Triple S: Study Plan - Strategy - Success: 300 BEST Computer Awareness Mcqs
Triple S: Study Plan - Strategy - Success: 300 BEST Computer Awareness Mcqs
TRIPLE S :
STUDY PLAN –
STRATEGY –
SUCCESS
300 BEST
COMPUTER
AWARENESS MCQs
JKSSB PANCHAYAT
ACCOUNTS
ASSISANT
RBI ASSISTANT
MAINS
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
Youtube
https://www.youtube.com/c/TRIPLESSumitPuri
https://m.facebook.com/groups/2529061790444363/
5) Technique that is used to send more than one call over a single line is
a. Digital transmission
b. Infrared transmission
c. Streaming
d. Multiplexing
The method of Internet access that requires a phone line, but offers faster
access speeds than dial-up is the Connection
e. Cable access
f. Satellite access
g. Fiber optic service
h. Digital Subscriber Line (DSL)
3|Page
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
9)
A program either talk or music that is made available in digital
format for automatic download over the internet is called a.....
a. wiki
b. broadcast
c. vodcast
d. podcast
10) A USB communication device that supports data encryption for secure
wireless communication for notebook users is called a...
a. USB Wireless Network adapter
b. wireless switch
c. wireless hub
d. router
12)The connection between your computer at home and your local ISP is
called.....
(A) the last mile
(B) the home stretch
(C) the home page
(D) the vital mile
4|Page
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
15) Collecting personal information and effectively posing as another
individual is known as the crime of .....
a. spooling
b. spoofing
c. hacking
d. identity theft
16) The signal that a computer is waiting for a command from the user is....
(A) prompt
(B) event
(C) time slice
(D) interrupt
17)
Physical security is concerned with protecting computer hardware
from human tampering & natural disasters and security is concerned
with protecting
software from unauthorized tampering or damage.
5|Page
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
a. data
b. cyber
c. internet
d. metaphysical
19)
Where you are likely to find an embedded operating system?
(A) On a desktop operating system
(B) On a networked PC
(C) On a PDA
(D) On a Mainframe.
20) Which of the following places the common data elements in order from
smallest to largest?
a. Bit, byte, character, record, field, file, database
b. Database, file, record, field, character
c. Character, file, record, field, database
d. Character, field, record, file, database
21)
Which protocol provides e-mail facility among different hosts?
(A) File Transfer Protocol (FTP)
(B) TELNET
(C) Simple Mail Transfer Protocol (SMTP)
(D) Simple Network Management Protocol (SNMP)
23)
What is embedded system?
(A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer
(C) The computer which is the part of a big computer.
6|Page
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(D) Some combination of computer hardware and software.
26) The first general purpose electronic digital computer in the world was?
7|Page
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(B) EDVAC (Electronic Discrete Variable Automatic Computer)
(C) ENIAC (Electronic Numerical Integrator & Computer)
(D) EDSAC (Electronic Delay Storage Automatic Computer)
27) Signals can be analog or digital and a computer that processes the both
type of signals is known as?
(A) Analog computer
(B) Digital Computer
(C) Hybrid Computer
(D) Mainframe Computer
28)
Human beings are referred to as Homo sapiens, which device is
called Silico Sapiens?
(A) Monitor
(B) Hardware
(C) Robot
(D) Computer
30)
Different components of the motherboard of a PC unit are linked
together by sets of parallel electrical conducting lines. What are these
lines called?
(A) Conductors
(B) Buses
(C) Connectors
(D) Consecutive
33)
The metal disks, which are permanently housed in, sealed and
contamination free containers are called?
(A) Hard disks
(B) Floppy disk
(C) Winchester disk
(D) Flexible disk
9|Page
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
35) The first digital computer built with IC chips was known as
(A) IBM 7090
(B) Apple - 1
(C) IBM System / 360
(D) VAX - 10
37)
The magnetic storage chip used to provide non-volatile direct access
storage of data and that have no moving parts are known as
(A)Magnetic core
memory (B)Magnetic
tape memory
(C)Magnetic disk
memory (D)Magnetic
bubble memory
39) A language translator that analyses and executes the source code in-
line-by- line manner without looking at the entire program is called a/an
(A) Interpreter
(B) Simulator
(C) Compiler
(D) Commander
10 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
41) A device driver acts like a……. between the device & OS
(A) inverter
(B) converter
(C) translator
(D) None
11 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Shared Area Network
(D) None
46)
Hardware or software designed to guard against unauthorized
access to a computer network is known as…..
