Computer Awareness MCQ's Practice Set - 2

Computer Awareness Quiz
Dear Readers,
Welcome to Mentor for Bank Exams. Here I am sharing the Computer Awareness MCQ’s Practice set – 2 with 50 MCQ’s. A link for downloading the PDF is provided at the end of the post. Do visit daily for more MCQ’s like this. Kindly make use of this!!!

1. The vast network of computers that connects millions of people all over the world is called ________
1) LAN
2) Web
3) Hypertext
4) Internet
2. The property that, when classes are arranged in a hierarchy each class assumes the attributes and methods of its ancestors is ________
1) Generalization
2) Inheritance
3) Encapsulation
4) Information hidings
3. The software component of an experts system that draws conclusion is the _____
1) User interface
2) Database
3) Inference engine
4) I/O Controller
4. The attributes and methods for each object are stored in ________
1) An object instance
2) An object connection
3) An assembly structure
4) An object repository
5. One advantage of dial up Internet access is ____________
1) It utilizes broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
6. What is backup?
1) Adding more component to your network
2) Protecting data by copying it from the original store to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
7. Which of the following is true?
1) Byte is a single digit a binary number
2) Bit represents a grouping of digital numbers
3) Eight digit binary number is called a byte
4) Eight digit binary number is called a bit
8. A hard copy of a file created on a computer refers to data
1) Saved on a floppy disk
2) Printed on a printer
3) Backed up on a tape drive
4) Sent as an e-mail
9. A ________ is an organised collection of data about a single entity.
1) File
2) Library
3) Database
4) Dictionary
10. Something which ahs easily understood instruction is said to be
1) User friendly
2) Information
3) Word processing
4) Icon
11. Hardware devices that are not part of the main computer system and are often added later to the system are _________
1) Clip art
2) Highlight
3) Execute
4) Peripherals
12. All of the following are examples of real security and privacy risks EXCEPT
1) Hackers
2) Spam
3) Viruses
4) Identity theft
13. If you want to move an icon on your desktop, this is called ________
1) Double clicking
2) Highlighting
3) Dragging
4) Pointing
14. A computer checks the ________ of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
15. Computers that the portable and convention for users who travel are known as ________
1) Supercomputers
2) Laptops
3) Minicomputers
4) Files servers
16. A MODEM is connected in between a telephone line and a ________
1) Network
2) Computer
3) Communication adapter
4) Serial port
17. Window is __________ and window 95, window 98 are __________
1) Graphical user interface, operating system
2) Graphics useful interface, Executing system
3) Graph user interval, Expert systems
4) Graphical Use interface, Excel systems
18. The most widely used input device is the _________
1) Mouse
2) Keyboard
3) Modem
4) Monitor
19. the blinking symbol which indicates the next character will appear at which place, is called ____
1) Delete key
2) Control key
3) Cursor
4) Return key
20. A small figure which depicts some application on the screen is called
1) Menu
2) Photo
3) Modem
4) Icon
21. A(n) _________ is a small group of computers and peripherals linked together in a small geographical area.
1) MAN
2) PAN
3) CAN
4) LAN
22. .bas,.doc.and.htm are examples of
1) Database
2) Extension
3) Domain
4) Protocol
23. Saving is the process
1) To copy document form memory to storage medium
2) To change the content of any document
3) To change the display or entire document
4) To develop document by entering text using keyboard
24. _______ is the process of implementing command
1) Fetching
2) Storing
3) Decoding
4) Executing
25. __________ printed information, exists in real sense and is more permanent from of output than the output existing of display device.
1) Soft copy
2) Carbon copy
3) Hard copy
4) Desk copy
26. To move to the beginning of a line of text, press the _________ key
1) Home
2) Page up
3) Enter
4) Alt
27. When sending an e-mail, the ______ line describes the contents of message.
1) To
2) Subject
3) Contents
4) Cc
28. Which grouping do you work with when formatting text in world?
1) Tables, paragraphs and indexes
2) Paragraph, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) All of these
29. A __________ is a computer attached to the Internet that runs a special web server software and can send web pages out to other computers over the Internet.
1) Web client
2) Web system
3) Web page
4) Web server
30. C, BASCI, COBOL, and Java are examples of __________ languages
1) Low-level
2) Computer
3) System programming
4) High-level
31. Deleted data remains on a disk until
1) The data is overwritten
2) The recycle bin is emptied
3) A file compression utility is used
4) The disk is scanned
32. The ________ enables your computer to connect on other computers.
1) Video card
2) Sound card
3) Network interface card
4) Controller card
33. What menu is selected to save or save us?
1) Tools
2) File
3) Format
4) Edit
34. To make the umber pad act a directional arrows, you
1) Num lock
2) Caps lock
3) Arrows lock
4) Shift
35. A button that makes characters either upper or lower case or numbers to symbols.
1) Monitor
2) Shift key
3) icon
4) mouse
36. To access a mainframe or super computer, users often use a __________
1) terminal
2) node
3) desktop
4) handheld
37. office LANs that are spread geographically apart on a lagged scale can be connected using a corporate __________
1) CAM
2) LAN
3) WNA
4) MAN
38. CPU ________________
1) Contains the electronic circuits that cause processing to occur
2) Make the information resulting form processing available for use
3) Allows data, programs, commands, and user responses to be entered into a computer.
4) consist of electronic components that store data
39. Which process checks to ensure the components of the computer are operating and connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
40. How can the user determine what programmes are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list for installed programmes
4) Checking for existing files saved on the disk
41. If you type a work that is not in Word’s dictionary, a wavy _______ underline appears below the word.
1) Red
2) Green
3) Blue
4) Black
42. Which of the following is considered a vulnerability of SNMP?
1) Clear text community strings
2) Its use of TCP
3) The fact that is this on by default in widows 2000 server
4) The fact that it is on by default in window XP professionally
43. Network routing information distributed among routers is stored in which of the following?
1) Flash memory
2) Route table
3) Metric table
4) Router memory
44. If the destination did not receive a segment, how will the TCP hasty know to resend the information?
1) The ACK received will not include the segment number that was not received
2) The ACK received will include the segment numbers that was not received
3) The sending host will send a PACK to verify segments receipts
4) The distinction host will send a YACK message to the sending host.
45. Small application programs that run on a Web page and my ensure a form is completed properly for provides animation are known as __________
1) Flash
2) Spiders
3) Cookies
4) Applets
46. Several computers linked to a server to share progress and strogae space are in
1) Network
2) Grouping
3) Library
4) Integrated system
47. Soft copy refers to __________
1) Printed output
2) Music sounds
3) Screen output
4) All of these
48. The software that allows users to surf the Internet is called is
1) Search engine
2) Internet Service Provider
3) Multimedia application
4) Browser
49. A tuple is a
1) Column of a table
2) Two dimensional table
3) Row of a table
4) Key of a table
50. The method of file organization in which data records in a file are arranged in a specified order according to key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method

Thank you,
Keep Visiting,
Like my Facebook page for getting the updates.