Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

www.gradeup.

co

1
50+ Computer Awareness Questions 8.The term PC means ?
A. Private Computer
1.‘C’ language is a B. Personal Calculator
A. Low level language C. Professional Calculator
B. High level language D. Personal Computer
C. Machine level language
D. Assembly level language 9.The full form of PDF is_______
A. Programmed Document File
2.The speed of the processor of a computer B. Portable Document File
is measured in which of the following unit? C. Possible Document File
A. BPS D. Portable Document Format
B. MIPS
C. Baud 10.Processed data is known as ______.
D. IP A. Data
B. Information
3.What MS-DOS command is used to C. Knowledge
create a sub-directory? D. Analysis
A. DIR/MK
B. MKDIR 11.What is the base of the Octal Numeral
C. CHDIR System?
D. RMDIR A. 8
B. 16
4.CPU performance is often measured in : C. 32
A. GHz D. 64
B. MIPS E. None of these
C. Band rate
D. GB 12.The command that merges the contents
of one file to another is ?
5.DTP stands for_____. A. APPEND
A. Daily Text Printing B. RENAME
B. Desk Top Publishing C. RESTORE
C. Desk Top Printing D. ADD
D. Daily Text Publishing
13.The idea of the integrated circuit was
6.__________ helps in remote login. first given by ?
A. Telnet A. Geoffrey Dummer
B. Usenet B. Federico Faggin
C. Milnet C. Tom kilbum
D. Arpanet D. None of these

7.The term __________ is often used to 14._________ optical data storage is a


refer to the step-by-step procedure to technology where data is stored in multiple
solve a problem. layers in the optical disc.
A. Algorithm A. 3D
B. Flowchart B. 30D
C. Pseudocode C. 300D
D. Procedure D. 3000D

Join Our Classroom Program Now


15.The web uses the __________ to D. Port
request and serve web pages and
programs. 22.One byte consists of _______
A. Hyper Text Marketing Language A. One bit
B. Hyper Text Markup Language B. Four bits
C. Hotmail Text Markup Language C. Eight bits
D. Home Text Markup Language D. Ten bits

16.If you use a font that is not supported 23.DNS is a networking term that refers to?
by a browser, then the next ? A. Domain Name System
A. Will be displayed using ‘APRIL’ font only B. Digital Network Services
B. Will be displayed with a particular C. Disk Numbering Sequence
background D. Data Number System
C. Will be displayed in the default font
D. Will not be displayed 24.Who invented logarithms?
A. Eden Snowden
17.Which one of the following converts B. Larry Page
assembly language into machine language? C. Thomas Edison
A. Algorithm D. John Napier
B. Interpreter
C. Compiler 25.How many layers are there in the OSI
D. Assembler networking model?
A. 13
18.Of the following, which is the fastest? B. 11
A. CD-ROM C. 9
B. RAM D. 7
C. Registers
D. Cache 26.How many GB is equal to 1 TB?
A. 128
19.The indentations on CDs and DVDs are B. 256
called C. 512
A. Pits D. 1024
B. Clusters
C. Tracks 27.A computer language that expresses
D. Lands the presentation of structured documents,
such as CSS, is called _____.
20.In HTML, <B> and </B> tags display A. Command Language
the enclosed text in ? B. Machine Language
A. Black color C. Markup Language
B. Background D. Style Sheet Language
C. Bold
D. Bright 28.Unix operating system was developed in
1970s by
21.A place through which, data can enter A. Moto Labs
or leave a computer is called B. Microsoft Labs
A. Bus C. IBM Labs
B. Dock D. Bell Labs
C. Mouse

