for Word Count is available in Proofing under which of the following tab? 40. Which of the following is used for closing a tab on a (a) Home browser? (b) Review (a) Ctrl + T (c) Insert (b) Ctrl + W (d) View (c) Ctrl + A (e) References (d) Ctrl + Y (e) Alt + F4 34. A computer cannot ‘boot’ if it does not have the_____________. (a) Compiler (b) Loader (c) Operating system (d) Assembler (e) None of these 35. ISDN stands for_________. (a) Integrated Services Digital Network (b) Integrated Services Data Network (c) Integrated Security Digital Network (d) Integrated Security Data Network (e) None of these 4 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App Solutions 1. (a); Application software is a term which is used for 12. (e); TCP/IP, which stands for Transmission control software created for a specific purpose. It is Protocol/Internet Protocol, is an industry- generally a program or collection of programs standard protocol suite for WANs. On the other used by end users. hand, HTML, COBOL, JAVA and C++ are computer programming languages. 2. (b); An embedded system is some combination of computer hardware and software, either fixed in 13. (b); Bridges operate at the Data-Link Layer of the OSI capability or programmable, that is designed for a Model. They can distinguish between local and specific function or for specific functions within a remote data, so data traveling from one larger system. workstation to another in the same segment doesn't have to cross the bridge. Bridges operate 3. (b); Filter is used in your Excel data, if you only want on MAC-Layer addresses. to display records that meet certain criteria. 14. (e); A router is used to route data packets between 4. (d); Hexadecimal number system has base 16, Octal- different networks. It reads the information in Base 8, Binary- Base 2 and Decimal- Base 10 each packet to tell where it is going. If it is destined for an immediate network it has access 5. (c); SMPS stands for Switched-Mode Power Supply. It to, it will strip the outer packet (IP packet for is an electronic power supply that uses a example), readdress the packet to the proper switching regulator to convert electrical power Ethernet address, and transmit it on that network. efficiently. It is also known as Switching Mode Power Supply. It is power supply unit (PSU) 15. (d); Pascal is an imperative and procedural generally used in computers to convert the programming language developed by Niklaus voltage into the computer acceptable range. Wirth. 6. (c); Computer virus are often delivered to a PC 16. (c); through an email attachment and are often 17. (a); The.org top-level domain stands for designed to do harm. A computer virus is a “organization” and is primarily used for nonprofit malicious program that normally self-replicates websites such as charities, NGOs, open source by copying itself to another computer program. In projects. basic terms, a computer virus spreads itself 18. (c); Paint, PowerPoint and Word are application through executable code or documents. software. Microsoft Edge is the new browser built 7. (c); RAM is volatile memory used to hold instructions for Windows 10. Edge is faster, safer and gives and data of currently running programs. It loses you longer battery life. integrity after loss of power. RAM memory 19. (d); modules are installed into slots on the computer motherboard. 20. (a); 8. (c); A hardcopy is a printed copy of information from 21. (c); a computer. 22. (a); Cache memory is a small-sized type of volatile computer memory that provides high-speed data 9. (a); One nibble is equal to 4 bits. access to a processor and stores frequently used 10. (c); Firewall in Computer Network is a system computer programs, applications and data. Cache designed to prevent unauthorized access. is the fastest memory in a computer. 11. (c); ALU is an arithmetic-logic unit is the part of a 23. (c); central processing unit that carries out arithmetic 24. (c); and logic operations on the operands in computer instruction words. 