0% found this document useful (0 votes)
8 views6 pages

Computer Awareness Bundle PDF Course Day - 31 (Eng)

computer

Uploaded by

devikapattar985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views6 pages

Computer Awareness Bundle PDF Course Day - 31 (Eng)

computer

Uploaded by

devikapattar985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Computer Awareness Bundle PDF Course Day -31 (Eng)

Computer Awareness

1. The brain of any computer system is Answer: A


______________. CGI: Common Gateway Interface
a) Motherboard
b) Keyboard 4. Which of the following are the different types
c) Mouse of Programming Language?
d) CPU a) Object-Oriented Programming Language
e) Scanner b) Logic Programming Language
Answer: D c) Procedural Programming Language
The Central Processing Unit (CPU), which d) Functional Programming Language
houses all the circuitry required to process input, e) All the above
store data, and output results, is the brain of a Answer: E
computer. 5 Different Types of Programming Languages
 Object-Oriented Programming Language
2. In word processing, an efficient way to move  Logic Programming Language
the 3rd paragraph to place it after the 5th  Procedural Programming Language
paragraph is _____.  Functional Programming Language
a) Copy and paste  Scripting Programming Language
b) Copy and cut
c) Cut and copy 5. The ____________ instruction inserts the result
d) Cut and paste into one or more registers after reading data
e) None of these from memory using a segment or flat address
Answer: D expression.
Microsoft Word allows you to select text or a a) Load
graphic, cut it and paste it somewhere else in the b) Machine
same document or another document. c) Storage
d) Access
3. What do I represent in CGI? e) Arithmetic
a) Interface Answer: A
b) Information The load instruction (ld) inserts the result into
c) Insert one or more registers after reading data from
d) Interval memory using a segment or flat address
e) Intention expression.

Click Here For Bundle PDF Course | support@guidely.in Page 1 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

6. _____________ is a temporary memory bank responsibility of running specific applications


where your computer stores data it's currently within that network.
working on and keeps data easily accessible so a) Application Server
that it can be retrieved quickly, meaning your b) Arithmetic Server
processor doesn't have to go into long-term c) Algorithm
storage to complete immediate processing tasks. d) Applet
a) Storage e) Adware
b) RAM Answer: A
c) ROM An application Server is a specialized server
d) Joystick based in a client/server network that has the sole
e) Scanner responsibility of running specific applications
Answer: B within that network.
RAM is a temporary memory bank where your
computer stores data it's currently working on. 9. ____________ simply means linking with
RAM keeps data easily accessible so that it can another device without using a wire, or a
be retrieved quickly, meaning your processor physical connection.
doesn't have to go into long-term storage to a) Network
complete immediate processing tasks. b) Wireless
c) Protocol
7. The potential impact of a threat on a system is d) Interlacing
measured by its ______________. e) Open Source
a) Vulnerabilities Answer: B
b) Susceptibility Wireless simply means linking with another
c) Degree of Harm device without using a wire, or a physical
d) CounterMeasures connection.
e) None of these
Answer: C 10. What is information about data called?
The potential impact of a threat on a system is a) Hyperdata
measured by its Degree of Harm. b) Teradata
c) Metadata
8. _______________ is a specialized server d) Relation
based in a client/server network that has the sole e) Database
Answer: C

Click Here For Bundle PDF Course | support@guidely.in Page 2 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

Meta Data provides information about other 3GLare C, C++, Java, JavaScript, and Visual
data. The basic data information is condensed Basic.
into metadata, which facilitates identifying and
interacting with specific instances of data. 13. The World Wide Web also referred to as the
Metadata can be generated automatically with Web, is an information system that makes it
more basic information or manually for greater possible to access papers and other web
accuracy. resources via the Internet. Who is the inventor of
WWW?
11. The first computer mouse was developed by a) Bill Gates
_____________. b) Lee. N. Feyong
a) Douglas Engelbart c) Tim Berners Lee
b) William English d) Tom Berners Lee
c) Daniel Cougher e) Tim Cook
d) Robert Zawaski Answer: C
e) William Henry The World Wide Web also referred to as the
Answer: A Web, is an information system that makes it
Development of the mouse began in the early possible to access papers and other web
1960s by SRI International's Douglas Engelbart, resources via the Internet. The web is another
while he was exploring the interactions between name for www. Tim Berners-Lee created it in
humans and computers. Bill English, then the 1989 at CERN in Geneva.
chief engineer at SRI, built the first computer
mouse prototype in 1964. 14. A file is transferred from one computer
system to another, or to a server so that others
12. In which generation is a high-level language can see or retrieve it is called
developed? ____________________.
a) First a) Download
b) Second b) Upload
c) Third c) Retrieval
d) Fourth d) Sharing
e) Fifth e) Software
Answer: C Answer: A
High-Level languages are developed in the third
generation. The third Generation languages, or