(A) Hacker-proof program
(B) Firewall
(C) Hacker-resistant server
(D) None
48)
A type of message that web servers pass to your web browser when
you visit the website
(A) Cache
(B) Spam
(C) None
(D) Cookie
49) Software that you can use free of charge for a set period. After that you
have to buy it to keep working is known as
(A) Freeware
(B) Shareware
(C) Software
12 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(D) None
50) A type of virus (malicious code) that looks for security loopholes in a
system and uses that to replicate itself is known as
(A) Worm
(B) Threat
(C) Trojan Horse
(D) None
13 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Redundant Array of Inexpensive Drives
(D) Redundant Array of Inexpensive Disks
53)
Software that is made available at no cost and is sometimes used to
entice a user to purchase the unbranded version with no advertising.
(A) Malware
(B) Spyware
(C) Freeware
(D) None
54)
Which is used to display one or more web pages within another
normal web page?
(A) IFRAME
(B) Hyperlink
(C) Home page
(D) None
55) What is the main difference between a mainframe and a super computer?
(A) Supercomputer is much larger than mainframe computers
(B) Supercomputers are much smaller than mainframe computers
(C) Supercomputers are focused to execute few programs as fast as
possible while mainframe uses its power to execute as many programs
concurrently.
(D) None
56)
storage area used to store data to a compensate for the difference in
speed at which the different units can handle data is
(A) Memory
(B) Buffer
(C) Accumulator
(D) None
59)
Which type of computers uses the 8-bit code called EBCDIC?
(A) Minicomputers
(B) Microcomputers
(C) Mainframe computers
(D) None
15 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
62) A technique used by codes to convert an analog signal into a digital bit
stream is known as
(A) Pulse code modulation
(B) Pulse stretcher
(C) Query processing
(D) Queue management
63)
Before a disk drive can access any sector record, a computer
program has to provide the record’s disk address. What information
does this address specify?
(A) Track number
(B) Sector number
(C) Surface number
(D) All of above
64)
What is the responsibility of the logical unit in the CPU of a computer?
(A) To produce result
(B) To compare numbers
(C) To control flow of information
(D) To do math’s works
(C) Adder
17 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(D) Shift register
68) How many address lines are needed to address each machine location in
a 2048 x 4 memory chip?
(A) 10
(B) 11
(C) 8
(D) 12
69)
Multi user systems provided cost savings for small business because
they use a single processing unit to link several
(A) Personal computers
(B) Workstations
(C) Dumb terminals
(D) Mainframes
70) The difference between memory and storage is that memory is and
storage is
(A) Temporary, permanent
(B) Permanent, temporary
(C) Slow, fast
(D) All of the above
71)
Which of the following is the first computer to use Stored Program
Concept?
(A) UNIVAC
(B) ENIAC
(C) EDSAC
(D) None of above
73) The most commonly used standard data code to represent alphabetical,
numerical and punctuation characters used in electronic data processing
system is called
(A) ASCII
(B) EBCDIC
18 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) BCD
(D) All of the above
19 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
77) The programs which are as permanent as hardware and stored in ROM
is known as
(A) Hardware
(B) Software
(C) Firmware
(D) ROM ware
78) Which of the following memories must be refreshed many times per
second?
(A) Static RAM
(B) Dynamic RAM
(C) EPROM
(D) ROM
79)
In which mode, the communication channel is used in both
directions at the same time?
(A) Full-duplex
(B) Simplex
(C) Half-duplex
(D) None of the above
80)
Which of the printers used in conjunction with computers uses dry ink
powder?