Join Our Classroom Program Now


29.Which of the following is not a C. Execution time
hardware? D. Delay time
A. Processor chip
B. Printer 36.How many bits does an IP address
C. Mouse contain?
D. Java A. 64 bits
B. 32 Bits
30.How many bytes are equal to one C. 111 Bits
kilobyte? D. 256 Bits
A. 1050
B. 1000 37.The transfer of data from one
C. 976 application to another in a computer
D. 1024 system is known as
A. Dynamic Data Exchange
31.A collection of HTML pages makes up B. Dodgy Data Exchange
the_________ C. Dogmatic Data Exchange
A. Hyperlinks D. Dynamic Disk Exchange
B. Hypertext
C. World Wide Web 38.A set of instructions executed directly
D. Hypermedia by a computer's central processing unit is
___________.
32.A hybrid computer is the one having A. Command Language
features of? B. Machine Language
A. Super and micro computers C. Markup Language
B. Mini and micro computers D. Style Sheet Language
C. Analog and digital computers
D. Super and mini computers 39.Which company developed Java?
A. Microsoft
33.Virus in a computer is a ? B. Sun
A. Chemical that attacks silicon C. Novell
B. Micro-organism that disturbs integrated D. Oracle
circuits
C. Program that damages the computer 40.In Microsoft Excel, the _______()
software function returns the smallest value among
D. None of the above the values passed as arguments.
A. LEAST
34.A new technology which provides the B. LESS
ability to create an artificial world and have C. MIN
people interact with it is called? D. LOW
A. Televirtuality
B. Virtual reality 41.______________ is a series of
C. Alternate reality supercomputers designed and assembled
D. 3-D reality by the Centre for Development of
Advanced Computing (C-DAC) in Pune,
35.The time between program input and India.
output is called _____________. A. PARAM
A. Turnaround time B. SHAKTI
B. Waiting time C. TITAN

Join Our Classroom Program Now


D. VIGYAN 48.A computer cannot ''boot'' if it does not
have which of the following?
42.Which one of the following acts as a A. Compiler
mediator between the user’s program and B. Loader
the hardware? C. Operating system
A. Operating System D. Assembler
B. Browser
C. Compiler 49.C, BASIC, COBOL and Java are
D. Editor examples of ____________ language.
A. Low-level
43.Which one of the following is a system B. Computer
software? C. System programming
A. Database programs D. High level
B. Word processors
C. Spreadsheets 50.The term ‘PC - XT refers to
D. Compilers _____________.
A. Personal Computer External Technology
44.Every bank branch is given a unique B. Personal Computer Extended
MICR code and which helps the RBI to Technology
identify the bank branch and speed up the C. Personal Computer Expanded
clearing process. The MICR code consists of Technology
how many digits? D. Personal Computer Embedded
A. 11 Technology
B. 9
C. 8 51.
D. 6 What is the process of defining tables called
E. 10 ?
A. Data definition
45.Programs stored in a ROM are called ? B. Data Normalisation
A. Software C. Index definition
B. Freeware D. Data administration
C. Firmware
D. None of these 52.What is the mascot of Linux Operating
System?
46.While the computer executes a A. Bear
program, the program is held in ? B. Penguin
A. RAM C. Lion
B. ROM D. Whale
C. Hard Disk
D. Floppy Disk 53.Which of the following errors are
identified by the compiler?
47.The computer memory holds data ? A. Logical Errors
A. Bytes B. Hardware Errors
B. Program C. Language Errors
C. Registers D. Image Errors
D. Bits
54.ROM in computer science stands for?
A. Random Only Memory

Join Our Classroom Program Now


B. Read Out Memory The clock speed of computers is usually
C. Read Only Memory measured in megahertz (MHz) or gigahertz
D. Rotation Only Memory (GHz).
3. Ans. B.
55._________ tells the computer's • The MKDIR command is used to create
memory, arithmetic/logic unit and input new directories.
and output devices how to respond to a • A directory, referred to as a folder in some
program's instructions. operating systems, appears to the user.
A. Storage Unit • RD (or RMDIR) command is used to
B. Input Device Remove (or delete) a directory or
C. Control Unit subdirectory
D. Logic Unit 4. Ans. A.
• Computer performance is characterized
56.In Microsoft Excel, the _______() by the amount of useful work accomplished
function returns the largest value among by a computer system or computer
the values passed as arguments. network compared to the time and
A. HIGHEST resources used.
B. MORE • CPU performance is often measured in
C. HIGH GHz.
D. MAX 5. Ans. B.
• Desktop publishing (abbreviated DTP) is
the creation of documents using page
layout skills on a personal computer.
###ANSWERS### • Desktop publishing software can generate
layouts and produce typographic quality
1. Ans. B. text and images comparable to traditional
• C is a general-purpose, imperative typography and printing. This technology
computer programming language, allows individuals, businesses, and other
supporting structured programming, lexical organizations to self-publish a wide range
variable scope and recursion, while a static of printed matter.
type system prevents many unintended 6. Ans. A.
operations. • Telnet is a user command and an
• By design, C provides constructs that map underlying TCP/IP protocol for accessing
efficiently to typical machine instructions, remote computers.
and therefore it has found lasting use in • Through Telnet, an administrator or
applications that had formerly been coded another user can access someone else's
in assembly language, including operating computer remotely. Telnet helps in remote
systems, as well as various application login.
software for computers ranging from super 7. Ans. A.
computers to embedded systems. C was • The term algorithm is often used to refer
originally developed by Dennis Ritchie to the step-by-step procedure to solve a
between 1969 and 1973 at AT&T Bell Labs. problem
2. Ans. B. • An algorithm is a procedure or formula for
Processor's speed of a computer is solving a problem.
measured in various ways: 8. Ans. D.
• MIPS - Million Instructions Per Second • A personal computer (PC) is a small,
• Flops -Floating-point operations per relatively inexpensive computer designed
second for an individual user. home, the most

