Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

30 Important Questions

1. _________are digits used to represent characters in a


computer’s memory.
(A) Bits (B) Pits
(C) Pixels (D) Dpi
Ans: (A)

Explanation: A bit is a binary digit i.e. 0 or 1 any data is store


in this form of binary digits. It is also the smallest unit in
computer memory.

2. What is the use of GOTO statement?


(A) Instructs the computer to GOTO a specific statement
associated with a label.
(B) Can be used to skip some statements.
(C) Can be used to repeat some statements.
(D) All of these
Ans: (D)
Explanation: The GOTO statement is a statement used to
jump anywhere in the main program within a function.

1
3. Identify:
______option arranges windows on top of each other and
______ option arranges windows next to each other
respectively.
(A) Center, Cascade
(B) Serial, Joint
(C) Cascade windows, Show windows side by side
(D) Joint, Show windows serial
Ans: (C)

Explanation: cascading windows is a type of arrangement of


application which are currently running and overlapped by
each other (multiple programs in single window and only one
or two applications are visible to us).

4. In second generation computers __________ language is


used.
(A) Assembly (B) High level
(C) Pascal (D) Basic
Ans: (A)
Explanation:

2
Second generation (1956 - 1963)
The second generation of computers saw the use
of transistors instead of vacuum tubes. Transistors were
widely used in computers from 1956 to 1963. Transistors
were smaller than vacuum tubes and allowed computers to be
smaller in size, faster in speed, and cheaper to build.

5. A __________ can hold upto 25 times more data than a


CD-ROM.
(A) CD-RW (B) CD-R
(C) DVD-ROM (D) Both (A) and (B)
Ans: (C)
Explanation: A CD-ROM can only store 650 MB of data where
as a DVD-ROM can store upto 4.38 GB of data.

6. _________ command is used to display the graphics on the


screen?
(A) CANVAS (B) RESOLUTION
(C) LOCATE (D) SCREEN
Ans: (D)

Explanation: SCREEN statement is used to display graphics


on the screen.
All the graphics related work is done by this statement.

3
7. When we create a custom show in a presentation. Even
when a custom show already exists for it. Then
(A) A copy of the presentation is created with the new
custom show.
(B) Previous custom show gets merged with the recent one.
(C) Both the custom shows remain in the presentation
(D) Previous custom show gets deleted
Ans: (C)
Explanation: You can essentially tag a subset of slides in a
presentation file for the purpose of showing that subset to a
particular audience. You might think of it as a playlist.
PowerPoint calls this a custom show. When you create a
custom show in PowerPoint, you can adapt a presentation for
different audiences. Use a custom show to present only certain
slides from your presentation, or to create a hyperlink to a
group of slides in your presentation.

8. Which of the following is a data storage device using


integrated circuit assemblies as memory to store data
persistently.
(A) CD-ROM

4
(B) Tape drive
(C) SSD
(D) DVD
Ans: (C)
Explanation: An SSD (solid-state drive) is a type of
nonvolatile storage media that stores persistent data on solid-
state flash.

9. _______cannot be used for mass storage of digital data?


(A) Hard disk drive (B) RAM
(C) Optical disc drive (D) Optical jukebox
Ans: (B)
Explanation: RAM Random-access memory is computer
memory that can store data only in working condition when the
power is turned off the data will erase. It is used to store
temporary working application, code or other software.

10. Now-a-days a new interface is adopted by computing


devices that allows its users to control games and apps when
the controlling device is moved in the air. Which technology is
followed by such interfaces?
(A) Steering (B) Air maneuvering
(C) Air sensing (D) Gesture sensing

5
Ans: (D)
Explanation: Gesture sensing is technology used in computer
science to interpreting human gestures via mathematical
algorithms. Gestures is a form of any bodily motion or state. It
also include the hands, face movement etc.

11. What do you mean by Reverse blog?


(A) A blog in which older posts appears first.
(B) A blog which is composed by a single user.
(C) A blog that creates reverse proxy.
(D) A blog which is composed by its users rather than a single
blogger.
Ans: (D)
Explanation: A reverse blog is a type of blog that is
characterized by the lack of a single, specific blogger. In a
traditional blog a blogger will write his or her comments
about a given topic and other users may view and sometimes
comment on the bloggers work. A reverse blog is written
entirely by the users, who are given a topic. The blog posts are
usually screened and chosen for publication by a core group
or the publisher of the blog.

6
12. _______the output of the following QBASIC code?
NAME$ = ‘Project Scope’ PRINT LEN(NAME$)
(A) 10
(B) 11
(C) 12
(D) 13
Ans: (D)
Explanation: QBasic, a short form of Quick Beginners All-
purpose Symbolic Instruction Code, is an integrated
development environment (IDE) and interpreter for a variety
of BASIC programming languages which are based on
QuickBASIC. Code entered into the IDE is compiled to an
intermediate representation (IR), and this IR is immediately
interpreted on demand within the IDE.