(A) Daisy wheel printer
(B) Line printer
(C) Laser printer
(D) Thermal printer
21 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(A)Extensible Markup Language (XML)
(B) Extensible Business Reporting Language (XBRL)
(C) Enterprise Application Integration (EAI)
(D) None
23 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(A) Graphical & Text
(B) Graphical & Navigational
(C) Text & Pictorial
(D) None
94)The displayed data over internet can be classified into two types. They
are
(A) Static & Dynamic
(B) Graphical & Text
(C) Data & Voice
(D) None
95)
Which is an open source development environment to develop
dynamic web pages?
(A) PHP (Hypertext Preprocessor)
(B) XML
(C) VB Script
(D) None
97)A set of rules that enables a user to log on to another computer and
transfer information between it & his/ her computer.
(A) HTTP
(B) FTP
(C) WWW
(D) None
25 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Global System for Mobile communication
(D) None
102) TCP stands for
(A) Transmission Control Protocol
(B) Telnet Control Protocol
(C) Transmission Channel Protocol
(D) None
104) A product that is owned exclusively by a single company that can only
function properly, if it is used with other products owned by the same
company?
(A) Proprietary Software
(B) Public Domain Software
(C) Commercial Software
(D) None
105)
Freeware can be classified into four types. It includes
(A) Donationware, Postcardware
(B) Abandonware, Adware
(C) Both (A) & (B)
(D) None
109)
A code that represents English characters as numbers and ranging
from 0 to 127.
(A) ASCII
(B) EBCDIC
(C) BCD
(D) All of above
27 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
110) An email feature, which is used to send a copy of an email to one or
many other people at the same time that you are sending it to the main
recipient/s is called
(A) CC
(B) BCC
(C) To
(D) None
113) A….. is a design tool that graphically shows the logic in a solution
algorithm.
(A) Hierarchy Chart
(B) Flow Chart
(C) Structure Chart
(D) None
115) A file that contains definitions of the paragraph and character styles
for your document and all things you customized like toolbars and menus
is called a…….
(A) guide
(B) prompt
(C) template
28 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(D) None
116)
Programs designed specifically to address general purpose
applications & special-purpose applications are called
(A) System Software
(B) Application Software
(C) Operating System
(D) None
117) A ….. contains buttons & menus that provide quick access to
commonly used commands.
(A) menubar
(B) toolbar
(C) window
(D) None
29 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
124) Which of the following format for storing & backing up computer
30 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
data on tape that evolved from Digital Audio Tape (DAT) technology?
(A) Data Aggregation
(B) Digital Data Storage
(C) Virtual Tape System
(D) None
31 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(B) addresses
(C) locations
(D) None
32 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
133) Is the Virus that overwrites the files or a few parts being replaced?
(A) Virus
(B) File infectors
(C) worm
(D) None
33 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(D) None
138)A type of phishing attack where mobile phone users receive text
messages containing a Web site hyperlink is called
(A) Pharming
(B) Smishing
(C) Vishing
(D) None
139) The creation of Internet Protocol (IP) packets with a forged source IP
address, with the purpose of concealing the identity of the sender or
impersonating another computing system is called …………..