Join Our Classroom Program Now


popular use for personal computers is for 14. Ans. A.
playing games. • 3D optical data storage is a form of optical
• Businesses use personal computers for data storage in which information can be
word processing, accounting, desktop recorded or read with three-dimensional
publishing, and for running spreadsheet resolution.
and database management applications. • Data recording and readback are achieved
9. Ans. D. by focusing lasers within the medium.
• Full form of PDF is Portable Document • The disc contains many layers of
Format. information, each at a different depth in the
• It is a file format for storing documents on media and each consisting of a DVD-like
a computer. Each PDF file consists of a spiral track.
complete description of a fixed-layout 15. Ans. B.
document. • Hypertext Markup Language (HTML) is
10. Ans. B. the standard markup language for creating
• Data in terms of Computer is any web pages and web applications. With
collection of numbers, characters or other Cascading Style Sheets (CSS) and
symbols that can be input into a computer JavaScript, it forms a triad of cornerstone
and processed. technologies for the World Wide Web.
• Data on its own has no meaning or • Web browsers receive HTML documents
context, it’s only after processing by a from a web server or from local storage and
computer that data takes on some meaning render them into multimedia web pages.
and becomes Information. • HTML describes the structure of a web
11. Ans. A. page semantically and originally included
• The base of the Octal Numeral System is cues for the appearance of the document.
8. 16. Ans. C.
• Octal system uses digit from 0 to 7. • If you use a font that is not supported by
• Octal numerals can be made from binary a browser, then the next will be displayed
numerals by grouping consecutive binary in the default font. Web-safe fonts are fonts
digits into groups of three. likely to be present on a wide range of
12. Ans. A. computer systems, and used by Web
• The command that merges the contents content authors to increase the likelihood
of one file to another is APPEND. that content displays in their chosen font.
• This is an MS DOS command which is • If a visitor to a Web site does not have the
similar to the PATH command , that specified font, their browser tries to select
enables a user to open files in a specified a similar alternative, based on the author-
directory a if they were in the current specified fallback fonts and generic families
directory. or it uses font substitution defined in the
13. Ans. A. visitor's operating system.
The idea of the integrated circuit was first 17. Ans. D.
conceived by a radar scientist working for
the Royal Radar Establishment of the • An assembly language (or assembler
Ministry of Defence, Geoffrey W.A. language) is a low-level programming
Dummer. language for a computer, or other
• Dummer presented the first public programmable device, in which there is a
description of an integrated circuit at the very strong (generally one-to-one)
Symposium on Progress in Quality correspondence between the language and
Electronic Components in Washington, D.C. the architecture's machine code
on 7 May 1952. instructions.