13. A ___________ is a multiuser computer system capable of


supporting hundreds of users simultaneously.
(A) Tablet PC (B) Mini Computer
(C) Personal computer (D) Terminal
Ans: (B)

7
Explanation: A minicomputer is a type of computer that
possesses most of the features and capabilities of a large
computer but is smaller in physical size.
A minicomputer fills the space between the mainframe and
microcomputer, and is smaller than the former but larger than
the latter. Minicomputers are mainly used as small or mid-
range servers operating business and scientific applications.
However, the use of the term minicomputer has diminished
and has merged with servers.

14. Identify the following.


-- It is a feature that allows you to see and manage all external
devices from a central location.
– Examples of such devices can be a camera, mobile phone or
flash drive
– This feature can be accessed by going to Devices and
Printers option in Control Panel.
(A) Device View (B) Device Name
(C) Device Stage (D) Device Show
Ans: (C)

8
Explanation: Device Stage is a new Windows platform that
enables device manufacturers to deliver rich user experiences
that match the specific branding, features, and content of their
devices. With Device Stage, users can simply connect their
device to a Windows 7 PC, and the manufacturer-supplied
experience will be automatically installed and presented to the
user, ensuring a seamless experience between the device and
PC.

15.__________is NOT a display technology for smart TVs?


(A) OLED 3D
(B) HDTV
(C) UHDTV
(D) 10 K
Ans: (D)
Explanation: A smart TV is also called a digital TV. It is a
technological convergence of computers, television sets and
set-top boxes. It is delivered an internet connected, storage
aware content.

9
16. Identify which statements is INCORRECT about a
Register?
(A) It is a small high speed storage unit.
(B) It holds the data and instructions that need to be
processed immediately.
(C) It holds the data permanently.
(D) Data stored in specific registers have special meaning to
the CPU.
Ans: (C)
Explanation: Registers are a type of computer memory used to
quickly accept, store, and transfer data and instructions that
are being used immediately by the CPU. The registers used by
the CPU are often termed as Processor registers.
A processor register may hold an instruction, a storage
address, or any data (such as bit sequence or individual
characters).

10
17. Identify which statements is INCORRECT about
EPROM?
(A) EPROM stands for Erasable Programmable Read Only
Memory.
(B) It is volatile in nature.
(C) It comes in several sizes and storage capacities.
(D) Its data can be erased and new data can also be added to
it.
Ans: (B)
Explanation: EPROM (erasable programmable read-only
memory) is programmable read-only memory (programmable
ROM) that can be erased and re-used. Erasure is caused by
shining an intense ultraviolet light through a window that is
designed into the memory chip. (Although ordinary room
lighting does not contain enough ultraviolet light to cause
erasure, bright sunlight can cause erasure. For this reason, the
window is usually covered with a label when not installed in
the computer.

11
18. ___________ is/are the application areas of wearable
computers?
(A) Healthcare monitoring system
(B) E-textiles
(C) Both (A) and (B)
(D) None of these
Ans: (C)
Explanation: Wearable computers, also known as wearables
or body-borne computers, are small computing devices
(nowadays usually electronic) that are worn under, with, or on
top of clothing.
The definition of 'wearable computer' may be narrow or
broad, extending to smartphones or even ordinary
wristwatches. This article uses the broadest definition.

19. These are specially designed computer chips. They reside


inside other devices. Examples of such devices can be your
car’s dashboard, washing machines and microwave ovens, or
the electronic thermostat in air conditioners.

12
(A) Mainframes (B) Robotic computers
(C) Embedded system (D) Servers
Ans: (C)
Explanation: An embedded system is a controller with a
dedicated function within a larger mechanical or electrical
system, often with real-time computing constraints. It is
embedded as part of a complete device often including
hardware and mechanical parts. Embedded systems control
many devices in common use today. Ninety-eight percent of
all microprocessors manufactured are used in embedded
systems.

20. ________ technology used to produce machines like


computer and robots that display intelligence quite similar to
the intelligence shown by human beings.
(A) Biotechnology
(B) Cross-over technology
(C) Simulation

(D) Artificial Intelligence


Ans: (D)

13
Explanation: Artificial intelligence (AI) is the simulation of
human intelligence processes by machines, especially computer
systems. These processes include learning (the acquisition of
information and rules for using the information), reasoning
(using rules to reach approximate or definite conclusions) and
self-correction. Particular applications of AI include expert
systems, speech recognition and machine vision.

21. Identify the following:


-- They are used to identify positions in a document.
-- These positions can be the beginning of a chapter or a table.
-- They can be used to jump to specific points in a document.

(A) Save points (B) Hyphenation


(C) Watermarks (D) Bookmarks
Ans: (D)
Explanation: Bookmarks is a uniform resource identifier used
to save the page, location or positon of curser so you can easily
jump to the place without any trouble .

14
22. Identify the given icon can. What is it’s use in a mail-
merged document.

