Computer Awareness MCQ's Practice Set - 8

Mentor for Bank Exams

Computer Awareness MCQ's Practice Set - 8

1. Which part is the “brain” of the computer?
1) CPU
2) Monitor
3) RAM
4) ROM

2. Something which has easily-understood instructions is said to be
1) Information
2) Word-processing
3) User friendly
4) Icon
3. Information on a computer is stored as
1) Analog data
2) Digital data
3) Modern data
4) Watts data
4. For creating a document, you use _____ command at file menu.
1) New
2) Open
3) Document
4) Type
5. ______ is data that has been organized or presented in a meaningful fashion.
1) A process
2) Storage
3) Software
4) Information
6. A ______ contains buttons and menus that provide quick access to commonly used commands.
1) Menu bar
2) Toolbar
3) Window
4) Find
7. Letters, numbers and symbols found on a keyboard are ______
1) Icon
2) Screen
3) Keys
4) Menu
8. Which is not an item of hardware?
1) An MP3 file
2) A keyboard
3) A disk drive
4) A monitor
9. A (n) ______ is created by an application.
1) Executable file
2) Software program
3) Document
4) O/S
10. Storage media such as a CD read and write information using ________
1) Laser beam of red light
2) Magnetic dots
3) Magnetic strips
4) All of the above
11. Vendor-created program modification are called _______
1) Patches
2) Antivirus
3) Holes
4) Fixes
12. When we open an Internet site we see www. What is the full form of www?
1) World wide wakeups
2) World wide web
3) Word wading works
4) World wide Spiderman web
13. What do you use to create a chart?
1) Pei Wizard
2) Excel Wizard
3) Data Wizard
4) Chart Wizard
14. The effect the ROLLBACK command in a transactions is the following:
1) Undo all changes to the database resulting form the execution of the transaction
2) Undo the effects of the last UPDATE command
3) Restore the content of the database to its state at the end of the previous day
4) Make sure that all changes to the database are in effect
15. Each of the following is a true statement except;
1) Online systems continually update the master file
2) In online processing, the user enters transactions into a device that is directly connected to the computer system.
3) Batch processing is still used today in older systems or in some systems with massive columns of transactions.
4) Information in batch systems will always be up-to-date
16. When you save to ______ your data will remain intact even with the computer is turned off.
1) RAM
2) Motherboard
3) Secondary storage device
4) Primary storage device
17. The motherboard is the
1) Circuit board that houses peripheral devices
2) Same as the CPU chip
3) The first chip that is accessed when the computer is turned 0n
4) Circuit board that contains a CPU and other chips
18. Each box in a spreadsheet is called a
1) Cell
2) Empty space
3) Record
4) Field
19. What is the term for unsolicited e-mail
1) Newsgroup
2) Usenet
3) Flaming
4) spam
20. The ability to easily add additional users means that a network is
1) Icon
2) Hyperlink
3) Menu
4) Source derived
21. To take information form one source and bring it to your computer is referred to as _____
1) Upload
2) Download
3) Transfer
4) De-link
22. Under link text, such as text and folder names is referred to as a ______
1) Icon
2) Hyperlink
3) Menu
4) Source drive
23. Junk e-mail is also called _______
1) Spam
2) Spoof
3) Sniffer script
4) Spool
24. What is the most common way to get a virus in your computer’s hard disk?
1) By installing games form their CD ROMs
2) By uploading pictures form mobile phones to the computer
3) By opening emails
4) By sending e-mails
25. What is the default extension for all word documents?
1) WRD
2) TXT
3) DOC
4) FIL
26. The keys labeled 0-9 on the keyboards are called ________
1) Function keys
2) Numeric keys
3) Typewriter keys
4) Special keys
27. In a spreadsheet, a cell is defined as the ______
1) Intersection of a table and a duplet
2) Intersection of a file and a database
3) Intersection of a row and column
4) Intersection of a field and a record
28. The basic goal of computer process is to convert data into ______
1) Information
2) Tables
3) Files
4) Graphs
29. Dumb terminals have terminal and ______
1) Mouse
2) Speaker
3) Keyboard
4) Mouse or speaker
30. _______ is when the more power-hungry components, such as the monitor and the hard drive are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
31. To shrink a window to an icon _____
1) Open a group window
2) Minimize a window
3) Maximize a window
4) Restore a window
32. Personal computers can be connected together to form a ______
1) Server
2) Supercomputer
3) Enterprise
4) Network
33. What characteristic of read-only memory (ROM) makes it useful?
1) ROM information can be easily updated
2) Data in ROM is nonvolatile, that is, remains there even without electrical power
3) ROM provides very large amounts of expensive data storage
4) ROM chips are easily swapped between different brands of computers.
34. By CD you can
1) Read
2) Write
3) Read and write
4) Either Read or Write
35. The Word function that corrects text as you type is referred to as
1) Auto Summarize
2) Auto Insert
3) Auto Correct
4) Track Changes
36. To combine two or more cells into a single cell is called
1) Merging
2) Joining
3) Sharing
4) Splitting
37. _______ is when the computer is turned on and the O/S is loading
1) Booting
2) Flashing
3) Tracking
4) Taping
38. A device that connects to a network without the use of cables is said to be ______
1) Distributed
2) Wireless
3) Centralized
4) Open source
39. The particular field of a record that uniquely identifies each record is called the ______
1) Key field
2) Primary field
3) Master field
4) Order field
40. A CPU contains _______
1) A card reader and a printing device
2) An analytical engine and a control unit
3) A control unit and an arithmetic logic unit
4) An arithmetic logic unit and a card reader
41. A computer cannot “boot” if it does not have the _______
1) Complier
2) Loader
3) O/S
4) Assembler
42. The ___ key and the _______ key can be used in combination with other keys to perform shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
43. When you quickly press and realize the left mouse button twice you are ______
1) Primary-clicking
2) Pointing
3) Double-clicking
4) Secondary-clicking
44. What is the process of copying software program form secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
45. _______ provides the means to move the pointer on the screen and give information to the computer by clicking it buttons.
1) Scanner
2) Mouse
3) Keyboard
4) Program
46. Even if a disk fails, the computer applications running and using it can continue processing. This application is said to have been designed with this feature called.
1) 100 percent up-time
2) Fault tolerance
3) High reliability
4) All of these
47. Two or more computers connected to each other sharing information form a ______
1) Network
2) Router
3) Server
4) Tunnel
48. A computer-intensive problem runs on a _______
1) Server
2) Mainframe
3) Supercomputer
4) Super PC
49. Programs that automatically submit your search request to several search engines simultaneously are called.
1) Met search engines
2) Web crawlers
3) Spiders
4) Hits
50. Which of the following describes programs that can run independently, travel from system to system, and disrupt computer communications?
1) Trojans
2) Viruses
3) Idlers
4) Droppers