(A) Pharming
(B) Spoofing
(C) Vishing
(D) None
140)
A malware program that can be used by a black hat cracker to
remotely take control of a system for further attacks like spam emails or
34 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
Denial of Service attacks, without a user’s knowledge is called……
(A) Zombie
(B) Spoofing
(C) Vishing
(D) None
141) Ethical hackers who use their skill to secure the integrity of computer
systems or networks is called
(A) Black Hat
(B) White Hat
(C) Green Hat
(D) None
35 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
142)
A type of malicious software that is activated each time your system
boots up. This malicious software difficult to detect because they are
activated before your system's Operating System has completely booted up
is called
(A) Phishing
(B) Rootkits
(C) Pharming
(D) None
143)
Spam over instant messenger is called spim while spam over
Internet telephony is known as
(A) Malware
(B) Spit
(C) Pharming
(D) None
147) Modifying data in a Domain Name System (DNS) server so that calls to
particular Websites or even entire domains are misdirected for fraudulent
purposes is termed as
(A) DNS cache poisoning
(B) Penetration
(C) Phishing
(D) None
36 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
148) Any deliberate damage to operations or equipments is called
(A) Piggybacking
(B) Sabotage
(C) Phishing
(D) None
37 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
150) Malicious modification or destruction of data such as changing
information on Web sites is called
(A) Super zapping
(B) Vandalism
(C) Spamming
(D) None
151) Overwhelming or saturating resources on a target system to
cause a reduction of availability to legitimate users is termed as
(A) Distributed DoS attack
(B) Denial of Service (DoS) attack
(C) Data Diddling
(D) None
155) A program or batch file that waits for a specific time before causing
damage is……
(A) Logic bomb
(B) Time bomb
(C) Mail bombing
(D) None
39 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) A network connection
(D) None
163)
The process of analyzing large data sets in search of new,
previously undiscovered relationships is known as:
(A) data mining
(B) data marting
(C) data maintenance
(D) data warehousing
166)Keys that are used in combination with some other key, they
have been programmed to perform certain tasks is called
(A) Function keys
(B) Alphanumeric keys
(C) Modifier keys( Alt, Ctrl)
(D) None
41 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
167) A key that is used to alternate the input mode of a group of
keys on a keyboard is known as
(A) Function keys
(B) Alphanumeric keys
(C) Toggle Keys (Caps Lock, Nums Lock)
(D) None
168) Networking can be classified into two types. It includes
(A) Server-based networking (A central Server)
(B) Peer to Peer networking (Group of computers that perform both Server &
Client function)
(C) Both (A) & (B)
(D) None
169)
Which is used to connect a computer to the cabling used in LAN?
(A) Network Interface Card (or) Network Adapter
(B) Router
(C) Modem
(D) None
170) A device which converts data between the analog form used on
telephone lines & the digital form used on computers is………
(A) Network Interface Card (or) Network Adapter
(B) Router
(C) Modem (Modulator Demodulator)
(D) None
173)
A networking device that is used to receive signals from one
Computer & transmit them on to other computers in a network is
called……..
42 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(A) Repeater
(B) Hub
(C) Bridge
(D) None
175) An intelligent Hub that has the ability to determine the destination of a
packet sent across the network is called………
(A) Repeater
43 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(B) Switch
(C) Bridge
(D) None
177)
CSMA/CD stands for
(A) Carrier Sense Multiple Access with Correction Detection
(B) Code Sense Multiple Access with Collision Detection
(C) Carrier Sense Multiple Access with Collision Detection
(D) None
181)
Star topologies are normally implemented using a
(A) Unshielded Twisted Pair (UTP) cable
(B) Twisted Pair cable
(C) Fiber Optic Cable
(D) None
44 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
182) A set of stations connected serially by cable is known as
(A) Star topology
(B) Bus topology
(C) Ring topology
(D) None
45 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
184) Layer which deals with the transportation of binary data and defines
cable & electrical specifications is known as……….
(A) Data Link Layer
(B) Physical Layer
(C) Session Layer
(D) None
185) Layer which converts data frames into bits and also convert bits into
frames is known as……….
(A) Data Link Layer
(B) Transport Layer
(C) Session Layer
(D) None
186) Layer which deals with translation of logical & physical addresses &
determines route from source to destination & also control network traffic
is known as……….
(A) Network Layer
(B) Transport Layer
(C) Session Layer
(D) None
187) Layer which manages flow control & ensures reliable delivery of data
packets in sequence with no losses or duplications is known as………
(A) Presentation Layer
(B) Transport Layer
(C) Session Layer
(D) None
189) Layer which translates data format & deals with compression of
data and network security is known as………
(A) Presentation Layer
(B) Application Layer
46 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Session Layer
(D) None
190) Layer which is the user interface to access the network services such as
file transfer/ database access is known as………
(A) Presentation Layer
(B) Application Layer
(C) Session Layer
(D) None
191)
A long message that needs to be transmitted is broken into smaller
packets of fixed size for error free transmission is termed as……..