25. (d); 5 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 26. (b); 37. (c); A relational database management system (RDBMS) is a database management system 27. (b); A patch is a piece of software designed to update (DBMS) that is based on the relational model as a computer program or its supporting data to fix invented by E. F. Codd. Relational databases have or improve it. often replaced legacy hierarchical databases and 27. (a); A local-area network (LAN) is a computer network databases because they are easier to network that spans a relatively small area. Most understand and use. often, a LAN is confined to a single room, building 38. (e); Cyberslacking refers to an employee’s use of work or group of buildings. computers and other resources during work 28. (a); Static Random Access Memory (Static RAM or hours for non-work-related purposes. When an SRAM) is a type of RAM that holds data in a static employee is cyberslacking, they will be using the form, that is, as long as the memory has power. employer's devices, internet connection, or other Unlike dynamic RAM, it does not need to be resources for personal affairs and even refreshed. entertainment. 29. (a); Primary key is used to uniquely identify a record 39. (c); Encryption is the most effective way to achieve within a table. data security. To read an encrypted file, you must have access to a secret key or password that 30. (a); enables you to decrypt it. Unencrypted data is 31. (d); called plain text; encrypted data is referred to as cipher text. 32. (d); 40. (b); Ctrl+ W closes a tab on a browser and Alt + F4 33. (b); Word Count is available in Proofing under Review closes the whole application program. tab. 34. (c); An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers. 35. (a); ISDN stands for Integrated Services Digital Network. 36. (d); Printer is a shared common resource in a computer network. 6 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App Memory Based Questions 1. Which of the following operating system developed by Apple? 9. Convert Binary number (111001)2 to decimal number________. (a) Windows 10 (a) (38)10 (b) Android (b) (57)10 (c) Windows Vista (c) (55)10 (d) macOS (d) (47)10 (e) None of these (e) None of these 10. ENIAC belongs to which computer generation? 2. What is the full form of DBMS? (a) Second (a) Database Maintain System (b) First (b) Desktop Marketing System (c) Third (c) Database Management System (d) Fourth (d) Durable Management System (e) None of these (e) None of these 11. MS Access is a _______? 3. What is the base of Octal Number system? (a) System Software (a) 8 (b) Browser (b) 16 (c) Database (c) 10 (d) Pointing Device (d) 2 (e) None of these (e) None of these 12. Which of the following is the most common tool used to restrict access to a computer system? 4. Which of the following is used in first generation computer? (a) User logins (a) Integrated Circuit (b) Computer keys (b) Vacuum Tube (c) Access-control Software (c) Transistor (d) Passwords (d) VLSI circuits (e) None of these (e) None of these 13. Photo-editing, spreadsheet and word processing were the 5. PROM Stands for_______. examples of? (a) Programmable random-on memory (a) Application software. (b) Picture random memory (b) System software. (c) Process read-only memory (c) Operating system software. (d) Programmable read-only memory (d) Platform software. (e) None of these (e) None of these 14. Which of the following shortcut key is used to close document 6. COBOL is used for which of the following purpose? in MS Word? (a) Scientific calculation (a)Ctrl+C (b) Business and Finance (b)Alt+W (c) Application development (c) Shift+C (d) Network Security (d) Ctrl+W (e) None of these (e) None of these 7. Which key is used to delete characters to the left of the cursor? (a) Tab (b) Page Down (c) Delete (d) Backspace (e) None of these 8. How many MB is equal to 1 GB? (a) 10MB (b) 100000MB (c) 20000 MB (d) 1024 MB (e) None of these 7 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 15. What is the base of Hexadecimal number system? 23. Which of the following shortcut key is used to minimize all (a) 2 open windows and display the desktop? (b) 16 (a) Windows logo+D (c) 8 (b) Alt+Shift+C (d) 10 (c) Ctrl+fn (e) None of these (d) Tab+Shift+C (e) None of these 16. In second generation, which type of memory was used to store data? 24. Which of the following kind of devices allows the user to add (a) Paper tapes components and capabilities to a computer system? (b) Magnetic drum (a) System boards (c) Magnetic core (b) Storage devices (d) Magnetic tape (c) Input devices (e) None of these (d) Output devices (e) Expansion slots 17. Which among the following key can be used as a shortcut to rename a folder in Microsoft Windows 8 and higher versions? 