Join Our Classroom Program Now


• It is an Internet service that translates
• Each assembly language is specific to domain names into IP addresses. These
particular computer architecture, in domain names are alphabetic for they are
contrast to most high-level programming easier to remember, however the Internet
languages, which are generally portable network, is really based on IP addresses.
across multiple architectures, but require • What it means that every time one uses a
interpreting or compiling. domain name, DNS service would translate
the name into the corresponding IP address
• Assembly language is converted into to locate the search subject.
executable machine code by a utility 24. Ans. D.
program referred to as an assembler; the Logarithms were invented independently
conversion process is referred to as by John Napier, a Scotsman. Napier's
assembly, or assembling the code. logarithms were published in 1614.
25. Ans. D.
18. Ans. C. • There are 7 layers in the OSI networking
A register is a very small amount of very layers.
fast memory that is built into the CPU in • Application layer, presentation layer,
order to speed up its operation by providing session layer, transport layer, network
quick access to commonly used values. layer, data-link layer and the physical layer
19. Ans. A. are the 7 OSI networking model layers.
• CD/DVD data is represented as tiny 26. Ans. D.
indentations known as "pits", encoded in • 1024 Gigabytes is equal to 1Terabyte.
a spiral track moulded into the top of the • The prefix Tera represents the fourth
polycarbonate layer. power of 1000, and means 10 ¹² or one
• Pit is used to record information. trillion bytes. The prefix Giga represents 10
20. Ans. C. to the power of 9 bytes.
• The markup language is made up of tags 27. Ans. D.
such as <B> which requests text that • A style sheet language is a computer
follows to be in bold type. language that expresses the presentation
• This bolding is turned off by the inverse of structured documents such as cascading
markup tag </B>. In writing a tag, the style sheet to style documents of HTML,
case of the letters in the tag name is XUL, SVG.
unimportant so that <B> and <b> • The similar contents in the documents can
represent the same tag. be used for various presentations by using
21. Ans. D. CSS to have greater control over
• A port is a place where data can enter or presentations.
leave the computer through some attached 28. Ans. D.
device. • The Unix operating system was developed
• The port is used to refer to both physical in the 1970s at the Bell Labs research
connections and their software address.The centre by Ken Thompson, Dennis Ritchie
OS manages the use of the ports. and others.
22. Ans. C. • It is a family of multitasking, multiuser
• A bit is the basic unit of information in computer operating systems.
computing and digital communications. 29. Ans. D.
• The byte is a unit of digital information
that most commonly consists of eight bits. • Java is a set of several computer
23. Ans. A. software and specifications developed
• DNS refers to the Domain Name system. by Sun Microsystems, later acquired by

Join Our Classroom Program Now


Oracle Corporation, that provides a system • A computer virus is a malware program
for developing application software and that, when executed, replicates by
deploying it in a cross-platform computing inserting copies of itself into other
environment. computer programs, data files, or the boot
sector of the hard drive; when this
• Java is used in a wide variety of replication succeeds, the affected areas are
computing platforms from embedded then said to be "infected".
devices and mobile phones to enterprise 34. Ans. B.
servers and supercomputers. • Virtual Reality (VR), which can be
referred to as immersive multimedia or
30. Ans. D. computer-simulated life, replicates an
• The kilobyte is a multiple of the unit byte environment that simulates physical
for digital information. presence in places in the real world or
• In some fields of information technology imagined worlds and lets the user interact
kilobyte has traditionally used to denote in that world.
1024 (210) bytes, which arises from binary • Virtual reality artificially creates sensory
exponentiation common to digital circuitry. experiences, which can include sight,
31. Ans. C. hearing, touch, smell, and taste.
• A collection of HTML pages makes up the 35. Ans. C.
World Wide Web. The World Wide Web • The time between program input and
(www) is an information space where output is called Execution time.
documents and other web resources are • It makes up the last half of the instruction
identified by URLs, interlinked by hypertext cycle.
links, and can be accessed via the Internet.
It has become known simply as the Web. 36. Ans. B.
• The World Wide Web was central to the • An IP address has 32 bits. An Internet
development of the Information Age and is Protocol address is a numerical label
the primary tool billions of people use to assigned to all the devices which are
interact on the Internet. connected to a computer network and uses
32. Ans. C. the Internet for communication and helps
• Hybrid computers are computers that in network interface identification and
exhibit features of analog computers and location addressing.
digital computers. • Version 4 of internet protocol has 32 bits
• The digital component normally serves as address, while the newer version 6 of
the controller and provides logical and internet protocol has 128 bit address.
numerical operations, while the analog 37. Ans. A.
component often serves as a solver of • The transfer of data from one application
differential equations and other to another in a computer system is known
mathematically complex equations. as Dynamic Data Exchange.
• The advantages of analog computers are • It does it using a client/server relationship
that they show the solutions in a simple in which a client application is sent to
and graphical manner in little time. In a request information from a server
digital computer the real time changes application.
require complex programming and • It is mostly used in off the shelf software
graphical programs. of windows and OS.
Hence option C is the right answer. 38. Ans. B.
33. Ans. C.