(A) Data Sequencing
47 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(B) Flow Control
(C) Error control
(D) None
198)
The two application protocols most commonly associated with
(A) Network File System (NFS)
48 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(B) Common Internet File System (CIFS)
(C) Both (A) & (B)
(D) None
49 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
200)A reliability & flow control technique where the source sends one
packet, starts a timer and waits for an acknowledgement before sending
a new packet is called
(A) Positive Acknowledgement Retransmission (PAR)
(B) Checksum
(C) Routing
(D) None
203)
What is Warm booting?
(A) When a computer is turned on after it has been completely shut down.
(B) When a computer is restarted by pressing the restart button or pressing (ctrl +
Alt + Del) key.
(C) (A) or (B)
(D) None.
51 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) A type of OS which do not interact with a computer directly.
(D) An OS which use multiple central processors to serve multiple real time
applications.
210)
What is Distributed Operating System (RTOS)?
(A) More than one processes can be executed concurrently.
(B) Processing is done with a time constraint
(C) A type of OS which do not interact with a computer directly.
(D) An OS which uses multiple central processors to serve multiple real time
applications.
213)
A system call of OS which is used to create a new process is known as?
(A) Kernel
(B) Shell
(C) Fork
(D) None
214) A process which is not executing due to any waiting event is called?
(A) Kernel
(B) Shell
(C) Deadlock
(D) None
52 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
215) Which provides an interface between process & OS?
(A) Kernel
(B) System Calls
(C) Deadlock
(D) None
216)
User Interface can be divided into two types. They are
(A) Graphical User Interface
(B) Character User Interface
(C) (A) & (B)
(D) None
53 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Character Level Interface
(D) None
220) Grouping & processing all of a firm’s transactions at one time is called,
(A) batch processing
(B) a real time system
(C) a database management system
(D) None
226) means
that the data contained in a database is accurate & reliable
(A) Data redundancy
(B) Data integrity
55 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Data consistency
(D) None
228)
Which combines efficient implementation techniques that enable
them to be used in extremely large database?
(A) Data Mining
(B) Data Manipulation
(C) Data reliability
(D) None.
230)
A collection of conceptual tools for describing data, relationships,
semantics & constraints is referred as….
(A) data model
(B) ER model
(C) DBMS
(D) None.
234) provides
total solutions to reduce data redundancy, inconsistency,
dependence & unauthorized access of data.
(A) Table
(B) Protection password
57 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) Data reliability
(D) None.
236) … ....are distinct items that don’t have much meaning to you in a given
answer
(A) Fields
(B) Data
(C) Queries
(D) None.
242) An entity set that does not have sufficient attributes to form a primary
key, is a…..
(A) primary entity set
(B) weak entity set
(C) simple entity set
(D) None.
243) A computer checks ..... of username & password for a match before
granting
access.
59 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(A) website
(B) network
(C) database
(D) None.
244)….. is a primary key of one file that also appears in another file?
(A) Physical key
(B) Foreign key
(C) Logical key
(D) None.
61 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(A) network layer
(B) data link layer
(C) transport layer
(D) None
257) Which is the name of the network topology in which there are
bidirectional links between each possible nodes?
(A) Mesh
(B) Ring
(C) Bus
(D) None
63 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
261) How many ways you can save a document?
(A) 5
(B) 4
(C) 3
(D) None
262) The maximum zoom % in MS Power Point is…….
(A) 400
(B) 100
(C) 200
(D) None
265)
A....... is the term used when a search engine returns a web page that
matches search criteria
(A) blog
(B) hit
(C) link
(D) None
64 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
268) Which stores information about the user’s web activity?
(A) Spam
(B) Cookie
(C) Cache
(D) None
65 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
270) Vendor-created program modifications are called———
(A) patches
(B) antiviruses
(C) holes
(D) None
271) If your computer rebooting itself then it is likely that
(A) It has a virus
(B) It does not have enough memory
(C) There has been a power surge
(D) None
67 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
280) Arithmetic Logic Unit(ALU) and control sections have special purpose
locations called
(A) secondary memory
(B) registers
(C) accumulator
(D) None
282) What are the units used to count the speed of a printer?