25. Transformation of input into output is performed by: (a) F2 (a) Peripherals (b) Memory (b) F4 (c) Storage (c) F6 (d) ALU (d) F9 (e) CPU (e) F11 26. Which of the following device enabling data transfer between 18. In order to move from one worksheet to another in MS-Excel two different networks? workbook. One should click ___________. (a) Plotter (a) active cell (b) Joystick (b) scroll bar (c) Gateway (c) sheet tab (d) Path (d) tab button (e) None of these (e) None of these 27. Among the following which is the popular DOS based 19. Which shortcut key is used to check spelling and grammar in spreadsheet package? MS-Word? (a) Multiplan (a) F1 (b) Word (b) F2 (c) Smart cell (c) F7 (d) Lotus 1-2-3 (d) F9 (e) Excel (e) F10 28. Which of the following is a windows utility program that 20. Which is not a storage device? locates and eliminates unnecessary fragments and rearranges (a) Printer filed and unused disk space to optimize operations? (b) CD (a) Backup (c) Hard disk (b) Disk cleanup (d) Floppy Disk (c) Disk defragmenter (d) Restore (e) DVD (e) None of these 21. An image editing software in which we can draw and edit 29. Which among the following key combination can be used to images is? search in Windows Explorer? (a) PageMaker (a) Ctrl+F (b) MS-Paint (b) Ctrl+S (c) Coral Draw (c) Ctrl+G (d) Photo Image (d) Alt+S (e) Front page (e) Alt+P 22. Which of the following can be used to select the entire 30. What is the technology used to read pencil or pen marks on a document? multiple-choice answer sheet called? (a) Ctrl+A (a) OMR (b) Alt+F5 (b) MICR (c) Shift+A (c) OCR (d) Ctrl+K (d) CPU (e) Ctrl+H (e) FTP 8 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 31. Which among the following is a type of error that a compiler 36. The ability of an operating system to run more than one can check? application at a time is called _________. (a) Syntax Error (a) Multi-tasking (b) Power Failure (b) Object-oriented programming (c) Network Failure (c) Multi-user computing (d) All of the above (d) Real-Time (e) None of the above (e) None of the above 32. A special, high-speed storage area within the CPU in which all 37. The process of checking all the peripheral units by the OS data must be represented before it can be processed is called during the time of booting is known as_____ _____. (a) BIOS (a) BIOS (b) POST (b) Cache (c) BUS (c) RAM (d) Register (d) Chkdsk (e) None of these (e) None of these 33. In Power Point, the Header & Footer button can be found on 38. A handheld device that allows you to control your computer the Insert tab in what group? without typing instructions from a keyboard is known (a) Illustrations group as_______. (b) Object group (a) Tablet (b) PDA (c) Text group (c) Mouse (d) Tables group (d) Mike (e) None of these (e) None of these 34. Which of the following is generally used for selecting or 39. The feature in database language that allows us to access highlighting? certain records in database is called __________. (a) Icon (a) Query (b) Keyboard (b) Forms (c) Mouse (c) Reports (d) Floppy Disk (d) Tables (e) None of these (e) Node 35. __________ ensures secure transfer of data over an unsecured 40. When you save a Microsoft Access project, what file format do network, such as the Internet. you use? (a) Antivirus (a).adp (b) Hacking (b).Xml (c) Cracking (c).mbd (d) Spoofing (d) All of the above (e) Cryptography (e) None of the above Solutions 1. (d); COBOL was designed for business computer programs in industries such as finance and human resources. 2. (c); A database management system (DBMS) is system software for creating and managing databases. A DBMS 7. (d); makes it possible for end users to create, read, update and delete data in a database. 8. (d); 3. (a); 9. (b); (111001)2 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = (57)10 4. (b); 10. (b); 5. (d); PROM or programmable ROM (programmable read-only 11. (c); memory) is a computer memory chip that can be programmed once after it is created. Once the PROM is 12. (d); programmed, the information written is permanent and 13. (a); cannot be erased or deleted. 14. (d); 6. (b); COBOL (Common Business-Oriented Language) is a high- level programming language for business applications. 15. (b); 9 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 16. (c); In second generation, magnetic cores were used as 33. (c); primary memory and magnetic tape and magnetic disks as secondary storage devices. 34. (c); Generally, we can use mouse for selecting or highlighting object. 17. (a); 35. (e); In cryptography, data are sent in such a way that they 18. (c); look completely different from the original data. Thus, 19. (c); cryptography ensures secure transfer of data over an unsecured network. 