Join Our Classroom Program Now


• A set of instruction executed directly by a • This means it functions as a mediator
computer’s central processing unit is between the hardware and software
Machine Language. running within the operating system.
43. Ans. D.
• Each instruction performs a very specific • A compiler is a computer program that
task, such as a load, a jump, or an ALU transforms a source code written in a
operation on a unit of data in a CPU register programming language into another
or memory. computer language.
• The name "compiler" is primarily used for
39. Ans. B. programs that translate source code from a
• Java was developed by Sun Microsystems high-level programming language to a
which was recently acquired by Oracle lower-level language. (e.g., assembly
corporation. language or machine code).
• Java is a general-purpose computer So, option D is the correct answer.
programming language which is object- 44. Ans. B.
oriented and allows developers to "write • Every bank branch is given a unique MICR
once, run on all platforms without code and this helps the RBI to identify the
recompilation." bank branch and speed up the clearing
40. Ans. C. process.
• Microsoft Excel is a spreadsheet • The MICR code has nine digits in it with
developed by Microsoft for Windows, every three digits signifying some
macOS, Android and iOS. important information about the
• It features calculation, graphing tools, transaction and the bank.
pivot tables, and a macro programming 45. Ans. C.
language called Visual Basic for • In electronic systems and computing,
Applications. firmware is a type of software that provides
• The Excel MIN function returns the control, monitoring and data manipulation
smallest value from a supplied set of of engineered products and systems.
numeric values.The syntax of the function Typical examples of devices containing
is:MIN( number1, [number2], ... )where firmware are embedded systems (such as
the number arguments are one or more traffic lights, consumer appliances, and
numeric values (or arrays of numeric digital watches), computers, computer
values), that you want to return the peripherals, mobile phones, and digital
smallest value of. cameras.
41. Ans. A. • The firmware contained in these devices
• PARAM is a series of supercomputers provides the low-level control program for
designed and assembled by the Centre for the device. As of 2013, most firmware can
Development of Advanced Computing (C- be updated.
DAC) in Pune, India. 46. Ans. A.
• In this series, the latest machine is • The computer does its primary work in a
PARAM ISHAN. The PARAM series unveiled part of the machine we cannot see, a
in 1991 with PARAM 8000. control center that converts data input to
42. Ans. A. information output.
• The operating system keeps constant • This control center, called the central
communication with the internal hardware processing unit (CPU), is a highly complex,
(CPU, memory, storage devices, etc.) to extensive set of electronic circuitry that
provide efficient execution of other executes stored program instructions.
programs.

Join Our Classroom Program Now


While the computer executes a program, abnormally (or crash). It produces
the program is held in RAM. unintended or undesired output or other
47. Ans. B. behavior. These errors are found by
• Computer memory refers to the physical compiler when something goes wrong with
devices used to store programs (sequence your program, and you can't even try to
of instructions) or data execute it.
• Before a program can run, the program is 54. Ans. C.
loaded from some storage medium into the • ROM in computer science is abbreviated
memory. as Read Only Memory. It is a built-in
48. Ans. C. computer memory containing data
• An operating system (OS) is system permanently that normally can only be
software that manages computer hardware read, not written to.
and software resources and provides • It contains the programming that allows
common services for computer programs. your computer to be "booted up" each time
• The operating system is a component of when turned on.
the system software in a computer 55. Ans. C.
system. Application programs usually • Control unit tells the computer’s memory,
require an operating system to function. arithmetic/logic unit and input and output
49. Ans. D. devices how to respond to a program’s
• Ultimately, programs written in a high- instructions.
level language must be translated into • A CU component is considered the
machine language by a compiler or processor brain because it issues orders to
interpreter. just about everything and ensures correct
• The first high-level programming instruction execution.
languages were designed in the 1950s. 56. Ans. D.
Now there are dozens of different • Microsoft Excel is a spreadsheet
languages, including Ada, Algol,BASIC, developed by Microsoft for Windows,
COBOL, C, C++, FORTRAN, LISP, Pascal, macOS, Android and iOS.
and Prolog. • It features calculation, graphing tools,
50. Ans. B. pivot tables, and a macro programming
Personal Computer Extended Technology language called Visual Basic for
or PC – XT is a class of personal computers Applications.
released by IBM in 1983. • The Excel MAX function returns the
51. Ans. A. largest value from a supplied set of
Data definition is the Creation, numeric values. The syntax of the function
modification, and removal of definitions is: MAX (number1, [number2], ... )where
that define the organization of the data. the number arguments are one or more
52. Ans. B. numeric values (or arrays of numeric
• The mascot of Linux operating system is values), that you want to return the largest
penguin. value of.
• The mascot of Linux penguin is known as
TUX and the concept of mascot was
invented by Linux Torvald. Recently, linux
has decided to change its mascot to FOSS.
53. Ans. A.
In computer programming, a logical erroris
a bug in a program that causes it to operate
incorrectly, but not to terminate

Join Our Classroom Program Now


www.gradeup.co

12

You might also like