(A) DPI
(B) CPM
(C) PPM
(D) None
69 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(B) resolution
(C) pitch
(D) None
293)
The term .......refers to data storage systems that make it possible for a
computer or electronic device to store and retrieve data
(A) storage technology
(B) input technology
70 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
(C) output technology
(D) None
295) The storage device used to compensate for the difference in rates of
flow of data from one device to another is termed as…..
(A) floppy
(B) chip
(C) buffer
(D) None
71 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
298) The ….. is the amount of data that a storage device can move from the
storage to the computer per second
(A) data transfer rate
(B) data access rate
(C) data migration rate
(D) None
300) ……… acts as a temporary high speed holding area between the
memory and the CPU thereby improving processing capabilities
(A) Cache
(B) RAM
(C) ROM
(D) None
Question Answers
Number
1 D
2 B
72 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
3 A
4 D
5 D
6 B
7 D
8 C
9 D
10 A
73 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
11 A
12 A
13 A
14 B
15 D
16 A
17 A
18 D
19 C
20 D
21 C
22 C
23 D
24 C
25 A
26 C
27 C
28 D
29 A
30 B
31 D
32 D
33 C
34 C
35 C
36 A
37 D
38 C
39 A
40 B
74 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
41 C
42 A
43 A
75 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
44 B
45 B
46 B
47 A
48 D
49 B
50 A
51 D
52 B
53 C
54 A
55 C
56 B
57 B
58 C
59 C
60 B
61 B
62 A
63 D
64 B
65 D
66 C
67 D
68 B
69 C
70 A
71 C
72 C
73 A
76 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
74 C
75 A
76 A
77 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
77 C
78 B
79 A
80 C
81 B
82 A
83 C
84 B
85 B
86 B
87 C
88 C
89 A
90 D
91 A
92 A
93 A
94 A
95 A
96 B
97 B
98 B
99 A
100 C
101 C
102 A
103 A
104 A
105 C
106 D
107 A
108 B
109 A
78 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
79 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
110 A
111 B
112 B
113 B
114 B
115 C
116 B
117 B
118 A
119 B
120 A
121 A
122 B
123 B
124 B
125 B
126 B
127 C
128 B
129 C
130 C
131 C
132 C
133 B
134 A
135 C
136 C
137 C
138 B
139 B
140 A
141 B
142 B
80 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
81 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
143 B
144 B
145 B
146 A
147 A
148 B
149 B
150 B
151 B
152 C
153 A
154 B
155 B
156 B
157 C
158 B
159 A
160 C
161 A
162 B
163 A
164 A
165 A
166 C
167 C
168 A
169 A
170 C
171 C
172 A
173 B
174 C
175 B
82 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
83 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
176 A
177 C
178 B
179 C
180 A
181 A
182 C
183 A
184 B
185 A
186 A
187 B
188 C
189 A
190 B
191 A
192 A
193 B
194 C
195 B
196 C
197 B
198 C
199 C
200 A
201 C
202 A
203 B
204 D
205 C
206 D
207 A
208 B
84 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
85 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
209 C
210 D
211 A
212 B
213 C
214 C
215 B
216 C
217 B
218 C
219 B
220 A
221 B
222 B
223 A
224 B
225 A
226 B
227 B
228 A
229 C
230 A
231 C
232 C
233 A
234 B
235 B
236 A
237 B
238 A
239 A
240 B
241 A
86 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
87 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
242 B
243 C
244 B
245 A
246 B
247 A
248 D
249 C
250 A
251 B
252 A
253 D
254 A
255 A
256 D
257 A
258 A
259 C
260 C
261 C
262 A
263 B
264 A
265 B
266 B
267 A
268 B
269 C
270 A
271 A
272 B
273 B
274 C
88 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
89 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
275 A
276 B
277 A
278 C
279 A
280 B
281 A
282 A
283 B
284 C
285 A
286 C
287 A
288 A
289 C
290 C
291 B
292 C
293 A
294 C
295 C
296 B
297 B
298 A
299 B
300 A
90 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e
TRIPLE S
(STUDY PLAN – STRATEGY – SUCCESS)
91 | P a g
SUBSCRIBE http://www.youtube.com/c/triplesSumitpuri e