20. (a); 36. (a); The ability of an operating system to run more than one 21. (c); application at a time is called Multi-tasking. 22. (a); 37. (b); POST (Power on Self-Test) is a test the computer must 23. (a); complete to verify all hardware is working properly before starting the remainder of the boot process. 24. (e); Expansion slots allows user to add devices. 38. (c); A mouse is a handheld device that allows you to control 25. (e); the CPU is the Central Processing Unit of the computer. A your computer without typing the instructions from the computer's CPU handles all instructions it receives from keyboard. By using a mouse, you can select icons, open hardware and software running on the computer. programs, and select, commands, present in a program by 26. (c); A gateway is a network node that connects two networks moving the pointer. using different protocols together. 39. (a); Query allows us to access certain records in database. 27. (d); Lotus 1-2-3, developed by Lotus Development 40. (a); An Access project is an Access file (.adp) that provides a Corporation, is the most popular spreadsheet package direct, efficient connection to a Microsoft SQL Server among DOS users. database through the OLE DB component architecture. 28. (c); Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation. 29. (a); Ctrl+F is the short cut key combination that can be used to search in Windows Explorer. 30. (a); Optical Mark Recognition What is the technology used to read pencil or pen marks on a multiple-choice answer sheet. 31. (a); Syntax Errors - These are invalid code which the compiler doesn't understand. The compiler will detect them as it can't compile them. 32. (d); Register is a special high-speed storage area within the CPU where all data must be represented before it can be processed. 10 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App Memory Based Questions 1. Which of the following topologies has the highest 9. Which of the following network devices is also called a reliability? concentrator? (a) Star topology (a) Switch (b) Bus topology (b) Router (c) Ring topology (c) Brouter (d) Mesh topology (d) Repeater (e) None of these (e) Hub 2. Which among the following term is used for: 10. What type of web technology creates an online Unauthorized copying of software to be used for personal community where people can make statements and gain instead of personal backups? others can read and respond to those statements? (a) program thievery (a) I-Journal (b) data snatching (b) Podcast (c) software piracy (c) ASP (d) program looting (d) Blog (e) data looting (e) None of the above 3. EDBIC code can support how many different 11. What is the full form of EDI in computer? representation of characters? (a) Electronic Data Image (a) 256 (b) E-mail Data Interchange (b) 149 (c) Electronic Data Interchange (c) 1024 (d) Electronic digital Interchange (d) 64 (e) None of these (e) 16 12. What is the use of "," symbol in Ms EXCEL? 4. The main webpage of a website is also known as - (a) allows you to make one reference for multiple cells (a) Contents Page located between 2 cells (b) Home Page (b) is used to separate arguments in Excel spreadsheet (c) Introduction Page formulas. (d) First Page (c) it is an intersection operator (e) Icebreaker Page (d) For Sum of two cells 5. What is a hyperlink? (e) None of these (a) It is a text or image that you can click on to jump to a 13. Which of the following shortcut key use to close the new document/page. current window? (b) It is an input type for multimedia files. (a) Alt+F7 (c) It is a collection or directory of web pages. (b) Shift+F4 (d) It is the home page of a site. (c) CRLT+F6 (e) None of the above (d) Alt+F4 6. What is a technique used to gain unauthorized access to (e)None of these computers, whereby the intruder sends messages to a 14. What are programs such as Microsoft Edge that serve as computer with an address indicating that the message is navigable windows into the Web called as? coming from a trusted host? (a) Hypertext (a) Identity Theft (b) Web browsers (b) Forging (c) Internet (c) IP Spoofing (d) Networks (d) Pharming (e) Windows Navigator (e) Phishing 15. Which among the following is a self-contained step-by- 7. Portrait and Landscape are: step set of operations to be performed? (a) Page Orientation (a) System Software (b) page layout (b) Algorithm (c) page size (c) Network topology (d) page view (d) Application software (e) none of the