(A) View the merged data


(B) Make changes to the list of recipients
(C) Highlight the field in letter
(D) Add a greeting line in letter.
Ans: (B)
Explanation: Mail merge is a collection of mail and letters and
pre-addressed envelopes or mailing labels for mass mailings
from a form letter. It is just like sending a letter to many people
at same time.

23. Identify which statements hold(s) true about working of


computer with input and output devices
Statement 1: An input device takes data and converts it into
binary form.
Statement 2: An output device takes data in binary form and
converts it into decimal form for the end users.

15
(A) Only Statement 1
(B) Only Statement 2
(C) Both Statement 1 and Statement 2
(D) Neither Statement 1 nor Statement 2
Ans: A)
Explanation: An input device sends information to a computer
system for processing, and an output device reproduces or
displays the results of that processing. Input devices only
allow for input of data to a computer and output devices only
receive the output of data from another device.

24. Identify the following: -- It is used as main memory in


personal computers.
-- Inside its chip, each memory holds one bit of information.
-- It is made up of two parts, a transistor and a capacitor.
(A) Audio RAM (B) Static RAM
(C) Video RAM (D) Dynamic RAM
Ans: (D)
Explanation: Dynamic RAM is the most common type of
memory in use today. Inside a dynamic RAM chip, each
memory cell holds one bit of information and is made up of

16
two parts: a transistor and a capacitor. These are, of course,
extremely small transistors and capacitors so that millions of
them can fit on a single memory chip. The capacitor holds the
bit of information -- a 0 or a 1 (see How Bits and Bytes Work
for information on bits). The transistor acts as a switch that
lets the control circuitry on the memory chip read the
capacitor or change its state.

25. _______is the computer language that is directly


understandable by computer CPU and does not need a
translator program.

(A) High level language

(B) Fourth generation language


(C) Machine language

(D) Assembly language


Ans: (C)
Explanation: Human being can speak many languages but
computer only know machine language i.e. the language of 0
or 1 so to communicate with computer there is High level
language which is used as translator.
17
26. Which of the following is NOT an advantage of second
generation computers over first generation computers?
(A) No need of AC (B) More faster
(C) Generated less-heat (D) More reliable
Ans: (A)
Explanation: Second generation (1956 - 1963)
The second generation of computers saw the use
of transistors instead of vacuum tubes. Transistors were
widely used in computers from 1956 to 1963. Transistors
were smaller than vacuum tubes and allowed computers to be
smaller in size, faster in speed, and cheaper to build.
The first computer to use transistors was the TX-0 and was
introduced in 1956.

27. Identify which of the following statements is true when


multiple user accounts have been created on a computer?
(A) Each account is time limited.
(B) Each user has administrative rights and an administrator
password.
(C) Each user can customize certain account settings.
(D) None of these

18
Ans C)
A multi-user account is a Simply Cast account that is
available for multiple users with varying permissions to use.
For example, a company using SimplyCast 360 with their
sales team would have a login for each individual user and
each user might be working with a different set of clients.

28. Which of the following statements is CORRECT?


(A) Virus is a hardware and can be easily detected.
(B) A Trojan Horse replicates itself without any human
action.
(C) Computer virus is a biological organism.

(D) Ping Pong is an example of computer virus.


Ans: (D)
Explanation: The Ping-Pong is a boot virus i.e it attack the
computer on the time of rebooting. It is also a computer virus.

19
29. Identify which statements is INCORRECT about solar
charger?
(A) It employs solar energy to supply electricity to devices or
charge batteries.
(B) It is designed to charge a range of different mobile phones
ipods and other portable audio equipment.
(C) They are not portable charges i.e. we can’t move it from
one place to another.
(D) All are correct
Ans: (C)
Explanation: A solar charger is a charger that employs solar
energy to supply electricity to devices or batteries. They are
generally portable.
Solar chargers can charge lead acid or Ni-Cd battery banks up
to 48 V and hundreds of ampere-hours (up to 4000 Ah)
capacity. Such type of solar charger setups generally use an
intelligent charge controller. A series of solar cells are
installed in a stationary location (ie: rooftops of homes, base
station locations on the ground etc.) and can be connected to a
battery bank to store energy for off-peak usage. They can also
be used in addition to mains-supply chargers for energy
saving during the daytime.

20
30. E-sensing can be defined as____________.
(A) Mechanism/technology that mimics human senses using
pattern recognition or sensors.
(B) A device based on human machine interface mechanism
that work only when the authorized user places its palm on it.
(C) A measurement used to give rating to biometric devices.
(D) Both (A) and (B)
Ans: (A).
Explanation: An electronic nose is a device intended to detect
odors or flavors.
Over the last decades, "electronic sensing" or "e-sensing"
technologies have undergone important developments from a
technical and commercial point of view. The expression
"electronic sensing" refers to the capability of reproducing
human senses using sensor arrays and pattern
recognition systems. Since 1982,[2] research has been
conducted to develop technologies, commonly referred to as
electronic noses, that could detect and recognize odors and
flavors.

21

You might also like