Click Here For Bundle PDF Course | support@guidely.in Page 3 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

A file is transferred from one computer system to 17. Changing the appearance of a document is
another, or a server so that others can see or called ___
retrieve it is called Download. a) Aligning
b) Formatting
15. Who among the following is considered the c) Documenting
Father of the Computer? d) Copying
a) Charles Babbage e) Editing
b) Pascal Answer: B
c) Herman Hollerith The process of changing the appearance of the
d) Reynold Johnson text is called Formatting.
e) Gary Kildall
Answer: A 18. A ________ is the fundamental building block
Charles Babbage was considered to be the of an Excel spreadsheet that you insert data.
father of computing after his concept, and then a) Data
later the invention of the Analytical Engine in b) Tab
1837. c) Range
d) Cell
16. A ________________ is a network security e) Box
device used in computing that monitors and Answer: D
regulates incoming and outgoing network traffic A cell is the fundamental building block of an
by pre-established security rules. Excel spreadsheet where we insert data. Each
a) Bridge worksheet is made up of countless cells, which
b) Firewall are rectangular shapes. A row and a column
c) Port come together to form a cell.
d) Domain
e) Protocol 19. What are the basic rectangular building
Answer: B blocks of a spreadsheet?
A firewall is a network security device used in a) Columns
computing that monitors and regulates incoming b) Rows
and outgoing network traffic following pre- c) Cell
established security rules. d) Table
e) Ribbon
Answer: C

Click Here For Bundle PDF Course | support@guidely.in Page 4 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

Each rectangle in a worksheet is called a cell. A d) Floppy Disk


cell is the intersection of a row and a column. e) None of these
Answer: C
20. Which layer of OSI model is responsible for Blue-ray Disk is an Optical disk storage medium
the delivery of individual packets from the source designed to recapture the data normally in DVD
host to the destination host? format and it contains 25 GB(23.31 GB) per
a) Physical layer space.
b) Network
c) Data Link 23. While studying networking, we may come to
d) Session know about the term SACK. What does SACK
e) Application represent?
Answer: B a) Selection Acknowledgement
The network layer of the OSI model is b) Selective Acknowledgement
responsible for the delivery of individual packets c) Supreme request
from the source host to the destination host. d) Suppress Data
e) None of these
21. ____________ is the maximum length of a Answer: B
DOS command using an optional parameter. SACK ⇒ Selective Acknowledgement
a) 26 characters
b) 87 characters 24. The Artificial satellite which revolves around
c) 127 characters the earth and provides transmit information from
d) 142 characters the earth is basically called _____
e) 163 characters a) Geosynchronous satellites
Answer: C b) Geostationary satellites
127 characters is the maximum length of a DOS c) Low Earth Orbits
command using an optional parameter. d) Sun-Synchronous orbits
e) None of these
22. Which one is an Optical disk storage medium Answer: B
designed to recapture the data normally in DVD The majority of communications satellites are in
format? fact geostationary satellites. Geostationary
a) Compact Disk satellites like geosynchronous satellites take 24
b) Digital Video Disk hours to complete a rotation. However,
c) Blue-ray Disk geostationary satellites are positioned directly

Click Here For Bundle PDF Course | support@guidely.in Page 5 of 6


Computer Awareness Bundle PDF Course Day -31 (Eng)

over the equator and their path follows the c) Drive imaging
equatorial plane of the Earth. d) Utility software
e) None of these
25 ______ is the software that creates a mirror Answer: C
image of the entire hard disk, including the Drive imaging is the software that creates a
operating system, application, files and data. mirror image of the entire hard disk, including the
a) Operating system operating system, application, files and data.
b) Backup software

Click Here For Bundle PDF Course | support@guidely.in Page 6 of 6

You might also like