above (e) Utility software 8. Internet access by transmitting digital data over the wires 16. which of the following is an intersection of a row and of a local telephone network is provided by: column in a spreadsheet? (a) leased line (a) Formula (b) digital subscriber line (b) Worksheet (c) digital signal line (c) Address (d) MODEM (d) Cell (e) None of the above (e) None of these 11 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 17. which of the following is a set of rules computers use to 23. Which of the following is a translator program used for talk to each other? assembly language? (a) Syntax (a) Complier (b) HTML (b) Interpreter (c) DOS command (c) Translation (d) Protocol (d) Translator (e) None of these (e) Assembler 18. Which of the following topology have a central controller 24. What is the technical term for the devices connected in a or hub? network? (a) Star (a) Hubs (b) Nodes (b) Mesh (c) Sections (c) Ring (d) Attachment units (d) Bus (e) Access points (e) None of these 25. Which of the following is the communication protocol that 19. Which shortcut key is used to create a new folder in MS sets the standard used by almost every computer that Windows? accesses web based information? (a) Right Click Button+W+Enter (a) XML (b) Ctrl+W+Shift (b) DML (c) Right Click Button+F+Enter (c) HTTP (d) Right Click Button+Q+Enter (d) HTML (e) Ctrl+Shift+N (e) RIP 20. The first computers were programmed using which of the 26. What is the attempt to acquire sensitive information such following language? as usernames, passwords, and credit card details (and (a) Assembly language sometimes, indirectly, money) by masquerading as a (b) Machine language trustworthy entity in an electronic communication? (c) Source code (a) Phishing (d) Object code (b) Spoofing (e) None of the above (c) Identity theft 21. Which of the following is not example of Utility Software? (d) Authentication (a) Backup software (e) Spamming (b) Antivirus software 27. Communication channel is shared by all the machines on (c) Disk tools the network in: (d) Media Players (a) broadcast network (e) All of the above are examples of Utility Software (b) unicast network (c) multicast network 22. Copying a process from memory to disk to allow space for (d) Internet Protocol Address other processes is called __________. (e) none of the above (a) Swapping 28. A(n) __________ converts all the source code into machine (b) Deadlock code, creating an executable file. (c) Demand Paging (a) linker (d) Page Fault (b) assembler (e) Cloud Computing (c) compiler (d) interpreter (e) None of these 29. What is the term that refers to an ad hidden inside software that you downloaded from an internet site? (a) Spam (b) Cookie (c) Phish (d) Adware (e) None of these 30. In PowerPoint, what is the function of Alt+N in navigating the ribbon with only the keyboard? (a) Open the Transitions tab (b) Open the Home tab (c) Open the Insert tab (d) Open the Review tab (e) Open the Tell me box 12 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App 31. Commands at the top of a screen such as File-Edit, Format 37. A database that spreads information across different and Tools to operate and change things are incorporated tables while maintaining links between them is referred in __________________. to as________. (a) Menu bar (a) Relational database (b) Tool bar (b) Rotational database (c) User friendly (c) Database connection (d) Word processor (d) Tabular database (e) None of these (e) None of these 32. Specialised program(s) designed to allow particular input 38. What does SNMP stand for? or output device(s) to communication with the rest of the (a) Simple Network Mail Protocol computer system is called _______. (b) Single Network Mail Protocol (a) Computer (c) Single Network Message Protocol (b) Device drivers (d) Simple Network Management Protocol (c) Interpreters (e) None of these (d) Operating system 39. What is the common name given to a program written in (e) None of these any one of the high-level languages? 33. UDP and TCP are categorized under the ___layer of the OSI (a) System program model. (b) Compiler program (a) Data link (c) Object program (b) Application (d) Source program (c) Network (e) Data program (d) Transport 40. For predicting the weather which of the following is the (e) Session best solution? 34. Twisted pair wires are commonly used in? (a) thin clients (a) Telephones networks (b) servers (b) Cable TV Networks (c) supercomputer (c) Computer networks (d) workstations (d) Both (a) and (b) (e) mini computer (e) None of the above 35. Timing and control unit is a part of a(n)______. (a) ALU (b) Processor (c) Memory (d) CMOS (e) BIOS 36. A specialized network device that determines the next network point to which it can forward a data packet towards the destination of the packet is commonly known as_________. (a) bridge (b) router (c) switch (d) hub (e) repeater Solutions 1. (d); In the mesh topology, each computer is connected to 4. (b); A home page is the main page or the introductory the other with a separate physical link in a network. It page of a website, typically serving as a table of is most reliable topology as the network does not get contents for the site. down in case one of the nodes is failed. 5. (a); A hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, 2. (c); Software piracy is the illegal copying, distribution, or tapping, or hovering. Hyperlinks are found in nearly use of software. all Web pages, allowing users to click their way from 3. (a); EBCDIC stands for Extended Binary Coded Decimal page to page. Interchange Code. EBCDIC is a 8-Bit code with 256 6. (c); Spoofing: It is a type of scam where an intruder different representations of characters. It is mainly attempts to gain unauthorized access to a user’s used in mainframe computers. system or information by pretending to be the user. 13 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App The main purpose is to trick the user into releasing 28. (c); A compiler converts all the source code into machine sensitive information. code, creating an executable file. 7. (a); Page orientation is the way in which a rectangular 29. (d); Adware is software that automatically displays or page is oriented for normal viewing. downloads advertising material such as banners or 8. (b); Digital subscriber line (DSL or digital subscriber pop-ups when a user is online. loop) is a family of technologies that are used to 30. (c) transmit digital data over telephone lines. 31. (a); Those commands, options are available in menu bar. 9. (e); A hub contains several ports for connecting multiple 32. (b); A device driver is a program that controls a particular computers to form a small network. A simple hub is type of device that is attached to your computer. also called a concentrator. There are device drivers for printers, displays, CD- 10. (d); A blog is a regularly updated website or web page, ROM readers, diskette drives, and so on. When you typically one run by an individual or small group, that buy an operating system, many device drivers are is written in an informal or conversational style. 11. (c); EDI (Electronic Data Interchange) is the transfer of built into the product data from one computer system to another by 33. (d); The transport layer is a conceptual division of standardized message formatting, without the need methods in the layered architecture of protocols in for human intervention. EDI permits multiple the network stack in the Internet Protocol Suite and companies -- possibly in different countries -- to the Open Systems Interconnection (OSI). The exchange documents electronically. protocols of the layer provide host-to-host 12. (b); communication services for applications 13. (d); 34. (a); Twisted pair wires are used in telephone networks 14. (b); and for digital data transmission over short distances 15. (b); up to 1 km. 16. (d); A cell is the intersection between a row and a column 35. (b); Timing and control unit is a part of processor. on a spreadsheet that starts with cell A1. 36. (b); A router is a networking device that forwards data 17. (d); A protocol or communication protocol is a set of rules packets between computer networks. Routers in which computers communicate with each other. perform the traffic directing functions on the 18. (a); Star topology is a network topology where each Internet. individual piece of a network is attached to a central 37. (a); A relational database is a collective set of multiple node (often called a hub or switch). data sets organized by tables, records and columns. It 19. (e); Ctrl+Shift+N is also the shortcut key to open new establishes a well-defined relationship between incognito mode in chrome web browser. database tables. 20. (b); First computers were programmed using machine 38. (d); Simple Network Management Protocol (SNMP) is a language. 21. (d); Utility software is system software designed to help popular protocol for network management. It is used analyze, configure, optimize or maintain a computer. for collecting information from, and configuring, 22. (a); Swapping concept comes in terms of process network devices, such as servers, printers, hubs, scheduling. Scheduler removes process from CPU for switches, and routers on an Internet Protocol (IP) duration and reduces the degree of network. multiprogramming. And after some time these 39. (d); Source program is written in high level language. process can again be reintroduced into main memory. 40. (c); Supercomputer is used for predicting the weather. 23. (e); Assembler translates a program written in an assembly language into machine language. 24. (b); In a computer network, the devices are called nodes. 25. (c); The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. 26. (a); Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. 27. (a); Broadcast networks: It has a single communication channel that is shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any machine are received by all the others. 14 www.bankersadda.com | www.sscadda.com | www.adda247.com | Adda247 App MEMORY BASED QUESTIONS Q1. There is a small-sized type of volatile computer memory (d) Attachment (e) Spam that provides high-speed data access to a processor and Q14. Which among the following is the smallest unit in an stores frequently used computer programs, applications and image in a computer screen? data. Which among the following is a type of memory used to (a) Unit (b) Pixel (c) Array hold frequently used data? (d) Resolution (e) Clip (a) Microprocessor (b) Cache (c) ROM Q15. Different icons of application software can be found in (d) ALU (e) Control which bar in latest version of Microsoft Windows? Q2. memory in a computer is where information is (a) Start Menu (b) Browser (c) Status temporarily stored while it is being accessed or worked on (d) Control Panel (e) Personalize by the processor. Q16. Information that comes from external source and fed (a) Logical (b) Secondary (c) ROM into computer software is called. (d) RAM (e) Crude (a) Output (b) Input (c) Throughout Q3. Which among the following is a small set of data holding (d) Reports (e) Process place that is a part of the computer processor and may hold Q17. An email attachment is referred to as? an instruction, a storage address, or any kind of data? (a) The body of the email (a) Register (b) WAN (c) Bus (b) The address of the sender (d) Address (e) Processor (c) A document that is sent with an email Q4. An optical input device that interprets pencil marks on (d) The address of the receiver paper media is. (e) Any document that can be attached and sent with an (a) OMR (b) punch card reader email (c) optical scanners (d) magnetic tape (e) Stylus Q18. What is the default extension of Microsoft Word 2013? Q5. Which among the following is related to the internet and (a).dcc (b).docx (c).xls e-mail? (d).ppt (e).ycs (a) Boot-Up (b) Magnetic Tapes Q19. Which unit is a combinational digital electronic circuit (c) Application Software (d) Paging (e) Virus that performs arithmetic and bitwise operations on integer Q6. Shift, Control, Alt are examples of which among the binary numbers? following category? (a) BOU (b) AEU (c) CPU (a) Modifier Keys (b) Primary Keys (d) ALU (e) UPS (c) Function Keys (d) Alternate Keys Q20. Which button is called as middle button used as third (e) Candidate Keys mouse button by pressing on it. Q7. In a keyboard, left-right-up-down set of keys facilitates (a) right button (b) scroll wheel which among the following function? (c) touch bar (d) light bar (e) left button (a) Deleting Data or Modification Q21. Presentation of a series of still images on a projection (b) Page Scrolling to view a Document screen or electronic display device is called as: (c) Launching Start Menu (a) slide edit (b) slide view (c) slide show (d) Initiating Search and Help (d) slide movie (e) slide image (e) Controlling RAM or process execution Q22. Which memory is used as temporary memory? Q8. Which among the following term means/refers to web (a) Non-volatile memory address of a page? (b) volatile memory (a) SMTP (b) IP (c) HTTP (c) hard disk memory (d) URL (e) MAC (d) read only memory Q9. Which of the following is always a part of an E-mail (e) flash disc memory address? Q23. A software program that add functionality to your (a) Period (-) (b) At sign (@) (c) Space ( ) computer or help your computer perform better is called as (d) Underscore () (e) Angular Bracket (

Use Quizgecko on...
Browser
Browser